IOC Report
WATER TREATMENT PROJECT.zip

loading gif

Files

File Path
Type
Category
Malicious
WATER TREATMENT PROJECT.zip
Zip archive data, at least v1.0 to extract, compression method=store
initial sample
malicious
C:\Users\Public\ANYDESK.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\alpha.pif
PE32+ executable (console) x86-64, for MS Windows
modified
malicious
C:\Users\Public\expha.pif
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\Public\ghf.pif
PE32+ executable (console) x86-64, for MS Windows
modified
malicious
C:\Users\Public\rdha.pif
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\Links\Kaitdipg.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\15897.cmd
Unicode text, UTF-8 text, with very long lines (577), with CRLF line terminators
dropped
C:\ProgramData\5964.cmd
Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\ProgramData\neo.cmd
Unicode text, UTF-8 text, with very long lines (372), with CRLF line terminators
dropped
C:\Users\Public\HEW.3GP
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\33CUD2J1\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhv3B03.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x20a679e7, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\takeydqzzhsuw
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Links\Kaitdipg.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\user\\Links\\Kaitdipg.PIF">), ASCII text, with CRLF line terminators
modified
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif"
malicious
C:\Users\Public\expha.pif
C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif"
malicious
C:\Users\Public\expha.pif
C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif"
malicious
C:\Users\Public\expha.pif
C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9
malicious
C:\Users\Public\ghf.pif
C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Filter Specifications,PDF.cmd" "C:\Users\Public\HEW.3GP" 9
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12
malicious
C:\Users\Public\ghf.pif
C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
PING -n 2 127.0.0.1
malicious
C:\Users\Public\rdha.pif
C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF
malicious
C:\Users\Public\ANYDESK.PIF
"C:\Users\Public\ANYDESK.PIF"
malicious
C:\Windows\System32\cmd.exe
cmd /c exit /b 0
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\5964.cmd""
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\15897.cmd""
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\expha.pif"
malicious
C:\Users\Public\expha.pif
C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\alpha.pif"
malicious
C:\Users\Public\expha.pif
C:\\Users\\Public\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\rdha.pif"
malicious
C:\Users\Public\expha.pif
C:\\Users\\Public\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\ghf.pif"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\takeydqzzhsuw"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\wvqpzwbsnpkzgrsc"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gxvizoluaxcejxogfbg"
malicious
C:\Users\Public\ghf.pif
C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\user\Desktop\WATER TREATMENT PROJECT\WATER TREATMENT PROJECT\RFQ Mixer Specifications,PDF.bat" "C:\Users\Public\HEW.3GP" 9
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /C C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12
malicious
C:\Users\Public\ghf.pif
C:\\Users\\Public\\ghf.pif -decodehex -f "C:\Users\Public\HEW.3GP" "C:\Users\Public\ANYDESK.PIF" 12
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c PING -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
PING -n 2 127.0.0.1
malicious
C:\Users\Public\rdha.pif
C:\\Users\\Public\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\ANYDESK.PIF
malicious
C:\Users\Public\ANYDESK.PIF
"C:\Users\Public\ANYDESK.PIF"
malicious
C:\Windows\System32\cmd.exe
cmd /c exit /b 0
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
conquer25.duckdns.org
malicious
baddieszn.duckdns.org
malicious
bahadii.duckdns.org
malicious
unforseen.duckdns.org
malicious
https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEP
unknown
http://www.imvu.comr
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://ebd871449a8dbfc3efbaabaef620b095.clo.footprintdns.com/apc/trans.gif?b53a91fd779d41798d7818ff
unknown
http://geoplugin.net/json.gp)
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAXr4b&Fr
unknown
https://9cf1d93416b343cbb0aa1deae6dc7661.azr.footprintdns.com/apc/trans.gif?b4ef4344b8bbbc91cc6b3006
unknown
http://geoplugin.net/son.gp
unknown
https://ebd871449a8dbfc3efbaabaef620b095.clo.footprintdns.com/apc/trans.gif?2b5ac21b953982869b52cfd6
unknown
http://www.imvu.coma
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ow1.res.office365.com/apc/trans.gif?2bedfa25f63b1e1b9bd24eb0a5625631
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://fp-afd.azurefd.net/apc/trans.gif?355cac43462bdbbb118c6145bdcc88c0
unknown
https://www.google.com
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://geoplugin.net/json.gpP
unknown
https://6a1824ae7f5b378648db1f87c4a047c1.azr.footprintdns.com/apc/trans.gif?6aff50c04f9af0461603c0c1
unknown
https://0bf8c87e7673b17d24aaf92c4c29ca42.azr.footprintdns.com/apc/trans.gif?6cc2fc022d35de4436d46235
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
unknown
https://www.office.com/
unknown
https://0bf8c87e7673b17d24aaf92c4c29ca42.azr.footprintdns.com/apc/trans.gif?97ae33b93885af7139d3f9b0
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://fp-afd.azurefd.net/apc/trans.gif?42704eed386765f870e05e14b5b322b7
unknown
https://fp-afd.azurefd.net/apc/trans.gif?b21ec88677686eb844798ccd641c5fe5
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://6a1824ae7f5b378648db1f87c4a047c1.azr.footprintdns.com/apc/trans.gif?e4d500512ddeced1b68e7640
unknown
https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatah
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://9cf1d93416b343cbb0aa1deae6dc7661.azr.footprintdns.com/apc/trans.gif?67e56b9b06a4d427a359554f
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
http://www.pmail.com
unknown
https://ow1.res.office365.com/apc/trans.gif?f60497627d681e8f4d8561fad4b92959
unknown
http://www.ebuddy.com
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&
unknown
https://fp-afd.azurefd.net/apc/trans.gif?2b2f77512f7c65b2f52ee30ffe87d61a
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bahadii.duckdns.org
194.59.31.85
malicious
geoplugin.net
178.237.33.50
baddieszn.duckdns.org
193.9.36.1

IPs

IP
Domain
Country
Malicious
194.59.31.85
bahadii.duckdns.org
Germany
malicious
127.0.0.1
unknown
unknown
malicious
193.9.36.1
baddieszn.duckdns.org
Czech Republic
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-14MUP4
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-14MUP4
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-14MUP4
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-14MUP4
UID
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Kaitdipg
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%systemroot%\system32\colorui.dll,-1400
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
UsePerUserProfiles

Memdumps

Base Address
Regiontype
Protect
Malicious
315E000
heap
page read and write
malicious
2EF01000
heap
page read and write
malicious
318C000
heap
page read and write
malicious
400000
system
page execute and read and write
malicious
256F000
direct allocation
page read and write
malicious
2F285000
heap
page read and write
malicious
2F4A7000
heap
page read and write
malicious
317C000
heap
page read and write
malicious
6831000
remote allocation
page execute and read and write
malicious
3195000
heap
page read and write
malicious
315E000
heap
page read and write
malicious
400000
direct allocation
page execute and read and write
malicious
2F10D000
heap
page read and write
malicious
2EE7B000
heap
page read and write
malicious
2EF63000
heap
page read and write
malicious
3110000
heap
page read and write
malicious
3180000
heap
page read and write
malicious
30D0000
heap
page read and write
156214D0000
heap
page read and write
B9D000
stack
page read and write
210F0000
heap
page read and write
31CD000
heap
page read and write
30244FF000
stack
page read and write
2F58000
heap
page read and write
8A0000
heap
page read and write
34EC000
heap
page read and write
320A000
heap
page read and write
7E8C0000
direct allocation
page read and write
2F4A000
heap
page read and write
47FC07D000
stack
page read and write
729000
stack
page read and write
400000
unkown
page readonly
482000
unkown
page read and write
2B35000
direct allocation
page execute and read and write
CE7197E000
stack
page read and write
2F62000
heap
page read and write
1F75B270000
heap
page read and write
482000
unkown
page read and write
37EE2BC000
stack
page read and write
2FC0000
heap
page read and write
2B248110000
heap
page read and write
532A000
heap
page read and write
2F0E000
stack
page read and write
210DF000
stack
page read and write
2EC2000
heap
page read and write
503C000
stack
page read and write
7FF7AB710000
unkown
page readonly
156216C0000
heap
page read and write
456000
system
page execute and read and write
92FFFDE000
stack
page read and write
2EB2000
heap
page read and write
7EE10000
direct allocation
page read and write
23BC4180000
heap
page read and write
2B5C000
stack
page read and write
7E71F000
direct allocation
page read and write
2F343000
heap
page read and write
7FF77758F000
unkown
page read and write
2EF9000
heap
page read and write
3830000
heap
page read and write
930047F000
stack
page read and write
34EC000
heap
page read and write
7FF7AB71E000
unkown
page readonly
23AA8C23000
heap
page read and write
21330000
heap
page read and write
31AF000
heap
page read and write
4CA0000
heap
page read and write
20918000
direct allocation
page read and write
34EC000
heap
page read and write
7FF789D22000
unkown
page readonly
8908FE000
stack
page read and write
66E5AFC000
stack
page read and write
2CFE000
stack
page read and write
3500000
heap
page read and write
2EEDE000
heap
page read and write
15621710000
heap
page read and write
2F5A000
heap
page read and write
7E780000
direct allocation
page read and write
1F75B4A0000
heap
page read and write
32DF000
stack
page read and write
2EF00000
heap
page read and write
7FB30000
direct allocation
page read and write
7EE20000
direct allocation
page read and write
9D6000
heap
page read and write
1F5C086B000
heap
page read and write
27E0FD60000
heap
page read and write
34D3000
heap
page read and write
7FF777585000
unkown
page read and write
23AA7343000
heap
page read and write
880000
heap
page read and write
20E4F000
stack
page read and write
23BC4215000
heap
page read and write
650000
heap
page read and write
1FF42F4B000
heap
page read and write
23AA732B000
heap
page read and write
1F5C07C0000
heap
page read and write
5170000
heap
page read and write
5607000
direct allocation
page read and write
2F54000
heap
page read and write
8D4000
heap
page read and write
7EBEF000
direct allocation
page read and write
2B27000
direct allocation
page read and write
34D3000
heap
page read and write
318C000
heap
page read and write
2F55000
heap
page read and write
34D3000
heap
page read and write
2592000
direct allocation
page read and write
34D3000
heap
page read and write
20857000
direct allocation
page read and write
1DAC1D5F000
heap
page read and write
32D3000
heap
page read and write
97E000
heap
page read and write
2EE7B000
heap
page read and write
2F22A000
heap
page read and write
20966437000
heap
page read and write
30C3000
heap
page read and write
31E8000
heap
page read and write
2F61000
heap
page read and write
1E816670000
heap
page read and write
34D3000
heap
page read and write
2D3E000
stack
page read and write
8E9947E000
stack
page read and write
47FC17E000
stack
page read and write
24464FA0000
heap
page read and write
2F4A000
heap
page read and write
32FE000
stack
page read and write
E5396FF000
stack
page read and write
D8E000
stack
page read and write
1FF42F47000
heap
page read and write
34ED000
heap
page read and write
230568E0000
heap
page read and write
34EC000
heap
page read and write
7EB80000
direct allocation
page read and write
24464FC0000
heap
page read and write
2F55000
heap
page read and write
1FF42F66000
heap
page read and write
4BF0000
heap
page read and write
2F5F000
heap
page read and write
20B9FF00000
heap
page read and write
2ED3000
heap
page read and write
2817000
heap
page read and write
400000
system
page execute and read and write
1A809030000
heap
page read and write
5A7000
unkown
page read and write
3530000
heap
page read and write
7FF777573000
unkown
page readonly
2F4C000
heap
page read and write
2EF9000
heap
page read and write
54FB000
stack
page read and write
230586E0000
heap
page read and write
7EC60000
direct allocation
page read and write
2F41000
heap
page read and write
34EC000
heap
page read and write
8D4000
heap
page read and write
9EB000
heap
page read and write
20BFE000
stack
page read and write
2F59000
heap
page read and write
44A000
unkown
page readonly
5A2B0FE000
stack
page read and write
30B6000
heap
page read and write
5DB000
stack
page read and write
2EAE000
heap
page read and write
2A55000
direct allocation
page execute and read and write
1FF44843000
heap
page read and write
C20000
heap
page read and write
2EE01000
heap
page read and write
96F000
stack
page read and write
4CC0000
heap
page read and write
348E000
stack
page read and write
5352000
heap
page read and write
36BF000
stack
page read and write
884000
heap
page read and write
884000
heap
page read and write
2ADB000
stack
page read and write
2F4A000
heap
page read and write
3176000
heap
page read and write
547E000
stack
page read and write
20CFF000
stack
page read and write
1F75B292000
heap
page read and write
208ED000
direct allocation
page read and write
2ECB000
heap
page read and write
7FF6AFC36000
unkown
page readonly
A08EF8E000
stack
page read and write
2B2482D0000
heap
page read and write
2F46000
heap
page read and write
2BC0000
heap
page read and write
4740000
trusted library allocation
page read and write
2F58000
heap
page read and write
4C1E000
stack
page read and write
66E5BFE000
stack
page read and write
34EF000
heap
page read and write
884000
heap
page read and write
BAF000
stack
page read and write
4BD0000
heap
page read and write
7FF630870000
unkown
page readonly
20BA0190000
heap
page read and write
31D6000
heap
page read and write
34EC000
heap
page read and write
496B000
stack
page read and write
2F58000
heap
page read and write
1F75B250000
heap
page read and write
53FF000
stack
page read and write
2C3B000
stack
page read and write
27E0FC67000
heap
page read and write
30B6000
heap
page read and write
770000
heap
page read and write
78A000
heap
page read and write
20BEE000
stack
page read and write
23056C40000
heap
page read and write
1E814390000
heap
page read and write
475000
direct allocation
page execute and read and write
2E7E000
stack
page read and write
2E90000
heap
page read and write
5A2B17E000
stack
page read and write
884000
heap
page read and write
4CC8000
heap
page read and write
20831000
direct allocation
page read and write
3187000
heap
page read and write
D4E000
unkown
page read and write
230586F7000
heap
page read and write
23AA7359000
heap
page read and write
20BA0010000
heap
page read and write
2FF0000
heap
page read and write
1FF42F5C000
heap
page read and write
31B8000
heap
page read and write
1F75B296000
heap
page read and write
B032B7E000
stack
page read and write
1E8143D7000
heap
page read and write
1E8143EF000
heap
page read and write
7FF777581000
unkown
page read and write
7FE4E000
direct allocation
page read and write
8BE000
stack
page read and write
7E68F000
direct allocation
page read and write
31C1000
heap
page read and write
2F69000
heap
page read and write
4BC0000
heap
page read and write
2990000
heap
page readonly
2C6F000
stack
page read and write
4A60000
heap
page read and write
7E424000
direct allocation
page read and write
2082A000
direct allocation
page read and write
2F50000
heap
page read and write
475000
direct allocation
page execute and read and write
20966340000
heap
page read and write
27E0FC71000
heap
page read and write
A0F000
heap
page read and write
2F5F000
heap
page read and write
933000
heap
page read and write
6A0000
heap
page read and write
7FF6309F8000
unkown
page read and write
5376000
direct allocation
page execute and read and write
2F69000
heap
page read and write
233B3E38000
heap
page read and write
1E683707000
heap
page read and write
794000
heap
page read and write
2F69000
heap
page read and write
2F45000
heap
page read and write
2ED9000
heap
page read and write
7FF630992000
unkown
page readonly
2E99000
heap
page read and write
9C9000
heap
page read and write
4D5A000
heap
page read and write
2F7F000
stack
page read and write
2F4A000
heap
page read and write
31B6000
heap
page read and write
33C0000
heap
page read and write
2EBB000
heap
page read and write
9B000
stack
page read and write
329E000
stack
page read and write
2F65000
heap
page read and write
2F5E000
heap
page read and write
1E816020000
heap
page read and write
534C000
heap
page read and write
7FF71DCF4000
unkown
page read and write
20ABE000
stack
page read and write
31B8000
heap
page read and write
8D4000
heap
page read and write
20966439000
heap
page read and write
4D5D000
heap
page read and write
2EBA000
heap
page read and write
34D3000
heap
page read and write
66E5DFF000
stack
page read and write
34D3000
heap
page read and write
5A2000
unkown
page write copy
37EE33D000
stack
page read and write
2F61000
heap
page read and write
31F7000
heap
page read and write
3176000
heap
page read and write
A1CDB5C000
stack
page read and write
34CE000
stack
page read and write
22606035000
heap
page read and write
27E0FB70000
heap
page read and write
5335000
heap
page read and write
316A000
heap
page read and write
3370000
heap
page read and write
2ADE000
stack
page execute and read and write
34D3000
heap
page read and write
7EDB0000
direct allocation
page read and write
3200000
heap
page read and write
532B000
heap
page read and write
319E000
heap
page read and write
32FC000
heap
page read and write
2F4F000
heap
page read and write
2EFC4000
heap
page read and write
20A7F000
stack
page read and write
20BA0185000
heap
page read and write
2D90000
heap
page read and write
3163000
heap
page read and write
1A8090B3000
heap
page read and write
401000
unkown
page execute read
2F24000
heap
page read and write
7FD30000
direct allocation
page read and write
31A9000
heap
page read and write
1B9BA3C9000
heap
page read and write
DB0000
heap
page read and write
2F55000
heap
page read and write
207DF000
direct allocation
page read and write
2E68000
heap
page read and write
34D3000
heap
page read and write
7FF77757D000
unkown
page read and write
29DE000
stack
page read and write
7FF7AB71E000
unkown
page write copy
5A5000
unkown
page read and write
2F58000
heap
page read and write
4E4C8FE000
stack
page read and write
CE7187E000
stack
page read and write
2463000
heap
page read and write
4888000
heap
page read and write
527F000
stack
page read and write
34EC000
heap
page read and write
2EE7A000
heap
page read and write
31A3000
heap
page read and write
2B78000
heap
page read and write
23AA7337000
heap
page read and write
34BF000
unkown
page read and write
2F64000
heap
page read and write
5319000
heap
page read and write
1FF42F56000
heap
page read and write
7FF629D2E000
unkown
page write copy
2E9E000
heap
page read and write
2BA1000
heap
page read and write
24464FE7000
heap
page read and write
7FF629D28000
unkown
page readonly
23AA7348000
heap
page read and write
7E260000
direct allocation
page read and write
7FF789D88000
unkown
page read and write
35C0000
heap
page read and write
193CF187000
heap
page read and write
316D000
heap
page read and write
2B2481D7000
heap
page read and write
4BF1000
heap
page read and write
4C5E000
stack
page read and write
2EB1000
heap
page read and write
44A000
unkown
page readonly
91E000
stack
page read and write
34D3000
heap
page read and write
7E440000
direct allocation
page read and write
2F3E000
heap
page read and write
1E8169F8000
heap
page read and write
7FC10000
direct allocation
page read and write
1F5C0980000
heap
page read and write
2F5E000
stack
page read and write
316C000
heap
page read and write
B6F000
stack
page read and write
8D4000
heap
page read and write
1E814280000
heap
page read and write
657000
heap
page read and write
2F46000
heap
page read and write
7E520000
direct allocation
page read and write
31C1000
heap
page read and write
7FF7AB718000
unkown
page readonly
244C000
stack
page read and write
20FDE000
stack
page read and write
7FF789D1E000
unkown
page readonly
1FF42F7D000
heap
page read and write
34EC000
heap
page read and write
31CD000
heap
page read and write
20840000
direct allocation
page read and write
7FF629D20000
unkown
page readonly
2F8A000
heap
page read and write
20810000
direct allocation
page read and write
2080D000
direct allocation
page read and write
7ED30000
direct allocation
page read and write
2ED5E000
stack
page read and write
8DEB5FE000
stack
page read and write
2EA1000
heap
page read and write
22605E50000
heap
page read and write
31AD000
heap
page read and write
2F3A000
heap
page read and write
23056987000
heap
page read and write
23AA7359000
heap
page read and write
1FF42F60000
heap
page read and write
7E5A0000
direct allocation
page read and write
7EDEF000
direct allocation
page read and write
2EBB000
heap
page read and write
2E91000
heap
page read and write
25DA000
direct allocation
page read and write
23AA9960000
heap
page read and write
2F8E000
heap
page read and write
2F61000
heap
page read and write
31B7000
heap
page read and write
23058AC1000
heap
page read and write
23AA7327000
heap
page read and write
2093B000
stack
page read and write
20E9E000
stack
page read and write
7FF7AB711000
unkown
page execute read
1E21B2C000
stack
page read and write
7FF71DCFD000
unkown
page readonly
1FF42F4B000
heap
page read and write
317D000
heap
page read and write
FC587FE000
stack
page read and write
400000
system
page execute and read and write
2B5E000
stack
page read and write
2EE92000
heap
page read and write
2ED9000
heap
page read and write
1DAC1D59000
heap
page read and write
233B2430000
heap
page read and write
2EE5000
heap
page read and write
2EC4000
heap
page read and write
876AAFC000
stack
page read and write
900000
heap
page read and write
1B9BA290000
heap
page read and write
24466908000
heap
page read and write
457000
unkown
page readonly
20966454000
heap
page read and write
2EE7A000
heap
page read and write
2090A000
direct allocation
page read and write
31C9000
heap
page read and write
207B0000
direct allocation
page read and write
CE718FF000
stack
page read and write
1F75B150000
heap
page read and write
32D3000
heap
page read and write
4CF1000
heap
page read and write
A08F27E000
stack
page read and write
7FF63098E000
unkown
page readonly
31B5000
heap
page read and write
2F4C000
heap
page read and write
21331000
heap
page read and write
7FF71DCDD000
unkown
page read and write
7FF789C01000
unkown
page execute read
2560000
heap
page read and write
2F58000
heap
page read and write
30CA000
heap
page read and write
31DB000
heap
page read and write
1E6839B5000
heap
page read and write
1DAC1FB5000
heap
page read and write
1DAC1D50000
heap
page read and write
34EC000
heap
page read and write
870000
heap
page readonly
31D0000
heap
page read and write
7E890000
direct allocation
page read and write
2EA9000
heap
page read and write
7FF7AB71F000
unkown
page readonly
156214FF000
heap
page read and write
7FC01000
direct allocation
page read and write
2073A000
direct allocation
page read and write
7E863000
direct allocation
page read and write
7EDDF000
direct allocation
page read and write
7FF77757D000
unkown
page write copy
29FC000
stack
page read and write
31D6000
heap
page read and write
318F000
heap
page read and write
30CD000
heap
page read and write
9E7000
heap
page read and write
7FF71DCF4000
unkown
page read and write
2F4E000
heap
page read and write
2F3E000
heap
page read and write
2EFD9000
heap
page read and write
630000
heap
page read and write
7FF71DCEF000
unkown
page read and write
7FF71DCD3000
unkown
page readonly
7F950000
direct allocation
page read and write
31C1000
heap
page read and write
7E850000
direct allocation
page read and write
23AA7327000
heap
page read and write
42E000
unkown
page read and write
4DA6000
heap
page read and write
2F3A000
heap
page read and write
41B000
system
page execute and read and write
534C000
heap
page read and write
2BD0000
heap
page read and write
2EEAA000
heap
page read and write
31C2000
heap
page read and write
B0327CC000
stack
page read and write
8D4000
heap
page read and write
1E684FD0000
heap
page read and write
2F64000
heap
page read and write
7FF71DCFC000
unkown
page write copy
4CA4000
heap
page read and write
216AF000
heap
page read and write
1FF42F6C000
heap
page read and write
2F50000
heap
page read and write
3128000
heap
page read and write
4BF1000
heap
page read and write
2F51000
heap
page read and write
7E850000
direct allocation
page read and write
2F55000
heap
page read and write
20806000
direct allocation
page read and write
5D6000
stack
page read and write
7FF77759C000
unkown
page write copy
A08EF0D000
stack
page read and write
376F000
heap
page read and write
20FDE000
stack
page read and write
2F5A000
heap
page read and write
23AA7334000
heap
page read and write
7EA0F000
direct allocation
page read and write
20CEF000
stack
page read and write
2F55000
heap
page read and write
49D0000
heap
page read and write
7E850000
direct allocation
page read and write
31CC000
heap
page read and write
2F69000
heap
page read and write
FC589FE000
stack
page read and write
316F000
heap
page read and write
262C000
direct allocation
page read and write
2EA6000
heap
page read and write
7FF66B896000
unkown
page readonly
1B9BA3C0000
heap
page read and write
2F59000
heap
page read and write
31BD000
heap
page read and write
8E991ED000
stack
page read and write
6330000
heap
page read and write
D60000
heap
page read and write
30C6000
heap
page read and write
5AE000
unkown
page readonly
3210000
heap
page read and write
23BC5D00000
heap
page read and write
233B2510000
heap
page read and write
32FC000
heap
page read and write
325E000
stack
page read and write
42E000
unkown
page read and write
22608278000
heap
page read and write
302413C000
stack
page read and write
1A8090B8000
heap
page read and write
32F0000
heap
page read and write
2E90000
heap
page read and write
7FF71DCE5000
unkown
page read and write
2F5B000
heap
page read and write
23056980000
heap
page read and write
2F4C000
heap
page read and write
4CC1000
heap
page read and write
247339DA000
heap
page read and write
23AA8C20000
heap
page read and write
193D16E4000
heap
page read and write
884000
heap
page read and write
305E000
stack
page read and write
5F4000
stack
page read and write
7FF71DCE1000
unkown
page read and write
2B2482B0000
heap
page read and write
8D4000
heap
page read and write
31B8000
heap
page read and write
1F75B27C000
heap
page read and write
1FF42F55000
heap
page read and write
2F46000
heap
page read and write
CE715FC000
stack
page read and write
1B9BA670000
heap
page read and write
3160000
heap
page read and write
319A000
heap
page read and write
C26000
heap
page read and write
47FBDFC000
stack
page read and write
20F9E000
stack
page read and write
A18000
heap
page read and write
2F58000
heap
page read and write
4C510000
trusted library allocation
page read and write
7FF777572000
unkown
page readonly
23AA735D000
heap
page read and write
1E683660000
heap
page read and write
2F58000
heap
page read and write
31E2000
heap
page read and write
7FF777594000
unkown
page read and write
32CC000
heap
page read and write
19D000
stack
page read and write
2EF62000
heap
page read and write
4CAD000
stack
page read and write
23AA7336000
heap
page read and write
92FFF5D000
stack
page read and write
1E21FFF000
stack
page read and write
8E9916C000
stack
page read and write
2F58000
heap
page read and write
210E0000
heap
page read and write
4C00000
heap
page read and write
2A0047F000
stack
page read and write
2F50000
heap
page read and write
401000
unkown
page execute read
2E3D000
stack
page read and write
31C4000
heap
page read and write
1E8143D0000
heap
page read and write
1F75B390000
heap
page read and write
7FAF0000
direct allocation
page read and write
A08EE8C000
stack
page read and write
2E60000
heap
page read and write
31E7000
heap
page read and write
34ED000
heap
page read and write
3B0000
heap
page read and write
2F3A000
heap
page read and write
7EA30000
direct allocation
page read and write
20966605000
heap
page read and write
4DE0000
heap
page read and write
7FF629D2E000
unkown
page readonly
FC5877E000
stack
page read and write
2E98000
heap
page read and write
47E0000
trusted library allocation
page read and write
25D3000
direct allocation
page read and write
32FC000
heap
page read and write
7FF789C00000
unkown
page readonly
3090000
heap
page read and write
472000
direct allocation
page execute and read and write
2B248130000
heap
page read and write
66E5CFE000
stack
page read and write
2F55000
heap
page read and write
8E994FE000
stack
page read and write
7E8C0000
direct allocation
page read and write
318C000
heap
page read and write
31D0000
heap
page read and write
30245FF000
stack
page read and write
7FF71DCA0000
unkown
page readonly
7020000
heap
page read and write
23AA7170000
heap
page read and write
34ED000
heap
page read and write
21327000
heap
page read and write
22607CE2000
heap
page read and write
1A8092F0000
heap
page read and write
2F5F000
heap
page read and write
930037E000
stack
page read and write
6FF0000
heap
page read and write
C6E000
stack
page read and write
7FF71DCE1000
unkown
page read and write
C9D000
stack
page read and write
21669000
heap
page read and write
1A809320000
heap
page read and write
770000
heap
page read and write
23AA735A000
heap
page read and write
4D80000
heap
page read and write
7EED1000
direct allocation
page read and write
1FF42F78000
heap
page read and write
7FF66B89A000
unkown
page readonly
34FF000
heap
page read and write
2B15000
stack
page read and write
23056C45000
heap
page read and write
1A809097000
heap
page read and write
226080B4000
heap
page read and write
23BC4237000
heap
page read and write
2ED9F000
stack
page read and write
49AD000
stack
page read and write
910000
direct allocation
page execute and read and write
2EE00000
heap
page read and write
20B9FF0E000
heap
page read and write
884000
heap
page read and write
23AA7345000
heap
page read and write
5CD000
unkown
page readonly
A47000
heap
page read and write
2EFC000
heap
page read and write
27E0FA90000
heap
page read and write
233B2660000
heap
page read and write
2F43000
heap
page read and write
E5394FC000
stack
page read and write
2F1A2000
heap
page read and write
21AC0000
direct allocation
page execute and read and write
23AA7310000
heap
page read and write
2F46000
heap
page read and write
22605E20000
heap
page read and write
1E814510000
heap
page read and write
2E6F000
stack
page read and write
2EBB000
heap
page read and write
8D4000
heap
page read and write
2096643F000
heap
page read and write
1E683640000
heap
page read and write
1DAC1CA0000
heap
page read and write
23AA735F000
heap
page read and write
233B3E30000
heap
page read and write
1E683560000
heap
page read and write
35BF000
stack
page read and write
2FA0000
heap
page read and write
7FF71DCA1000
unkown
page execute read
5335000
heap
page read and write
2460000
heap
page read and write
7E080000
direct allocation
page read and write
2EBA000
heap
page read and write
2EEDE000
heap
page read and write
67F0000
trusted library allocation
page read and write
310D000
stack
page read and write
25C4000
direct allocation
page read and write
7EE7F000
direct allocation
page read and write
2305698A000
heap
page read and write
23AA9160000
trusted library allocation
page read and write
2E9E000
heap
page read and write
23AA7317000
heap
page read and write
2B2481B0000
heap
page read and write
20F9E000
stack
page read and write
FC586FE000
stack
page read and write
24733A16000
heap
page read and write
24A0000
heap
page read and write
23AA75CD000
heap
page read and write
4CF1000
heap
page read and write
210DF000
stack
page read and write
20966630000
heap
page read and write
37EE67E000
stack
page read and write
45E000
system
page execute and read and write
2F3E000
heap
page read and write
970000
heap
page read and write
1FF42F1D000
heap
page read and write
34EF000
heap
page read and write
247337E0000
heap
page read and write
24733995000
heap
page read and write
7FD2E000
direct allocation
page read and write
32C0000
heap
page read and write
319E000
stack
page read and write
156214F0000
heap
page read and write
2F8B000
heap
page read and write
543E000
stack
page read and write
1FF42F78000
heap
page read and write
2B248425000
heap
page read and write
24733990000
heap
page read and write
4D9E000
stack
page read and write
4E4C97F000
stack
page read and write
2EE7A000
heap
page read and write
1DAC1CB0000
heap
page read and write
2F7D000
stack
page read and write
31F7000
heap
page read and write
87E000
stack
page read and write
3210000
heap
page read and write
2B00000
direct allocation
page readonly
31D6000
heap
page read and write
7FF7AB71C000
unkown
page read and write
70E000
stack
page read and write
20BBF000
stack
page read and write
31D7000
heap
page read and write
2F56000
heap
page read and write
1F5C0960000
heap
page read and write
4BA0000
trusted library allocation
page read and write
7EEF4000
direct allocation
page read and write
31CD000
heap
page read and write
5350000
heap
page read and write
6C0000
heap
page read and write
2EA1000
heap
page read and write
31B5000
heap
page read and write
2F49000
heap
page read and write
7ED60000
direct allocation
page read and write
2F4F000
unkown
page read and write
7FF71DCDD000
unkown
page write copy
A13000
heap
page read and write
1E816135000
heap
page read and write
1F5C0882000
heap
page read and write
2F5B000
heap
page read and write
2810000
heap
page read and write
5346000
heap
page read and write
2096E000
stack
page read and write
2EDC000
heap
page read and write
20A6F000
stack
page read and write
7FF7AB718000
unkown
page readonly
24465155000
heap
page read and write
20B9FF28000
heap
page read and write
54BD000
stack
page read and write
2A51000
direct allocation
page read and write
2A47000
direct allocation
page read and write
2F8B000
heap
page read and write
89087C000
stack
page read and write
2EE0000
heap
page read and write
884000
heap
page read and write
15621715000
heap
page read and write
25A0000
direct allocation
page read and write
2EEDE000
heap
page read and write
7F770000
direct allocation
page read and write
315F000
stack
page read and write
2F39000
heap
page read and write
7FF7AB71D000
unkown
page readonly