IOC Report
RFQ24060084#U00b7pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ24060084#U00b7pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\BgImage.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\UserInfo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xc741b813, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsstcjge.bga.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wutuq30z.pqy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv1A81.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x517d4aba, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhv322F.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x517d4aba, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\qqfaqoxzawjkoyuyo
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\yclmrmwzwbdunxrzdoz
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\Farvebaandsomskifteren.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\Montanes176.opt
Matlab v4 mat-file (little endian) \303, text, rows 1202847744, columns 285212672
dropped
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\Wafery.unt
data
dropped
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\barsel.pul
data
dropped
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\migraines.sla
PGP symmetric key encrypted data - Plaintext or unencrypted data
dropped
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\tegnmssig.bra
data
dropped
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\tradionsbevarende.unp
data
dropped
C:\Users\user\AppData\Local\kilns\Unobtainably\Simens.Ice
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe
"C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)"
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
"C:\Users\user\AppData\Local\Temp\Fatherhoods.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"
malicious
C:\Windows\SysWOW64\cmd.exe
/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
malicious
C:\Windows\SysWOW64\reg.exe
C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\yclmrmwzwbdunxrzdoz"
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\ieqxsfhtkjvzqdndurmsqf"
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\tydqtxsuyrnmajbpdcyttscnyt"
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\qqfaqoxzawjkoyuyo"
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\akkkrhibwebpzeqcfkuhx"
malicious
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\lepdszsvkmtcbkegougjiype"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
}a458386d9.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gp%
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.usercontent.google.com/hQ
unknown
https://contoso.com/License
unknown
http://geoplugin.net/json.gphy
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://drive.usercontent.google.com/
unknown
http://www.imvu.coma
unknown
http://www.nirsoft.net
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://geoplugin.net/json.gplr
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://geoplugin.net/json.gpC
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://drive.google.com/Y
unknown
http://geoplugin.net/
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
https://contoso.com/
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://nuget.org/nuget.exe
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://apis.google.com
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
a458386d9.duckdns.org
217.76.50.73
malicious
geoplugin.net
178.237.33.50
drive.google.com
142.250.186.110
drive.usercontent.google.com
216.58.206.65

IPs

IP
Domain
Country
Malicious
217.76.50.73
a458386d9.duckdns.org
Sweden
malicious
142.250.186.110
drive.google.com
United States
216.58.206.65
drive.usercontent.google.com
United States
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\Toponymist
Berufsverbots
HKEY_CURRENT_USER\Environment
Stableres
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Preoccupant
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
6120000
heap
page read and write
malicious
60FB000
heap
page read and write
malicious
BF76000
direct allocation
page execute and read and write
malicious
6131000
heap
page read and write
malicious
42C000
unkown
page read and write
2236000
heap
page read and write
400000
unkown
page readonly
22EFC000
heap
page read and write
618B000
heap
page read and write
3239000
stack
page read and write
2231000
heap
page read and write
B4014FB000
stack
page read and write
2231000
heap
page read and write
2204C000
stack
page read and write
1BFC1677000
trusted library allocation
page read and write
408000
unkown
page readonly
21F1000
heap
page read and write
544000
heap
page read and write
34D0000
heap
page read and write
963000
heap
page read and write
3635000
trusted library allocation
page execute and read and write
22C21000
direct allocation
page execute and read and write
96C000
heap
page read and write
221B000
heap
page read and write
21D0000
heap
page read and write
6183000
heap
page read and write
1BFC145B000
heap
page read and write
2BF0000
heap
page read and write
6129000
heap
page read and write
21D0000
heap
page read and write
21DF000
heap
page read and write
221C000
heap
page read and write
6040000
direct allocation
page read and write
544000
heap
page read and write
6486000
heap
page read and write
22C91000
heap
page read and write
544000
heap
page read and write
21F1000
heap
page read and write
2F2C000
heap
page read and write
2090000
heap
page read and write
B4017FE000
unkown
page readonly
4F4000
heap
page read and write
19E000
stack
page read and write
438000
unkown
page read and write
21FAE000
stack
page read and write
B40237E000
stack
page read and write
1BFBD230000
trusted library allocation
page read and write
21DC000
heap
page read and write
22CB7000
heap
page read and write
534000
heap
page read and write
26D1000
heap
page read and write
544000
heap
page read and write
544000
heap
page read and write
6A8000
heap
page read and write
400000
unkown
page readonly
3610000
heap
page read and write
7B10000
heap
page read and write
2211000
heap
page read and write
22CAE000
heap
page read and write
616C000
heap
page read and write
2210000
heap
page read and write
26D1000
heap
page read and write
7625000
heap
page execute and read and write
33A0000
direct allocation
page read and write
32B0000
heap
page read and write
6460000
direct allocation
page read and write
4F4000
heap
page read and write
6098000
heap
page read and write
2227000
heap
page read and write
504000
heap
page read and write
219EE000
stack
page read and write
545000
heap
page read and write
8397000
trusted library allocation
page read and write
5DD000
heap
page read and write
26D1000
heap
page read and write
21EE000
heap
page read and write
26D1000
heap
page read and write
21DC000
heap
page read and write
8DF000
stack
page read and write
798000
heap
page read and write
21F0000
heap
page read and write
7CA0000
trusted library allocation
page read and write
21D8000
heap
page read and write
440000
unkown
page readonly
1BFC167A000
trusted library allocation
page read and write
544000
heap
page read and write
624000
heap
page read and write
504000
heap
page read and write
2239000
heap
page read and write
26D1000
heap
page read and write
2231000
heap
page read and write
B4011FE000
unkown
page readonly
401000
unkown
page execute read
6176000
heap
page read and write
213F000
stack
page read and write
21E5000
heap
page read and write
26F2000
heap
page read and write
460000
heap
page read and write
91F000
stack
page read and write
545000
heap
page read and write
30FD000
stack
page read and write
504000
heap
page read and write
7B00000
direct allocation
page read and write
504000
heap
page read and write
222E000
heap
page read and write
22CA0000
heap
page read and write
2239000
heap
page read and write
22A6C000
unclassified section
page execute and read and write
34BD000
heap
page read and write
400000
unkown
page readonly
26D1000
heap
page read and write
2210000
heap
page read and write
3606000
remote allocation
page execute and read and write
22D5A000
heap
page read and write
2239000
heap
page read and write
22E08000
heap
page read and write
21EE000
heap
page read and write
267E000
stack
page read and write
8A00000
trusted library allocation
page read and write
CBD000
stack
page read and write
544000
heap
page read and write
224A000
heap
page read and write
2218000
heap
page read and write
21F1000
heap
page read and write
21D5000
heap
page read and write
3670000
heap
page readonly
221D000
heap
page read and write
2244000
heap
page read and write
224F000
heap
page read and write
2266000
heap
page read and write
22CE3000
heap
page read and write
612A000
heap
page read and write
22C91000
heap
page read and write
21E5000
heap
page read and write
22F40000
heap
page read and write
21E0000
heap
page read and write
7B20000
heap
page read and write
6F8000
heap
page read and write
4F4000
heap
page read and write
22D8B000
heap
page read and write
480000
heap
page read and write
440000
unkown
page readonly
550000
heap
page read and write
544000
heap
page read and write
219F000
stack
page read and write
22CAE000
heap
page read and write
B40092B000
stack
page read and write
2231000
heap
page read and write
21E5000
heap
page read and write
B400FFE000
unkown
page readonly
408000
unkown
page readonly
544000
heap
page read and write
1BFBBE97000
heap
page read and write
4006000
remote allocation
page execute and read and write
1BFC1600000
trusted library allocation
page read and write
8990000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
6020000
heap
page read and write
4A06000
remote allocation
page execute and read and write
7E60000
trusted library allocation
page read and write
26D1000
heap
page read and write
2220000
heap
page read and write
21F1000
heap
page read and write
221F000
heap
page read and write
96C000
heap
page read and write
545000
heap
page read and write
1BFBBE29000
heap
page read and write
21E6000
heap
page read and write
21F3000
heap
page read and write
9C000
stack
page read and write
624000
heap
page read and write
21D1000
heap
page read and write
6184000
heap
page read and write
4F4000
heap
page read and write
3600000
trusted library allocation
page read and write
21EE000
heap
page read and write
510000
heap
page read and write
1BFC1660000
remote allocation
page read and write
1BFBBE5B000
heap
page read and write
222E000
heap
page read and write
2258000
heap
page read and write
5AE000
stack
page read and write
B4013FE000
unkown
page readonly
21EE000
heap
page read and write
22D34000
heap
page read and write
A0A000
heap
page read and write
2219000
heap
page read and write
4EE000
stack
page read and write
21EE000
heap
page read and write
C90000
heap
page read and write
3272000
heap
page read and write
21F1000
heap
page read and write
1BFC12D1000
trusted library allocation
page read and write
221C000
heap
page read and write
22CCF000
heap
page read and write
22CE9000
heap
page read and write
26D1000
heap
page read and write
7E20000
trusted library allocation
page read and write
6183000
heap
page read and write
6189000
heap
page read and write
222E000
heap
page read and write
2225000
heap
page read and write
2BD0000
trusted library allocation
page read and write
223CE000
stack
page read and write
20F8000
heap
page read and write
22D9D000
heap
page read and write
9C000
stack
page read and write
34B0000
heap
page read and write
3660000
heap
page read and write
22D29000
heap
page read and write
21D1000
heap
page read and write
AFD000
stack
page read and write
9C000
stack
page read and write
21D8000
heap
page read and write
508000
heap
page read and write
2219000
heap
page read and write
618B000
heap
page read and write
544000
heap
page read and write
33A0000
heap
page read and write
2231000
heap
page read and write
5C89000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
2FF0000
heap
page read and write
21D1000
heap
page read and write
611B000
heap
page read and write
21DD000
heap
page read and write
26D1000
heap
page read and write
7B9E000
stack
page read and write
2221000
heap
page read and write
4F4000
heap
page read and write
544000
heap
page read and write
21F1000
heap
page read and write
28CF000
stack
page read and write
3400000
direct allocation
page read and write
21F1000
heap
page read and write
4D0000
heap
page read and write
2219000
heap
page read and write
545000
heap
page read and write
33D0000
direct allocation
page read and write
548E000
trusted library allocation
page read and write
21F1000
heap
page read and write
98000
stack
page read and write
2C74000
heap
page read and write
2E0F000
heap
page read and write
54E000
stack
page read and write
21D9000
heap
page read and write
223E000
heap
page read and write
532000
heap
page read and write
940000
heap
page read and write
2244000
heap
page read and write
69E000
stack
page read and write
193000
stack
page read and write
400000
unkown
page readonly
21EE000
heap
page read and write
22F91000
heap
page read and write
21E6000
heap
page read and write
1BFBBCE0000
heap
page read and write
21F70000
remote allocation
page read and write
21C80000
direct allocation
page read and write
262E000
stack
page read and write
21F1000
heap
page read and write
21F0000
heap
page read and write
504000
heap
page read and write
21E5000
heap
page read and write
401000
unkown
page execute read
21FEF000
stack
page read and write
3530000
direct allocation
page read and write
401000
unkown
page execute read
21E0000
heap
page read and write
530000
heap
page read and write
1BFC150A000
heap
page read and write
6178000
heap
page read and write
1BFBBE3F000
heap
page read and write
21F4000
heap
page read and write
222E000
heap
page read and write
22F0C000
heap
page read and write
222E000
heap
page read and write
9DF000
stack
page read and write
2211000
heap
page read and write
799E000
stack
page read and write
1BFBC71A000
heap
page read and write
21DC000
heap
page read and write
6185000
heap
page read and write
4F5000
heap
page read and write
544000
heap
page read and write
7E80000
trusted library allocation
page read and write
891E000
stack
page read and write
303F000
stack
page read and write
40A000
unkown
page write copy
2231000
heap
page read and write
440000
unkown
page readonly
22A4000
heap
page read and write
3550000
direct allocation
page read and write
1BFC12B0000
trusted library allocation
page read and write
3518000
heap
page read and write
1BFC1390000
trusted library allocation
page read and write
2211000
heap
page read and write
8EC0000
trusted library allocation
page read and write
91F000
stack
page read and write
430000
heap
page read and write
B401A7E000
stack
page read and write
2231000
heap
page read and write
6DE000
stack
page read and write
6070000
direct allocation
page read and write
544000
heap
page read and write
6470000
direct allocation
page read and write
222E000
heap
page read and write
2210000
heap
page read and write
1BFBD201000
trusted library allocation
page read and write
544000
heap
page read and write
61E000
stack
page read and write
B4018FB000
stack
page read and write
4D0000
heap
page read and write
3275000
heap
page read and write
4EBE000
stack
page read and write
545000
heap
page read and write
2BD0000
trusted library allocation
page read and write
2229000
heap
page read and write
2231000
heap
page read and write
21F1000
heap
page read and write
6185000
heap
page read and write
22D11000
heap
page read and write
220F000
heap
page read and write
2235000
heap
page read and write
544000
heap
page read and write
7680000
heap
page read and write
2B60000
heap
page read and write
9776000
direct allocation
page execute and read and write
2E0A000
heap
page read and write
3158000
heap
page read and write
2BCF000
stack
page read and write
A4A000
heap
page read and write
6114000
heap
page read and write
224F000
heap
page read and write
B4015FE000
unkown
page readonly
B401EFE000
unkown
page readonly
7B55000
heap
page read and write
540E000
stack
page read and write
19A000
stack
page read and write
544000
heap
page read and write
544000
heap
page read and write
21E1000
heap
page read and write
6136000
heap
page read and write
518000
heap
page read and write
7A12000
heap
page read and write
327D000
stack
page read and write
21F1000
heap
page read and write
21FC000
heap
page read and write
2231000
heap
page read and write
65CA000
trusted library allocation
page read and write
400000
unkown
page readonly
21E0000
heap
page read and write
22C97000
heap
page read and write
81F000
stack
page read and write
7C85000
trusted library allocation
page read and write
21E8000
heap
page read and write
7B87000
heap
page read and write
920000
heap
page read and write
22CE3000
heap
page read and write
21D9000
heap
page read and write
21D8000
heap
page read and write
221E000
heap
page read and write
221F000
heap
page read and write
22C90000
heap
page read and write
B76000
heap
page read and write
2220000
heap
page read and write
8D27000
heap
page read and write
21F1000
heap
page read and write
2530000
heap
page read and write
2F2E000
heap
page read and write
2C06000
remote allocation
page execute and read and write
2340000
trusted library allocation
page read and write
21C50000
direct allocation
page read and write
5AE000
stack
page read and write
504000
heap
page read and write
B401F7E000
stack
page read and write
21DF000
heap
page read and write
2231000
heap
page read and write
21F9000
heap
page read and write
6139000
heap
page read and write
1BFC14C4000
heap
page read and write
97E000
stack
page read and write
22CAE000
heap
page read and write
36B0000
heap
page read and write
2E17000
heap
page read and write
21F70000
remote allocation
page read and write
21DC000
heap
page read and write
8D2F000
heap
page read and write
6131000
heap
page read and write
4F5000
heap
page read and write
22899000
unclassified section
page execute and read and write
3438000
heap
page read and write
7E30000
trusted library allocation
page read and write
B401FFE000
unkown
page readonly
2204000
heap
page read and write
21D1000
heap
page read and write
2211000
heap
page read and write
B401DFE000
unkown
page readonly
2219000
heap
page read and write
22CB0000
heap
page read and write
22CB7000
heap
page read and write
2231000
heap
page read and write
570000
heap
page read and write
74C0000
direct allocation
page read and write
22CEB000
heap
page read and write
544000
heap
page read and write
B400DFE000
unkown
page readonly
27D1000
heap
page read and write
228B3000
unclassified section
page execute and read and write
624000
heap
page read and write
21C70000
direct allocation
page read and write
2220000
heap
page read and write
21CCE000
stack
page read and write
221E000
heap
page read and write
21E3000
heap
page read and write
8D37000
heap
page read and write
A00000
heap
page read and write
4F0000
heap
page read and write
222D000
heap
page read and write
8877000
stack
page read and write
52AD000
stack
page read and write
746E000
stack
page read and write
4F5000
heap
page read and write
7D5E000
stack
page read and write
19C000
stack
page read and write
1BFC2000000
heap
page read and write
2217000
heap
page read and write
8B9C000
stack
page read and write
222A000
heap
page read and write
2280000
heap
page read and write
7DDD000
stack
page read and write
D30000
heap
page read and write
4F4000
heap
page read and write
223E000
heap
page read and write
6459000
trusted library allocation
page read and write
4CE000
stack
page read and write
2231000
heap
page read and write
544000
heap
page read and write
2209000
heap
page read and write
2228F000
stack
page read and write
2236000
heap
page read and write
26D1000
heap
page read and write
470000
heap
page read and write
2268D000
stack
page read and write
1BFBBD00000
heap
page read and write
92F000
stack
page read and write
6188000
heap
page read and write
21E2000
heap
page read and write
6090000
heap
page read and write
895F000
stack
page read and write
7DF000
stack
page read and write
222E000
heap
page read and write
7EA0000
trusted library allocation
page read and write
26A0000
heap
page read and write
544000
heap
page read and write
21EE000
heap
page read and write
21EE000
heap
page read and write
440000
unkown
page readonly
401000
unkown
page execute read
21DCF000
stack
page read and write
2250F000
stack
page read and write
21E1000
heap
page read and write
624000
heap
page read and write
1BFC14DD000
heap
page read and write
545000
heap
page read and write
79DE000
stack
page read and write
473000
system
page execute and read and write
630000
heap
page read and write
616E000
heap
page read and write
1BFBC71A000
heap
page read and write
544000
heap
page read and write
7E70000
trusted library allocation
page read and write
1BFC12D0000
trusted library allocation
page read and write
221E000
heap
page read and write
6187000
heap
page read and write
45D000
system
page execute and read and write
2239000
heap
page read and write
22B2D000
unclassified section
page execute and read and write
21E6000
heap
page read and write
26D0000
heap
page read and write
22BC6000
unclassified section
page execute and read and write
470000
heap
page read and write
6187000
heap
page read and write
21B0000
heap
page read and write
21E5000
heap
page read and write
618D000
heap
page read and write
1BFBBE8D000
heap
page read and write
21E5000
heap
page read and write
21F4000
heap
page read and write
21F1000
heap
page read and write
68C000
heap
page read and write
1BFBCCE0000
trusted library section
page readonly
94D000
heap
page read and write
2235000
heap
page read and write
544000
heap
page read and write
1BFBBE92000
heap
page read and write
221A000
heap
page read and write
7C40000
trusted library allocation
page read and write
1BFBBEA2000
heap
page read and write
99E000
stack
page read and write
6420000
direct allocation
page read and write
21F1000
heap
page read and write
7C30000
trusted library allocation
page execute and read and write
7DE0000
trusted library allocation
page read and write
21FC000
heap
page read and write
2CDE000
heap
page read and write
29CF000
stack
page read and write
26D1000
heap
page read and write
2236000
heap
page read and write
550000
heap
page read and write
21F9000
heap
page read and write
550000
heap
page read and write
2233000
heap
page read and write
21EE000
heap
page read and write
401000
unkown
page execute read
25E1000
heap
page read and write
16C0000
remote allocation
page execute and read and write
22D19000
heap
page read and write
1BFC142C000
heap
page read and write
18F000
stack
page read and write
343E000
stack
page read and write
545000
heap
page read and write
26D1000
heap
page read and write
21F1000
heap
page read and write
5BE000
stack
page read and write
5420000
heap
page execute and read and write
2DBF000
heap
page read and write
1BFBBE13000
heap
page read and write
2ABD000
stack
page read and write
74D0000
direct allocation
page read and write
A47000
heap
page read and write
8C7E000
heap
page read and write
B4026FB000
stack
page read and write
4F5000
heap
page read and write
B401D7E000
stack
page read and write
B401B7E000
stack
page read and write
220F000
heap
page read and write
2E1F000
heap
page read and write
544000
heap
page read and write
1BFC1400000
heap
page read and write
5E95000
heap
page read and write
560000
heap
page read and write
2226000
heap
page read and write
504000
heap
page read and write
222E000
heap
page read and write
3619000
trusted library allocation
page read and write
21D0000
heap
page read and write
6187000
heap
page read and write
21F1000
heap
page read and write
408000
unkown
page readonly
B400C7F000
stack
page read and write
40A000
unkown
page write copy
544000
heap
page read and write
21D0000
heap
page read and write
26EF000
stack
page read and write
26D1000
heap
page read and write
21F1000
heap
page read and write
624000
heap
page read and write
21F3000
heap
page read and write
A0A000
heap
page read and write
21DC000
heap
page read and write
8CA6000
heap
page read and write
351E000
heap
page read and write
611B000
heap
page read and write
2219000
heap
page read and write
545000
heap
page read and write
22C20000
direct allocation
page read and write
4F4000
heap
page read and write
88B0000
trusted library allocation
page read and write
6183000
heap
page read and write
4F4000
heap
page read and write
1BFC1505000
heap
page read and write
40A000
unkown
page write copy
4F4000
heap
page read and write
6187000
heap
page read and write
35E0000
trusted library section
page read and write
D376000
direct allocation
page execute and read and write
5C0000
heap
page read and write
1BFBC602000
heap
page read and write
7E00000
trusted library allocation
page read and write
21EE000
heap
page read and write
2CD0000
trusted library allocation
page read and write
544000
heap
page read and write
B30000
heap
page read and write
304F000
heap
page read and write
52E000
heap
page read and write
544000
heap
page read and write
624000
heap
page read and write
456000
system
page execute and read and write
B402D7E000
stack
page read and write
618D000
heap
page read and write
B4029FE000
unkown
page readonly
440000
unkown
page readonly
82E000
stack
page read and write
2233000
heap
page read and write
2CD0000
trusted library allocation
page read and write
1BFC14F4000
heap
page read and write
41B000
system
page execute and read and write
3690000
heap
page read and write
8BDC000
stack
page read and write
B50000
heap
page read and write
21DF000
heap
page read and write
504000
heap
page read and write
2236000
heap
page read and write
223E000
heap
page read and write
22A10000
unclassified section
page execute and read and write
2BD0000
trusted library allocation
page read and write
4F5000
heap
page read and write
21F9000
heap
page read and write
21FE000
heap
page read and write
21D1000
heap
page read and write
9E0000
heap
page read and write
545000
heap
page read and write
22CAE000
heap
page read and write
545000
heap
page read and write
A35000
heap
page read and write
22CAE000
heap
page read and write
4F20000
heap
page read and write
21DC000
heap
page read and write
624000
heap
page read and write
21DF000
heap
page read and write
222E000
heap
page read and write
17C000
stack
page read and write
4F4000
heap
page read and write
544000
heap
page read and write
222E000
heap
page read and write
21F5000
heap
page read and write
21D0000
heap
page read and write
89B0000
trusted library allocation
page read and write
22CE9000
heap
page read and write
3698000
heap
page read and write
222E000
heap
page read and write
52B0000
trusted library allocation
page read and write
95E000
stack
page read and write
33FE000
stack
page read and write
2275000
heap
page read and write
B402DFE000
unkown
page readonly
2219000
heap
page read and write
2227000
heap
page read and write
3650000
trusted library allocation
page read and write
4F5000
heap
page read and write
7B65000
heap
page read and write
19A000
stack
page read and write
7BBA000
heap
page read and write
26D1000
heap
page read and write
7AF0000
direct allocation
page read and write
34CE000
heap
page read and write
B4010FE000
stack
page read and write
2231000
heap
page read and write
2BD0000
heap
page read and write
6450000
direct allocation
page read and write
22D2A000
heap
page read and write
23A0000
heap
page read and write
500000
heap
page read and write
6120000
heap
page read and write
B400D7E000
stack
page read and write
1BFC148B000
heap
page read and write
34E0000
heap
page read and write
2236000
heap
page read and write
2231000
heap
page read and write
21EE000
heap
page read and write
1BFBCCD0000
trusted library section
page readonly
21E5000
heap
page read and write
7E50000
trusted library allocation
page read and write
3390000
direct allocation
page read and write
7AD0000
direct allocation
page read and write
3540000
direct allocation
page read and write
8970000
heap
page read and write
7D1E000
stack
page read and write
21D1000
heap
page read and write
21D1000
heap
page read and write
544000
heap
page read and write
544000
heap
page read and write
26D1000
heap
page read and write
1BFC1390000
trusted library allocation
page read and write
440000
unkown
page readonly
1BFBC801000
trusted library allocation
page read and write
2ECE000
heap
page read and write
177000
stack
page read and write
45D000
system
page execute and read and write
21F1000
heap
page read and write
27D0000
heap
page read and write
9C000
stack
page read and write
22CCF000
heap
page read and write
617D000
heap
page read and write
456000
system
page execute and read and write
26D1000
heap
page read and write
401000
unkown
page execute read
33C0000
direct allocation
page read and write
4F5000
heap
page read and write
8980000
trusted library allocation
page execute and read and write
2204000
heap
page read and write
2CD7000
heap
page read and write
2211000
heap
page read and write
5D3000
heap
page read and write
22CCF000
heap
page read and write
544000
heap
page read and write
60E000
stack
page read and write
21F9000
heap
page read and write
1BFBBF13000
heap
page read and write
6185000
heap
page read and write
3290000
heap
page read and write
2210000
heap
page read and write
618E000
heap
page read and write
8890000
trusted library allocation
page execute and read and write
459000
system
page execute and read and write
21D1000
heap
page read and write
624000
heap
page read and write
8D01000
heap
page read and write
2229000
heap
page read and write
2231000
heap
page read and write
21DA000
heap
page read and write
544000
heap
page read and write
2229000
heap
page read and write
504000
heap
page read and write
27D1000
heap
page read and write
2226000
heap
page read and write
21EE000
heap
page read and write
530E000
stack
page read and write
401000
unkown
page execute read
6440000
direct allocation
page read and write
540000
heap
page read and write
400000
unkown
page readonly
6BF000
stack
page read and write
21C60000
direct allocation
page read and write
B40207E000
stack
page read and write
222CB000
stack
page read and write
B4012FD000
stack
page read and write
6E0000
heap
page read and write
232E000
stack
page read and write
408000
unkown
page readonly
19A000
stack
page read and write
3480000
heap
page read and write
21EE000
heap
page read and write
B4023FE000
unkown
page readonly
624000
heap
page read and write
27D1000
heap
page read and write
21F1000
heap
page read and write
1BFBBE00000
heap
page read and write
408000
unkown
page readonly
2231000
heap
page read and write
21D9000
heap
page read and write
222E000
heap
page read and write
1BFC12C0000
trusted library allocation
page read and write
544000
heap
page read and write
222E000
heap
page read and write
1BFBBDE0000
heap
page read and write
C976000
direct allocation
page execute and read and write
21D1000
heap
page read and write
1BFC14EC000
heap
page read and write
2279F000
heap
page read and write
1BFC1660000
remote allocation
page read and write
920000
trusted library allocation
page read and write
2531000
heap
page read and write
65DD000
trusted library allocation
page read and write
25F5000
heap
page read and write
B4025FE000
unkown
page readonly
2249000
heap
page read and write
6188000
heap
page read and write
3603000
trusted library allocation
page execute and read and write
92F000
stack
page read and write
430000
unkown
page read and write
8AD0000
trusted library allocation
page read and write
B576000
direct allocation
page execute and read and write
26D1000
heap
page read and write
54C000
heap
page read and write
21880000
heap
page read and write
3040000
heap
page read and write
B4022FE000
unkown
page readonly
2CCF000
stack
page read and write
26D1000
heap
page read and write
544000
heap
page read and write
2220000
heap
page read and write
408000
unkown
page readonly
21D8000
heap
page read and write
21FE000
heap
page read and write
4F4000
heap
page read and write
2258000
heap
page read and write
21F1000
heap
page read and write
2DA5000
heap
page read and write
544000
heap
page read and write
34CF000
stack
page read and write
2231000
heap
page read and write
21F1000
heap
page read and write
21EE000
heap
page read and write
7D9E000
stack
page read and write
2239000
heap
page read and write
325B000
heap
page read and write
21F5000
heap
page read and write
40A000
unkown
page write copy
21E0000
heap
page read and write
7E40000
trusted library allocation
page read and write
2211000
heap
page read and write
21D9000
heap
page read and write
A07000
heap
page read and write
19C000
stack
page read and write
22CB0000
heap
page read and write
34D1000
heap
page read and write
2211000
heap
page read and write
8E80000
trusted library allocation
page read and write
943000
heap
page read and write
2231000
heap
page read and write
3430000
heap
page read and write
B401AFE000
unkown
page readonly
2219000
heap
page read and write
21F1000
heap
page read and write
220E000
heap
page read and write
545000
heap
page read and write
21E0000
heap
page read and write
2198E000
stack
page read and write
35B0000
heap
page read and write
1BFC13F0000
trusted library allocation
page read and write
21D9000
heap
page read and write
2FDC000
stack
page read and write
21F3000
heap
page read and write
680000
heap
page read and write
21EE000
heap
page read and write
4F4000
heap
page read and write
2215000
heap
page read and write
45C000
system
page execute and read and write
6F0000
heap
page read and write
440000
unkown
page readonly
624000
heap
page read and write
40A000
unkown
page write copy
400000
unkown
page readonly
5C83000
trusted library allocation
page read and write
504000
heap
page read and write
65E3000
trusted library allocation
page read and write
A176000
direct allocation
page execute and read and write
2231000
heap
page read and write
400000
unkown
page readonly
22CAD000
heap
page read and write
4F0000
heap
page read and write
40A000
unkown
page write copy
400000
system
page execute and read and write
21E5000
heap
page read and write
21F70000
remote allocation
page read and write
33F0000
direct allocation
page read and write
7AA0000
direct allocation
page read and write
544000
heap
page read and write
544000
heap
page read and write
22EFC000
heap
page read and write
B4019FE000
unkown
page readonly
B401C7E000
stack
page read and write
21DC000
heap
page read and write
40A000
unkown
page read and write
408000
unkown
page readonly
1BFC1443000
heap
page read and write
22B29000
unclassified section
page execute and read and write
2ED7000
heap
page read and write
4CE000
stack
page read and write
401000
unkown
page execute read
221E000
heap
page read and write
1BFC1610000
trusted library allocation
page read and write
22A66000
unclassified section
page execute and read and write
45C000
system
page execute and read and write
2BD0000
trusted library allocation
page read and write
1BFBBEB8000
heap
page read and write
26D1000
heap
page read and write
440000
unkown
page readonly
B4020FE000
unkown
page readonly
345D000
heap
page read and write
26D1000
heap
page read and write
4D0000
heap
page read and write
544000
heap
page read and write
8A20000
trusted library allocation
page read and write
8C70000
heap
page read and write
21F4000
heap
page read and write
7BED000
heap
page read and write
21F1000
heap
page read and write
1BFC1230000
trusted library allocation
page read and write
1BFC12D0000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
2C7D000
heap
page read and write
2BD0000
trusted library allocation
page read and write
41B000
system
page execute and read and write
2236000
heap
page read and write
430000
heap
page read and write
544000
heap
page read and write
400000
system
page execute and read and write