IOC Report
PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0e2khuxc.z2g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0zkopqrk.c1h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1puojpvp.gjq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5fgbf1fg.5z3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cctkwvjs.ojt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ddz1g5gd.dur.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eyo11ksp.ezi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzw3zstz.gsz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lbwkwkaw.a0x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lut3sdm0.lg4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mgmdjcek.jdl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_opsvl4lt.0sw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sebsye04.0bz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_szgsbeet.0dn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t21lvj1f.5ep.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xvtspzon.1nh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Oct 26 21:26:26 2024, mtime=Sat Oct 26 21:26:26 2024, atime=Sat Oct 26 21:26:26 2024, length=523776, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe
"C:\Users\user\Desktop\PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe"
malicious
C:\Users\user\Desktop\PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe
"C:\Users\user\Desktop\PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'PACKIING-#U5ee3#U5dde#U7acb#U5f97 - EVER ATOP V.1319-008W KHH-RTM SO A268.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
104.250.180.178
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.microsofts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://crl.mi
unknown
There are 9 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3541000
trusted library allocation
page read and write
malicious
808E000
stack
page read and write
7D1C000
trusted library allocation
page read and write
2C5E000
stack
page read and write
6123000
trusted library allocation
page read and write
879D000
stack
page read and write
7906000
heap
page read and write
A3E000
stack
page read and write
983E000
stack
page read and write
7342000
trusted library allocation
page read and write
F0A000
stack
page read and write
5940000
heap
page execute and read and write
79D0000
trusted library allocation
page execute and read and write
8B7F000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
5AA0000
heap
page read and write
6A5D000
stack
page read and write
1444000
trusted library allocation
page read and write
5900000
heap
page read and write
2D78000
trusted library allocation
page read and write
4AE6000
trusted library allocation
page read and write
78A4000
heap
page read and write
147A000
trusted library allocation
page execute and read and write
56B3000
trusted library allocation
page read and write
2CAA000
trusted library allocation
page execute and read and write
78B0000
trusted library allocation
page read and write
8F6E000
stack
page read and write
4DB0000
trusted library allocation
page execute and read and write
7932000
heap
page read and write
2897000
trusted library allocation
page execute and read and write
880E000
stack
page read and write
3220000
heap
page read and write
7260000
heap
page read and write
73FB000
stack
page read and write
7BDF000
stack
page read and write
6103000
trusted library allocation
page read and write
4C69000
trusted library allocation
page read and write
88CA000
heap
page read and write
820B000
heap
page read and write
969E000
stack
page read and write
3159000
heap
page read and write
4CF7000
heap
page read and write
7365000
heap
page read and write
79CA000
heap
page read and write
87DE000
stack
page read and write
794F000
heap
page read and write
2B60000
trusted library allocation
page read and write
326B000
stack
page read and write
8D0F000
stack
page read and write
7379000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
61C0000
trusted library allocation
page execute and read and write
5748000
trusted library allocation
page read and write
5F42000
trusted library allocation
page read and write
339E000
stack
page read and write
5C60000
heap
page read and write
707B000
stack
page read and write
8800000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
1260000
heap
page read and write
2B30000
trusted library section
page read and write
55BE000
stack
page read and write
788A000
heap
page read and write
92CE000
stack
page read and write
72A0000
trusted library allocation
page read and write
2B5D000
trusted library allocation
page execute and read and write
74C0000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
3180000
heap
page read and write
7ED000
stack
page read and write
872D000
trusted library allocation
page read and write
897B000
heap
page read and write
884E000
stack
page read and write
4E32000
trusted library allocation
page read and write
14EE000
stack
page read and write
5050000
heap
page read and write
6CCE000
stack
page read and write
61A0000
trusted library allocation
page read and write
6D0B000
stack
page read and write
8E6B000
stack
page read and write
8560000
trusted library allocation
page execute and read and write
2B10000
heap
page read and write
144D000
trusted library allocation
page execute and read and write
713E000
stack
page read and write
4EF4000
trusted library allocation
page read and write
3100000
heap
page read and write
5148000
trusted library allocation
page read and write
4836000
trusted library allocation
page read and write
1450000
heap
page read and write
8F4D000
stack
page read and write
15C0000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
83C000
stack
page read and write
8810000
trusted library allocation
page execute and read and write
820E000
heap
page read and write
1615000
heap
page read and write
732E000
heap
page read and write
7CE0000
trusted library allocation
page read and write
4DAC000
stack
page read and write
7F040000
trusted library allocation
page execute and read and write
4D40000
heap
page readonly
819C000
heap
page read and write
2C60000
trusted library section
page read and write
74BE000
stack
page read and write
4F71000
trusted library allocation
page read and write
FC7000
heap
page read and write
78FD000
heap
page read and write
A47000
heap
page read and write
78D0000
heap
page read and write
7BDE000
stack
page read and write
892C000
heap
page read and write
B57000
stack
page read and write
2CB2000
trusted library allocation
page read and write
1AC7000
heap
page read and write
8800000
heap
page read and write
4991000
trusted library allocation
page read and write
319D000
stack
page read and write
8261000
heap
page read and write
6B8C000
stack
page read and write
91CE000
stack
page read and write
8830000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
5EFD000
stack
page read and write
4F17000
heap
page read and write
875E000
stack
page read and write
7CF0000
trusted library allocation
page read and write
788E000
stack
page read and write
8233000
heap
page read and write
6EC000
stack
page read and write
3190000
trusted library allocation
page read and write
744E000
stack
page read and write
1470000
trusted library allocation
page read and write
7F5B0000
trusted library allocation
page execute and read and write
2B53000
trusted library allocation
page execute and read and write
3251000
heap
page read and write
8740000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
C1CD000
stack
page read and write
4FDE000
stack
page read and write
8225000
heap
page read and write
4C70000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
31B0000
heap
page execute and read and write
703E000
stack
page read and write
8B00000
trusted library allocation
page execute and read and write
5F16000
trusted library allocation
page read and write
8212000
heap
page read and write
4C7A000
trusted library allocation
page execute and read and write
2CB0000
trusted library allocation
page read and write
6D8B000
stack
page read and write
70BE000
stack
page read and write
6DCE000
stack
page read and write
8F0000
heap
page read and write
8827000
trusted library allocation
page read and write
958A000
heap
page read and write
81D8000
heap
page read and write
88A0000
heap
page read and write
14F0000
trusted library allocation
page execute and read and write
62E0000
heap
page read and write
8B90000
trusted library allocation
page read and write
F3E000
stack
page read and write
5F10000
trusted library allocation
page read and write
944E000
stack
page read and write
2C5A000
heap
page read and write
709F000
stack
page read and write
5930000
trusted library allocation
page execute and read and write
76DE000
stack
page read and write
826D000
heap
page read and write
8880000
trusted library allocation
page read and write
588B000
trusted library allocation
page read and write
79B6000
heap
page read and write
C66000
heap
page read and write
72E6000
heap
page read and write
31A0000
heap
page read and write
C0CE000
stack
page read and write
64A0000
heap
page read and write
7F058000
trusted library allocation
page execute and read and write
5701000
trusted library allocation
page read and write
3155000
heap
page read and write
88C6000
heap
page read and write
1AB5000
trusted library allocation
page read and write
6CFD000
stack
page read and write
753D000
stack
page read and write
8020000
trusted library allocation
page read and write
4EAE000
stack
page read and write
5B3A000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
6E10000
heap
page read and write
8D13000
trusted library allocation
page read and write
88D2000
heap
page read and write
4D7C000
stack
page read and write
5053000
heap
page read and write
57E6000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page execute and read and write
7600000
trusted library allocation
page read and write
4399000
trusted library allocation
page read and write
2882000
trusted library allocation
page read and write
790C000
heap
page read and write
167C000
heap
page read and write
954E000
stack
page read and write
2CD0000
trusted library allocation
page read and write
879D000
stack
page read and write
76BE000
stack
page read and write
8890000
trusted library allocation
page execute and read and write
7D10000
trusted library allocation
page read and write
7290000
heap
page execute and read and write
563E000
trusted library allocation
page read and write
7880000
heap
page read and write
4B81000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
3106000
heap
page read and write
7CF3000
trusted library allocation
page read and write
5C69000
stack
page read and write
73CD000
trusted library allocation
page read and write
2CA7000
heap
page read and write
89B0000
heap
page read and write
5220000
heap
page execute and read and write
2C70000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
8CCE000
stack
page read and write
324B000
heap
page read and write
8170000
trusted library allocation
page read and write
733F000
heap
page read and write
506D000
stack
page read and write
6137000
trusted library allocation
page read and write
5658000
trusted library allocation
page read and write
2B69000
trusted library allocation
page read and write
4E15000
trusted library allocation
page read and write
88F8000
heap
page read and write
3484000
trusted library allocation
page read and write
707C000
stack
page read and write
2900000
trusted library allocation
page execute and read and write
3470000
trusted library allocation
page read and write
454D000
stack
page read and write
97A0000
trusted library section
page read and write
7D00000
trusted library allocation
page read and write
727000
stack
page read and write
2FAE000
stack
page read and write
2CA0000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
7330000
heap
page read and write
899A000
heap
page read and write
7C80000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
6263000
trusted library allocation
page read and write
60F9000
trusted library allocation
page read and write
751A000
stack
page read and write
729E000
heap
page read and write
7219000
heap
page read and write
C50000
heap
page read and write
7CB0000
trusted library allocation
page read and write
8241000
heap
page read and write
3098000
stack
page read and write
3220000
trusted library allocation
page execute and read and write
50C6000
trusted library allocation
page read and write
88E0000
heap
page read and write
6490000
trusted library allocation
page read and write
C70000
heap
page read and write
85AE000
stack
page read and write
740E000
stack
page read and write
7550000
trusted library allocation
page execute and read and write
2D60000
heap
page readonly
5F60000
heap
page read and write
7994000
heap
page read and write
3391000
trusted library allocation
page read and write
2EB1000
heap
page read and write
4620000
trusted library allocation
page execute and read and write
4C53000
trusted library allocation
page execute and read and write
2C10000
heap
page read and write
F70000
heap
page read and write
5808000
trusted library allocation
page read and write
A3E000
stack
page read and write
88E8000
heap
page read and write
3B29000
trusted library allocation
page read and write
4E13000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
3120000
heap
page read and write
821C000
heap
page read and write
8720000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
461C000
stack
page read and write
3200000
heap
page read and write
1266000
heap
page read and write
7520000
trusted library allocation
page read and write
2C66000
heap
page read and write
74FE000
stack
page read and write
742A000
trusted library allocation
page read and write
6D4E000
stack
page read and write
32E2000
heap
page read and write
7C90000
trusted library allocation
page read and write
7984000
heap
page read and write
F80000
heap
page read and write
7780000
heap
page read and write
70D1000
heap
page read and write
88E2000
heap
page read and write
7F70000
trusted library allocation
page read and write
46D0000
heap
page execute and read and write
7B5E000
stack
page read and write
7CA0000
trusted library allocation
page read and write
4F60000
heap
page execute and read and write
76FE000
stack
page read and write
575A000
trusted library allocation
page read and write
3590000
heap
page read and write
75A0000
heap
page read and write
2930000
heap
page execute and read and write
8180000
heap
page read and write
4C85000
trusted library allocation
page execute and read and write
8C80000
trusted library allocation
page read and write
5DFB000
stack
page read and write
4FEE000
trusted library allocation
page read and write
85F3000
trusted library allocation
page read and write
3048000
heap
page read and write
7336000
heap
page read and write
5B23000
trusted library allocation
page read and write
795C000
heap
page read and write
FBD000
trusted library allocation
page execute and read and write
4F59000
stack
page read and write
3B66000
trusted library allocation
page read and write
307C000
stack
page read and write
56E1000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
81C2000
heap
page read and write
4C5D000
trusted library allocation
page execute and read and write
717E000
stack
page read and write
7530000
trusted library allocation
page read and write
8D20000
trusted library section
page read and write
4C80000
trusted library allocation
page read and write
6ADE000
stack
page read and write
56E9000
trusted library allocation
page read and write
793F000
heap
page read and write
6B80000
heap
page execute and read and write
609C000
stack
page read and write
755E000
stack
page read and write
878E000
stack
page read and write
54EB000
trusted library allocation
page read and write
355F000
stack
page read and write
FA4000
trusted library allocation
page read and write
8922000
heap
page read and write
30EB000
trusted library allocation
page read and write
51FF000
stack
page read and write
627B000
trusted library allocation
page read and write
6A99000
stack
page read and write
18DE000
stack
page read and write
50CC000
trusted library allocation
page read and write
8B79000
trusted library allocation
page read and write
7990000
heap
page execute and read and write
731D000
heap
page read and write
7F6F8000
trusted library allocation
page execute and read and write
5131000
trusted library allocation
page read and write
CA5000
heap
page read and write
97D0000
trusted library allocation
page read and write
754E000
stack
page read and write
537C000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
732E000
stack
page read and write
321E000
stack
page read and write
2E9E000
heap
page read and write
2B85000
trusted library allocation
page execute and read and write
3190000
heap
page read and write
C4C000
stack
page read and write
7C60000
trusted library allocation
page read and write
4C5D000
stack
page read and write
4CEE000
stack
page read and write
7C5D000
stack
page read and write
4FD0000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
3229000
heap
page read and write
6BB0000
heap
page read and write
146D000
trusted library allocation
page execute and read and write
88C2000
heap
page read and write
869D000
stack
page read and write
775E000
stack
page read and write
7CD0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page execute and read and write
741E000
stack
page read and write
3192000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
73CB000
trusted library allocation
page read and write
87E0000
heap
page read and write
7F768000
trusted library allocation
page execute and read and write
6C0B000
stack
page read and write
5C65000
heap
page read and write
72A4000
heap
page read and write
6C4E000
stack
page read and write
8247000
heap
page read and write
829B000
heap
page read and write
8840000
trusted library allocation
page read and write
48AE000
stack
page read and write
7490000
heap
page execute and read and write
A5B000
stack
page read and write
5920000
trusted library allocation
page read and write
8162000
trusted library allocation
page read and write
80CE000
stack
page read and write
78AA000
heap
page read and write
547E000
stack
page read and write
78F9000
heap
page read and write
7CC0000
trusted library allocation
page read and write
8810000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
81D0000
heap
page read and write
6CBE000
stack
page read and write
A50000
trusted library section
page read and write
8B10000
trusted library allocation
page read and write
3483000
trusted library allocation
page execute and read and write
8720000
heap
page read and write
83D0000
trusted library allocation
page read and write
305C000
stack
page read and write
2C83000
trusted library allocation
page execute and read and write
3110000
heap
page read and write
72C7000
heap
page read and write
8B6F000
stack
page read and write
8D10000
trusted library allocation
page read and write
58CB000
trusted library allocation
page read and write
6FDE000
stack
page read and write
3599000
heap
page read and write
4E1C000
stack
page read and write
F90000
trusted library allocation
page read and write
74CE000
stack
page read and write
79F1000
heap
page read and write
8F1E000
stack
page read and write
85AE000
stack
page read and write
897A000
heap
page read and write
C30D000
stack
page read and write
7F6D000
trusted library allocation
page read and write
6329000
heap
page read and write
7F6E0000
trusted library allocation
page execute and read and write
2B50000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
C99000
heap
page read and write
75C0000
trusted library allocation
page read and write
1482000
trusted library allocation
page read and write
CA3000
heap
page read and write
62E5000
heap
page read and write
4B5C000
stack
page read and write
72C0000
heap
page read and write
85F0000
trusted library allocation
page read and write
86C0000
trusted library allocation
page execute and read and write
2BFE000
stack
page read and write
31DF000
stack
page read and write
2C30000
heap
page read and write
7A0000
heap
page read and write
15E0000
heap
page read and write
341E000
stack
page read and write
3280000
heap
page read and write
4DF0000
heap
page execute and read and write
8198000
heap
page read and write
701F000
stack
page read and write
2C00000
trusted library section
page read and write
62F0000
heap
page read and write
7500000
trusted library allocation
page read and write
8227000
heap
page read and write
557F000
stack
page read and write
74DE000
stack
page read and write
6C8E000
stack
page read and write
5910000
trusted library allocation
page read and write
81E4000
heap
page read and write
878000
stack
page read and write
5A62000
trusted library allocation
page read and write
4987000
heap
page read and write
7270000
heap
page read and write
7282000
heap
page read and write
5AEB000
stack
page read and write
2C90000
trusted library allocation
page read and write
2C00000
heap
page readonly
874D000
trusted library allocation
page read and write
1690000
heap
page read and write
8194000
heap
page read and write
8DA0000
trusted library allocation
page read and write
2EFC000
stack
page read and write
5C70000
heap
page read and write
4DD0000
trusted library allocation
page read and write
8AE2000
trusted library allocation
page read and write
DF2000
unkown
page readonly
979F000
stack
page read and write
61A7000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
75CE000
stack
page read and write
2B54000
trusted library allocation
page read and write
3140000
heap
page read and write
50DB000
trusted library allocation
page read and write
1472000
trusted library allocation
page read and write
7997000
heap
page read and write
8E2D000
stack
page read and write
8B2E000
stack
page read and write
C60000
heap
page read and write
5F1B000
trusted library allocation
page read and write
33DD000
stack
page read and write
5B43000
trusted library allocation
page read and write
3A81000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
89AD000
heap
page read and write
7330000
trusted library allocation
page read and write
8253000
heap
page read and write
56F7000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
7939000
heap
page read and write
2DA0000
trusted library allocation
page read and write
773E000
stack
page read and write
89A9000
heap
page read and write
50AB000
stack
page read and write
6D8F000
stack
page read and write
88CE000
heap
page read and write
4A88000
trusted library allocation
page read and write
6D7E000
stack
page read and write
73C0000
trusted library allocation
page read and write
2BA0000
heap
page read and write
15B0000
trusted library allocation
page read and write
88DA000
heap
page read and write
743E000
stack
page read and write
85EE000
stack
page read and write
97F0000
trusted library allocation
page execute and read and write
777F000
stack
page read and write
4C60000
trusted library allocation
page read and write
6274000
trusted library allocation
page read and write
8F8E000
stack
page read and write
8900000
heap
page read and write
6D4E000
stack
page read and write
7C5D000
stack
page read and write
9555000
heap
page read and write
3575000
trusted library allocation
page read and write
2C38000
heap
page read and write
50C7000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7EF50000
trusted library allocation
page execute and read and write
5F31000
trusted library allocation
page read and write
8D3E000
stack
page read and write
3198000
heap
page read and write
8E0000
heap
page read and write
7200000
heap
page read and write
4F9E000
stack
page read and write
FCE000
stack
page read and write
72EE000
stack
page read and write
7CC0000
trusted library allocation
page read and write
771B000
stack
page read and write
79B4000
heap
page read and write
7510000
trusted library allocation
page read and write
4C25000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
744E000
stack
page read and write
5F00000
trusted library allocation
page read and write
2FEF000
stack
page read and write
32CC000
heap
page read and write
7320000
trusted library allocation
page read and write
1518000
trusted library allocation
page read and write
288A000
trusted library allocation
page execute and read and write
2CB5000
trusted library allocation
page execute and read and write
791B000
heap
page read and write
78A0000
heap
page execute and read and write
7540000
trusted library allocation
page read and write
493D000
stack
page read and write
8251000
heap
page read and write
7580000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
DF0000
unkown
page readonly
72D9000
heap
page read and write
5F36000
trusted library allocation
page read and write
7B1E000
stack
page read and write
2C99000
trusted library allocation
page read and write
C0E000
stack
page read and write
FAD000
trusted library allocation
page execute and read and write
74A0000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
4C82000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
79B8000
heap
page read and write
4DBC000
stack
page read and write
4EEE000
stack
page read and write
15D0000
trusted library allocation
page read and write
7F6B000
trusted library allocation
page read and write
2DC0000
heap
page read and write
6E0D000
stack
page read and write
88D0000
heap
page read and write
2C8D000
trusted library allocation
page execute and read and write
7CB0000
trusted library allocation
page read and write
73BD000
stack
page read and write
30B8000
stack
page read and write
7610000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page execute and read and write
8184000
heap
page read and write
83C0000
trusted library allocation
page read and write
2D5F000
stack
page read and write
7C90000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
FC0000
heap
page read and write
7B5E000
stack
page read and write
8EED000
stack
page read and write
3578000
trusted library allocation
page read and write
81EC000
heap
page read and write
FA0000
trusted library allocation
page read and write
823B000
heap
page read and write
C20D000
stack
page read and write
779E000
stack
page read and write
5AC5000
trusted library allocation
page read and write
705E000
stack
page read and write
7FC70000
trusted library allocation
page execute and read and write
8560000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
324D000
heap
page read and write
4DF2000
trusted library allocation
page read and write
6D0A000
stack
page read and write
5873000
trusted library allocation
page read and write
2D00000
heap
page read and write
7B9E000
stack
page read and write
89A4000
heap
page read and write
1500000
heap
page read and write
72D9000
heap
page read and write
8ECB000
stack
page read and write
525B000
trusted library allocation
page read and write
89C3000
heap
page read and write
611B000
trusted library allocation
page read and write
8E40000
trusted library allocation
page execute and read and write
5B7E000
trusted library allocation
page read and write
8180000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
8700000
heap
page read and write
89A0000
heap
page read and write
7560000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
5B34000
trusted library allocation
page read and write
4F10000
heap
page read and write
7F750000
trusted library allocation
page execute and read and write
FA3000
trusted library allocation
page execute and read and write
3420000
heap
page read and write
7452000
trusted library allocation
page read and write
7F40000
heap
page read and write
8DE0000
trusted library allocation
page execute and read and write
882A000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
5F99000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
5F2E000
trusted library allocation
page read and write
717F000
stack
page read and write
4DF5000
heap
page execute and read and write
7427000
trusted library allocation
page read and write
8F2E000
stack
page read and write
810E000
stack
page read and write
824F000
heap
page read and write
5B6A000
stack
page read and write
3490000
trusted library allocation
page read and write
1607000
heap
page read and write
9550000
heap
page read and write
46E1000
trusted library allocation
page read and write
6BCD000
stack
page read and write
2892000
trusted library allocation
page read and write
351E000
stack
page read and write
8860000
trusted library allocation
page read and write
1456000
heap
page read and write
750A000
stack
page read and write
61D0000
trusted library allocation
page read and write
4D58000
trusted library allocation
page read and write
7FDD000
stack
page read and write
7265000
heap
page read and write
5B2B000
stack
page read and write
920000
heap
page read and write
7192000
heap
page read and write
7901000
heap
page read and write
4D50000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
15EE000
heap
page read and write
813E000
stack
page read and write
7D00000
trusted library allocation
page read and write
8237000
heap
page read and write
31F0000
trusted library allocation
page read and write
2C18000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
473B000
trusted library allocation
page read and write
1476000
trusted library allocation
page execute and read and write
50C0000
heap
page execute and read and write
78C5000
heap
page read and write
458E000
stack
page read and write
75D0000
trusted library allocation
page read and write
4DD0000
heap
page read and write
6230000
trusted library allocation
page execute and read and write
4590000
heap
page read and write
2F65000
heap
page execute and read and write
52D0000
trusted library allocation
page read and write
8277000
heap
page read and write
3040000
heap
page read and write
6DBF000
stack
page read and write
1480000
trusted library allocation
page read and write
8B70000
trusted library allocation
page read and write
303D000
stack
page read and write
97C0000
trusted library allocation
page read and write
58F0000
heap
page read and write
56B7000
trusted library allocation
page read and write
7267000
heap
page read and write
56BB000
trusted library allocation
page read and write
2B0E000
stack
page read and write
486E000
stack
page read and write
32D3000
heap
page read and write
7360000
trusted library allocation
page execute and read and write
7952000
heap
page read and write
8CF3000
trusted library allocation
page read and write
87FF000
stack
page read and write
140E000
stack
page read and write
748E000
stack
page read and write
6283000
trusted library allocation
page read and write
737F000
trusted library allocation
page read and write
88F0000
heap
page read and write
3560000
heap
page readonly
3150000
heap
page read and write
8D7E000
stack
page read and write
1AAB000
stack
page read and write
5CAE000
stack
page read and write
8040000
trusted library allocation
page execute and read and write
871F000
stack
page read and write
2DF9000
heap
page read and write
81E0000
heap
page read and write
5570000
trusted library allocation
page read and write
8954000
heap
page read and write
8533000
trusted library allocation
page read and write
4E60000
heap
page read and write
87CD000
stack
page read and write
310D000
trusted library allocation
page read and write
6199000
stack
page read and write
5F79000
trusted library allocation
page read and write
548C000
stack
page read and write
4391000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
880A000
trusted library allocation
page read and write
8229000
heap
page read and write
5885000
trusted library allocation
page read and write
784E000
stack
page read and write
450E000
stack
page read and write
7F50000
trusted library allocation
page execute and read and write
5BDE000
stack
page read and write
5999000
trusted library allocation
page read and write
2D90000
trusted library allocation
page execute and read and write
7926000
heap
page read and write
7932000
heap
page read and write
4EFE000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7941000
heap
page read and write
7285000
heap
page read and write
5F22000
trusted library allocation
page read and write
4BE7000
trusted library allocation
page read and write
46CE000
stack
page read and write
81D4000
heap
page read and write
2A81000
trusted library allocation
page read and write
9030000
trusted library allocation
page execute and read and write
148B000
trusted library allocation
page execute and read and write
78DD000
heap
page read and write
4C00000
heap
page read and write
1443000
trusted library allocation
page execute and read and write
6B1E000
stack
page read and write
75B0000
trusted library allocation
page read and write
8188000
heap
page read and write
7490000
trusted library allocation
page execute and read and write
8B80000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
73CE000
stack
page read and write
7332000
heap
page read and write
7590000
trusted library allocation
page read and write
34B5000
trusted library allocation
page execute and read and write
8710000
trusted library allocation
page execute and read and write
7B9E000
stack
page read and write
7C1E000
stack
page read and write
748D000
stack
page read and write
5AE8000
trusted library allocation
page read and write
4D8E000
trusted library allocation
page read and write
2F60000
heap
page execute and read and write
5F91000
trusted library allocation
page read and write
4FDE000
stack
page read and write
168C000
heap
page read and write
703D000
stack
page read and write
34AA000
trusted library allocation
page execute and read and write
30E0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
72E1000
heap
page read and write
6F3C000
stack
page read and write
80CE000
stack
page read and write
5CA0000
heap
page read and write
87BE000
stack
page read and write
31A3000
heap
page read and write
8000000
heap
page read and write
733B000
heap
page read and write
2BA8000
heap
page read and write
3228000
heap
page read and write
759A000
stack
page read and write
747E000
stack
page read and write
2DC8000
heap
page read and write
2B82000
trusted library allocation
page read and write
1487000
trusted library allocation
page execute and read and write
8010000
trusted library allocation
page execute and read and write
83F0000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
4970000
heap
page read and write
5F71000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
4829000
stack
page read and write
A40000
heap
page read and write
7495000
heap
page execute and read and write
2940000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
86A0000
trusted library allocation
page read and write
8080000
heap
page read and write
53E9000
trusted library allocation
page read and write
15EB000
heap
page read and write
7274000
heap
page read and write
7370000
trusted library allocation
page read and write
881E000
stack
page read and write
7FE0000
heap
page read and write
795D000
heap
page read and write
28B0000
trusted library allocation
page read and write
6E20000
heap
page read and write
321C000
heap
page read and write
993F000
stack
page read and write
7540000
trusted library allocation
page read and write
28FE000
stack
page read and write
7C80000
trusted library allocation
page read and write
8D86000
trusted library allocation
page read and write
8050000
heap
page read and write
818C000
heap
page read and write
8872000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
CE7000
heap
page read and write
4DF4000
trusted library allocation
page read and write
BF90000
heap
page read and write
80DA000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
540E000
stack
page read and write
9560000
heap
page read and write
2910000
trusted library allocation
page read and write
3480000
trusted library allocation
page read and write
7F0000
heap
page read and write
289B000
trusted library allocation
page execute and read and write
8D80000
trusted library allocation
page read and write
31C9000
heap
page read and write
73D0000
trusted library allocation
page execute and read and write
758C000
stack
page read and write
5030000
trusted library allocation
page read and write
5C80000
heap
page read and write
79F1000
heap
page read and write
16B6000
heap
page read and write
83BF000
stack
page read and write
1622000
heap
page read and write
7D30000
trusted library allocation
page read and write
80E0000
trusted library allocation
page read and write
940F000
stack
page read and write
15FF000
heap
page read and write
5A90000
trusted library allocation
page read and write
874B000
stack
page read and write
35E7000
heap
page read and write
74D0000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
8958000
heap
page read and write
C78000
heap
page read and write
71F0000
trusted library allocation
page read and write
57E8000
trusted library allocation
page read and write
870D000
stack
page read and write
3499000
trusted library allocation
page read and write
8EAE000
stack
page read and write
6325000
heap
page read and write
2C16000
heap
page read and write
75F0000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
72BD000
heap
page read and write
4D3E000
stack
page read and write
400000
remote allocation
page execute and read and write
31C0000
trusted library allocation
page execute and read and write
2DED000
heap
page read and write
60F1000
trusted library allocation
page read and write
80D7000
trusted library allocation
page read and write
59F7000
trusted library allocation
page read and write
88B0000
heap
page read and write
7380000
heap
page execute and read and write
34B2000
trusted library allocation
page read and write
468E000
stack
page read and write
1AB0000
trusted library allocation
page read and write
2E7C000
heap
page read and write
7255000
heap
page read and write
8CE0000
trusted library allocation
page read and write
16D7000
heap
page read and write
8400000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
562A000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
3258000
heap
page read and write
793F000
heap
page read and write
4980000
heap
page read and write
70FF000
stack
page read and write
17DE000
stack
page read and write
5CA8000
heap
page read and write
81DC000
heap
page read and write
4CF0000
heap
page read and write
87F0000
trusted library allocation
page execute and read and write
4EEE000
stack
page read and write
50A8000
trusted library allocation
page read and write
6F4D000
stack
page read and write
5F3D000
trusted library allocation
page read and write
8FCF000
stack
page read and write
5077000
trusted library allocation
page read and write
8150000
trusted library allocation
page read and write
814E000
stack
page read and write
872B000
trusted library allocation
page read and write
59B9000
trusted library allocation
page read and write
4FFB000
trusted library allocation
page read and write
7C1E000
stack
page read and write
8924000
heap
page read and write
74B0000
trusted library allocation
page read and write
2970000
heap
page read and write
8E8D000
stack
page read and write
338F000
stack
page read and write
7890000
heap
page read and write
F50000
heap
page read and write
793A000
heap
page read and write
7937000
heap
page read and write
87DE000
stack
page read and write
89CB000
heap
page read and write
8860000
trusted library allocation
page read and write
4E6E000
stack
page read and write
8B30000
trusted library allocation
page read and write
2BDE000
stack
page read and write
802F000
stack
page read and write
1463000
trusted library allocation
page read and write
78BF000
heap
page read and write
6D3F000
stack
page read and write
726B000
heap
page read and write
6E0B000
stack
page read and write
4E3E000
stack
page read and write
348D000
trusted library allocation
page execute and read and write
5315000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
4630000
trusted library allocation
page read and write
7317000
heap
page read and write
5F1E000
trusted library allocation
page read and write
2D1E000
stack
page read and write
8246000
heap
page read and write
4C54000
trusted library allocation
page read and write
5FD8000
trusted library allocation
page read and write
7963000
heap
page read and write
6F8B000
stack
page read and write
4C50000
trusted library allocation
page read and write
50CA000
trusted library allocation
page read and write
56BE000
stack
page read and write
5AE6000
trusted library allocation
page read and write
49EB000
trusted library allocation
page read and write
7F60000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
7349000
heap
page read and write
2BE0000
heap
page read and write
89B9000
heap
page read and write
56A6000
trusted library allocation
page read and write
12F7000
stack
page read and write
89B7000
heap
page read and write
8520000
trusted library allocation
page read and write
7B1E000
stack
page read and write
72AC000
heap
page read and write
7329000
heap
page read and write
45DC000
stack
page read and write
825A000
heap
page read and write
2F3C000
stack
page read and write
4EAF000
stack
page read and write
530E000
stack
page read and write
56AF000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
2C84000
trusted library allocation
page read and write
3270000
trusted library section
page readonly
342E000
stack
page read and write
75E0000
trusted library allocation
page read and write
FE0000
heap
page read and write
2890000
trusted library allocation
page read and write
2CD3000
heap
page read and write
8F0E000
stack
page read and write
925000
heap
page read and write
2FF0000
heap
page execute and read and write
4F29000
stack
page read and write
318E000
stack
page read and write
58CE000
trusted library allocation
page read and write
6B85000
heap
page execute and read and write
7258000
heap
page read and write
5DBD000
stack
page read and write
4C3F000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
8030000
heap
page read and write
591F000
trusted library allocation
page read and write
7EF68000
trusted library allocation
page execute and read and write
2C80000
trusted library allocation
page read and write
50D1000
trusted library allocation
page read and write
760B000
stack
page read and write
7C70000
trusted library allocation
page execute and read and write
7953000
heap
page read and write
3430000
heap
page read and write
35E0000
heap
page read and write
8730000
trusted library allocation
page execute and read and write
2886000
trusted library allocation
page execute and read and write
8807000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
60D1000
trusted library allocation
page read and write
2A7F000
stack
page read and write
BC0000
heap
page read and write
34B0000
trusted library allocation
page read and write
10CE000
stack
page read and write
5338000
trusted library allocation
page read and write
86DE000
stack
page read and write
78AE000
heap
page read and write
6DCD000
stack
page read and write
1AC0000
heap
page read and write
7420000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
747F000
stack
page read and write
930E000
stack
page read and write
874B000
trusted library allocation
page read and write
88FC000
heap
page read and write
6200000
heap
page read and write
8E1D000
stack
page read and write
8190000
heap
page read and write
There are 1010 hidden memdumps, click here to show them.