IOC Report
F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ltnvgwb.qz5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2gqqqfti.wmj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3g3v2mv4.c3k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3sqmsmr1.3rv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_doo1jfqc.i2f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e5dziafv.dvh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwix4mu4.0r2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i2k3jbs1.g1g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iykyorr3.3cb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iyq5ekke.w2l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pqz4vs4g.ilf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qlhegpbf.ejq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_quqaejwr.03f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t44uf1gc.dld.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ytjs1ruy.w1v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zibivij4.bkf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Oct 8 08:28:39 2024, mtime=Tue Oct 8 08:28:39 2024, atime=Tue Oct 8 08:28:39 2024, length=512000, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe
"C:\Users\user\Desktop\F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe"
malicious
C:\Users\user\Desktop\F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe
"C:\Users\user\Desktop\F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'F41355 SO 7670 HBL EXPRESS RELEASEpdf.pdf.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
104.250.180.178
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://crl.miE
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.microz
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://crl.mi
unknown
http://crl.micros
unknown
There are 9 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2A51000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2ACA000
trusted library allocation
page read and write
malicious
2A6D000
trusted library allocation
page read and write
malicious
2EB1000
trusted library allocation
page read and write
malicious
771F000
heap
page read and write
80B0000
trusted library allocation
page read and write
5157000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
B16E000
stack
page read and write
782D000
stack
page read and write
75F0000
heap
page read and write
77AF000
stack
page read and write
3380000
heap
page read and write
7C6A000
trusted library allocation
page read and write
80F0000
trusted library allocation
page execute and read and write
6D09000
heap
page read and write
751C000
stack
page read and write
7714000
heap
page read and write
33E4000
trusted library allocation
page read and write
2980000
heap
page read and write
7890000
trusted library allocation
page read and write
8852000
heap
page read and write
3412000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
5E10000
heap
page read and write
51E6000
trusted library allocation
page read and write
7F900000
trusted library allocation
page execute and read and write
7BB0000
heap
page read and write
726E000
stack
page read and write
2C7D000
stack
page read and write
4225000
heap
page execute and read and write
84E0000
trusted library allocation
page read and write
8E5E000
stack
page read and write
4ABE000
stack
page read and write
7AD0000
heap
page read and write
70DE000
stack
page read and write
2E20000
heap
page read and write
52C9000
trusted library allocation
page read and write
76C7000
trusted library allocation
page read and write
74DE000
stack
page read and write
287A000
trusted library allocation
page execute and read and write
4A20000
heap
page execute and read and write
5DE3000
trusted library allocation
page read and write
1068000
heap
page read and write
5C51000
trusted library allocation
page read and write
30B4000
heap
page read and write
262E000
stack
page read and write
F50000
heap
page read and write
5443000
trusted library allocation
page read and write
7719000
heap
page read and write
25E0000
heap
page read and write
4ED2000
trusted library allocation
page read and write
482C000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
8950000
trusted library allocation
page execute and read and write
A90000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
7C1E000
stack
page read and write
6CEE000
stack
page read and write
4AC7000
heap
page read and write
8820000
heap
page read and write
8C30000
trusted library allocation
page read and write
742F000
stack
page read and write
2DEE000
stack
page read and write
6D0B000
heap
page read and write
76D0000
trusted library allocation
page read and write
28B0000
heap
page readonly
E70000
heap
page read and write
4A31000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
784E000
stack
page read and write
84B8000
heap
page read and write
31C0000
trusted library allocation
page execute and read and write
5505000
trusted library allocation
page read and write
7F718000
trusted library allocation
page execute and read and write
5EF4000
trusted library allocation
page read and write
6518000
trusted library allocation
page read and write
8BDF000
stack
page read and write
7D28000
heap
page read and write
72B0000
heap
page read and write
63D0000
trusted library allocation
page read and write
86B9000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
703E000
stack
page read and write
680E000
stack
page read and write
725E000
stack
page read and write
3010000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
854C000
heap
page read and write
3400000
trusted library allocation
page read and write
2DAC000
stack
page read and write
3048000
heap
page read and write
8410000
heap
page read and write
82EB000
trusted library allocation
page read and write
72ED000
stack
page read and write
6EF0000
trusted library allocation
page execute and read and write
87B0000
trusted library allocation
page read and write
3070000
heap
page read and write
B07000
heap
page read and write
5146000
trusted library allocation
page read and write
2882000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
1324000
trusted library allocation
page read and write
5279000
trusted library allocation
page read and write
24D0000
heap
page read and write
8B1E000
stack
page read and write
2B1D000
stack
page read and write
6C99000
heap
page read and write
2FF0000
heap
page read and write
2950000
trusted library allocation
page read and write
510A000
trusted library allocation
page read and write
85EA000
heap
page read and write
89CD000
stack
page read and write
5A51000
trusted library allocation
page read and write
4B88000
trusted library allocation
page read and write
85CA000
heap
page read and write
3415000
trusted library allocation
page execute and read and write
4B4D000
stack
page read and write
55FA000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
725E000
stack
page read and write
82E0000
trusted library allocation
page read and write
AE0000
heap
page read and write
711E000
stack
page read and write
2E6E000
stack
page read and write
5353000
heap
page read and write
2EB0000
heap
page read and write
1117000
heap
page read and write
856D000
heap
page read and write
8A4E000
stack
page read and write
6EAE000
stack
page read and write
5D79000
trusted library allocation
page read and write
844A000
trusted library allocation
page read and write
335E000
stack
page read and write
70C0000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
8571000
heap
page read and write
2800000
heap
page read and write
7D52000
heap
page read and write
721B000
stack
page read and write
106B000
heap
page read and write
7660000
trusted library allocation
page read and write
10C0000
heap
page read and write
8ACE000
stack
page read and write
7D10000
heap
page read and write
88EF000
heap
page read and write
7840000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
78E0000
trusted library allocation
page execute and read and write
DEE000
stack
page read and write
8818000
heap
page read and write
4BD9000
trusted library allocation
page read and write
6F7D000
stack
page read and write
4825000
trusted library allocation
page execute and read and write
28C8000
trusted library allocation
page read and write
26A0000
heap
page read and write
4D3C000
stack
page read and write
7B60000
heap
page read and write
7930000
trusted library allocation
page read and write
2EA0000
heap
page read and write
741F000
stack
page read and write
6F4E000
stack
page read and write
5E9B000
stack
page read and write
319E000
stack
page read and write
876A000
trusted library allocation
page read and write
A8D000
trusted library allocation
page execute and read and write
134A000
trusted library allocation
page execute and read and write
7A90000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
502000
unkown
page readonly
AA2000
trusted library allocation
page read and write
6C80000
heap
page read and write
3000000
trusted library allocation
page read and write
7652000
heap
page read and write
7590000
heap
page read and write
7863000
trusted library allocation
page read and write
86BF000
trusted library allocation
page read and write
776E000
stack
page read and write
2DED000
stack
page read and write
7062000
trusted library allocation
page read and write
88DC000
heap
page read and write
1352000
trusted library allocation
page read and write
E2B000
stack
page read and write
4FA0000
trusted library allocation
page read and write
82EE000
stack
page read and write
5EE3000
trusted library allocation
page read and write
AAB000
trusted library allocation
page execute and read and write
83A000
stack
page read and write
51CE000
stack
page read and write
A20000
heap
page read and write
7B00000
trusted library allocation
page read and write
8A8E000
stack
page read and write
68CA000
stack
page read and write
31B0000
heap
page readonly
6510000
trusted library allocation
page read and write
8447000
trusted library allocation
page read and write
51F0000
heap
page read and write
7F4C000
stack
page read and write
8AE0000
trusted library allocation
page read and write
7C67000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
684E000
stack
page read and write
8980000
trusted library allocation
page execute and read and write
2F1C000
heap
page read and write
8D90000
trusted library allocation
page execute and read and write
6B60000
trusted library allocation
page execute and read and write
306C000
heap
page read and write
742A000
stack
page read and write
6ABE000
stack
page read and write
8617000
heap
page read and write
FC0000
heap
page read and write
2980000
heap
page read and write
6CEE000
heap
page read and write
8390000
trusted library allocation
page execute and read and write
3030000
trusted library allocation
page read and write
7DDA000
heap
page read and write
7860000
trusted library allocation
page read and write
715E000
stack
page read and write
B06E000
stack
page read and write
80C3000
trusted library allocation
page read and write
4CAB000
trusted library allocation
page read and write
7452000
heap
page read and write
4C58000
trusted library allocation
page read and write
2DF0000
heap
page read and write
32DE000
stack
page read and write
513E000
trusted library allocation
page read and write
33ED000
trusted library allocation
page execute and read and write
5E00000
trusted library allocation
page execute and read and write
76BD000
heap
page read and write
3035000
trusted library allocation
page execute and read and write
775C000
heap
page read and write
852C000
heap
page read and write
70C0000
heap
page read and write
2987000
heap
page read and write
7767000
heap
page read and write
49BE000
stack
page read and write
247D000
stack
page read and write
31A0000
heap
page execute and read and write
75E0000
heap
page read and write
694D000
stack
page read and write
E40000
trusted library allocation
page read and write
719A000
stack
page read and write
75FC000
heap
page read and write
6B70000
trusted library allocation
page read and write
83AD000
trusted library allocation
page read and write
4910000
heap
page read and write
604B000
trusted library allocation
page read and write
6BED000
stack
page read and write
8CCE000
stack
page read and write
6040000
trusted library allocation
page read and write
4B84000
trusted library allocation
page read and write
4DA6000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
667B000
stack
page read and write
285D000
trusted library allocation
page read and write
FE9000
heap
page read and write
2C3C000
stack
page read and write
4C6E000
stack
page read and write
8B5D000
stack
page read and write
84B0000
heap
page read and write
8742000
heap
page read and write
709E000
stack
page read and write
83A0000
trusted library allocation
page read and write
82C0000
heap
page read and write
70D0000
heap
page read and write
698D000
stack
page read and write
7B6D000
stack
page read and write
41AC000
stack
page read and write
4860000
trusted library allocation
page execute and read and write
BC1000
heap
page read and write
6F1E000
stack
page read and write
2EB5000
heap
page read and write
7540000
heap
page read and write
7710000
trusted library allocation
page execute and read and write
7880000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
4220000
heap
page execute and read and write
8740000
heap
page read and write
4A5C000
stack
page read and write
7D18000
heap
page read and write
678D000
stack
page read and write
8430000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
84B4000
heap
page read and write
547E000
trusted library allocation
page read and write
736E000
stack
page read and write
6F2E000
stack
page read and write
4B0E000
stack
page read and write
8540000
heap
page read and write
A7D000
trusted library allocation
page execute and read and write
51F5000
heap
page read and write
7940000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
7F830000
trusted library allocation
page execute and read and write
70EE000
stack
page read and write
1400000
heap
page read and write
26A6000
heap
page read and write
AE8000
heap
page read and write
867D000
trusted library allocation
page read and write
7670000
heap
page execute and read and write
867B000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
4F6C000
stack
page read and write
6EA0000
trusted library allocation
page read and write
497C000
stack
page read and write
B14000
heap
page read and write
7C70000
trusted library allocation
page read and write
6066000
trusted library allocation
page read and write
84E2000
heap
page read and write
4B82000
trusted library allocation
page read and write
A83000
trusted library allocation
page read and write
8660000
trusted library allocation
page execute and read and write
2947000
heap
page read and write
3A51000
trusted library allocation
page read and write
87FC000
stack
page read and write
4C90000
heap
page read and write
7EF50000
trusted library allocation
page execute and read and write
51E1000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
7700000
heap
page read and write
76CD000
heap
page read and write
55FC000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
7D14000
heap
page read and write
481A000
trusted library allocation
page execute and read and write
A9A000
trusted library allocation
page execute and read and write
7AC0000
trusted library allocation
page read and write
86C0000
trusted library allocation
page read and write
5C79000
trusted library allocation
page read and write
78CD000
stack
page read and write
1340000
trusted library allocation
page read and write
6540000
heap
page read and write
5C59000
trusted library allocation
page read and write
2B18000
stack
page read and write
4C51000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
7570000
heap
page read and write
6DAE000
stack
page read and write
7DC5000
heap
page read and write
284E000
trusted library allocation
page read and write
6D6F000
heap
page read and write
7DE8000
heap
page read and write
57EE000
stack
page read and write
5473000
trusted library allocation
page read and write
6CE8000
heap
page read and write
8420000
heap
page read and write
48FF000
stack
page read and write
84FA000
heap
page read and write
2DE8000
trusted library allocation
page read and write
4FD3000
heap
page read and write
A80000
trusted library allocation
page read and write
AD0000
trusted library allocation
page execute and read and write
7110000
heap
page execute and read and write
662B000
stack
page read and write
882C000
heap
page read and write
243C000
stack
page read and write
5445000
trusted library allocation
page read and write
6EEE000
stack
page read and write
5195000
trusted library allocation
page read and write
6061000
trusted library allocation
page read and write
2477000
stack
page read and write
6EC0000
trusted library allocation
page read and write
2EF8000
heap
page read and write
A73000
trusted library allocation
page execute and read and write
75C2000
heap
page read and write
7090000
trusted library allocation
page read and write
690E000
stack
page read and write
6F00000
trusted library allocation
page read and write
3420000
heap
page read and write
72AB000
stack
page read and write
42B0000
heap
page execute and read and write
2C78000
stack
page read and write
82AC000
stack
page read and write
49C8000
trusted library allocation
page read and write
6D3F000
heap
page read and write
7D8B000
heap
page read and write
8AD0000
trusted library allocation
page read and write
2ADC000
stack
page read and write
8680000
trusted library allocation
page read and write
3108000
heap
page read and write
709B000
stack
page read and write
8833000
trusted library allocation
page read and write
4FD0000
heap
page read and write
75B7000
heap
page read and write
33F9000
trusted library allocation
page read and write
4B80000
heap
page execute and read and write
2D19000
trusted library allocation
page read and write
8960000
trusted library allocation
page execute and read and write
B88000
heap
page read and write
729B000
stack
page read and write
7070000
trusted library allocation
page read and write
606D000
trusted library allocation
page read and write
71DB000
stack
page read and write
8742000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
757E000
stack
page read and write
4C70000
heap
page readonly
48BE000
stack
page read and write
79AF000
stack
page read and write
304D000
trusted library allocation
page execute and read and write
8E9C000
stack
page read and write
5701000
trusted library allocation
page read and write
B22000
heap
page read and write
77CE000
stack
page read and write
604E000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
FF4000
heap
page read and write
4FAD000
stack
page read and write
8420000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
8550000
heap
page read and write
70A0000
trusted library allocation
page read and write
6CF7000
heap
page read and write
780E000
stack
page read and write
E50000
trusted library allocation
page read and write
1310000
heap
page read and write
7D20000
heap
page read and write
7CCE000
stack
page read and write
835E000
stack
page read and write
8A4E000
stack
page read and write
515B000
trusted library allocation
page read and write
75BE000
stack
page read and write
7040000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
749E000
stack
page read and write
7AF0000
trusted library allocation
page execute and read and write
5592000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
788E000
stack
page read and write
AEE000
heap
page read and write
7540000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
7731000
heap
page read and write
7520000
trusted library allocation
page read and write
7DA7000
heap
page read and write
76BE000
stack
page read and write
4A8E000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
3043000
trusted library allocation
page execute and read and write
2DAE000
stack
page read and write
5D51000
trusted library allocation
page read and write
8824000
heap
page read and write
8614000
heap
page read and write
75E0000
heap
page read and write
2FD0000
trusted library section
page read and write
5A2E000
stack
page read and write
796E000
stack
page read and write
78D0000
trusted library allocation
page read and write
2E90000
heap
page read and write
4C0E000
stack
page read and write
6080000
heap
page read and write
8AC0000
trusted library allocation
page read and write
64E7000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
64F0000
trusted library allocation
page execute and read and write
8AB0000
trusted library allocation
page execute and read and write
29B0000
trusted library allocation
page read and write
BEB000
stack
page read and write
51E8000
trusted library allocation
page read and write
6E29000
stack
page read and write
4BE0000
trusted library allocation
page read and write
2E25000
heap
page read and write
4EA6000
trusted library allocation
page read and write
855C000
heap
page read and write
5422000
trusted library allocation
page read and write
8440000
trusted library allocation
page read and write
777F000
heap
page read and write
30C0000
heap
page read and write
30BD000
heap
page read and write
83B0000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
746D000
stack
page read and write
4F80000
heap
page read and write
4810000
trusted library allocation
page read and write
5A6E000
stack
page read and write
4823000
trusted library allocation
page read and write
5E5C000
stack
page read and write
55B0000
heap
page execute and read and write
2F91000
heap
page read and write
42C1000
trusted library allocation
page read and write
6FCE000
stack
page read and write
6F50000
heap
page read and write
73AE000
stack
page read and write
3040000
heap
page read and write
7A50000
trusted library allocation
page read and write
256C000
heap
page read and write
7EF68000
trusted library allocation
page execute and read and write
8F1E000
stack
page read and write
7620000
heap
page read and write
42AE000
stack
page read and write
77C1000
heap
page read and write
50E9000
trusted library allocation
page read and write
7783000
heap
page read and write
937000
stack
page read and write
4B4C000
stack
page read and write
2DE8000
stack
page read and write
5BE3000
trusted library allocation
page read and write
6D2F000
heap
page read and write
6D04000
heap
page read and write
761E000
stack
page read and write
739D000
stack
page read and write
135B000
trusted library allocation
page execute and read and write
6B75000
trusted library allocation
page read and write
76B0000
heap
page read and write
1330000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
75F9000
heap
page read and write
4CFC000
stack
page read and write
8ADB000
stack
page read and write
28B0000
heap
page read and write
84F0000
trusted library allocation
page read and write
1317000
heap
page read and write
5200000
heap
page read and write
2F68000
heap
page read and write
7920000
trusted library allocation
page read and write
7F700000
trusted library allocation
page execute and read and write
3059000
trusted library allocation
page read and write
BB1000
heap
page read and write
13FC000
stack
page read and write
5464000
trusted library allocation
page read and write
5560000
trusted library section
page read and write
55D9000
trusted library allocation
page read and write
3003000
trusted library allocation
page execute and read and write
33B0000
heap
page read and write
732B000
stack
page read and write
980000
heap
page read and write
6FCE000
stack
page read and write
AA7000
trusted library allocation
page execute and read and write
65D0000
heap
page read and write
6C50000
heap
page execute and read and write
7F660000
trusted library allocation
page execute and read and write
30B8000
heap
page read and write
884E000
stack
page read and write
2A40000
heap
page execute and read and write
6E1E000
stack
page read and write
839E000
stack
page read and write
563F000
trusted library allocation
page read and write
331E000
stack
page read and write
2BE0000
heap
page read and write
6052000
trusted library allocation
page read and write
3040000
heap
page read and write
49BC000
stack
page read and write
7AF0000
trusted library allocation
page read and write
4CA8000
trusted library allocation
page read and write
75F5000
heap
page read and write
7735000
heap
page read and write
2990000
heap
page execute and read and write
8583000
heap
page read and write
663D000
stack
page read and write
A92000
trusted library allocation
page read and write
6D68000
heap
page read and write
8517000
heap
page read and write
2E3E000
stack
page read and write
2A00000
trusted library allocation
page execute and read and write
6044000
trusted library allocation
page read and write
63E0000
heap
page read and write
133D000
trusted library allocation
page execute and read and write
8EDE000
stack
page read and write
7A30000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
302A000
trusted library allocation
page execute and read and write
426E000
stack
page read and write
84A0000
trusted library allocation
page read and write
303C000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
49DD000
trusted library allocation
page read and write
5142000
trusted library allocation
page read and write
75D4000
heap
page read and write
1074000
heap
page read and write
627D000
stack
page read and write
7BAE000
stack
page read and write
6EB0000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
4900000
trusted library allocation
page read and write
8430000
trusted library allocation
page execute and read and write
2860000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
3019000
trusted library allocation
page read and write
7D24000
heap
page read and write
7670000
trusted library allocation
page execute and read and write
2E90000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
7D2C000
heap
page read and write
6072000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
24D8000
heap
page read and write
894E000
stack
page read and write
56AA000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
6FFE000
stack
page read and write
31D0000
heap
page read and write
66BE000
stack
page read and write
4DB1000
trusted library allocation
page read and write
B70000
heap
page read and write
313E000
heap
page read and write
10C5000
heap
page read and write
73AE000
stack
page read and write
7050000
trusted library allocation
page read and write
7DC8000
heap
page read and write
3410000
trusted library allocation
page read and write
6E65000
heap
page execute and read and write
25CA000
heap
page read and write
FC8000
heap
page read and write
711E000
stack
page read and write
3150000
trusted library allocation
page read and write
31D9000
heap
page read and write
65E0000
trusted library allocation
page read and write
2EF0000
heap
page read and write
5380000
heap
page read and write
7AD0000
trusted library allocation
page read and write
70DE000
stack
page read and write
7C5E000
stack
page read and write
76C0000
trusted library allocation
page read and write
603E000
stack
page read and write
62BC000
stack
page read and write
7030000
trusted library allocation
page read and write
8442000
trusted library allocation
page read and write
4C80000
trusted library allocation
page execute and read and write
2870000
trusted library allocation
page read and write
73DC000
stack
page read and write
705D000
stack
page read and write
33B7000
heap
page read and write
826E000
stack
page read and write
5A59000
trusted library allocation
page read and write
73EE000
stack
page read and write
7A2D000
stack
page read and write
732B000
stack
page read and write
8554000
heap
page read and write
416F000
stack
page read and write
33F0000
trusted library allocation
page read and write
4A1C000
stack
page read and write
33E0000
trusted library allocation
page read and write
82ED000
trusted library allocation
page read and write
1406000
heap
page read and write
52E9000
trusted library allocation
page read and write
87A0000
trusted library allocation
page read and write
85B3000
heap
page read and write
73EE000
stack
page read and write
2DB0000
trusted library allocation
page execute and read and write
641F000
heap
page read and write
4A28000
trusted library allocation
page read and write
6FBB000
stack
page read and write
745E000
stack
page read and write
83A0000
heap
page read and write
2AE1000
trusted library allocation
page read and write
8C43000
trusted library allocation
page read and write
58EF000
stack
page read and write
4850000
heap
page readonly
30BE000
stack
page read and write
7B10000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
792E000
stack
page read and write
8450000
heap
page read and write
8DDE000
stack
page read and write
4CBB000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
7F310000
trusted library allocation
page execute and read and write
66FF000
stack
page read and write
FF6000
heap
page read and write
8A8D000
stack
page read and write
719D000
stack
page read and write
701E000
stack
page read and write
77EE000
stack
page read and write
2B90000
heap
page read and write
2870000
trusted library allocation
page read and write
8670000
trusted library allocation
page read and write
75BC000
heap
page read and write
2EAD000
stack
page read and write
8C40000
trusted library allocation
page read and write
8A8F000
stack
page read and write
8558000
heap
page read and write
2853000
trusted library allocation
page execute and read and write
7080000
trusted library allocation
page read and write
790A000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
285D000
trusted library allocation
page execute and read and write
8970000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
76A0000
heap
page read and write
7F328000
trusted library allocation
page execute and read and write
6AFE000
stack
page read and write
8767000
trusted library allocation
page read and write
500000
unkown
page readonly
4D28000
trusted library allocation
page read and write
88B5000
heap
page read and write
70E0000
trusted library allocation
page read and write
28D0000
heap
page read and write
4822000
trusted library allocation
page read and write
78B3000
trusted library allocation
page read and write
88BC000
stack
page read and write
2851000
trusted library allocation
page read and write
86A0000
trusted library allocation
page execute and read and write
7970000
trusted library allocation
page read and write
7739000
heap
page read and write
3428000
heap
page read and write
7740000
heap
page read and write
75FE000
stack
page read and write
592E000
stack
page read and write
642D000
heap
page read and write
4A93000
trusted library allocation
page read and write
76E6000
heap
page read and write
E60000
trusted library allocation
page read and write
7AE0000
heap
page read and write
70E0000
heap
page read and write
291E000
stack
page read and write
74EE000
stack
page read and write
70F0000
trusted library allocation
page read and write
4BC9000
stack
page read and write
76F0000
heap
page execute and read and write
75DD000
heap
page read and write
721E000
stack
page read and write
9DE000
stack
page read and write
69CB000
stack
page read and write
7BD0000
trusted library allocation
page execute and read and write
4834000
trusted library allocation
page read and write
5CB8000
trusted library allocation
page read and write
841D000
stack
page read and write
89ED000
stack
page read and write
2FE0000
trusted library section
page read and write
545C000
trusted library allocation
page read and write
63B9000
stack
page read and write
4416000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
873F000
stack
page read and write
80C0000
trusted library allocation
page read and write
514E000
trusted library allocation
page read and write
849E000
stack
page read and write
4C2E000
stack
page read and write
729C000
stack
page read and write
6C60000
trusted library allocation
page read and write
6428000
heap
page read and write
2EEE000
stack
page read and write
83EE000
stack
page read and write
8A92000
trusted library allocation
page read and write
DAF000
stack
page read and write
86B0000
trusted library allocation
page read and write
2F29000
heap
page read and write
539E000
stack
page read and write
5DF4000
trusted library allocation
page read and write
514A000
trusted library allocation
page read and write
5F03000
trusted library allocation
page read and write
84A4000
heap
page read and write
3020000
trusted library allocation
page read and write
763E000
stack
page read and write
67CB000
stack
page read and write
52C1000
trusted library allocation
page read and write
762B000
heap
page read and write
8750000
trusted library allocation
page execute and read and write
300D000
trusted library allocation
page execute and read and write
84A0000
heap
page read and write
8400000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
EF7000
stack
page read and write
29E0000
trusted library allocation
page read and write
8690000
heap
page read and write
2840000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
4AC0000
heap
page read and write
4B86000
trusted library allocation
page read and write
8A0B000
stack
page read and write
5BD4000
trusted library allocation
page read and write
A74000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
150D000
stack
page read and write
1110000
heap
page read and write
70BA000
stack
page read and write
7090000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
4870000
heap
page read and write
700D000
stack
page read and write
881C000
heap
page read and write
6046000
trusted library allocation
page read and write
85A2000
heap
page read and write
132D000
trusted library allocation
page execute and read and write
4761000
trusted library allocation
page read and write
7020000
trusted library allocation
page execute and read and write
6B80000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5580000
trusted library allocation
page read and write
990000
heap
page read and write
63FD000
heap
page read and write
78C0000
trusted library allocation
page read and write
887E000
stack
page read and write
2928000
trusted library allocation
page read and write
86D0000
trusted library allocation
page read and write
8760000
trusted library allocation
page execute and read and write
5B6E000
stack
page read and write
A96000
trusted library allocation
page execute and read and write
5FF9000
stack
page read and write
340A000
trusted library allocation
page execute and read and write
282E000
stack
page read and write
8810000
heap
page read and write
859A000
heap
page read and write
27BE000
stack
page read and write
2590000
heap
page read and write
4820000
trusted library allocation
page read and write
64E0000
trusted library allocation
page read and write
672D000
stack
page read and write
7AB0000
trusted library allocation
page read and write
6DA1000
heap
page read and write
4917000
heap
page read and write
7D60000
heap
page read and write
5BC3000
trusted library allocation
page read and write
8548000
heap
page read and write
2854000
trusted library allocation
page read and write
534E000
stack
page read and write
75EA000
heap
page read and write
4928000
trusted library allocation
page read and write
778E000
stack
page read and write
78F0000
trusted library allocation
page read and write
855A000
heap
page read and write
83AB000
trusted library allocation
page read and write
78EE000
stack
page read and write
2A10000
heap
page read and write
51F9000
trusted library allocation
page read and write
8770000
trusted library allocation
page read and write
84BC000
heap
page read and write
7950000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
580000
unkown
page readonly
7933000
trusted library allocation
page read and write
307B000
heap
page read and write
6B3E000
stack
page read and write
7AA0000
trusted library allocation
page read and write
431A000
trusted library allocation
page read and write
6D7D000
heap
page read and write
87C0000
trusted library allocation
page read and write
1038000
heap
page read and write
736E000
stack
page read and write
1320000
trusted library allocation
page read and write
72EE000
stack
page read and write
4D40000
heap
page execute and read and write
756F000
heap
page read and write
77A4000
heap
page read and write
75D1000
heap
page read and write
A1E000
stack
page read and write
707D000
stack
page read and write
7BCB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
775F000
heap
page read and write
12DC000
stack
page read and write
89A0000
trusted library allocation
page execute and read and write
70D0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
75B7000
heap
page read and write
507F000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
75E2000
heap
page read and write
78D0000
trusted library allocation
page read and write
6CA9000
heap
page read and write
30FC000
heap
page read and write
8770000
trusted library allocation
page read and write
4A0E000
stack
page read and write
51AD000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
B80000
heap
page read and write
29BA000
trusted library allocation
page read and write
29A0000
trusted library allocation
page execute and read and write
F7F000
stack
page read and write
56BE000
stack
page read and write
8C8E000
stack
page read and write
7589000
heap
page read and write
6B40000
heap
page read and write
8544000
heap
page read and write
7799000
heap
page read and write
3F94000
trusted library allocation
page read and write
28C0000
trusted library allocation
page execute and read and write
545E000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
79EE000
stack
page read and write
5453000
trusted library allocation
page read and write
87BE000
stack
page read and write
8E19000
stack
page read and write
7F678000
trusted library allocation
page execute and read and write
688E000
stack
page read and write
7720000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
4A8C000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
2885000
trusted library allocation
page execute and read and write
2E7E000
stack
page read and write
3123000
heap
page read and write
7A99000
trusted library allocation
page read and write
76CA000
trusted library allocation
page read and write
8800000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
8B0E000
stack
page read and write
2869000
trusted library allocation
page read and write
605E000
trusted library allocation
page read and write
2A30000
trusted library section
page readonly
30D8000
heap
page read and write
7A80000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
4F90000
trusted library allocation
page execute and read and write
7960000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
2BDE000
stack
page read and write
5EFA000
stack
page read and write
5DFA000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
3068000
heap
page read and write
5230000
heap
page read and write
1346000
trusted library allocation
page execute and read and write
7990000
trusted library allocation
page read and write
86FD000
stack
page read and write
8229000
stack
page read and write
49F6000
trusted library allocation
page read and write
33E3000
trusted library allocation
page execute and read and write
FA0000
heap
page read and write
73DE000
stack
page read and write
832F000
stack
page read and write
7BCD000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
8810000
trusted library allocation
page read and write
13BE000
stack
page read and write
74AB000
stack
page read and write
8973000
trusted library allocation
page read and write
6D80000
trusted library section
page read and write
71DE000
stack
page read and write
49D8000
trusted library allocation
page read and write
6E60000
heap
page execute and read and write
76FC000
heap
page read and write
2DD0000
heap
page execute and read and write
30D0000
heap
page read and write
4D51000
trusted library allocation
page read and write
8608000
heap
page read and write
4C40000
heap
page read and write
7900000
trusted library allocation
page read and write
6DED000
stack
page read and write
4E2E000
trusted library allocation
page read and write
E65000
trusted library allocation
page read and write
3060000
heap
page read and write
2856000
trusted library allocation
page read and write
7115000
heap
page execute and read and write
777D000
heap
page read and write
6F8E000
stack
page read and write
5350000
heap
page read and write
266E000
stack
page read and write
BAE000
heap
page read and write
5152000
trusted library allocation
page read and write
70C7000
heap
page read and write
8B9E000
stack
page read and write
5A31000
trusted library allocation
page read and write
5C71000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
813E000
stack
page read and write
72A0000
heap
page read and write
82D0000
trusted library allocation
page execute and read and write
6D5E000
stack
page read and write
2880000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
2670000
heap
page read and write
4840000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
41EC000
stack
page read and write
1357000
trusted library allocation
page execute and read and write
3A59000
trusted library allocation
page read and write
2CD0000
heap
page read and write
8710000
heap
page read and write
7510000
heap
page execute and read and write
5210000
heap
page read and write
8582000
heap
page read and write
1323000
trusted library allocation
page execute and read and write
28A0000
trusted library allocation
page read and write
5197000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
715E000
stack
page read and write
4B85000
heap
page execute and read and write
4F70000
heap
page read and write
3F56000
trusted library allocation
page read and write
6ED2000
trusted library allocation
page read and write
752E000
stack
page read and write
7C60000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page execute and read and write
6A7E000
stack
page read and write
7A40000
trusted library allocation
page execute and read and write
559E000
stack
page read and write
84AC000
heap
page read and write
7910000
trusted library allocation
page read and write
2940000
heap
page read and write
2FCE000
stack
page read and write
8828000
heap
page read and write
27FE000
stack
page read and write
3045000
heap
page read and write
2507000
heap
page read and write
75EB000
heap
page read and write
There are 991 hidden memdumps, click here to show them.