IOC Report
QWNTSg4Fdm.exe

loading gif

Files

File Path
Type
Category
Malicious
QWNTSg4Fdm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\QWNTSg4Fdm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_QWNTSg4Fdm.exe_327c2118ecbb8a156ce51a79c656445a30e6eeb8_50f05828_81cd941a-cfdf-45e5-874b-8346e1fe118b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER320.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD.tmp.dmp
Mini DuMP crash report, 16 streams, Tue Mar 26 17:26:40 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2bnqhgdt.ctk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2eaobaa5.yst.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4xlgw1wl.nt3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eyhqchz5.rpt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_frktg3e4.4mw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hclw5lyu.4dx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hvdqcy0n.zbt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_klxsuqlr.r1a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lcehotju.lwa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p1fwcvcj.iis.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tpgn54mj.hwh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqbhfmbn.wem.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QWNTSg4Fdm.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 26 16:23:52 2024, mtime=Tue Mar 26 16:23:52 2024, atime=Tue Mar 26 16:23:52 2024, length=152064, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QWNTSg4Fdm.exe
"C:\Users\user\Desktop\QWNTSg4Fdm.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\QWNTSg4Fdm.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'QWNTSg4Fdm.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\QWNTSg4Fdm.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4788 -s 1376

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.microsoft.coF
unknown
https://api.telegram.org/bot5498061286:AAEOFPFhizSA_AbkzDV_OWcHlXVsegPpL_c/sendMessage?chat_id=1267602057&text=%E2%98%A0%20%5BXWorm%20V3.0%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEF317FDFBD80D532EB57%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro
149.154.167.220
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://upx.sf.net
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
157.254.223.19
unknown
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QWNTSg4Fdm_RASMANCS
FileDirectory
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
ProgramId
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
FileId
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
LowerCaseLongPath
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
LongPathHash
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
Name
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
OriginalFileName
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
Publisher
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
Version
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
BinFileVersion
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
BinaryType
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
ProductName
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
ProductVersion
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
LinkDate
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
BinProductVersion
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
AppxPackageFullName
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
AppxPackageRelativeId
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
Size
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
Language
\REGISTRY\A\{443b2797-d17c-686a-6747-fb3ccd5d769c}\Root\InventoryApplicationFile\qwntsg4fdm.exe|de375640448aa9c8
Usn
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12F91000
trusted library allocation
page read and write
malicious
C02000
unkown
page readonly
malicious
2FF4000
trusted library allocation
page read and write
malicious
15E2F364000
heap
page read and write
15E17F71000
trusted library allocation
page read and write
7FFB4B1D4000
trusted library allocation
page read and write
1082000
heap
page read and write
1E3CCE49000
trusted library allocation
page read and write
7FFB4B1B0000
trusted library allocation
page read and write
15E2FAFF000
heap
page read and write
177E69E1000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page read and write
7FFB4B300000
trusted library allocation
page read and write
7FFB4B270000
trusted library allocation
page read and write
1E3E50DF000
heap
page read and write
7DF49DFD0000
trusted library allocation
page execute and read and write
7FFB4B100000
trusted library allocation
page read and write
177E5E7D000
trusted library allocation
page read and write
7FFB4AEDC000
trusted library allocation
page execute and read and write
1E3CB2E0000
heap
page read and write
5D63F7D000
stack
page read and write
177E6C5E000
trusted library allocation
page read and write
7FFB4B140000
trusted library allocation
page read and write
15E18BED000
trusted library allocation
page read and write
7FFB4B220000
trusted library allocation
page read and write
1E3CC910000
trusted library allocation
page read and write
177FDED8000
heap
page read and write
1E3CDFE3000
trusted library allocation
page read and write
177E6CF4000
trusted library allocation
page read and write
15E2F87E000
heap
page read and write
4C5677E000
stack
page read and write
1B910000
heap
page execute and read and write
7FFB4B310000
trusted library allocation
page read and write
7FFB4B130000
trusted library allocation
page read and write
D61000
stack
page read and write
7FFB4B1E5000
trusted library allocation
page read and write
1E3DCC41000
trusted library allocation
page read and write
15E180DD000
trusted library allocation
page read and write
7FFB4B2A0000
trusted library allocation
page read and write
15E2F876000
heap
page read and write
7DF470460000
trusted library allocation
page execute and read and write
1E3CC940000
heap
page readonly
1CB4F000
stack
page read and write
1E3E5216000
heap
page read and write
10B5000
heap
page read and write
15E15BA5000
heap
page read and write
7FFB4B130000
trusted library allocation
page read and write
7FFB4B1D0000
trusted library allocation
page read and write
1E3E5540000
heap
page read and write
15C5000
heap
page read and write
177E3F6C000
heap
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
177E40A0000
trusted library allocation
page read and write
177FE127000
heap
page read and write
7FFB4AF56000
trusted library allocation
page read and write
4C57989000
stack
page read and write
4C56B36000
stack
page read and write
7FFB4AE83000
trusted library allocation
page execute and read and write
15E15890000
heap
page read and write
177E4030000
trusted library allocation
page read and write
7FFB4B050000
trusted library allocation
page execute and read and write
177E6B90000
trusted library allocation
page read and write
1E3CCC10000
heap
page read and write
15E158B0000
heap
page read and write
1E3CD81E000
trusted library allocation
page read and write
5D63FF9000
stack
page read and write
1E3E4FF6000
heap
page execute and read and write
C00000
unkown
page readonly
15E18725000
trusted library allocation
page read and write
1C450000
heap
page read and write
1E3CCA42000
heap
page read and write
1E3CB02C000
heap
page read and write
1E3CAEE0000
heap
page read and write
7FFB4AE94000
trusted library allocation
page read and write
7FFB4AE8D000
trusted library allocation
page execute and read and write
4D556BC000
stack
page read and write
177E6ADA000
trusted library allocation
page read and write
1105000
heap
page read and write
15E273D2000
trusted library allocation
page read and write
1E3E5010000
heap
page read and write
7FFB4B1E8000
trusted library allocation
page read and write
1E3CDA05000
trusted library allocation
page read and write
7FFB4B0C0000
trusted library allocation
page read and write
7FFB4B270000
trusted library allocation
page read and write
7FFB4B140000
trusted library allocation
page read and write
177FDEEE000
heap
page read and write
1E3E537B000
heap
page read and write
1E3E4FD0000
trusted library allocation
page read and write
7FFB4AECB000
trusted library allocation
page execute and read and write
15E15910000
trusted library section
page read and write
7FFB4AECD000
trusted library allocation
page execute and read and write
104C000
heap
page read and write
1E3E4FF0000
heap
page execute and read and write
177F5CBA000
trusted library allocation
page read and write
1E3CD671000
trusted library allocation
page read and write
7FFB4B080000
trusted library allocation
page read and write
1100000
heap
page read and write
177E59B1000
trusted library allocation
page read and write
7FFB4B1D4000
trusted library allocation
page read and write
177E3F20000
heap
page readonly
177F5C9B000
trusted library allocation
page read and write
7FFB4B1B0000
trusted library allocation
page read and write
7FFB4B1D0000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
13E0000
heap
page read and write
177FDE87000
heap
page read and write
7FFB4B078000
trusted library allocation
page read and write
15E2F87A000
heap
page read and write
7FFB4B0A0000
trusted library allocation
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
15E182E1000
trusted library allocation
page read and write
15E17589000
trusted library allocation
page read and write
1E3CCA30000
heap
page read and write
7FFB4AEA4000
trusted library allocation
page read and write
1E3E5000000
heap
page read and write
7FFB4B062000
trusted library allocation
page read and write
4C56CBE000
stack
page read and write
1E3CDB84000
trusted library allocation
page read and write
1E3CDDFA000
trusted library allocation
page read and write
1E3E5041000
heap
page read and write
177FE218000
heap
page read and write
1B31D000
heap
page read and write
7FFB4B1F0000
trusted library allocation
page read and write
7FFB4B1E8000
trusted library allocation
page read and write
13E5000
heap
page read and write
7FFB4B1C0000
trusted library allocation
page read and write
1E3E52D1000
heap
page read and write
7FFB4B1F8000
trusted library allocation
page read and write
1E3E5200000
heap
page read and write
1E3CEA42000
trusted library allocation
page read and write
1E3CB00E000
heap
page read and write
2F6E000
stack
page read and write
15E15982000
heap
page read and write
7FFB4B1B3000
trusted library allocation
page read and write
1E3DCC93000
trusted library allocation
page read and write
177E4105000
heap
page read and write
7FF428900000
trusted library allocation
page execute and read and write
7FFB4B120000
trusted library allocation
page read and write
15E1841E000
trusted library allocation
page read and write
7FFB4AE84000
trusted library allocation
page read and write
177E77D6000
trusted library allocation
page read and write
7DF477310000
trusted library allocation
page execute and read and write
4D552F9000
stack
page read and write
7FFB4B062000
trusted library allocation
page read and write
177E65B6000
trusted library allocation
page read and write
15E2F7B0000
heap
page read and write
5D63E7E000
stack
page read and write
1E3CCC9D000
trusted library allocation
page read and write
7FFB4AEC0000
trusted library allocation
page read and write
15E15AE0000
trusted library allocation
page read and write
15E159CE000
heap
page read and write
177F5CA0000
trusted library allocation
page read and write
1E3E5131000
heap
page read and write
7FFB4B2E0000
trusted library allocation
page read and write
177E5940000
heap
page execute and read and write
1E3CD0ED000
trusted library allocation
page read and write
7FFB4AE9B000
trusted library allocation
page read and write
1E3CEA3D000
trusted library allocation
page read and write
177E723E000
trusted library allocation
page read and write
177E778C000
trusted library allocation
page read and write
7FFB4B0E0000
trusted library allocation
page read and write
15E2FB91000
heap
page read and write
4D5628D000
stack
page read and write
1CB8E000
heap
page read and write
1E3E5002000
heap
page read and write
15E159B2000
heap
page read and write
4C56DBC000
stack
page read and write
15E2FBE6000
heap
page read and write
5D6423E000
stack
page read and write
1E3CDCDF000
trusted library allocation
page read and write
15E2FB72000
heap
page read and write
177FE1A4000
heap
page read and write
1E3E52DB000
heap
page read and write
15E15930000
trusted library allocation
page read and write
7DF49DFE0000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
7FFB4B090000
trusted library allocation
page read and write
1D38C000
stack
page read and write
7FFB4B1C3000
trusted library allocation
page read and write
7FFB4B1EC000
trusted library allocation
page read and write
15E15B30000
heap
page execute and read and write
177E77D1000
trusted library allocation
page read and write
7FFB4B03A000
trusted library allocation
page read and write
7FFB4AF40000
trusted library allocation
page read and write
4C56977000
stack
page read and write
1E3DCC21000
trusted library allocation
page read and write
15E18481000
trusted library allocation
page read and write
7FFB4B190000
trusted library allocation
page read and write
111F000
heap
page read and write
7FFB4AF46000
trusted library allocation
page read and write
177FE0D5000
heap
page read and write
7FFB4B2E6000
trusted library allocation
page read and write
177E6AA9000
trusted library allocation
page read and write
1CF50000
heap
page read and write
DB0000
heap
page read and write
1E3E5047000
heap
page read and write
7FFB4B170000
trusted library allocation
page read and write
7FFB4B022000
trusted library allocation
page read and write
5D639C3000
stack
page read and write
5D63CFE000
stack
page read and write
7FFB4B28A000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
1E3CCBF0000
heap
page execute and read and write
304B000
trusted library allocation
page read and write
1E3CDEC6000
trusted library allocation
page read and write
177FDE00000
heap
page read and write
3003000
trusted library allocation
page read and write
7FFB4B150000
trusted library allocation
page read and write
1E3E5366000
heap
page read and write
7FFB4B074000
trusted library allocation
page read and write
15E2765A000
trusted library allocation
page read and write
177E3FB6000
heap
page read and write
15E27391000
trusted library allocation
page read and write
177FE142000
heap
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
1E3CB0D0000
heap
page read and write
7FFB4B1A0000
trusted library allocation
page read and write
15E2F882000
heap
page read and write
15E2FC0E000
heap
page read and write
1BF5E000
stack
page read and write
1353000
trusted library allocation
page read and write
4D551F7000
stack
page read and write
4D5610C000
stack
page read and write
7FFB4B170000
trusted library allocation
page read and write
1E3CE56C000
trusted library allocation
page read and write
1E3CB058000
heap
page read and write
7FFB4B1A0000
trusted library allocation
page read and write
15E159AE000
heap
page read and write
1E3DCF2A000
trusted library allocation
page read and write
15E19160000
trusted library allocation
page read and write
1E3CDB88000
trusted library allocation
page read and write
7FFB4B2C0000
trusted library allocation
page read and write
1D78C000
stack
page read and write
4D5527D000
stack
page read and write
177FDEF8000
heap
page read and write
177E6CC1000
trusted library allocation
page read and write
7FFB4AE90000
trusted library allocation
page read and write
15E159B0000
heap
page read and write
15E182C8000
trusted library allocation
page read and write
1E3CCC21000
trusted library allocation
page read and write
7FFB4B070000
trusted library allocation
page execute and read and write
7FFB4AEB2000
trusted library allocation
page read and write
7FFB4B1EC000
trusted library allocation
page read and write
1E3E52EB000
heap
page read and write
7FFB4B2B0000
trusted library allocation
page read and write
15E2FC63000
heap
page read and write
15E2764B000
trusted library allocation
page read and write
7FFB4AF50000
trusted library allocation
page read and write
1E3E5374000
heap
page read and write
1E3CC950000
trusted library allocation
page read and write
1E3CB053000
heap
page read and write
7FFB4B160000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
7FFB4AF3C000
trusted library allocation
page execute and read and write
15E15B40000
heap
page read and write
7FFB4AEDC000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
15E158F0000
heap
page read and write
15E2F86E000
heap
page read and write
1E3E524C000
heap
page read and write
1E3CDE33000
trusted library allocation
page read and write
7FFB4B1EA000
trusted library allocation
page read and write
7FFB4B070000
trusted library allocation
page execute and read and write
1CB58000
heap
page read and write
7FFB4B050000
trusted library allocation
page execute and read and write
15E2F9D0000
heap
page read and write
177FE194000
heap
page read and write
7FFB4AF36000
trusted library allocation
page read and write
4D5608E000
stack
page read and write
177E7217000
trusted library allocation
page read and write
15E2FBDA000
heap
page read and write
1E3E5050000
heap
page read and write
7FFB4AEAD000
trusted library allocation
page execute and read and write
177E7132000
trusted library allocation
page read and write
15E2F872000
heap
page read and write
7FFB4B140000
trusted library allocation
page read and write
7FFB4AF66000
trusted library allocation
page execute and read and write
177E5990000
heap
page execute and read and write
4C56879000
stack
page read and write
7FFB4B1B3000
trusted library allocation
page read and write
1E3CAFF5000
heap
page read and write
7FFB4B210000
trusted library allocation
page read and write
1E3CD889000
trusted library allocation
page read and write
4C56E3E000
stack
page read and write
7FFB4B0E0000
trusted library allocation
page read and write
7FFB4AFA5000
trusted library allocation
page execute and read and write
15E2F862000
heap
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
15E159F7000
heap
page read and write
1CF48000
stack
page read and write
7FFB4B2D6000
trusted library allocation
page read and write
177E69B5000
trusted library allocation
page read and write
1CB50000
heap
page read and write
15E2FBDD000
heap
page read and write
177E72FF000
trusted library allocation
page read and write
4D5638C000
stack
page read and write
15E1782D000
trusted library allocation
page read and write
C00000
unkown
page readonly
7FFB4B150000
trusted library allocation
page read and write
4D5533E000
stack
page read and write
1E3DCF0C000
trusted library allocation
page read and write
177E5937000
heap
page execute and read and write
15E2FC5A000
heap
page read and write
1573000
heap
page read and write
1BC3B000
heap
page read and write
7FFB4B050000
trusted library allocation
page read and write
15E182CC000
trusted library allocation
page read and write
7FFB4B2C0000
trusted library allocation
page read and write
15E2FC21000
heap
page read and write
15E2F907000
heap
page execute and read and write
15E184C0000
trusted library allocation
page read and write
177E3D70000
heap
page read and write
4C5790E000
stack
page read and write
1E3CB016000
heap
page read and write
7FFB4AF5C000
trusted library allocation
page execute and read and write
1B51D000
stack
page read and write
7FFB4B100000
trusted library allocation
page read and write
15E27381000
trusted library allocation
page read and write
7FFB4B0D0000
trusted library allocation
page read and write
7FFB4B1E4000
trusted library allocation
page read and write
1C255000
stack
page read and write
1CB9C000
heap
page read and write
5D64E0C000
stack
page read and write
15E18608000
trusted library allocation
page read and write
4C5788E000
stack
page read and write
5D63C7E000
stack
page read and write
7FFB4B280000
trusted library allocation
page read and write
4D5563E000
stack
page read and write
177FE198000
heap
page read and write
4C56BB7000
stack
page read and write
177FE0AB000
heap
page read and write
7FFB4B120000
trusted library allocation
page read and write
106B000
heap
page read and write
4D54D7E000
stack
page read and write
7FFB4B2A0000
trusted library allocation
page execute and read and write
7FFB4B150000
trusted library allocation
page read and write
15E159FC000
heap
page read and write
7FFB4B04A000
trusted library allocation
page read and write
15E182DD000
trusted library allocation
page read and write
7FFB4AF30000
trusted library allocation
page read and write
1040000
heap
page read and write
4C57A8E000
stack
page read and write
177FE420000
heap
page read and write
7FFB4B29C000
trusted library allocation
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
7FFB4B2E0000
trusted library allocation
page read and write
15E15978000
heap
page read and write
1E3CB010000
heap
page read and write
15E2F80E000
heap
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
1E3E525C000
heap
page read and write
1E3CD9DA000
trusted library allocation
page read and write
5D63EF9000
stack
page read and write
5D641BB000
stack
page read and write
7FFB4AE84000
trusted library allocation
page read and write
15E18CAE000
trusted library allocation
page read and write
7FFB4B180000
trusted library allocation
page read and write
7FFB4AE83000
trusted library allocation
page execute and read and write
7FFB4AE9B000
trusted library allocation
page read and write
14EC000
stack
page read and write
4C566FE000
stack
page read and write
1E3DCF10000
trusted library allocation
page read and write
7FFB4B2C0000
trusted library allocation
page execute and read and write
7FFB4B1B0000
trusted library allocation
page read and write
15E27652000
trusted library allocation
page read and write
7FFB4B1FC000
trusted library allocation
page read and write
15E159F5000
heap
page read and write
1E3DCC51000
trusted library allocation
page read and write
177E3E50000
heap
page read and write
4C567FF000
stack
page read and write
15E186E7000
trusted library allocation
page read and write
4D5543A000
stack
page read and write
15E15BA0000
heap
page read and write
15E182D0000
trusted library allocation
page read and write
7FFB4B1E2000
trusted library allocation
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
1E3CDF28000
trusted library allocation
page read and write
1E3CD997000
trusted library allocation
page read and write
4D5507E000
stack
page read and write
7FFB4B0B0000
trusted library allocation
page read and write
16CD000
stack
page read and write
1570000
heap
page read and write
7FFB4B170000
trusted library allocation
page read and write
1C540000
heap
page read and write
7FFB4B031000
trusted library allocation
page read and write
7FFB4B1D9000
trusted library allocation
page read and write
1BCBC000
heap
page read and write
15C0000
heap
page read and write
7FFB4B200000
trusted library allocation
page read and write
15E18AE1000
trusted library allocation
page read and write
7DF477300000
trusted library allocation
page execute and read and write
177E3F10000
trusted library allocation
page read and write
1E3CB055000
heap
page read and write
7FFB4B040000
trusted library allocation
page read and write
7FFB4B300000
trusted library allocation
page read and write
15E17F5C000
trusted library allocation
page read and write
7FFB4B2E0000
trusted library allocation
page read and write
7FFB4B200000
trusted library allocation
page read and write
7FFB4AEC4000
trusted library allocation
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
15E15970000
heap
page read and write
7FFB4B0E0000
trusted library allocation
page read and write
7FFB4B064000
trusted library allocation
page read and write
7FFB4AE90000
trusted library allocation
page read and write
177FD9B4000
heap
page read and write
15E15950000
trusted library allocation
page read and write
177FE1E4000
heap
page read and write
7FFB4B190000
trusted library allocation
page read and write
177FE202000
heap
page read and write
4D555BE000
stack
page read and write
7FFB4AE92000
trusted library allocation
page read and write
4C568FE000
stack
page read and write
15E159B8000
heap
page read and write
177E3FB9000
heap
page read and write
7FFB4AEA0000
trusted library allocation
page read and write
15E182D9000
trusted library allocation
page read and write
177F59E1000
trusted library allocation
page read and write
1E3CE9F8000
trusted library allocation
page read and write
7FFB4B1A0000
trusted library allocation
page read and write
15E1913B000
trusted library allocation
page read and write
7FFB4AF30000
trusted library allocation
page read and write
4C57A0C000
stack
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
7FFB4AE82000
trusted library allocation
page read and write
7FFB4B090000
trusted library allocation
page read and write
1046000
heap
page read and write
15E182D4000
trusted library allocation
page read and write
7FFB4B040000
trusted library allocation
page execute and read and write
177E3F8C000
heap
page read and write
13B0000
heap
page read and write
15E19180000
trusted library allocation
page read and write
15E173E8000
trusted library allocation
page read and write
177F5CA8000
trusted library allocation
page read and write
7FFB4B2B0000
trusted library allocation
page execute and read and write
15E18570000
trusted library allocation
page read and write
7FFB4B120000
trusted library allocation
page read and write
1E3CC930000
trusted library allocation
page read and write
7FFB4B180000
trusted library allocation
page read and write
5D640B7000
stack
page read and write
7FFB4B041000
trusted library allocation
page read and write
7FFB4B031000
trusted library allocation
page read and write
7FFB4B064000
trusted library allocation
page read and write
177E4070000
trusted library allocation
page read and write
7FFB4AF86000
trusted library allocation
page execute and read and write
7FFB4B040000
trusted library allocation
page execute and read and write
4D550F9000
stack
page read and write
1E3CDB80000
trusted library allocation
page read and write
1E3E5387000
heap
page read and write
177E5BD9000
trusted library allocation
page read and write
7FFB4B290000
trusted library allocation
page read and write
5D64E8D000
stack
page read and write
7FFB4AE93000
trusted library allocation
page execute and read and write
7FFB4AEAB000
trusted library allocation
page read and write
15E157B0000
heap
page read and write
1E3E5058000
heap
page read and write
7FFB4B110000
trusted library allocation
page read and write
177FE147000
heap
page read and write
1E3CE39E000
trusted library allocation
page read and write
7FFB4B1F0000
trusted library allocation
page read and write
1CB9A000
heap
page read and write
177E6D7B000
trusted library allocation
page read and write
4D5517F000
stack
page read and write
177E6722000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
15E15AA0000
trusted library allocation
page read and write
177FE0AE000
heap
page read and write
1E3E531C000
heap
page read and write
177FDF90000
heap
page read and write
7FFB4B2DD000
trusted library allocation
page read and write
4C569FD000
stack
page read and write
15E2FAB0000
heap
page read and write
7FFB4B1F2000
trusted library allocation
page read and write
7FFB4B1E0000
trusted library allocation
page read and write
15E159C0000
heap
page read and write
5D6403E000
stack
page read and write
5D64F8C000
stack
page read and write
1C354000
stack
page read and write
15E15BB0000
heap
page read and write
1E3CDB9D000
trusted library allocation
page read and write
1E3CDD44000
trusted library allocation
page read and write
5D642BE000
stack
page read and write
4C56673000
stack
page read and write
15E2FC48000
heap
page read and write
7FFB4AFB0000
trusted library allocation
page execute and read and write
4D5553E000
stack
page read and write
177E77B1000
trusted library allocation
page read and write
4C56EBB000
stack
page read and write
177E6C06000
trusted library allocation
page read and write
1D488000
stack
page read and write
177FDE50000
heap
page read and write
177F59D1000
trusted library allocation
page read and write
1E3CE0EF000
trusted library allocation
page read and write
7FFB4AE9D000
trusted library allocation
page execute and read and write
1E3DCF12000
trusted library allocation
page read and write
1E3CE4AA000
trusted library allocation
page read and write
5D64D8F000
stack
page read and write
7FFB4B160000
trusted library allocation
page read and write
7FFB4AFA0000
trusted library allocation
page execute and read and write
1E3E531F000
heap
page read and write
7FFB4B020000
trusted library allocation
page read and write
7FFB4B060000
trusted library allocation
page execute and read and write
2F80000
heap
page execute and read and write
300B000
trusted library allocation
page read and write
7FFB4B068000
trusted library allocation
page read and write
7FFB4B2A0000
trusted library allocation
page read and write
7FFB4B068000
trusted library allocation
page read and write
15E15960000
heap
page readonly
15E2F817000
heap
page read and write
7FFB4AF60000
trusted library allocation
page execute and read and write
15E185AF000
trusted library allocation
page read and write
177E6B14000
trusted library allocation
page read and write
177FE22A000
heap
page read and write
177E59A5000
heap
page read and write
1C51F000
stack
page read and write
4D5630C000
stack
page read and write
177FE270000
trusted library allocation
page read and write
7FFB4B032000
trusted library allocation
page read and write
5D643BC000
stack
page read and write
7FFB4B280000
trusted library allocation
page read and write
7FFB4B1D9000
trusted library allocation
page read and write
177FDE24000
heap
page read and write
1084000
heap
page read and write
7FFB4B070000
trusted library allocation
page execute and read and write
177F5CAA000
trusted library allocation
page read and write
7FFB4B2B0000
trusted library allocation
page read and write
7FFB4B200000
trusted library allocation
page read and write
7DF477320000
trusted library allocation
page execute and read and write
4C56C39000
stack
page read and write
177E3F76000
heap
page read and write
1E3CB00C000
heap
page read and write
15E17F58000
trusted library allocation
page read and write
15E2F900000
heap
page execute and read and write
1E3E503F000
heap
page read and write
1E3E5080000
heap
page read and write
15E18669000
trusted library allocation
page read and write
7FFB4AE90000
trusted library allocation
page read and write
15E1839A000
trusted library allocation
page read and write
4D553B6000
stack
page read and write
7FFB4AF66000
trusted library allocation
page execute and read and write
1CE48000
stack
page read and write
15E2F86A000
heap
page read and write
4D554B8000
stack
page read and write
1E3CD823000
trusted library allocation
page read and write
177F5A22000
trusted library allocation
page read and write
177E694D000
trusted library allocation
page read and write
15E19185000
trusted library allocation
page read and write
15E2FB0A000
heap
page read and write
1E3E5120000
heap
page read and write
7FFB4B0B0000
trusted library allocation
page read and write
7FFB4AEFC000
trusted library allocation
page execute and read and write
1CB6A000
heap
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
7FFB4AEEC000
trusted library allocation
page execute and read and write
15E18537000
trusted library allocation
page read and write
7FFB4B0A0000
trusted library allocation
page read and write
7FFB4AF4C000
trusted library allocation
page execute and read and write
15E18120000
trusted library allocation
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page read and write
1E3CAFD0000
heap
page read and write
177E3F72000
heap
page read and write
4C57A8C000
stack
page read and write
7FFB4B290000
trusted library allocation
page read and write
1E3CE484000
trusted library allocation
page read and write
1E3CDB8C000
trusted library allocation
page read and write
4C56ABE000
stack
page read and write
1E3E507B000
heap
page read and write
1E3DCC31000
trusted library allocation
page read and write
7FFB4B0B0000
trusted library allocation
page read and write
1E3E52A7000
heap
page read and write
15E2FD40000
heap
page read and write
7FFB4B290000
trusted library allocation
page read and write
7FFB4B2ED000
trusted library allocation
page read and write
5D63DF9000
stack
page read and write
1AFC0000
trusted library allocation
page read and write
177E3F42000
heap
page read and write
1E3DCF1A000
trusted library allocation
page read and write
1E3CC9C0000
trusted library allocation
page read and write
15E2FC13000
heap
page read and write
7FFB4B210000
trusted library allocation
page read and write
7FFB4AE80000
trusted library allocation
page read and write
1BCF8000
heap
page read and write
7FFB4B03A000
trusted library allocation
page read and write
177F59B1000
trusted library allocation
page read and write
177E3F30000
heap
page read and write
1E3E5337000
heap
page read and write
7FFB4B110000
trusted library allocation
page read and write
15E159FA000
heap
page read and write
15E18398000
trusted library allocation
page read and write
4D54DFE000
stack
page read and write
15E2F7F8000
heap
page read and write
1C74B000
stack
page read and write
7FFB4B080000
trusted library allocation
page execute and read and write
177E59A0000
heap
page read and write
177E3EB0000
heap
page read and write
1E3CDF5B000
trusted library allocation
page read and write
177FE070000
heap
page read and write
7FFB4B190000
trusted library allocation
page read and write
DC0000
heap
page read and write
177FE190000
heap
page read and write
15E17F4A000
trusted library allocation
page read and write
1E3E52ED000
heap
page read and write
1E3E5005000
heap
page read and write
7FFB4B110000
trusted library allocation
page read and write
1E3CDB90000
trusted library allocation
page read and write
177E6A73000
trusted library allocation
page read and write
15E2766A000
trusted library allocation
page read and write
7FFB4B100000
trusted library allocation
page read and write
1E3CE50D000
trusted library allocation
page read and write
7FFB4AF76000
trusted library allocation
page execute and read and write
7FFB4B0D0000
trusted library allocation
page read and write
1E3E528B000
heap
page read and write
15E2FC42000
heap
page read and write
15E15A6A000
heap
page read and write
15E182C4000
trusted library allocation
page read and write
15E15920000
trusted library section
page read and write
7FFB4B0A0000
trusted library allocation
page read and write
4D5618E000
stack
page read and write
1E3CCBA0000
heap
page execute and read and write
10B0000
heap
page read and write
4D54CF3000
stack
page read and write
7FFB4AFA0000
trusted library allocation
page execute and read and write
7FFB4B0C0000
trusted library allocation
page read and write
7FFB4B0C0000
trusted library allocation
page read and write
177E5A36000
trusted library allocation
page read and write
7FFB4AF36000
trusted library allocation
page read and write
1E3CDC54000
trusted library allocation
page read and write
1E3CCA35000
heap
page read and write
15E2FC1C000
heap
page read and write
15E18B87000
trusted library allocation
page read and write
177E3EF0000
trusted library allocation
page read and write
7FFB4B1E0000
trusted library allocation
page read and write
15E27650000
trusted library allocation
page read and write
15E17DB2000
trusted library allocation
page read and write
1E3E5286000
heap
page read and write
7FFB4AFC0000
trusted library allocation
page execute and read and write
15E2FCB0000
trusted library allocation
page read and write
15E17361000
trusted library allocation
page read and write
15E15BB5000
heap
page read and write
177FDECD000
heap
page read and write
15E18BC6000
trusted library allocation
page read and write
1E3CEA1D000
trusted library allocation
page read and write
1E3CB2B0000
heap
page read and write
177E6402000
trusted library allocation
page read and write
7FFB4B273000
trusted library allocation
page read and write
177F5CA2000
trusted library allocation
page read and write
130D000
stack
page read and write
4D5620C000
stack
page read and write
4C56D3E000
stack
page read and write
7FFB4B1F0000
trusted library allocation
page read and write
7FFB4B072000
trusted library allocation
page read and write
1E3CC980000
trusted library allocation
page read and write
7FFB4B090000
trusted library allocation
page read and write
177E3FB4000
heap
page read and write
177FE1CE000
heap
page read and write
177E4060000
heap
page read and write
7FFB4B030000
trusted library allocation
page read and write
7FFB4B160000
trusted library allocation
page read and write
7FFB4B210000
trusted library allocation
page read and write
7FFB4AEA3000
trusted library allocation
page execute and read and write
1E3CB2E5000
heap
page read and write
15E27361000
trusted library allocation
page read and write
7DF470450000
trusted library allocation
page execute and read and write
15E2F8A8000
heap
page read and write
15E2F84B000
heap
page read and write
5D64F07000
stack
page read and write
7FFB4B180000
trusted library allocation
page read and write
1C94E000
stack
page read and write
7FFB4B1E9000
trusted library allocation
page read and write
7FFB4AF3C000
trusted library allocation
page execute and read and write
1340000
trusted library allocation
page read and write
7FFB4B050000
trusted library allocation
page execute and read and write
5D64138000
stack
page read and write
1E3CB0F0000
heap
page read and write
1E3CDB99000
trusted library allocation
page read and write
1102000
heap
page read and write
177E3E70000
heap
page read and write
5D6433E000
stack
page read and write
7FFB4B0D0000
trusted library allocation
page read and write
1BCAA000
heap
page read and write
7FFB4B060000
trusted library allocation
page execute and read and write
7FFB4AEBD000
trusted library allocation
page execute and read and write
1E3CDB94000
trusted library allocation
page read and write
177E4100000
heap
page read and write
5D6500E000
stack
page read and write
7FFB4B080000
trusted library allocation
page read and write
1BC20000
heap
page read and write
1E3E50CF000
heap
page read and write
15E2FC56000
heap
page read and write
1E3CB01A000
heap
page read and write
4C56A79000
stack
page read and write
7FFB4AE8D000
trusted library allocation
page execute and read and write
1E3E5348000
heap
page read and write
15E2F8E0000
heap
page execute and read and write
7FFB4B130000
trusted library allocation
page read and write
177E5930000
heap
page execute and read and write
5D63D7E000
stack
page read and write
177FDEC1000
heap
page read and write
1AF90000
trusted library allocation
page read and write
There are 689 hidden memdumps, click here to show them.