IOC Report
Quotation.exe

loading gif

Files

File Path
Type
Category
Malicious
Quotation.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Links\Agcakrhb.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\22183.cmd
Unicode text, UTF-8 text, with very long lines (577), with CRLF line terminators
dropped
C:\ProgramData\4140.cmd
Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\ProgramData\neo.cmd
Unicode text, UTF-8 text, with very long lines (372), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\Flighting\FlightingLogging.txt
data
modified
C:\Users\user\AppData\Local\Temp\bhv72CB.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x1d2d76f6, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\cjuokcdbbgcjypgifkadlgabsyky
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Links\Agcakrhb.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\user\\Links\\Agcakrhb.PIF">), ASCII text, with CRLF line terminators
modified
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quotation.exe
"C:\Users\user\Desktop\Quotation.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\4140.cmd""
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\22183.cmd""
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\cjuokcdbbgcjypgifkadlgabsyky"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\fdhglvnuxouoivcuwvmxwtvktnthewt"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pfmz"
malicious
C:\Users\user\Links\Agcakrhb.PIF
"C:\Users\user\Links\Agcakrhb.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\user\Links\Agcakrhb.PIF
"C:\Users\user\Links\Agcakrhb.PIF"
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\backgroundTaskHost.exe
"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
qwertyuioplkjhgfdsazxcvbnm.ydns.eu
malicious
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
https://www.office.com/
unknown
http://www.imvu.comr
unknown
https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
unknown
http://www.imvu.com
unknown
http://c.pki.goog/r/gsr1.crl0
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://c.pki.goog/we2/64OUIVzpZV4.crl0
unknown
http://i.pki.goog/we2.crt0
unknown
http://o.pki.goog/we20%
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
unknown
http://geoplugin.net/json.gpF
unknown
https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
unknown
http://geoplugin.net/
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://i.pki.goog/gsr1.crt0-
unknown
http://c.pki.goog/r/r4.crl0
unknown
http://geoplugin.net/json.gpP
unknown
http://i.pki.goog/r4.crt0
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://geoplugin.net/json.gpW
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://www.pmail.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
unknown
http://www.ebuddy.com
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qwertyuioplkjhgfdsazxcvbnm.ydns.eu
185.208.156.45
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
185.208.156.45
qwertyuioplkjhgfdsazxcvbnm.ydns.eu
Switzerland
malicious
127.0.0.1
unknown
unknown
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Agcakrhb
HKEY_CURRENT_USER\SOFTWARE\chrome-3GMLHL
exepath
HKEY_CURRENT_USER\SOFTWARE\chrome-3GMLHL
licence
HKEY_CURRENT_USER\SOFTWARE\chrome-3GMLHL
time
HKEY_CURRENT_USER\SOFTWARE\chrome-3GMLHL
UID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1
UILanguage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\MaxAttachmentSizeInBytes
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\LocationReminderDesktopOnUnlockRadius
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\MaxRetryCount
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\DeviceManagementEnabled
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\ShowSearchGlyphLeftOfSearchBox
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\LocationReminderDesktopOnUnlockSpan
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\ReminderCalendarUpdate
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\TemplatesSyncInterval
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\SubmitButtonNarratorText
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\TimerSyncInterval
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\ProactivePrefetchIntervalMinutes
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\LocalNewBatchSize
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\SearchBoxAutoSuggestedForegroundColor
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\SearchBoxText
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\WideAtStartupDeltaMinWidthThreshold
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\SearchBoxUseSearchIconAtRest
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\SearchBoxWideWidth
Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting\1\MaxReminderCount
Value
\REGISTRY\A\{4895240c-7196-61ef-25b7-06030c0b16b3}\LocalState
BINGIDENTITY_PROP_USEREMAIL
\REGISTRY\A\{4895240c-7196-61ef-25b7-06030c0b16b3}\LocalState
BINGIDENTITY_PROP_ACCOUNTTYPETEXT
\REGISTRY\A\{4895240c-7196-61ef-25b7-06030c0b16b3}\LocalState
BINGIDENTITY_PROP_ACCOUNTTYPE
\REGISTRY\A\{4895240c-7196-61ef-25b7-06030c0b16b3}\LocalState
BINGIDENTITY_PROP_ACCOUNTTYPE
\REGISTRY\A\{4895240c-7196-61ef-25b7-06030c0b16b3}\LocalState
BINGIDENTITY_PROP_AUTHORITY
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C00000
remote allocation
page execute and read and write
malicious
1E243000
heap
page read and write
malicious
20611000
heap
page read and write
malicious
2820000
remote allocation
page execute and read and write
malicious
20810000
unclassified section
page execute and read and write
malicious
2AB0000
remote allocation
page execute and read and write
malicious
2C050000
heap
page read and write
malicious
20A4A000
heap
page read and write
malicious
20993000
heap
page read and write
malicious
20BC0000
heap
page read and write
malicious
208B2000
heap
page read and write
malicious
400000
system
page execute and read and write
malicious
2081F000
heap
page read and write
malicious
1E218000
heap
page read and write
malicious
20673000
heap
page read and write
malicious
1B6E7000
heap
page read and write
malicious
20B0D000
heap
page read and write
malicious
2058B000
heap
page read and write
malicious
2A05000
direct allocation
page execute and read and write
malicious
20611000
heap
page read and write
malicious
7E770000
direct allocation
page read and write
malicious
20990000
heap
page read and write
malicious
23DA000
direct allocation
page read and write
malicious
24A1000
direct allocation
page read and write
239D000
direct allocation
page read and write
32C3000
heap
page read and write
318E000
heap
page read and write
4EF8000
heap
page read and write
1E28E000
heap
page read and write
318E000
heap
page read and write
7ECCF000
direct allocation
page read and write
211AF000
trusted library allocation
page read and write
307F000
stack
page read and write
4EC1000
heap
page read and write
317D000
heap
page read and write
4EFC000
heap
page read and write
2CC4000
heap
page read and write
4FCE000
stack
page read and write
4665000
heap
page read and write
32DD000
heap
page read and write
23C8000
direct allocation
page read and write
23B3000
direct allocation
page read and write
317D000
heap
page read and write
4660000
heap
page read and write
289C000
stack
page read and write
32C3000
heap
page read and write
283D000
stack
page read and write
20673000
heap
page read and write
318E000
heap
page read and write
19E000
unkown
page write copy
4EC8000
heap
page read and write
21119000
direct allocation
page read and write
2EAD000
stack
page read and write
2BE0000
heap
page read and write
2AD4000
heap
page read and write
1E279000
heap
page read and write
1E2AA000
heap
page read and write
503B000
heap
page read and write
2925000
direct allocation
page execute and read and write
211A0000
trusted library allocation
page read and write
89A000
heap
page read and write
2320000
heap
page read and write
4EC1000
heap
page read and write
29DA000
stack
page read and write
259A000
direct allocation
page read and write
3600000
heap
page read and write
55C0000
direct allocation
page read and write
2E80000
heap
page read and write
4EC1000
heap
page read and write
318E000
heap
page read and write
615000
heap
page read and write
34B0000
heap
page read and write
207AE000
stack
page execute and read and write
206DD000
direct allocation
page read and write
2C2C000
heap
page read and write
7F0B0000
direct allocation
page read and write
25A1000
direct allocation
page read and write
8D4000
heap
page read and write
2790000
heap
page read and write
464C000
heap
page read and write
1E100000
heap
page read and write
4ECB000
heap
page read and write
526F000
stack
page read and write
4665000
heap
page read and write
26EC000
stack
page read and write
7F07F000
direct allocation
page read and write
1E286000
heap
page read and write
1E140000
heap
page read and write
5029000
heap
page read and write
2E3F000
stack
page read and write
2A97000
direct allocation
page read and write
4ED4000
heap
page read and write
2CC4000
heap
page read and write
522E000
stack
page read and write
4EC1000
heap
page read and write
2300000
heap
page read and write
4651000
heap
page read and write
1E257000
heap
page read and write
20F50000
heap
page read and write
7EC10000
direct allocation
page read and write
20CBF000
stack
page read and write
2BFF000
stack
page read and write
4EDF000
heap
page read and write
4F03000
heap
page read and write
4698000
heap
page read and write
3006000
heap
page read and write
318E000
heap
page read and write
1D300000
heap
page read and write
20B6F000
stack
page read and write
3500000
heap
page read and write
26E1000
direct allocation
page read and write
20D0E000
stack
page read and write
31D0000
heap
page read and write
7E770000
direct allocation
page read and write
4EE1000
heap
page read and write
4EC8000
heap
page read and write
4EC1000
heap
page read and write
7ECB8000
direct allocation
page read and write
29D0000
heap
page read and write
32DD000
heap
page read and write
32DD000
heap
page read and write
318E000
heap
page read and write
2366000
heap
page read and write
21487000
heap
page read and write
1BE000
unkown
page readonly
32C3000
heap
page read and write
2AD4000
heap
page read and write
2AD4000
heap
page read and write
4EC1000
heap
page read and write
2C2C000
heap
page read and write
31CF000
unkown
page read and write
92F000
heap
page read and write
4EC9000
heap
page read and write
4EDF000
heap
page read and write
7F0CF000
direct allocation
page read and write
32C3000
heap
page read and write
7EFF0000
direct allocation
page read and write
2C6E000
stack
page read and write
2CC4000
heap
page read and write
4EE0000
heap
page read and write
20A2F000
stack
page read and write
50C0000
trusted library allocation
page read and write
4EE8000
heap
page read and write
2310000
direct allocation
page execute and read and write
20510000
heap
page read and write
4693000
heap
page read and write
2AD4000
heap
page read and write
2AF9000
direct allocation
page execute and read and write
25F3000
direct allocation
page read and write
962000
heap
page read and write
7EFB0000
direct allocation
page read and write
4EFF000
heap
page read and write
4EDE000
heap
page read and write
4B5E000
heap
page read and write
2BDF000
stack
page read and write
32DD000
heap
page read and write
2CC4000
heap
page read and write
318E000
heap
page read and write
1E257000
heap
page read and write
89E000
heap
page read and write
32DD000
heap
page read and write
46AD000
heap
page read and write
2AD5000
heap
page read and write
1E2CE000
heap
page read and write
2AD4000
heap
page read and write
2F3D000
stack
page read and write
4EDE000
heap
page read and write
2C90000
heap
page read and write
85A000
heap
page read and write
758000
heap
page read and write
2560000
direct allocation
page read and write
206F3000
direct allocation
page read and write
318E000
heap
page read and write
318E000
heap
page read and write
4EDE000
heap
page read and write
2914000
remote allocation
page execute and read and write
1E4C0000
heap
page read and write
293D000
stack
page read and write
7EEE0000
direct allocation
page read and write
318D000
heap
page read and write
318E000
heap
page read and write
4EC1000
heap
page read and write
46F000
unkown
page read and write
1E29B000
heap
page read and write
2B28000
remote allocation
page execute and read and write
318E000
heap
page read and write
318E000
heap
page read and write
2BEA000
heap
page read and write
4F04000
heap
page read and write
1B9CF000
stack
page read and write
318E000
heap
page read and write
4EC1000
heap
page read and write
505D000
heap
page read and write
31E0000
heap
page read and write
7FE46000
direct allocation
page read and write
1E2CA000
heap
page read and write
2C23000
heap
page read and write
1E28E000
heap
page read and write
4ED5000
heap
page read and write
2FA0000
heap
page read and write
32DD000
heap
page read and write
32DD000
heap
page read and write
2B10000
heap
page read and write
322E000
stack
page read and write
171000
unkown
page execute read
171000
unkown
page execute read
E6D000
stack
page read and write
20BC0000
unclassified section
page execute and read and write
7DF000
stack
page read and write
4ECC000
heap
page read and write
4EDB000
heap
page read and write
4EC9000
heap
page read and write
4F04000
heap
page read and write
4EDE000
heap
page read and write
2AD4000
heap
page read and write
4EDE000
heap
page read and write
318E000
heap
page read and write
4661000
heap
page read and write
1E257000
heap
page read and write
32DD000
heap
page read and write
92B000
heap
page read and write
7FB15000
direct allocation
page read and write
4F04000
heap
page read and write
1E2C8000
heap
page read and write
94F000
stack
page read and write
23C1000
direct allocation
page read and write
318E000
heap
page read and write
5DE000
stack
page read and write
33C0000
heap
page read and write
20698000
direct allocation
page read and write
25AC000
stack
page read and write
2BEFE000
stack
page read and write
2D00000
heap
page read and write
2CF4000
remote allocation
page execute and read and write
28F1000
direct allocation
page execute read
1BE000
unkown
page readonly
7F104000
direct allocation
page read and write
788000
heap
page read and write
208A0000
heap
page read and write
2BA4000
remote allocation
page execute and read and write
7F9C0000
direct allocation
page read and write
1E2E1000
heap
page read and write
300D000
heap
page read and write
1B6C0000
heap
page read and write
318E000
heap
page read and write
318E000
heap
page read and write
401000
unkown
page execute read
4EDE000
heap
page read and write
2E6D000
stack
page read and write
318E000
heap
page read and write
3450000
heap
page read and write
4EC1000
heap
page read and write
317E000
heap
page read and write
272B000
stack
page read and write
20658000
direct allocation
page read and write
4EC1000
heap
page read and write
1E279000
heap
page read and write
95E000
heap
page read and write
4EDE000
heap
page read and write
4F04000
heap
page read and write
2B30000
heap
page read and write
2AA5000
direct allocation
page execute and read and write
4EDE000
heap
page read and write
1E51E000
stack
page read and write
4EFF000
heap
page read and write
318E000
heap
page read and write
1B81E000
stack
page read and write
57A000
unkown
page read and write
298E000
stack
page read and write
2CC4000
heap
page read and write
4ECB000
heap
page read and write
4F26000
heap
page read and write
850000
heap
page read and write
24B3000
heap
page read and write
2638000
direct allocation
page read and write
4B40000
heap
page read and write
4991000
heap
page read and write
4F04000
heap
page read and write
7EB20000
direct allocation
page read and write
31ED000
heap
page read and write
32C3000
heap
page read and write
4EF6000
heap
page read and write
1D20F000
stack
page read and write
300D000
heap
page read and write
1E550000
heap
page read and write
1D260000
heap
page read and write
1E2BA000
heap
page read and write
4F10000
heap
page read and write
4F39000
stack
page read and write
4EDE000
heap
page read and write
2C030000
heap
page read and write
23A4000
direct allocation
page read and write
2CA0000
heap
page read and write
2AD0000
heap
page read and write
578000
unkown
page read and write
318E000
heap
page read and write
4F03000
heap
page read and write
318E000
heap
page read and write
2035E000
stack
page read and write
4640000
heap
page read and write
4EC1000
heap
page read and write
27F0000
heap
page read and write
1E2CA000
heap
page read and write
170000
unkown
page readonly
578000
unkown
page read and write
25A8000
direct allocation
page read and write
6B5000
heap
page read and write
2039F000
stack
page read and write
32C3000
heap
page read and write
4F04000
heap
page read and write
2552000
direct allocation
page read and write
1E257000
heap
page read and write
2AD5000
heap
page read and write
20672000
heap
page read and write
4EC1000
heap
page read and write
26C4000
direct allocation
page read and write
8C4000
heap
page read and write
20691000
direct allocation
page read and write
315B000
heap
page read and write
3150000
heap
page read and write
4EDE000
heap
page read and write
7F830000
direct allocation
page read and write
1E29B000
heap
page read and write
19E000
unkown
page read and write
477E000
stack
page read and write
7F140000
direct allocation
page read and write
4F03000
heap
page read and write
4ECB000
heap
page read and write
4F3B000
stack
page read and write
318E000
heap
page read and write
46F000
unkown
page read and write
318E000
heap
page read and write
318E000
heap
page read and write
171000
unkown
page execute read
4EE5000
heap
page read and write
670000
heap
page read and write
1E257000
heap
page read and write
32C3000
heap
page read and write
318E000
heap
page read and write
20176000
direct allocation
page execute and read and write
4C50000
heap
page read and write
2AD0000
heap
page read and write
20F4F000
stack
page read and write
4EE1000
heap
page read and write
1E248000
heap
page read and write
1E2DD000
heap
page read and write
20BCE000
stack
page read and write
6B0000
heap
page read and write
26D3000
direct allocation
page read and write
28DC000
stack
page read and write
400000
system
page execute and read and write
4EE3000
heap
page read and write
4ED5000
heap
page read and write
206D6000
direct allocation
page read and write
7ED00000
direct allocation
page read and write
4F25000
heap
page read and write
265C000
stack
page read and write
1E2A8000
heap
page read and write
2A94000
stack
page read and write
4EF0000
heap
page read and write
938000
heap
page read and write
29F7000
direct allocation
page read and write
4C5C000
heap
page read and write
7E670000
direct allocation
page read and write
318E000
heap
page read and write
25DD000
direct allocation
page read and write
4EC1000
heap
page read and write
1E29B000
heap
page read and write
32DD000
heap
page read and write
3140000
heap
page read and write
26AF000
direct allocation
page read and write
4F04000
heap
page read and write
7EFAB000
direct allocation
page read and write
4EF7000
heap
page read and write
4671000
heap
page read and write
7F061000
direct allocation
page read and write
6FE000
stack
page read and write
72E000
stack
page read and write
318E000
heap
page read and write
2080B000
stack
page read and write
4ED2000
heap
page read and write
1D1CE000
stack
page read and write
83E000
stack
page read and write
8EB000
heap
page read and write
2AD4000
heap
page read and write
46B0000
heap
page read and write
4EDB000
heap
page read and write
1E279000
heap
page read and write
3000000
heap
page read and write
19D000
stack
page read and write
20884000
unclassified section
page execute and read and write
4ECB000
heap
page read and write
32DD000
heap
page read and write
2601000
direct allocation
page read and write
19D000
stack
page read and write
2A3C000
stack
page read and write
1E2AA000
heap
page read and write
4698000
heap
page read and write
400000
unkown
page readonly
4673000
heap
page read and write
5045000
heap
page read and write
7A1000
heap
page read and write
2C40000
heap
page read and write
4EDE000
heap
page read and write
2AD5000
heap
page read and write
4EDE000
heap
page read and write
2CC4000
heap
page read and write
1BE000
unkown
page readonly
7F125000
direct allocation
page read and write
7FF000
stack
page read and write
30BE000
unkown
page read and write
2683000
heap
page read and write
318E000
heap
page read and write
2E99000
heap
page read and write
1E24C000
heap
page read and write
1E2CE000
heap
page read and write
46C2000
heap
page read and write
690000
heap
page read and write
81E000
stack
page read and write
318E000
heap
page read and write
1FD3F000
stack
page read and write
5A10000
trusted library allocation
page read and write
2CC4000
heap
page read and write
30C0000
heap
page read and write
20F50000
heap
page read and write
7EFE0000
direct allocation
page read and write
7F080000
direct allocation
page read and write
300E000
heap
page read and write
32C3000
heap
page read and write
7EDF0000
direct allocation
page read and write
2940000
heap
page read and write
2C75000
remote allocation
page execute and read and write
4EFE000
heap
page read and write
7F080000
direct allocation
page read and write
1E286000
heap
page read and write
967000
heap
page read and write
171000
unkown
page execute read
257D000
direct allocation
page read and write
1B98E000
stack
page read and write
20E0E000
stack
page read and write
20708000
direct allocation
page read and write
7F080000
direct allocation
page read and write
2380000
direct allocation
page read and write
7F0B0000
direct allocation
page read and write
20E4E000
stack
page read and write
2A19000
direct allocation
page execute and read and write
24A8000
direct allocation
page read and write
4698000
heap
page read and write
4EF7000
heap
page read and write
2AD4000
heap
page read and write
4ECF000
heap
page read and write
4665000
heap
page read and write
4ECB000
heap
page read and write
7F0CF000
direct allocation
page read and write
2484000
direct allocation
page read and write
2AD4000
heap
page read and write
4ECB000
heap
page read and write
1E18E000
stack
page read and write
240C000
stack
page read and write
695000
heap
page read and write
32DD000
heap
page read and write
1E2C8000
heap
page read and write
23AC000
stack
page read and write
1E24C000
heap
page read and write
2BF3F000
stack
page read and write
5056000
heap
page read and write
318E000
heap
page read and write
249A000
direct allocation
page read and write
318E000
heap
page read and write
318E000
heap
page read and write
2543000
direct allocation
page read and write
2A8F000
stack
page read and write
7EFF0000
direct allocation
page read and write
20CCF000
stack
page read and write
2C038000
heap
page read and write
32C3000
heap
page read and write
908000
heap
page read and write
318E000
heap
page read and write
32C3000
heap
page read and write
467E000
heap
page read and write
318E000
heap
page read and write
7FC25000
direct allocation
page read and write
300D000
heap
page read and write
4651000
heap
page read and write
300D000
heap
page read and write
1B6E0000
heap
page read and write
1E257000
heap
page read and write
4F26000
heap
page read and write
4EC1000
heap
page read and write
7EDA0000
direct allocation
page read and write
57C000
unkown
page write copy
30FE000
unkown
page read and write
2B38000
heap
page read and write
1E2CA000
heap
page read and write
4EC9000
heap
page read and write
258C000
direct allocation
page read and write
2921000
direct allocation
page read and write
32DD000
heap
page read and write
7F0FE000
direct allocation
page read and write
4ED2000
heap
page read and write
4698000
heap
page read and write
5056000
heap
page read and write
20BCE000
stack
page read and write
670000
heap
page read and write
318E000
heap
page read and write
32DD000
heap
page read and write
208EF000
stack
page read and write
5E0000
heap
page read and write
7FB20000
direct allocation
page read and write
890000
heap
page read and write
205BA000
heap
page read and write
2363000
direct allocation
page read and write
1E2C8000
heap
page read and write
2B20000
heap
page readonly
4EC1000
heap
page read and write
2460000
heap
page read and write
7FC30000
direct allocation
page read and write
318E000
heap
page read and write
505D000
heap
page read and write
7EBDF000
direct allocation
page read and write
32DD000
heap
page read and write
4EE1000
heap
page read and write
456000
system
page execute and read and write
7EDCF000
direct allocation
page read and write
4ED2000
heap
page read and write
1BE000
unkown
page readonly
4651000
heap
page read and write
4ED2000
heap
page read and write
2E40000
heap
page read and write
32C3000
heap
page read and write
20130000
unclassified section
page execute and read and write
4ECB000
heap
page read and write
A4F000
stack
page read and write
2493000
direct allocation
page read and write
2720000
heap
page read and write
4EE8000
heap
page read and write
1E2CE000
heap
page read and write
32C3000
heap
page read and write
20F4F000
stack
page read and write
2AD4000
heap
page read and write
4EE0000
heap
page read and write
318E000
heap
page read and write
20E0E000
stack
page read and write
1E145000
heap
page read and write
318E000
heap
page read and write
7FC21000
direct allocation
page read and write
4EE3000
heap
page read and write
8D7000
heap
page read and write
2E88000
heap
page read and write
2094F000
stack
page read and write
26DA000
direct allocation
page read and write
1E24C000
heap
page read and write
4F8F000
stack
page read and write
1B85F000
stack
page read and write
2A7D000
direct allocation
page execute and read and write
32C4000
heap
page read and write
7FD40000
direct allocation
page read and write
4780000
trusted library allocation
page read and write
2A5C000
stack
page read and write
2C50000
heap
page readonly
4EDE000
heap
page read and write
4EFE000
heap
page read and write
7F0F0000
direct allocation
page read and write
1E2CA000
heap
page read and write
32F1000
heap
page read and write
2AF0000
heap
page read and write
318E000
heap
page read and write
32DD000
heap
page read and write
4EFF000
heap
page read and write
7FD36000
direct allocation
page read and write
2226000
heap
page read and write
7F0B0000
direct allocation
page read and write
2C20000
heap
page read and write
20A4F000
stack
page read and write
2360000
heap
page read and write
750000
heap
page read and write
1E257000
heap
page read and write
247D000
direct allocation
page read and write
7E655000
direct allocation
page read and write
32C3000
heap
page read and write
318E000
heap
page read and write
2A9C000
direct allocation
page read and write
291C000
direct allocation
page read and write
4ECC000
heap
page read and write
2326000
heap
page read and write
2CC4000
heap
page read and write
464C000
heap
page read and write
1E279000
heap
page read and write
1E279000
heap
page read and write
2AD5000
heap
page read and write
31ED000
heap
page read and write
2451000
direct allocation
page read and write
20E0E000
stack
page read and write
9B000
stack
page read and write
2AD4000
heap
page read and write
2220000
heap
page read and write
20F60000
trusted library allocation
page read and write
2CC4000
heap
page read and write
4F26000
heap
page read and write
5010000
heap
page read and write
46F000
unkown
page write copy
34CF000
stack
page read and write
1E287000
heap
page read and write
318E000
heap
page read and write
24B0000
heap
page read and write
7E770000
direct allocation
page read and write
318E000
heap
page read and write
50C0000
trusted library allocation
page read and write
26B6000
direct allocation
page read and write
4790000
trusted library allocation
page read and write
20C16000
unclassified section
page execute and read and write
318E000
heap
page read and write
2CC4000
heap
page read and write
318E000
heap
page read and write
4780000
heap
page read and write
581000
unkown
page readonly
52F0000
heap
page read and write
4F26000
heap
page read and write
7F080000
direct allocation
page read and write
20161000
direct allocation
page execute and read and write
1E257000
heap
page read and write
20CCF000
stack
page read and write
730000
heap
page read and write
4EC1000
heap
page read and write
4F80000
heap
page read and write
4F03000
heap
page read and write
4EDE000
heap
page read and write
32DD000
heap
page read and write
2AD4000
heap
page read and write
2372000
direct allocation
page read and write
4EC8000
heap
page read and write
8A9000
heap
page read and write
1E210000
heap
page read and write
1E110000
heap
page read and write
205DF000
direct allocation
page read and write
1B870000
heap
page read and write
32C3000
heap
page read and write
20160000
direct allocation
page read and write
2A76000
stack
page read and write
850000
heap
page read and write
350A000
heap
page read and write
4ECB000
heap
page read and write
4728000
heap
page read and write
25E4000
direct allocation
page read and write
34AF000
stack
page read and write
1E1CF000
stack
page read and write
4EDB000
heap
page read and write
7EEAF000
direct allocation
page read and write
2990000
heap
page read and write
7EDA0000
direct allocation
page read and write
318E000
heap
page read and write
2E0E000
stack
page read and write
313E000
stack
page read and write
4EDB000
heap
page read and write
2AD4000
heap
page read and write
318E000
heap
page read and write
1F0000
heap
page read and write
50C0000
trusted library allocation
page read and write
3330000
heap
page read and write
2CC4000
heap
page read and write
20E4E000
stack
page read and write
2058B000
heap
page read and write
318E000
heap
page read and write
4665000
heap
page read and write
7ED60000
direct allocation
page read and write
2917000
direct allocation
page read and write
2092E000
stack
page read and write
4630000
heap
page read and write
2AD4000
heap
page read and write
21190000
heap
page read and write
1BA000
unkown
page readonly
7F0F0000
direct allocation
page read and write
206FA000
direct allocation
page read and write
2E9F000
heap
page read and write
2E3D000
stack
page read and write
1BA000
unkown
page readonly
4ED4000
heap
page read and write
19E000
unkown
page write copy
214C7000
heap
page read and write
26A2000
direct allocation
page read and write
4F03000
heap
page read and write
505D000
heap
page read and write
20511000
heap
page read and write
7EFF0000
direct allocation
page read and write
2D3E000
stack
page read and write
20D0E000
stack
page read and write
5057000
heap
page read and write
318E000
heap
page read and write
2CC4000
heap
page read and write
7F0B0000
direct allocation
page read and write
4EE1000
heap
page read and write
318E000
heap
page read and write
7ECAF000
direct allocation
page read and write
7F07F000
direct allocation
page read and write
57A000
unkown
page read and write
2FAD000
stack
page read and write
1E279000
heap
page read and write
2090F000
stack
page read and write
503A000
heap
page read and write
317D000
heap
page read and write
7F07F000
direct allocation
page read and write
25BF000
direct allocation
page read and write
1B6B0000
heap
page read and write
5045000
heap
page read and write
248C000
direct allocation
page read and write
32DD000
heap
page read and write
318E000
heap
page read and write
318E000
heap
page read and write
50C0000
trusted library allocation
page read and write
20F6F000
trusted library allocation
page read and write
2C78000
remote allocation
page execute and read and write
29CF000
stack
page read and write
1E279000
heap
page read and write
20890000
heap
page read and write
20BBE000
stack
page read and write
4EDB000
heap
page read and write
240E000
stack
page read and write
26E8000
direct allocation
page read and write
23AC000
direct allocation
page read and write
32BB000
heap
page read and write
32C4000
heap
page read and write
4EC9000
heap
page read and write
318E000
heap
page read and write
1E248000
heap
page read and write
31E3000
heap
page read and write
4990000
heap
page read and write
2AA1000
direct allocation
page read and write
4EBE000
stack
page read and write
2FB0000
heap
page read and write
2C200000
heap
page read and write
2CC4000
heap
page read and write
2543000
direct allocation
page read and write
344F000
stack
page read and write
2AD5000
heap
page read and write
7F0FE000
direct allocation
page read and write
318E000
heap
page read and write
1E2C4000
heap
page read and write
464C000
heap
page read and write
2CC4000
heap
page read and write
4728000
heap
page read and write
2723000
heap
page read and write
3720000
heap
page read and write
2B99000
direct allocation
page execute and read and write
41B000
system
page execute and read and write
2B25000
remote allocation
page execute and read and write
95A000
heap
page read and write
7ECD0000
direct allocation
page read and write
36FF000
stack
page read and write
1BA000
unkown
page readonly
2AD5000
heap
page read and write
32C3000
heap
page read and write
4651000
heap
page read and write
2F6C000
stack
page read and write
870000
heap
page read and write
400000
system
page execute and read and write
1BA000
unkown
page readonly
9B000
stack
page read and write
7F070000
direct allocation
page read and write
20F4F000
stack
page read and write
207AB000
stack
page read and write
4651000
heap
page read and write
318E000
heap
page read and write
19E000
unkown
page read and write
2A71000
direct allocation
page execute read
24C0000
heap
page read and write
505D000
heap
page read and write
247E000
stack
page read and write
4668000
heap
page read and write
4EC1000
heap
page read and write
7EDA0000
direct allocation
page read and write
4F03000
heap
page read and write
578000
unkown
page read and write
25D6000
direct allocation
page read and write
20F50000
heap
page read and write
207AF000
stack
page read and write
4EFE000
heap
page read and write
45E000
system
page execute and read and write
7FA10000
direct allocation
page read and write
505D000
heap
page read and write
7F0B0000
direct allocation
page read and write
318E000
heap
page read and write
4EE1000
heap
page read and write
170000
unkown
page readonly
1E28E000
heap
page read and write
7E7E8000
direct allocation
page read and write
7E4E0000
direct allocation
page read and write
318E000
heap
page read and write
1E28E000
heap
page read and write
2BF80000
heap
page read and write
20D0E000
stack
page read and write
4EDE000
heap
page read and write
4EF0000
heap
page read and write
23BA000
direct allocation
page read and write
1E47D000
stack
page read and write
505B000
heap
page read and write
20A6E000
stack
page read and write
318E000
heap
page read and write
4C51000
heap
page read and write
7F0F0000
direct allocation
page read and write
2500000
direct allocation
page read and write
505B000
heap
page read and write
32C3000
heap
page read and write
2058A000
heap
page read and write
1E4BF000
stack
page read and write
32DD000
heap
page read and write
933000
heap
page read and write
4640000
heap
page read and write
4EC9000
heap
page read and write
32DD000
heap
page read and write
20A4F000
stack
page read and write
7EFF0000
direct allocation
page read and write
32DD000
heap
page read and write
32DD000
heap
page read and write
299C000
stack
page read and write
1E28E000
heap
page read and write
32DD000
heap
page read and write
46E000
unkown
page execute read
7F083000
direct allocation
page read and write
32DD000
heap
page read and write
20E4E000
stack
page read and write
474000
system
page execute and read and write
46C2000
heap
page read and write
32DD000
heap
page read and write
1E279000
heap
page read and write
4EE1000
heap
page read and write
300D000
heap
page read and write
31E0000
heap
page read and write
880000
direct allocation
page execute and read and write
2CC4000
heap
page read and write
25EB000
stack
page read and write
318E000
heap
page read and write
2C98000
heap
page read and write
4991000
heap
page read and write
2058B000
heap
page read and write
318E000
heap
page read and write
4EFF000
heap
page read and write
1E24B000
heap
page read and write
4EE1000
heap
page read and write
7E350000
direct allocation
page read and write
6DE000
stack
page read and write
1E286000
heap
page read and write
2EA3000
heap
page read and write
4EDB000
heap
page read and write
20A8E000
stack
page read and write
505B000
heap
page read and write
318E000
heap
page read and write
8F5000
heap
page read and write
318E000
heap
page read and write
2119D000
heap
page read and write
467A000
heap
page read and write
1E24F000
heap
page read and write
2280000
heap
page read and write
2094E000
stack
page read and write
7F9C0000
direct allocation
page read and write
1E257000
heap
page read and write
318E000
heap
page read and write
206CF000
direct allocation
page read and write
4EFF000
heap
page read and write
46F000
unkown
page read and write
300D000
heap
page read and write
317E000
heap
page read and write
2CC4000
heap
page read and write
32DD000
heap
page read and write
32F1000
heap
page read and write
2FE0000
heap
page read and write
318E000
heap
page read and write
32DD000
heap
page read and write
2210000
heap
page read and write
2895000
remote allocation
page execute and read and write
5056000
heap
page read and write
2671000
direct allocation
page read and write
2A7B000
stack
page read and write
2230000
direct allocation
page execute and read and write
610000
heap
page read and write
2AD5000
heap
page read and write
25FA000
direct allocation
page read and write
318E000
heap
page read and write
7F07F000
direct allocation
page read and write
1E279000
heap
page read and write
318E000
heap
page read and write
2AD4000
heap
page read and write
4F03000
heap
page read and write
206C2000
direct allocation
page read and write
2084B000
stack
page read and write
244E000
stack
page read and write
32C3000
heap
page read and write
300D000
heap
page read and write
2460000
direct allocation
page read and write
4EE2000
heap
page read and write
4800000
heap
page read and write