IOC Report
DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0ekzbwv0.p1r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wjuv0yg.gdq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_45trmmj0.et1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4affsnnl.cx0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4k4ffrjg.rsw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5d2ki1vs.kv5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cp2etgf2.dg3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dqkphgh1.ems.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esz3eelj.ihu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ghjd1qdr.q0h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ji3rva4a.kx0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l52mmcxd.dra.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1wssa4w.kiu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nobnflej.mbh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_voj25otp.zt1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z53vlonu.rh4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Sep 26 06:29:55 2024, mtime=Thu Sep 26 06:29:55 2024, atime=Thu Sep 26 06:29:55 2024, length=467456, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
malicious
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
malicious
C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe
"C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DRAFT BL - CLS930 KHH-TOLEDO(VIA NYC) SO6615#U21928152 WKH2406122.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
104.250.180.178
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.fontbureau.com/designers?
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.tiro.com
unknown
http://www.microsoft.
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://github.com/Pester/Pester
unknown
http://www.microsoft.dgx
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://crl.micro
unknown
http://crl.microso
unknown
https://aka.ms/pscore6lBdq
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.micr.
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 34 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2911000
trusted library allocation
page read and write
malicious
2B01000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
29D8000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
84D4000
heap
page read and write
8510000
trusted library allocation
page read and write
4D16000
trusted library allocation
page read and write
4BFD000
stack
page read and write
5F70000
heap
page read and write
499D000
trusted library allocation
page read and write
7840000
trusted library allocation
page read and write
7F0D000
stack
page read and write
2858000
trusted library allocation
page read and write
2BED000
trusted library allocation
page execute and read and write
7F80000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
71FB000
heap
page read and write
2EB9000
trusted library allocation
page read and write
3147000
heap
page read and write
5B79000
trusted library allocation
page read and write
EEE000
stack
page read and write
774E000
heap
page read and write
3272000
trusted library allocation
page read and write
7AD8000
trusted library allocation
page read and write
8062000
heap
page read and write
3B01000
trusted library allocation
page read and write
4F0000
unkown
page readonly
76E0000
trusted library allocation
page read and write
6F80000
heap
page read and write
2E6E000
stack
page read and write
28BE000
stack
page read and write
7110000
trusted library allocation
page read and write
D10000
trusted library allocation
page execute and read and write
6C89000
stack
page read and write
5286000
trusted library allocation
page read and write
4CD9000
trusted library allocation
page read and write
86D0000
trusted library allocation
page read and write
2CD0000
heap
page read and write
5DC6000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
5CF7000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
71BE000
stack
page read and write
3290000
trusted library allocation
page read and write
748C000
heap
page read and write
726E000
stack
page read and write
FA0000
heap
page read and write
2E78000
stack
page read and write
2FC3000
trusted library allocation
page execute and read and write
7820000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
815B000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
ABD000
heap
page read and write
791E000
stack
page read and write
7A40000
trusted library allocation
page read and write
8640000
trusted library allocation
page read and write
486E000
stack
page read and write
7400000
trusted library allocation
page read and write
3330000
heap
page read and write
8711000
heap
page read and write
D20000
heap
page read and write
715A000
heap
page read and write
59D0000
heap
page read and write
55A1000
trusted library allocation
page read and write
4A41000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
8222000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
2A68000
heap
page read and write
5F81000
trusted library allocation
page read and write
6C4E000
stack
page read and write
E87000
trusted library allocation
page execute and read and write
A50000
heap
page read and write
3010000
trusted library allocation
page read and write
80ED000
heap
page read and write
2A50000
trusted library allocation
page read and write
D4D000
trusted library allocation
page execute and read and write
8720000
trusted library allocation
page read and write
47AF000
stack
page read and write
862E000
stack
page read and write
775E000
heap
page read and write
2AD5000
heap
page read and write
54FE000
stack
page read and write
7740000
trusted library allocation
page read and write
C64000
trusted library allocation
page read and write
833E000
heap
page read and write
845C000
stack
page read and write
71C0000
heap
page read and write
6F2E000
stack
page read and write
74E4000
heap
page read and write
3BD8000
trusted library allocation
page read and write
709B000
stack
page read and write
2A40000
trusted library section
page read and write
5FA000
stack
page read and write
767D000
stack
page read and write
749E000
heap
page read and write
87C9000
heap
page read and write
A78000
heap
page read and write
2B9E000
stack
page read and write
2DE5000
heap
page read and write
326A000
trusted library allocation
page execute and read and write
2C68000
trusted library allocation
page read and write
6C3A000
stack
page read and write
892D000
stack
page read and write
E29000
heap
page read and write
A40000
heap
page read and write
85C0000
heap
page read and write
5DCD000
trusted library allocation
page read and write
84E0000
heap
page read and write
52B0000
heap
page read and write
2C88000
heap
page read and write
7F77000
trusted library allocation
page read and write
6C8C000
stack
page read and write
2C00000
trusted library allocation
page read and write
4FD5000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
4F34000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
4B40000
heap
page execute and read and write
4BAB000
trusted library allocation
page read and write
5030000
heap
page read and write
48F2000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
50A0000
heap
page execute and read and write
8354000
heap
page read and write
6EAE000
heap
page read and write
2C10000
trusted library allocation
page read and write
2AFD000
stack
page read and write
7486000
heap
page read and write
81CE000
stack
page read and write
2960000
heap
page read and write
7690000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
4977000
heap
page read and write
2F7E000
stack
page read and write
3378000
heap
page read and write
8472000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
29FF000
stack
page read and write
893E000
stack
page read and write
6D8D000
stack
page read and write
8150000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
D30000
heap
page read and write
4B05000
trusted library allocation
page read and write
75D2000
heap
page read and write
7755000
heap
page read and write
313A000
heap
page read and write
78B000
stack
page read and write
7F130000
trusted library allocation
page execute and read and write
3000000
heap
page read and write
2F00000
heap
page readonly
7AC0000
trusted library allocation
page read and write
52F0000
heap
page read and write
6D65000
heap
page execute and read and write
6A8E000
stack
page read and write
5093000
heap
page read and write
7370000
trusted library allocation
page read and write
58B1000
trusted library allocation
page read and write
318B000
heap
page read and write
2C25000
trusted library allocation
page execute and read and write
5F30000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
3070000
trusted library allocation
page execute and read and write
87B7000
heap
page read and write
5407000
trusted library allocation
page read and write
2BDF000
stack
page read and write
72AA000
stack
page read and write
51D0000
heap
page execute and read and write
752D000
heap
page read and write
5D99000
stack
page read and write
86BD000
stack
page read and write
8500000
trusted library allocation
page read and write
8630000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
73A0000
heap
page read and write
2E90000
heap
page read and write
45A1000
trusted library allocation
page read and write
85A9000
stack
page read and write
803C000
heap
page read and write
495C000
stack
page read and write
4E33000
heap
page read and write
2C09000
trusted library allocation
page read and write
55A8000
trusted library allocation
page read and write
4B3E000
stack
page read and write
5D6B000
trusted library allocation
page read and write
76DA000
trusted library allocation
page read and write
2A30000
trusted library section
page read and write
5D67000
trusted library allocation
page read and write
703C000
stack
page read and write
8420000
trusted library allocation
page read and write
82EC000
heap
page read and write
8A50000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
D43000
trusted library allocation
page execute and read and write
885E000
stack
page read and write
850B000
trusted library allocation
page read and write
6F5E000
stack
page read and write
5265000
trusted library allocation
page read and write
7522000
heap
page read and write
330E000
stack
page read and write
8085000
heap
page read and write
734F000
stack
page read and write
74E9000
heap
page read and write
4DD0000
heap
page read and write
6B0F000
stack
page read and write
561A000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
8BEE000
stack
page read and write
718C000
stack
page read and write
80B7000
heap
page read and write
2C80000
heap
page read and write
7820000
trusted library allocation
page read and write
7F758000
trusted library allocation
page execute and read and write
72A0000
trusted library allocation
page read and write
77C0000
heap
page read and write
4D24000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
718F000
heap
page read and write
71FE000
stack
page read and write
80E7000
heap
page read and write
7207000
heap
page read and write
6EEA000
stack
page read and write
725E000
stack
page read and write
44EE000
stack
page read and write
D53000
trusted library allocation
page read and write
4CDB000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
6F9A000
stack
page read and write
32A0000
heap
page readonly
80FD000
heap
page read and write
77A6000
heap
page read and write
2C1A000
trusted library allocation
page execute and read and write
5BC9000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
E7A000
trusted library allocation
page execute and read and write
80DF000
heap
page read and write
6E3A000
stack
page read and write
2F44000
heap
page read and write
6D0E000
stack
page read and write
D40000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
2E0D000
stack
page read and write
7120000
heap
page read and write
727E000
stack
page read and write
878D000
stack
page read and write
7F50000
heap
page read and write
2EA4000
trusted library allocation
page read and write
E1B000
heap
page read and write
CA7000
trusted library allocation
page execute and read and write
5747000
trusted library allocation
page read and write
88B3000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
6F7E000
stack
page read and write
7F148000
trusted library allocation
page execute and read and write
722F000
stack
page read and write
7400000
heap
page read and write
6AFD000
stack
page read and write
7F60000
trusted library allocation
page execute and read and write
2C00000
heap
page read and write
71B4000
heap
page read and write
74CB000
heap
page read and write
29EF000
stack
page read and write
2870000
heap
page read and write
7458000
heap
page read and write
5216000
trusted library allocation
page read and write
83C4000
heap
page read and write
5DC1000
trusted library allocation
page read and write
CA2000
trusted library allocation
page read and write
2ECA000
trusted library allocation
page execute and read and write
5744000
trusted library allocation
page read and write
84C0000
heap
page read and write
70DE000
stack
page read and write
30CE000
stack
page read and write
2A60000
heap
page read and write
308D000
stack
page read and write
8034000
heap
page read and write
2ED0000
trusted library allocation
page read and write
2966000
heap
page read and write
3337000
heap
page read and write
74EE000
stack
page read and write
889C000
stack
page read and write
52E6000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
7591000
heap
page read and write
2EAD000
trusted library allocation
page execute and read and write
83A4000
heap
page read and write
D30000
trusted library allocation
page read and write
F4C000
stack
page read and write
7550000
trusted library allocation
page read and write
F8E000
stack
page read and write
25BC000
stack
page read and write
76F0000
trusted library allocation
page read and write
32C0000
heap
page execute and read and write
67FD000
heap
page read and write
2900000
heap
page execute and read and write
752E000
stack
page read and write
74A1000
heap
page read and write
2FEA000
trusted library allocation
page execute and read and write
8260000
trusted library allocation
page read and write
7F740000
trusted library allocation
page execute and read and write
4D50000
trusted library allocation
page read and write
7219000
heap
page read and write
777E000
stack
page read and write
2F80000
trusted library allocation
page execute and read and write
7499000
heap
page read and write
83C0000
trusted library allocation
page read and write
741D000
heap
page read and write
856D000
heap
page read and write
2EF0000
heap
page read and write
835D000
stack
page read and write
756E000
stack
page read and write
5754000
trusted library allocation
page read and write
2950000
heap
page read and write
5B19000
stack
page read and write
7460000
trusted library allocation
page read and write
4F2000
unkown
page readonly
D5D000
trusted library allocation
page execute and read and write
88BE000
stack
page read and write
F8D000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
3089000
heap
page read and write
2A10000
heap
page read and write
71C0000
trusted library section
page read and write
2B50000
heap
page read and write
820E000
stack
page read and write
7055000
heap
page execute and read and write
CEE000
stack
page read and write
2E3C000
stack
page read and write
8A1D000
stack
page read and write
52EA000
trusted library allocation
page read and write
691E000
stack
page read and write
7870000
trusted library allocation
page read and write
8A9D000
stack
page read and write
77BE000
stack
page read and write
7538000
heap
page read and write
58F8000
trusted library allocation
page read and write
5A23000
trusted library allocation
page read and write
74BB000
heap
page read and write
5B51000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
744D000
heap
page read and write
7A80000
trusted library allocation
page read and write
8028000
heap
page read and write
74F3000
heap
page read and write
836C000
heap
page read and write
A70000
heap
page read and write
8D2D000
stack
page read and write
284E000
stack
page read and write
4C22000
trusted library allocation
page read and write
8210000
heap
page read and write
8705000
heap
page read and write
86E4000
heap
page read and write
6A4E000
stack
page read and write
6DBB000
stack
page read and write
F86000
trusted library allocation
page read and write
7747000
heap
page read and write
5080000
heap
page read and write
6BFC000
stack
page read and write
52DE000
heap
page read and write
4430000
trusted library allocation
page execute and read and write
5E00000
heap
page read and write
44AE000
stack
page read and write
83B2000
heap
page read and write
795B000
stack
page read and write
7A30000
trusted library allocation
page execute and read and write
83B8000
heap
page read and write
58B9000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
5A1A000
stack
page read and write
6AC2000
trusted library allocation
page read and write
7568000
heap
page read and write
4E40000
heap
page read and write
8130000
heap
page read and write
792E000
stack
page read and write
73BA000
heap
page read and write
7AB0000
trusted library allocation
page read and write
503A000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page execute and read and write
6D7E000
stack
page read and write
FA7000
heap
page read and write
782A000
trusted library allocation
page read and write
3080000
heap
page read and write
7850000
trusted library allocation
page read and write
7F4F000
stack
page read and write
7450000
trusted library allocation
page read and write
82C0000
heap
page read and write
825E000
stack
page read and write
5CF4000
trusted library allocation
page read and write
6B4C000
stack
page read and write
7E90000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
3370000
heap
page read and write
AB6000
heap
page read and write
54DE000
stack
page read and write
8713000
trusted library allocation
page read and write
4FD7000
trusted library allocation
page read and write
48AE000
stack
page read and write
2F41000
heap
page read and write
46F6000
trusted library allocation
page read and write
8520000
trusted library allocation
page execute and read and write
78A0000
trusted library allocation
page read and write
4440000
trusted library allocation
page read and write
4AFD000
trusted library allocation
page read and write
8ADE000
stack
page read and write
77FD000
stack
page read and write
5608000
trusted library allocation
page read and write
4E09000
trusted library allocation
page read and write
AB9000
heap
page read and write
4A0E000
stack
page read and write
3060000
heap
page readonly
5DAB000
trusted library allocation
page read and write
C70000
heap
page read and write
2F90000
heap
page read and write
5DBE000
trusted library allocation
page read and write
55AC000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
2B40000
heap
page read and write
5060000
trusted library allocation
page execute and read and write
2E2E000
stack
page read and write
5DA4000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
7E80000
trusted library allocation
page execute and read and write
8332000
heap
page read and write
5B59000
trusted library allocation
page read and write
7E9D000
trusted library allocation
page read and write
83EE000
stack
page read and write
7379000
trusted library allocation
page read and write
857D000
stack
page read and write
7A20000
trusted library allocation
page read and write
D50000
heap
page read and write
5D53000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page execute and read and write
276E000
stack
page read and write
4B5E000
stack
page read and write
82EB000
trusted library allocation
page read and write
763E000
stack
page read and write
82E3000
heap
page read and write
7F120000
trusted library allocation
page execute and read and write
2FE0000
trusted library allocation
page read and write
705D000
stack
page read and write
61D0000
heap
page read and write
7680000
trusted library allocation
page read and write
738E000
stack
page read and write
7480000
trusted library allocation
page read and write
31EA000
heap
page read and write
7A2E000
stack
page read and write
2B0F000
trusted library allocation
page read and write
960000
heap
page read and write
2FC0000
trusted library allocation
page read and write
7A1D000
stack
page read and write
4DF0000
trusted library allocation
page execute and read and write
5DE9000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
74B4000
heap
page read and write
8715000
heap
page read and write
5C9C000
stack
page read and write
5DA0000
trusted library allocation
page read and write
7205000
heap
page read and write
701F000
stack
page read and write
76D0000
heap
page read and write
2FC8000
heap
page read and write
8160000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
C9A000
trusted library allocation
page execute and read and write
86C0000
trusted library allocation
page read and write
8022000
heap
page read and write
5891000
trusted library allocation
page read and write
8740000
trusted library allocation
page execute and read and write
52D9000
trusted library allocation
page read and write
F81000
trusted library allocation
page read and write
7827000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
746E000
heap
page read and write
6C0E000
stack
page read and write
787E000
stack
page read and write
8A40000
trusted library allocation
page read and write
73CD000
stack
page read and write
6ECE000
stack
page read and write
587F000
stack
page read and write
773E000
stack
page read and write
74F0000
heap
page read and write
736E000
stack
page read and write
7489000
heap
page read and write
4CB8000
trusted library allocation
page read and write
8512000
heap
page read and write
71D5000
heap
page read and write
73F0000
trusted library allocation
page execute and read and write
2E70000
heap
page read and write
7F0000
heap
page read and write
781E000
stack
page read and write
55C9000
trusted library allocation
page read and write
5F60000
trusted library allocation
page execute and read and write
2BF7000
heap
page read and write
8120000
heap
page read and write
25F8000
stack
page read and write
83A0000
heap
page read and write
74AA000
heap
page read and write
5020000
trusted library section
page readonly
82ED000
trusted library allocation
page read and write
69E0000
heap
page execute and read and write
2BDE000
stack
page read and write
87A3000
heap
page read and write
4D90000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
4B9C000
stack
page read and write
54BE000
stack
page read and write
4A4F000
stack
page read and write
CAB000
trusted library allocation
page execute and read and write
B0A000
heap
page read and write
A7E000
heap
page read and write
4A8D000
stack
page read and write
8280000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
80FA000
heap
page read and write
7440000
trusted library allocation
page read and write
2B30000
heap
page read and write
851F000
heap
page read and write
7557000
trusted library allocation
page read and write
456C000
stack
page read and write
5C28000
trusted library allocation
page read and write
F00000
heap
page read and write
4FBA000
trusted library allocation
page read and write
3110000
heap
page read and write
802C000
heap
page read and write
84F0000
trusted library allocation
page execute and read and write
2F97000
heap
page read and write
5B71000
trusted library allocation
page read and write
7FD70000
trusted library allocation
page execute and read and write
83D3000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
4460000
heap
page read and write
71CD000
heap
page read and write
8A9E000
stack
page read and write
2BE4000
trusted library allocation
page read and write
6EA0000
heap
page read and write
8BA0000
trusted library allocation
page execute and read and write
2A7C000
stack
page read and write
2DE9000
heap
page read and write
6ACE000
stack
page read and write
2FC0000
heap
page read and write
83A7000
heap
page read and write
3318000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
755A000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page read and write
D98000
heap
page read and write
71EE000
stack
page read and write
2B56000
heap
page read and write
5C5D000
stack
page read and write
87B0000
heap
page read and write
8240000
trusted library allocation
page execute and read and write
2ED2000
trusted library allocation
page read and write
6E2E000
stack
page read and write
5F10000
trusted library allocation
page read and write
2C08000
heap
page read and write
55A9000
trusted library allocation
page read and write
71DE000
heap
page read and write
4590000
heap
page execute and read and write
4DFB000
trusted library allocation
page read and write
699D000
stack
page read and write
52E2000
trusted library allocation
page read and write
777E000
stack
page read and write
84B0000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
51FD000
trusted library allocation
page read and write
71A4000
heap
page read and write
54E0000
trusted library section
page read and write
5D73000
trusted library allocation
page read and write
D57000
heap
page read and write
2DE0000
heap
page read and write
84A0000
trusted library allocation
page read and write
711B000
stack
page read and write
52DE000
trusted library allocation
page read and write
55FE000
stack
page read and write
71E5000
heap
page read and write
E8B000
trusted library allocation
page execute and read and write
C60000
trusted library allocation
page read and write
8591000
heap
page read and write
72EE000
stack
page read and write
2EB0000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
6D60000
heap
page execute and read and write
870D000
heap
page read and write
5040000
heap
page read and write
5324000
trusted library allocation
page read and write
C92000
trusted library allocation
page read and write
28F0000
heap
page read and write
6DCC000
stack
page read and write
5544000
trusted library allocation
page read and write
AA6000
heap
page read and write
8700000
heap
page read and write
871D000
heap
page read and write
5090000
heap
page read and write
78D0000
trusted library allocation
page read and write
82FC000
heap
page read and write
8F7000
stack
page read and write
285C000
stack
page read and write
2F3C000
heap
page read and write
47EC000
stack
page read and write
76CE000
stack
page read and write
799F000
stack
page read and write
7830000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
5326000
trusted library allocation
page read and write
728E000
stack
page read and write
DC8000
heap
page read and write
84E2000
trusted library allocation
page read and write
72DE000
stack
page read and write
7AA0000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
6C50000
heap
page read and write
7FAC8000
trusted library allocation
page execute and read and write
732E000
stack
page read and write
4A0C000
stack
page read and write
76EF000
heap
page read and write
C96000
trusted library allocation
page execute and read and write
DAE000
heap
page read and write
8140000
trusted library allocation
page execute and read and write
75AF000
stack
page read and write
305E000
stack
page read and write
2ED5000
trusted library allocation
page execute and read and write
82E0000
heap
page read and write
695E000
stack
page read and write
754E000
stack
page read and write
88A0000
trusted library allocation
page read and write
7F928000
trusted library allocation
page execute and read and write
2FC4000
trusted library allocation
page read and write
841E000
stack
page read and write
7EA0000
trusted library allocation
page read and write
2810000
heap
page execute and read and write
88E0000
trusted library allocation
page execute and read and write
E8E000
heap
page read and write
8768000
heap
page read and write
48FE000
stack
page read and write
2BE3000
trusted library allocation
page execute and read and write
7503000
heap
page read and write
7550000
heap
page read and write
715E000
stack
page read and write
5121000
trusted library allocation
page read and write
85EE000
stack
page read and write
86E0000
heap
page read and write
7552000
heap
page read and write
8382000
heap
page read and write
553D000
trusted library allocation
page read and write
7F70000
trusted library allocation
page read and write
7440000
heap
page execute and read and write
76B0000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page execute and read and write
2FD0000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
6BFE000
stack
page read and write
776C000
heap
page read and write
F92000
trusted library allocation
page read and write
529D000
stack
page read and write
5DE0000
trusted library allocation
page read and write
527A000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
6EFE000
stack
page read and write
86FE000
stack
page read and write
F6B000
trusted library allocation
page read and write
2E98000
heap
page read and write
7220000
trusted library allocation
page read and write
7A30000
heap
page read and write
7762000
heap
page read and write
2FF2000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
E76000
trusted library allocation
page execute and read and write
7757000
heap
page read and write
77CC000
heap
page read and write
71AB000
stack
page read and write
84E0000
heap
page read and write
8400000
trusted library allocation
page read and write
7850000
heap
page read and write
5A3B000
trusted library allocation
page read and write
2C3C000
stack
page read and write
6DFD000
stack
page read and write
3118000
heap
page read and write
7AF0000
trusted library allocation
page read and write
6A2E000
stack
page read and write
52DE000
stack
page read and write
5055000
heap
page read and write
71AA000
heap
page read and write
7810000
trusted library allocation
page execute and read and write
3260000
trusted library allocation
page read and write
3243000
trusted library allocation
page execute and read and write
5050000
heap
page read and write
775B000
heap
page read and write
29AE000
stack
page read and write
6EC0000
heap
page read and write
730E000
stack
page read and write
85BF000
stack
page read and write
A21E000
stack
page read and write
867E000
stack
page read and write
8DAF000
stack
page read and write
E0A000
heap
page read and write
D44000
trusted library allocation
page read and write
6FBF000
stack
page read and write
719D000
heap
page read and write
3244000
trusted library allocation
page read and write
4AB0000
heap
page execute and read and write
4B51000
trusted library allocation
page read and write
76D7000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
6B7E000
stack
page read and write
3340000
trusted library allocation
page read and write
6DEB000
stack
page read and write
A99000
heap
page read and write
7880000
heap
page execute and read and write
82F0000
trusted library allocation
page read and write
6ECE000
stack
page read and write
AF7000
stack
page read and write
4F98000
trusted library allocation
page read and write
860E000
stack
page read and write
7320000
heap
page read and write
7FC0000
trusted library allocation
page read and write
6200000
heap
page read and write
856E000
stack
page read and write
8710000
trusted library allocation
page read and write
79DE000
stack
page read and write
7FD0000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
71EE000
stack
page read and write
2E50000
heap
page read and write
7A50000
trusted library allocation
page read and write
8CAB000
stack
page read and write
4E23000
trusted library allocation
page read and write
3B9B000
trusted library allocation
page read and write
C76000
heap
page read and write
3275000
trusted library allocation
page execute and read and write
74AA000
heap
page read and write
4880000
heap
page read and write
716D000
stack
page read and write
8410000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
718C000
heap
page read and write
4BC1000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
573F000
stack
page read and write
85AC000
heap
page read and write
82D0000
trusted library allocation
page execute and read and write
719B000
stack
page read and write
8A53000
trusted library allocation
page read and write
8B1E000
stack
page read and write
2C79000
stack
page read and write
6C4E000
stack
page read and write
709E000
stack
page read and write
839F000
heap
page read and write
84E4000
heap
page read and write
C90000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
74DA000
heap
page read and write
86E8000
heap
page read and write
73E0000
trusted library allocation
page read and write
8C6D000
stack
page read and write
486E000
stack
page read and write
8520000
trusted library allocation
page read and write
48B0000
heap
page read and write
71A0000
heap
page read and write
6B3B000
stack
page read and write
86D0000
heap
page read and write
6FF2000
heap
page read and write
519E000
stack
page read and write
4908000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
84D0000
heap
page read and write
7680000
trusted library allocation
page execute and read and write
82F8000
heap
page read and write
2C37000
heap
page read and write
8322000
heap
page read and write
754E000
heap
page read and write
82E0000
trusted library allocation
page read and write
7F7A000
trusted library allocation
page read and write
4DE2000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
5DA6000
trusted library allocation
page read and write
549E000
stack
page read and write
8692000
trusted library allocation
page read and write
86BE000
stack
page read and write
67D0000
heap
page read and write
53BE000
stack
page read and write
50D8000
trusted library allocation
page read and write
B3C000
heap
page read and write
70DE000
stack
page read and write
2FD0000
heap
page read and write
7730000
trusted library allocation
page read and write
6F6C000
stack
page read and write
C80000
trusted library allocation
page read and write
2C2A000
heap
page read and write
2E4E000
stack
page read and write
2EBA000
heap
page read and write
6F7E000
stack
page read and write
7830000
trusted library allocation
page read and write
4E8D000
trusted library allocation
page read and write
310E000
stack
page read and write
D26000
heap
page read and write
D90000
heap
page read and write
CAF000
stack
page read and write
6BBF000
stack
page read and write
84D8000
heap
page read and write
72A0000
heap
page execute and read and write
4CA6000
trusted library allocation
page read and write
7F910000
trusted library allocation
page execute and read and write
CF0000
heap
page read and write
87BD000
heap
page read and write
8270000
trusted library allocation
page read and write
897F000
stack
page read and write
7198000
heap
page read and write
6F3E000
stack
page read and write
78B0000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
8D6E000
stack
page read and write
76D0000
trusted library allocation
page read and write
32B0000
trusted library allocation
page execute and read and write
6DAD000
stack
page read and write
729E000
stack
page read and write
DC5000
heap
page read and write
78DE000
stack
page read and write
A46000
heap
page read and write
5A34000
trusted library allocation
page read and write
887B000
stack
page read and write
767F000
stack
page read and write
5236000
trusted library allocation
page read and write
5648000
trusted library allocation
page read and write
6C40000
heap
page read and write
5A37000
trusted library allocation
page read and write
86B0000
trusted library allocation
page execute and read and write
EF0000
trusted library allocation
page execute and read and write
563E000
stack
page read and write
2F30000
heap
page execute and read and write
7100000
trusted library allocation
page execute and read and write
5DFD000
trusted library allocation
page read and write
6FDE000
stack
page read and write
7380000
trusted library allocation
page execute and read and write
482C000
stack
page read and write
49E8000
trusted library allocation
page read and write
C10000
heap
page read and write
7A70000
trusted library allocation
page read and write
8743000
heap
page read and write
8ADE000
stack
page read and write
4BB0000
heap
page read and write
8020000
heap
page read and write
858B000
heap
page read and write
76A0000
trusted library allocation
page read and write
731E000
stack
page read and write
4D65000
trusted library allocation
page read and write
7E70000
heap
page read and write
3250000
trusted library allocation
page read and write
6FFE000
stack
page read and write
8CEE000
stack
page read and write
2DB0000
heap
page read and write
8372000
heap
page read and write
4F7E000
stack
page read and write
69DB000
stack
page read and write
73F0000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
75BE000
stack
page read and write
5FA0000
trusted library allocation
page execute and read and write
6A6E000
stack
page read and write
74B1000
heap
page read and write
75FF000
stack
page read and write
74DE000
heap
page read and write
832E000
heap
page read and write
2A98000
heap
page read and write
723E000
stack
page read and write
4970000
heap
page read and write
850D000
trusted library allocation
page read and write
4AB5000
heap
page execute and read and write
E19000
heap
page read and write
815D000
trusted library allocation
page read and write
86BF000
stack
page read and write
742D000
heap
page read and write
452C000
stack
page read and write
7713000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
77D0000
trusted library allocation
page execute and read and write
4B0F000
trusted library allocation
page read and write
8290000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
84EC000
heap
page read and write
8719000
heap
page read and write
2FD9000
trusted library allocation
page read and write
DBA000
heap
page read and write
873F000
stack
page read and write
5F00000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
E6F000
stack
page read and write
5BE1000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
8519000
trusted library allocation
page read and write
C0E000
stack
page read and write
74F9000
heap
page read and write
8C29000
stack
page read and write
84E8000
heap
page read and write
5DB2000
trusted library allocation
page read and write
7500000
heap
page read and write
88F0000
trusted library allocation
page read and write
C8D000
trusted library allocation
page execute and read and write
85A2000
heap
page read and write
8510000
trusted library allocation
page read and write
6808000
heap
page read and write
67E9000
heap
page read and write
6EAE000
stack
page read and write
49BC000
stack
page read and write
78C0000
trusted library allocation
page read and write
555F000
trusted library allocation
page read and write
4891000
trusted library allocation
page read and write
2B9E000
stack
page read and write
304E000
stack
page read and write
7796000
heap
page read and write
C63000
trusted library allocation
page execute and read and write
8700000
trusted library allocation
page read and write
2C50000
heap
page readonly
7E60000
heap
page read and write
6E6E000
stack
page read and write
25FD000
stack
page read and write
2A8B000
heap
page read and write
8490000
trusted library allocation
page execute and read and write
574C000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
716B000
stack
page read and write
4604000
trusted library allocation
page read and write
2778000
trusted library allocation
page read and write
86FE000
stack
page read and write
7153000
heap
page read and write
2AB8000
stack
page read and write
7AE0000
trusted library allocation
page read and write
3005000
heap
page read and write
501B000
stack
page read and write
C6D000
trusted library allocation
page execute and read and write
7500000
trusted library allocation
page execute and read and write
324D000
trusted library allocation
page execute and read and write
2BF0000
heap
page read and write
5A44000
trusted library allocation
page read and write
4AF9000
stack
page read and write
545E000
stack
page read and write
6CCE000
stack
page read and write
7410000
trusted library allocation
page read and write
F7E000
trusted library allocation
page read and write
6FBE000
stack
page read and write
5DF0000
trusted library allocation
page read and write
712D000
stack
page read and write
73D0000
heap
page execute and read and write
839E000
stack
page read and write
72C1000
heap
page read and write
5733000
trusted library allocation
page read and write
749A000
heap
page read and write
82F0000
heap
page read and write
52A0000
heap
page read and write
69E5000
heap
page execute and read and write
859D000
heap
page read and write
D80000
trusted library allocation
page read and write
8500000
trusted library allocation
page execute and read and write
4CD5000
trusted library allocation
page read and write
AB3000
heap
page read and write
7FAB0000
trusted library allocation
page execute and read and write
8A5E000
stack
page read and write
7050000
heap
page execute and read and write
776F000
heap
page read and write
4E30000
heap
page read and write
577E000
stack
page read and write
82E8000
heap
page read and write
73CE000
stack
page read and write
2C20000
trusted library allocation
page read and write
D0E000
stack
page read and write
D60000
heap
page read and write
8709000
heap
page read and write
722E000
stack
page read and write
3911000
trusted library allocation
page read and write
5B5E000
stack
page read and write
400000
remote allocation
page execute and read and write
2EC7000
heap
page read and write
88FD000
stack
page read and write
2EA0000
trusted library allocation
page read and write
80C0000
heap
page read and write
5D64000
trusted library allocation
page read and write
BAE000
stack
page read and write
7472000
heap
page read and write
7480000
heap
page read and write
726D000
stack
page read and write
There are 992 hidden memdumps, click here to show them.