IOC Report
TSvDnT6fkE.dll

loading gif

Files

File Path
Type
Category
Malicious
TSvDnT6fkE.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x97040d86, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TSv_52bb2ff8749739655ef8ce7a55875e6631c6f4c1_cf813574_19b6376d\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D3E.tmp.dmp
Mini DuMP crash report, 15 streams, Sat May 14 11:43:37 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20BA.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2280.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\TSvDnT6fkE.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\TSvDnT6fkE.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\TSvDnT6fkE.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\TSvDnT6fkE.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LqleYRChPKuppQ\QMAA.dll"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k unistacksvcgroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ErRMcfUGTVTj\myfGzaHssmULBwf.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\TSvDnT6fkE.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TSvDnT6fkE.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6416 -s 316
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/K
unknown
malicious
https://23.239.0.12/0
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/ionT
unknown
malicious
https://23.239.0.12/$
unknown
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=
unknown
http://www.bingmapsportal.com
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Stops/
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
https://activity.windows.comr
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
http://schemas.xmlso
unknown
There are 48 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{c84b8eb1-4df0-ff14-192e-a209b83fc278}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
6E0000
direct allocation
page execute and read and write
malicious
EB0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
26C83780000
direct allocation
page execute and read and write
malicious
1BF264F0000
direct allocation
page execute and read and write
malicious
1BADFC02000
trusted library allocation
page read and write
22905CF9000
heap
page read and write
29768EAB000
heap
page read and write
AC5D47D000
stack
page read and write
2976E6B0000
trusted library allocation
page read and write
1A4F62FE000
heap
page read and write
1F55CC90000
trusted library allocation
page read and write
EFF33FB000
stack
page read and write
1F55C463000
heap
page read and write
2290658A000
heap
page read and write
EFF35FA000
stack
page read and write
23870A30000
heap
page read and write
22906587000
heap
page read and write
2976E3E0000
trusted library allocation
page read and write
29768F00000
heap
page read and write
22906A02000
heap
page read and write
15D15858000
heap
page read and write
1E561002000
trusted library allocation
page read and write
15D15872000
heap
page read and write
1F55C390000
heap
page read and write
22906570000
heap
page read and write
2976E3F0000
trusted library allocation
page read and write
29768E8F000
heap
page read and write
1E560650000
heap
page read and write
8570C7E000
stack
page read and write
22906583000
heap
page read and write
7FFFF0C51000
unkown
page execute read
1FE0000
trusted library allocation
page read and write
3A929FD000
stack
page read and write
22906587000
heap
page read and write
E18000
heap
page read and write
214063F0000
heap
page read and write
22905CB5000
heap
page read and write
22905CA4000
heap
page read and write
1BF26775000
heap
page read and write
ACD63FD000
stack
page read and write
1F55C4C7000
heap
page read and write
AC5D57E000
stack
page read and write
20C9A429000
heap
page read and write
1E56064F000
heap
page read and write
7FFFF0CA2000
unkown
page readonly
2976E4D7000
heap
page read and write
1BF2654E000
heap
page read and write
475000
stack
page read and write
23870781000
heap
page read and write
2DDB000
stack
page read and write
10BFC7B000
stack
page read and write
15D15847000
heap
page read and write
22905B50000
trusted library allocation
page read and write
22906583000
heap
page read and write
238707AE000
heap
page read and write
85706FE000
stack
page read and write
1BADF271000
heap
page read and write
297695F0000
trusted library allocation
page read and write
5D709F8000
stack
page read and write
26C83770000
direct allocation
page execute and read and write
22905C53000
heap
page read and write
1A4F65B5000
heap
page read and write
297695E0000
trusted library allocation
page read and write
180000
heap
page read and write
3A927FC000
stack
page read and write
1E560648000
heap
page read and write
229065A0000
heap
page read and write
15D15857000
heap
page read and write
10DAB3C000
stack
page read and write
22905C29000
heap
page read and write
1BADF308000
heap
page read and write
30426FE000
stack
page read and write
22906586000
heap
page read and write
22906A02000
heap
page read and write
1A4F8060000
heap
page read and write
22905C54000
heap
page read and write
22906585000
heap
page read and write
22906583000
heap
page read and write
17563190000
trusted library allocation
page read and write
1F55C47F000
heap
page read and write
1F55C429000
heap
page read and write
AC5CC7E000
stack
page read and write
F44F7F000
stack
page read and write
2290657B000
heap
page read and write
22906589000
heap
page read and write
5A6000
heap
page read and write
2290657B000
heap
page read and write
F44D77000
stack
page read and write
2387079E000
heap
page read and write
1E560645000
heap
page read and write
22905C88000
heap
page read and write
20C9A220000
heap
page read and write
23870740000
heap
page read and write
22906587000
heap
page read and write
7FFFF0CA9000
unkown
page readonly
1A4F65B0000
heap
page read and write
2976E503000
heap
page read and write
1A4F6309000
heap
page read and write
EFF36F7000
stack
page read and write
17563200000
heap
page read and write
2290657A000
heap
page read and write
213B000
stack
page read and write
22906595000
heap
page read and write
29768E78000
heap
page read and write
6D0000
direct allocation
page execute and read and write
2290658B000
heap
page read and write
21C4000
heap
page read and write
29768E96000
heap
page read and write
B66E979000
stack
page read and write
26C837C0000
heap
page read and write
22906562000
heap
page read and write
22906589000
heap
page read and write
22906583000
heap
page read and write
AC5CEFC000
stack
page read and write
22906590000
heap
page read and write
1756325C000
heap
page read and write
1F55CF00000
heap
page read and write
22906A02000
heap
page read and write
1BADF229000
heap
page read and write
22906599000
heap
page read and write
2976E60E000
trusted library allocation
page read and write
1E56066F000
heap
page read and write
29768F02000
heap
page read and write
22906584000
heap
page read and write
15D15918000
heap
page read and write
29769704000
heap
page read and write
1E56064C000
heap
page read and write
559000
heap
page read and write
22906A02000
heap
page read and write
180000000
direct allocation
page read and write
7FFFF0CA9000
unkown
page readonly
2976E624000
trusted library allocation
page read and write
1E56067D000
heap
page read and write
22906583000
heap
page read and write
1F55C4BD000
heap
page read and write
B66E37E000
stack
page read and write
22905C70000
heap
page read and write
2976E4DD000
heap
page read and write
22906586000
heap
page read and write
20C9A400000
heap
page read and write
229063B0000
remote allocation
page read and write
1BADF23C000
heap
page read and write
29768D40000
trusted library allocation
page read and write
D5BCC7E000
stack
page read and write
22906589000
heap
page read and write
22905C49000
heap
page read and write
2976E600000
trusted library allocation
page read and write
AC5D17B000
stack
page read and write
22906587000
heap
page read and write
2720000
remote allocation
page read and write
22906583000
heap
page read and write
1BF2658C000
heap
page read and write
1DD72602000
heap
page read and write
1A4F62A0000
heap
page read and write
52B000
heap
page read and write
1F55C3F0000
heap
page read and write
168ED908000
heap
page read and write
22905C27000
heap
page read and write
10DB0FE000
stack
page read and write
1F55C400000
heap
page read and write
10C02FD000
stack
page read and write
2990000
heap
page read and write
2290658B000
heap
page read and write
238707B8000
heap
page read and write
2A740D40000
heap
page read and write
2290657F000
heap
page read and write
22906589000
heap
page read and write
1B794008000
heap
page read and write
29768EB8000
heap
page read and write
229065DA000
heap
page read and write
857097B000
stack
page read and write
175631C0000
remote allocation
page read and write
22906574000
heap
page read and write
21406E02000
trusted library allocation
page read and write
229065AE000
heap
page read and write
7FFFF0CA9000
unkown
page readonly
FB0000
heap
page read and write
5D7097E000
stack
page read and write
2976E2D0000
trusted library allocation
page read and write
1B794280000
trusted library allocation
page read and write
1E560600000
heap
page read and write
2ECCE7E000
stack
page read and write
2976E840000
trusted library allocation
page read and write
22905CED000
heap
page read and write
1BADF24F000
heap
page read and write
2976E740000
remote allocation
page read and write
29768EAD000
heap
page read and write
F6E000
stack
page read and write
23870795000
heap
page read and write
B66DFF7000
stack
page read and write
238705F0000
heap
page read and write
23870792000
heap
page read and write
268F000
stack
page read and write
1A4F7EC0000
heap
page read and write
F44A7E000
stack
page read and write
15D155C0000
heap
page read and write
20C9A44F000
heap
page read and write
1BADF1F0000
heap
page read and write
1F55C43E000
heap
page read and write
22905C61000
heap
page read and write
1E5605C0000
heap
page read and write
857067B000
stack
page read and write
22905C4D000
heap
page read and write
1E56063E000
heap
page read and write
29768E25000
heap
page read and write
1DD72667000
heap
page read and write
15D15780000
trusted library allocation
page read and write
1F55CE02000
heap
page read and write
1BADF28B000
heap
page read and write
2976E3F0000
trusted library allocation
page read and write
15D157C0000
trusted library allocation
page read and write
21406513000
heap
page read and write
22906576000
heap
page read and write
238707AE000
heap
page read and write
229059E0000
heap
page read and write
15D15889000
heap
page read and write
2A740E80000
heap
page read and write
1DD72E02000
trusted library allocation
page read and write
229063B0000
remote allocation
page read and write
22905C59000
heap
page read and write
10BFEFC000
stack
page read and write
EFF3A7E000
stack
page read and write
10DAF7C000
stack
page read and write
2290657B000
heap
page read and write
1A4F6312000
heap
page read and write
EFF327E000
stack
page read and write
2030000
heap
page read and write
1A4F6318000
heap
page read and write
7FFFF0CA6000
unkown
page read and write
229065AC000
heap
page read and write
22905CC7000
heap
page read and write
87323A6000
stack
page read and write
22906500000
heap
page read and write
B66E27A000
stack
page read and write
2976E417000
heap
page read and write
22906599000
heap
page read and write
1E560649000
heap
page read and write
B66E47D000
stack
page read and write
2976E500000
heap
page read and write
1B794E10000
trusted library allocation
page read and write
17563229000
heap
page read and write
22906599000
heap
page read and write
22906574000
heap
page read and write
168ED888000
heap
page read and write
EE0000
heap
page readonly
29769718000
heap
page read and write
22906583000
heap
page read and write
2290658B000
heap
page read and write
18002E000
direct allocation
page read and write
26C83995000
heap
page read and write
1B794315000
heap
page read and write
715000
heap
page read and write
1E560550000
heap
page read and write
229065D0000
heap
page read and write
1F55C488000
heap
page read and write
7FFFF0C51000
unkown
page execute read
2ECD07E000
stack
page read and write
2290657A000
heap
page read and write
26C83700000
heap
page read and write
297695D0000
trusted library allocation
page read and write
20C9A280000
heap
page read and write
1BADF190000
heap
page read and write
15D15848000
heap
page read and write
1BADF313000
heap
page read and write
168ED84F000
heap
page read and write
22906A02000
heap
page read and write
22906572000
heap
page read and write
1A4F62C0000
heap
page read and write
22905C58000
heap
page read and write
26C837B0000
heap
page readonly
1E56066B000
heap
page read and write
1F55C413000
heap
page read and write
22906589000
heap
page read and write
9C0000
heap
page read and write
22905C50000
heap
page read and write
2290657B000
heap
page read and write
2976E624000
trusted library allocation
page read and write
229063B0000
remote allocation
page read and write
AC5D0FC000
stack
page read and write
22905C3C000
heap
page read and write
291C000
stack
page read and write
501000
heap
page read and write
23870770000
heap
page read and write
1BADF24B000
heap
page read and write
1DD72702000
heap
page read and write
FB4000
heap
page read and write
23870786000
heap
page read and write
2140646A000
heap
page read and write
21406413000
heap
page read and write
ACD62FE000
stack
page read and write
26C837F3000
heap
page read and write
873267E000
stack
page read and write
20C9A210000
heap
page read and write
4F90DFF000
stack
page read and write
1B79404F000
heap
page read and write
2976E430000
heap
page read and write
22906599000
heap
page read and write
22906576000
heap
page read and write
501000
heap
page read and write
22906574000
heap
page read and write
279E000
stack
page read and write
1BF2658F000
heap
page read and write
2290657D000
heap
page read and write
29768E72000
heap
page read and write
22906584000
heap
page read and write
2976E700000
trusted library allocation
page read and write
10DB6FE000
stack
page read and write
1A4F6309000
heap
page read and write
21BE000
stack
page read and write
26C85200000
heap
page read and write
20C9A488000
heap
page read and write
F44E7E000
stack
page read and write
1EC0000
heap
page readonly
1A4F62F0000
heap
page read and write
1B79404F000
heap
page read and write
22906595000
heap
page read and write
15D15630000
heap
page read and write
87327FE000
stack
page read and write
10DB4FD000
stack
page read and write
1A4F8063000
heap
page read and write
7FFFF0C50000
unkown
page readonly
297695B1000
trusted library allocation
page read and write
22905C4A000
heap
page read and write
22906583000
heap
page read and write
29768F07000
heap
page read and write
6B0000
heap
page read and write
1BADF251000
heap
page read and write
87328FB000
stack
page read and write
ACD5F8B000
stack
page read and write
1BF26724000
heap
page read and write
52E000
heap
page read and write
22906583000
heap
page read and write
29768F00000
heap
page read and write
4F9000
heap
page read and write
AC5CFFF000
stack
page read and write
29768EB1000
heap
page read and write
21406502000
heap
page read and write
22906574000
heap
page read and write
29768BE0000
heap
page read and write
21406428000
heap
page read and write
4F9167E000
stack
page read and write
7FFFF0CA2000
unkown
page readonly
15D15800000
heap
page read and write
229065AD000
heap
page read and write
15D1582A000
heap
page read and write
17563C02000
trusted library allocation
page read and write
23870720000
heap
page read and write
22905CB3000
heap
page read and write
168ED902000
heap
page read and write
168ED87D000
heap
page read and write
E42000
heap
page read and write
22906599000
heap
page read and write
EFF39FA000
stack
page read and write
15D15848000
heap
page read and write
2976E400000
heap
page read and write
58C000
heap
page read and write
168ED926000
heap
page read and write
1F55C46B000
heap
page read and write
1B7942A0000
trusted library allocation
page read and write
22906583000
heap
page read and write
EFF32FE000
stack
page read and write
4F9117F000
stack
page read and write
21406457000
heap
page read and write
7FFFF0CA2000
unkown
page readonly
238707B5000
heap
page read and write
ACD64FE000
stack
page read and write
22906A02000
heap
page read and write
20C9AC02000
trusted library allocation
page read and write
A60607E000
stack
page read and write
1E560652000
heap
page read and write
A605DFE000
stack
page read and write
238707AE000
heap
page read and write
168ED855000
heap
page read and write
22905C56000
heap
page read and write
22906574000
heap
page read and write
29768E3D000
heap
page read and write
22906A02000
heap
page read and write
10C017D000
stack
page read and write
1A4F6306000
heap
page read and write
1BADF256000
heap
page read and write
F4477B000
stack
page read and write
22906402000
heap
page read and write
FF5000
heap
page read and write
1B794047000
heap
page read and write
4F90D7E000
stack
page read and write
168ED83C000
heap
page read and write
21406C90000
trusted library allocation
page read and write
ACD6479000
stack
page read and write
17563213000
heap
page read and write
229065AC000
heap
page read and write
10BFF7D000
stack
page read and write
2D5E000
stack
page read and write
2290657B000
heap
page read and write
2290651D000
heap
page read and write
22906596000
heap
page read and write
29768C40000
heap
page read and write
2290657F000
heap
page read and write
1B793F00000
heap
page read and write
15D171E0000
remote allocation
page read and write
22905C00000
heap
page read and write
22906584000
heap
page read and write
15D15750000
trusted library allocation
page read and write
22905CAB000
heap
page read and write
58C000
heap
page read and write
1F55CF32000
heap
page read and write
20C9A413000
heap
page read and write
168ED870000
heap
page read and write
1B794300000
trusted library allocation
page read and write
26C836E0000
heap
page read and write
1A4F630E000
heap
page read and write
1BF26470000
heap
page read and write
15D155D0000
heap
page read and write
2976A260000
trusted library allocation
page read and write
55D000
heap
page read and write
DF5000
heap
page read and write
2976E4EE000
heap
page read and write
22906583000
heap
page read and write
E02000
heap
page read and write
22906583000
heap
page read and write
22906589000
heap
page read and write
22905C13000
heap
page read and write
2976E2C0000
trusted library allocation
page read and write
29768F02000
heap
page read and write
304267B000
stack
page read and write
22906599000
heap
page read and write
551000
heap
page read and write
3A921DB000
stack
page read and write
2976E600000
trusted library allocation
page read and write
18002E000
direct allocation
page read and write
3A92AFF000
stack
page read and write
857077E000
stack
page read and write
20C9A43C000
heap
page read and write
1B794240000
trusted library allocation
page read and write
4F90CFB000
stack
page read and write
AC5CCFC000
stack
page read and write
22905C55000
heap
page read and write
ACD627D000
stack
page read and write
2976E3E0000
trusted library allocation
page read and write
1B794290000
heap
page readonly
52E000
heap
page read and write
18002D000
direct allocation
page readonly
22906583000
heap
page read and write
21406390000
heap
page read and write
1BF264C0000
heap
page read and write
2976E465000
heap
page read and write
2976E4FA000
heap
page read and write
873277E000
stack
page read and write
229065B8000
heap
page read and write
22906584000
heap
page read and write
2387077B000
heap
page read and write
22906581000
heap
page read and write
22905CE4000
heap
page read and write
EFF37FE000
stack
page read and write
289E000
stack
page read and write
4F9157F000
stack
page read and write
D5BC96F000
stack
page read and write
1B7941E0000
trusted library allocation
page read and write
23870A35000
heap
page read and write
168ED857000
heap
page read and write
29768EB1000
heap
page read and write
1E560560000
heap
page read and write
22905CC3000
heap
page read and write
168ED913000
heap
page read and write
168ED7C0000
trusted library allocation
page read and write
168ED890000
heap
page read and write
2976E621000
trusted library allocation
page read and write
2A740FA3000
heap
page read and write
EFF2FDC000
stack
page read and write
29769718000
heap
page read and write
58C000
heap
page read and write
22906A03000
heap
page read and write
4CB000
heap
page read and write
1E560668000
heap
page read and write
168ED720000
heap
page read and write
3A92CFE000
stack
page read and write
1DD72641000
heap
page read and write
10BFDFF000
stack
page read and write
27B0000
heap
page read and write
ACD65F9000
stack
page read and write
20C9A44C000
heap
page read and write
1F55C4CE000
heap
page read and write
1E560666000
heap
page read and write
229065AC000
heap
page read and write
3A92EFF000
stack
page read and write
2ECCA7B000
stack
page read and write
22906574000
heap
page read and write
58E000
heap
page read and write
270E000
stack
page read and write
21406380000
heap
page read and write
1BF26310000
heap
page read and write
B66E17A000
stack
page read and write
1E56067C000
heap
page read and write
E27000
heap
page read and write
1DD723D0000
heap
page read and write
1BF264E0000
direct allocation
page execute and read and write
2290657A000
heap
page read and write
22906585000
heap
page read and write
10C01FE000
stack
page read and write
22906583000
heap
page read and write
22905D13000
heap
page read and write
2ECCD7B000
stack
page read and write
1A4F9930000
trusted library allocation
page read and write
2290659B000
heap
page read and write
B66E57B000
stack
page read and write
29769702000
heap
page read and write
1BF26520000
heap
page readonly
F447FE000
stack
page read and write
2720000
remote allocation
page read and write
229065B8000
heap
page read and write
20C9A508000
heap
page read and write
29769759000
heap
page read and write
1BADF200000
heap
page read and write
2976E620000
trusted library allocation
page read and write
26C83954000
heap
page read and write
22905A50000
heap
page read and write
22906519000
heap
page read and write
D80000
heap
page read and write
22906574000
heap
page read and write
1B793F10000
trusted library allocation
page read and write
238707B6000
heap
page read and write
58E000
heap
page read and write
229065AC000
heap
page read and write
2290657A000
heap
page read and write
17563160000
heap
page read and write
7FFFF0C50000
unkown
page readonly
1BADF300000
heap
page read and write
2290659E000
heap
page read and write
229059F0000
heap
page read and write
15D15858000
heap
page read and write
2290657F000
heap
page read and write
10DB5FE000
stack
page read and write
AC5C8DB000
stack
page read and write
8570B7E000
stack
page read and write
1E560680000
heap
page read and write
9E0000
heap
page read and write
15D15913000
heap
page read and write
A60627E000
stack
page read and write
15D15802000
heap
page read and write
26C83800000
heap
page read and write
A60637E000
stack
page read and write
15D15730000
trusted library allocation
page read and write
22906575000
heap
page read and write
1B793F90000
heap
page read and write
21406441000
heap
page read and write
17563240000
heap
page read and write
168ED827000
heap
page read and write
1E560641000
heap
page read and write
229065A2000
heap
page read and write
2976E4A0000
heap
page read and write
2976E423000
heap
page read and write
1E560642000
heap
page read and write
FF0000
heap
page read and write
1A4F6321000
heap
page read and write
1BADF27F000
heap
page read and write
29768EA4000
heap
page read and write
22906517000
heap
page read and write
15D15900000
heap
page read and write
29769700000
heap
page read and write
1F55C502000
heap
page read and write
26C837ED000
heap
page read and write
A60647F000
stack
page read and write
297695D3000
trusted library allocation
page read and write
229065BD000
heap
page read and write
7FFFF0CA6000
unkown
page read and write
15D1583D000
heap
page read and write
2976E4AA000
heap
page read and write
4C0000
heap
page read and write
1B79406E000
heap
page read and write
1E56064A000
heap
page read and write
2976E6F0000
trusted library allocation
page read and write
23870796000
heap
page read and write
857087C000
stack
page read and write
15D15862000
heap
page read and write
710000
heap
page read and write
20C9A46F000
heap
page read and write
5D70B7C000
stack
page read and write
2290659B000
heap
page read and write
87326FF000
stack
page read and write
7FFFF0C50000
unkown
page readonly
229065B1000
heap
page read and write
4A0000
heap
page read and write
480000
heap
page read and write
950000
heap
page read and write
3A926FF000
stack
page read and write
1A4F6230000
heap
page read and write
1B79404F000
heap
page read and write
551000
heap
page read and write
22906583000
heap
page read and write
1DD72430000
heap
page read and write
AC5D37E000
stack
page read and write
10DB2FE000
stack
page read and write
22906583000
heap
page read and write
3A92BFE000
stack
page read and write
2976E3F0000
trusted library allocation
page read and write
22906589000
heap
page read and write
2290657E000
heap
page read and write
26C83750000
heap
page read and write
EA0000
direct allocation
page execute and read and write
2290657E000
heap
page read and write
180000000
direct allocation
page read and write
180000000
direct allocation
page read and write
1BF26450000
heap
page read and write
1E560646000
heap
page read and write
1B794011000
heap
page read and write
1DD72713000
heap
page read and write
10DB1FE000
stack
page read and write
21406402000
heap
page read and write
29768E00000
heap
page read and write
DC5000
heap
page read and write
1DD7265B000
heap
page read and write
4F9147C000
stack
page read and write
DAB000
heap
page read and write
22906589000
heap
page read and write
1BF26591000
heap
page read and write
22906583000
heap
page read and write
2290657A000
heap
page read and write
21406466000
heap
page read and write
229065AC000
heap
page read and write
18002D000
direct allocation
page readonly
1BF26720000
heap
page read and write
2290659D000
heap
page read and write
B66DBBB000
stack
page read and write
4F9127B000
stack
page read and write
5D70A79000
stack
page read and write
29768EBB000
heap
page read and write
7FFFF0CA9000
unkown
page readonly
1A4F6312000
heap
page read and write
26C83950000
heap
page read and write
20C9A466000
heap
page read and write
1DD72678000
heap
page read and write
2976E710000
trusted library allocation
page read and write
22906A03000
heap
page read and write
2290658A000
heap
page read and write
C75000
stack
page read and write
2290659B000
heap
page read and write
2290657D000
heap
page read and write
22906A21000
heap
page read and write
22905CD7000
heap
page read and write
1A4F631C000
heap
page read and write
22905C4B000
heap
page read and write
2290657F000
heap
page read and write
2976E6B0000
trusted library allocation
page read and write
1E560679000
heap
page read and write
2976E6B0000
trusted library allocation
page read and write
168ED829000
heap
page read and write
2290657D000
heap
page read and write
1BADFA90000
trusted library allocation
page read and write
18002F000
direct allocation
page readonly
1B793F70000
heap
page read and write
C053DED000
stack
page read and write
1E560647000
heap
page read and write
20C9A380000
trusted library allocation
page read and write
1E560686000
heap
page read and write
2290658D000
heap
page read and write
281F000
stack
page read and write
304277E000
stack
page read and write
2976E502000
heap
page read and write
22906583000
heap
page read and write
2290657B000
heap
page read and write
29768E7C000
heap
page read and write
168EE202000
trusted library allocation
page read and write
1BF26540000
heap
page read and write
1A4F65BB000
heap
page read and write
1E560630000
heap
page read and write
1B7942B0000
trusted library allocation
page read and write
22906583000
heap
page read and write
22906583000
heap
page read and write
29769602000
heap
page read and write
17563100000
heap
page read and write
168ED84C000
heap
page read and write
175631C0000
remote allocation
page read and write
1DD72530000
trusted library allocation
page read and write
22906592000
heap
page read and write
1E560613000
heap
page read and write
2290657B000
heap
page read and write
20C9A513000
heap
page read and write
1E0000
remote allocation
page read and write
2290654F000
heap
page read and write
2976E445000
heap
page read and write
1A4F631C000
heap
page read and write
4F91377000
stack
page read and write
1DD72629000
heap
page read and write
20C9A454000
heap
page read and write
7FFFF0C51000
unkown
page execute read
22906578000
heap
page read and write
5D70AFF000
stack
page read and write
23870786000
heap
page read and write
7FFFF0CA6000
unkown
page read and write
29768F16000
heap
page read and write
1A4F8070000
heap
page read and write
18002D000
direct allocation
page readonly
10C007E000
stack
page read and write
20BF000
stack
page read and write
29768E29000
heap
page read and write
168ED900000
heap
page read and write
17563302000
heap
page read and write
2976E720000
trusted library allocation
page read and write
15D171E0000
remote allocation
page read and write
23870794000
heap
page read and write
1B794000000
heap
page read and write
20C9A466000
heap
page read and write
22905D08000
heap
page read and write
1BF2659B000
heap
page read and write
21C0000
heap
page read and write
2A740F90000
heap
page read and write
1BADF180000
heap
page read and write
7FFFF0C50000
unkown
page readonly
26C83800000
heap
page read and write
10DB3FC000
stack
page read and write
15D17202000
trusted library allocation
page read and write
22906589000
heap
page read and write
1B794319000
heap
page read and write
D5BC8E6000
stack
page read and write
175630F0000
heap
page read and write
1BF2657E000
heap
page read and write
22906A19000
heap
page read and write
22906589000
heap
page read and write
D5BC9EF000
stack
page read and write
3A925FB000
stack
page read and write
1DD723C0000
heap
page read and write
2976E4A4000
heap
page read and write
20C9A427000
heap
page read and write
168ED790000
heap
page read and write
2387079E000
heap
page read and write
30427FF000
stack
page read and write
2976E820000
trusted library allocation
page read and write
168ED730000
heap
page read and write
18002E000
direct allocation
page read and write
2290657B000
heap
page read and write
1BADF213000
heap
page read and write
29768F28000
heap
page read and write
238707B7000
heap
page read and write
1E56066D000
heap
page read and write
1B794320000
trusted library allocation
page read and write
4F910FC000
stack
page read and write
1DD72600000
heap
page read and write
18002D000
direct allocation
page readonly
EFF38F8000
stack
page read and write
1DD72613000
heap
page read and write
1E56063A000
heap
page read and write
2976E452000
heap
page read and write
F44C7B000
stack
page read and write
1E0000
remote allocation
page read and write
1F55C380000
heap
page read and write
1E560643000
heap
page read and write
1DD72663000
heap
page read and write
18002F000
direct allocation
page readonly
2290657A000
heap
page read and write
229065A0000
heap
page read and write
ACD6579000
stack
page read and write
229065A0000
heap
page read and write
15D15813000
heap
page read and write
A605D7C000
stack
page read and write
22905C61000
heap
page read and write
2387079E000
heap
page read and write
21406400000
heap
page read and write
29768E13000
heap
page read and write
1E560651000
heap
page read and write
175631C0000
remote allocation
page read and write
22905D16000
heap
page read and write
20C9A490000
heap
page read and write
8570A77000
stack
page read and write
22905C51000
heap
page read and write
20C9A500000
heap
page read and write
22906587000
heap
page read and write
229065CD000
heap
page read and write
B66EB7E000
stack
page read and write
2290658A000
heap
page read and write
1E5605F0000
trusted library allocation
page read and write
258D000
stack
page read and write
2A740F9D000
heap
page read and write
1A4F632D000
heap
page read and write
55D000
heap
page read and write
1BF26770000
heap
page read and write
2290657C000
heap
page read and write
17563202000
heap
page read and write
7FFFF0C51000
unkown
page execute read
2ECCF7B000
stack
page read and write
180000000
direct allocation
page read and write
29768E56000
heap
page read and write
58E000
heap
page read and write
2976E6D0000
trusted library allocation
page read and write
DA0000
heap
page read and write
20C9A502000
heap
page read and write
22906584000
heap
page read and write
55D000
heap
page read and write
229065A0000
heap
page read and write
29769615000
heap
page read and write
5D7087A000
stack
page read and write
26C835A0000
heap
page read and write
168ED800000
heap
page read and write
26C837C8000
heap
page read and write
168ED813000
heap
page read and write
29769758000
heap
page read and write
18002F000
direct allocation
page readonly
1BADF202000
heap
page read and write
2976E740000
remote allocation
page read and write
1B7941D0000
trusted library allocation
page read and write
2720000
remote allocation
page read and write
DE5000
heap
page read and write
1A4F630D000
heap
page read and write
1E560702000
heap
page read and write
26C83990000
heap
page read and write
29769600000
heap
page read and write
229065B6000
heap
page read and write
2976E608000
trusted library allocation
page read and write
22905D02000
heap
page read and write
1E560629000
heap
page read and write
20C9A449000
heap
page read and write
1BADF302000
heap
page read and write
29768BD0000
heap
page read and write
22906587000
heap
page read and write
168ED854000
heap
page read and write
873287F000
stack
page read and write
EFF34F8000
stack
page read and write
2976E740000
remote allocation
page read and write
2290657C000
heap
page read and write
22906A00000
heap
page read and write
7FFFF0CA2000
unkown
page readonly
ACD637E000
stack
page read and write
18002E000
direct allocation
page read and write
1FE0000
trusted library allocation
page read and write
AC5D27D000
stack
page read and write
29769DE0000
trusted library allocation
page read and write
22906A02000
heap
page read and write
22906574000
heap
page read and write
D5BCCFF000
stack
page read and write
1BF26547000
heap
page read and write
168ED852000
heap
page read and write
1BADF27E000
heap
page read and write
2976E4F6000
heap
page read and write
1F55C513000
heap
page read and write
1A4F62F9000
heap
page read and write
15D15902000
heap
page read and write
EFF3AFF000
unkown
page read and write
29768E7A000
heap
page read and write
18002F000
direct allocation
page readonly
7FFFF0CA6000
unkown
page read and write
2140647B000
heap
page read and write
1B794310000
heap
page read and write
29769713000
heap
page read and write
5D708FE000
stack
page read and write
21406500000
heap
page read and write
3A92DFF000
stack
page read and write
1BF26710000
heap
page read and write
22906589000
heap
page read and write
15D171E0000
remote allocation
page read and write
22906589000
heap
page read and write
There are 842 hidden memdumps, click here to show them.