IOC Report
W3XqCWvDWC.dll

loading gif

Files

File Path
Type
Category
Malicious
W3XqCWvDWC.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x30318109, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_W3X_e6deee335863428d576ebaa51f7a212f69d3e2_11952a33_077be6ee\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_W3X_e6deee335863428d576ebaa51f7a212f69d3e2_11952a33_0e4fe7a9\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD838.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:42:49 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8D4.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:42:50 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDCBD.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD88.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEE1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE01A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Logs\waasmedic\waasmedic.20220308_162907_174.etl
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_W3X_4b2923b72b8cb92cc1b5f136816e1b8388c8c88_11952a33_188de68a\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_W3X_4b2923b72b8cb92cc1b5f136816e1b8388c8c88_11952a33_192de409\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC3CF.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:29:49 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC844.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:29:50 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCDD3.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD0C2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD17C.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD544.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD882.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD95C.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA57.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD17.tmp.txt
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\W3XqCWvDWC.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_FileTime
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_SystemTime
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZDZEtulZzZAlvF\WFoCkDI.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KYnbMwv\FkmMqbieZ.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4668 -s 340
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5156 -s 328
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 428 -p 5116 -ip 5116
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 492 -p 3628 -ip 3628
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5116 -s 336
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3628 -s 328
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k netsvcs -p -s BITS
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://165.22.73.229/BV
unknown
malicious
https://165.22.73.229/
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://165.22.73.229:8080/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
http://crl.ver)
unknown
https://165.22.73.229:8080/temsi
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://universalstore.streaming.mediaservices.windows
unknown
https://165.22.73.229:8080/zU
unknown
https://165.22.73.229:8080/t
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://165.22.73.229:8080/temD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressin
unknown
There are 8 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
165.22.73.229
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{81e00543-02b3-baf3-c8d2-239b16bcdeb2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{50e1f40b-35d9-9514-3dd2-1a291dd85141}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00180008F3870B0F
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00180008F3870B0F
There are 42 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
26206480000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
3C0000
direct allocation
page execute and read and write
malicious
18470750000
direct allocation
page execute and read and write
malicious
18470750000
direct allocation
page execute and read and write
malicious
26206480000
direct allocation
page execute and read and write
malicious
4F0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
26206480000
direct allocation
page execute and read and write
malicious
18470750000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1AF9F77D000
heap
page read and write
1900E65D000
heap
page read and write
8A8B5AB000
stack
page read and write
18EA654A000
heap
page read and write
242A2799000
heap
page read and write
622000
heap
page read and write
22B8DE6D000
heap
page read and write
18EA64B0000
heap
page read and write
1650F56D000
heap
page read and write
5EF58FF000
stack
page read and write
F474FBC000
stack
page read and write
2005D7C0000
trusted library allocation
page read and write
18002E000
direct allocation
page readonly
242A2550000
remote allocation
page read and write
18470860000
heap
page read and write
26206220000
heap
page read and write
242A2C02000
heap
page read and write
19630813000
heap
page read and write
1F36F48E000
heap
page read and write
1F36F49C000
heap
page read and write
180000000
direct allocation
page read and write
242A2727000
heap
page read and write
18EA6570000
heap
page read and write
1900E580000
trusted library allocation
page read and write
F702A7E000
stack
page read and write
18EA6570000
heap
page read and write
242A2602000
heap
page read and write
F474FBC000
stack
page read and write
242A27AC000
heap
page read and write
7FFA668D2000
unkown
page readonly
1900F002000
trusted library allocation
page read and write
2478B318000
heap
page read and write
7FFA668B1000
unkown
page execute read
242A1D08000
heap
page read and write
1AF9FA15000
heap
page read and write
184705F0000
heap
page read and write
242A2791000
heap
page read and write
22B8DF02000
heap
page read and write
2005D7D9000
heap
page read and write
242A2727000
heap
page read and write
247904FE000
heap
page read and write
1AF9F788000
heap
page read and write
247900C4000
trusted library allocation
page read and write
22B8DE56000
heap
page read and write
242A27A3000
heap
page read and write
2AC939F0000
trusted library allocation
page read and write
242A270D000
heap
page read and write
2AC93A3B000
heap
page read and write
2005D81B000
heap
page read and write
7FFA668B0000
unkown
page readonly
51AC3FC000
stack
page read and write
26206460000
direct allocation
page execute and read and write
2B94ACF0000
heap
page read and write
62E000
heap
page read and write
7FFA668DF000
unkown
page readonly
247904F9000
heap
page read and write
242A2799000
heap
page read and write
242A2724000
heap
page read and write
18470740000
direct allocation
page execute and read and write
19630849000
heap
page read and write
242A1CAB000
heap
page read and write
2B94AE7B000
heap
page read and write
26206298000
heap
page read and write
184707E0000
remote allocation
page read and write
18470640000
heap
page read and write
7FFA668DF000
unkown
page readonly
7FFA668D2000
unkown
page readonly
7FFA668DF000
unkown
page readonly
19630877000
heap
page read and write
6CAF5FB000
stack
page read and write
1650F560000
heap
page read and write
18470865000
heap
page read and write
1900E686000
heap
page read and write
247901B0000
trusted library allocation
page read and write
242A2C02000
heap
page read and write
1900E4F0000
heap
page read and write
2B94AE02000
heap
page read and write
18470648000
heap
page read and write
18EA6573000
heap
page read and write
D3AF07F000
stack
page read and write
4E0000
direct allocation
page execute and read and write
242A2799000
heap
page read and write
1C0000
heap
page read and write
30AF0FE000
stack
page read and write
1AF9F768000
heap
page read and write
24790200000
remote allocation
page read and write
26206298000
heap
page read and write
2005D835000
heap
page read and write
22B8DE74000
heap
page read and write
242A1C65000
heap
page read and write
242A2C00000
heap
page read and write
242A2C03000
heap
page read and write
2005D822000
heap
page read and write
229F000
stack
page read and write
5FC000
heap
page read and write
654EB7F000
stack
page read and write
18470740000
direct allocation
page execute and read and write
242A2779000
heap
page read and write
1900E664000
heap
page read and write
242A278A000
heap
page read and write
654EA77000
stack
page read and write
F70287B000
stack
page read and write
247901E0000
trusted library allocation
page read and write
242A2700000
heap
page read and write
242A276E000
heap
page read and write
2478AAA6000
heap
page read and write
2B94B802000
trusted library allocation
page read and write
2AC94202000
trusted library allocation
page read and write
242A27C4000
heap
page read and write
242A2728000
heap
page read and write
242A2C02000
heap
page read and write
2AC93A13000
heap
page read and write
247900E0000
trusted library allocation
page read and write
242A1C29000
heap
page read and write
E1B5477000
stack
page read and write
180030000
direct allocation
page readonly
5EF519B000
stack
page read and write
242A2490000
trusted library allocation
page read and write
242A1CE1000
heap
page read and write
242A1C6C000
heap
page read and write
1650F4A0000
heap
page read and write
5FD000
heap
page read and write
242A279C000
heap
page read and write
18472140000
heap
page read and write
2478B1A0000
trusted library allocation
page read and write
51AC2F8000
stack
page read and write
2005E6D0000
trusted library allocation
page read and write
242A1C64000
heap
page read and write
18470640000
heap
page read and write
2478AB16000
heap
page read and write
7FFA668D2000
unkown
page readonly
622000
heap
page read and write
8A8B8FE000
stack
page read and write
242A2727000
heap
page read and write
2AC93A02000
heap
page read and write
242A27A3000
heap
page read and write
2478FF10000
trusted library allocation
page read and write
74E000
stack
page read and write
18EA6580000
heap
page read and write
F4752FF000
stack
page read and write
18EA6430000
heap
page read and write
F4752FF000
stack
page read and write
E1B5F7E000
stack
page read and write
24790400000
heap
page read and write
5EF54FE000
stack
page read and write
5EF55FB000
stack
page read and write
242A1B90000
heap
page read and write
2B94AF02000
heap
page read and write
140CE7C000
stack
page read and write
18470780000
heap
page readonly
18002E000
direct allocation
page readonly
18002E000
direct allocation
page readonly
242A2550000
remote allocation
page read and write
1F36F492000
heap
page read and write
51AC17F000
stack
page read and write
2479041F000
heap
page read and write
18002F000
direct allocation
page read and write
242A1C3C000
heap
page read and write
19630900000
heap
page read and write
242A1C6B000
heap
page read and write
242A279B000
heap
page read and write
242A1CB0000
heap
page read and write
242A2779000
heap
page read and write
7FB000
heap
page read and write
242A27DA000
heap
page read and write
F70247B000
stack
page read and write
196306D0000
heap
page read and write
E1B567B000
stack
page read and write
2478B318000
heap
page read and write
19630881000
heap
page read and write
B5EBC8B000
stack
page read and write
140CF7F000
stack
page read and write
7FFA668B1000
unkown
page execute read
1F36F492000
heap
page read and write
1963084C000
heap
page read and write
D3AEF7E000
stack
page read and write
242A2799000
heap
page read and write
7FFA668DB000
unkown
page read and write
2AC93B02000
heap
page read and write
2478B202000
heap
page read and write
302BCFC000
stack
page read and write
1F36F6A0000
heap
page read and write
1F36F486000
heap
page read and write
2190000
heap
page read and write
262064B0000
heap
page readonly
2478FF00000
trusted library allocation
page read and write
1900E550000
heap
page read and write
18002E000
direct allocation
page readonly
2005D812000
heap
page read and write
242A1C69000
heap
page read and write
242A1B80000
heap
page read and write
242A275F000
heap
page read and write
1AF9F760000
heap
page read and write
2478BF00000
trusted library allocation
page read and write
242A27C7000
heap
page read and write
802000
heap
page read and write
302BDF9000
stack
page read and write
2630000
remote allocation
page read and write
242A2C03000
heap
page read and write
1650F573000
heap
page read and write
18EA6563000
heap
page read and write
E1B557A000
stack
page read and write
242A2791000
heap
page read and write
242A1CD4000
heap
page read and write
7FFA668DB000
unkown
page read and write
2478FF80000
trusted library allocation
page read and write
242A2780000
heap
page read and write
242A1C61000
heap
page read and write
2005D822000
heap
page read and write
250000
heap
page read and write
1F36F430000
heap
page read and write
5EF5B7E000
stack
page read and write
24AD000
stack
page read and write
180030000
direct allocation
page readonly
2005D7D0000
heap
page read and write
242A2C02000
heap
page read and write
2AC93A00000
heap
page read and write
1900E679000
heap
page read and write
18EA6569000
heap
page read and write
1F36F470000
heap
page read and write
19630829000
heap
page read and write
2005E650000
trusted library allocation
page read and write
25AF000
stack
page read and write
2B94AE40000
heap
page read and write
1AF9F7A0000
heap
page read and write
D3AEC7B000
stack
page read and write
242A1CE5000
heap
page read and write
1963082E000
heap
page read and write
26206545000
heap
page read and write
26206540000
heap
page read and write
1AF9F78C000
heap
page read and write
30AF07B000
stack
page read and write
D3AF17E000
stack
page read and write
140CF7F000
stack
page read and write
22B8DF13000
heap
page read and write
802000
heap
page read and write
1FB0000
heap
page read and write
26206298000
heap
page read and write
2AC93A3E000
heap
page read and write
180030000
direct allocation
page readonly
242A1CB5000
heap
page read and write
18EA6564000
heap
page read and write
18472140000
heap
page read and write
E1B587B000
stack
page read and write
242A27A3000
heap
page read and write
1AF9F79D000
heap
page read and write
1900E65A000
heap
page read and write
302BA7B000
stack
page read and write
5EF56F7000
stack
page read and write
180000000
direct allocation
page read and write
305000
stack
page read and write
184705D0000
heap
page read and write
598000
heap
page read and write
622000
heap
page read and write
242A1CC7000
heap
page read and write
242A2799000
heap
page read and write
18EA6570000
heap
page read and write
242A278F000
heap
page read and write
190000
remote allocation
page read and write
654E97B000
stack
page read and write
18EA6573000
heap
page read and write
1AF9F78C000
heap
page read and write
18EA6573000
heap
page read and write
1900E4E0000
heap
page read and write
5EF5AF8000
stack
page read and write
180000000
direct allocation
page read and write
242A27A3000
heap
page read and write
7FFA668DB000
unkown
page read and write
26C0000
heap
page read and write
242A2799000
heap
page read and write
22B8DD40000
heap
page read and write
247900A8000
trusted library allocation
page read and write
E1B577E000
stack
page read and write
5FC000
heap
page read and write
2478AA13000
heap
page read and write
1AF9F779000
heap
page read and write
242A2727000
heap
page read and write
242A2761000
heap
page read and write
247900D0000
trusted library allocation
page read and write
242A27AC000
heap
page read and write
18EA6552000
heap
page read and write
5CD000
heap
page read and write
1F36F5B3000
heap
page read and write
22B8DD70000
trusted library allocation
page read and write
2B94AF13000
heap
page read and write
1AFA2AF3000
heap
page read and write
2005D790000
trusted library allocation
page read and write
22B8DE4D000
heap
page read and write
2478AB02000
heap
page read and write
26E8000
heap
page read and write
180030000
direct allocation
page readonly
247900A0000
trusted library allocation
page read and write
1900E713000
heap
page read and write
242A271A000
heap
page read and write
2478B215000
heap
page read and write
18EA6581000
heap
page read and write
2478A8A0000
heap
page read and write
2478AAFC000
heap
page read and write
247901C0000
trusted library allocation
page read and write
247904FB000
heap
page read and write
1F36F489000
heap
page read and write
2005D822000
heap
page read and write
262064B0000
heap
page readonly
7FFA668B0000
unkown
page readonly
247901D0000
trusted library allocation
page read and write
2478AA9C000
heap
page read and write
5EF547E000
stack
page read and write
7FFA668DB000
unkown
page read and write
7FFA668B1000
unkown
page execute read
1963083C000
heap
page read and write
30AF37B000
stack
page read and write
62E000
heap
page read and write
F474FBC000
stack
page read and write
2B94AD00000
heap
page read and write
7FFA668D2000
unkown
page readonly
1AF9F6E0000
heap
page read and write
242A1CF6000
heap
page read and write
30AF6FF000
stack
page read and write
1A0000
heap
page read and write
24790457000
heap
page read and write
30AF4F7000
stack
page read and write
2478B304000
heap
page read and write
1FAE000
stack
page read and write
22B8DE13000
heap
page read and write
26206510000
heap
page read and write
16A000
stack
page read and write
22B8DE81000
heap
page read and write
3F0000
heap
page readonly
180000000
direct allocation
page read and write
18470860000
heap
page read and write
19630861000
heap
page read and write
180000000
direct allocation
page read and write
F70277B000
stack
page read and write
22B8DE3C000
heap
page read and write
22B8DF08000
heap
page read and write
140CEFF000
stack
page read and write
242A2C02000
heap
page read and write
24790464000
heap
page read and write
18470780000
heap
page readonly
51AC279000
stack
page read and write
242A2794000
heap
page read and write
242A27A7000
heap
page read and write
140CEFF000
stack
page read and write
26206545000
heap
page read and write
2478B200000
heap
page read and write
242A2763000
heap
page read and write
140CF7F000
stack
page read and write
2005D5D0000
trusted library allocation
page read and write
190000
remote allocation
page read and write
2478BA50000
trusted library allocation
page read and write
E1B5C79000
stack
page read and write
24790200000
remote allocation
page read and write
1AFA2AF0000
heap
page read and write
1F36F6AB000
heap
page read and write
5EF5BFF000
unkown
page read and write
19630760000
trusted library allocation
page read and write
242A279B000
heap
page read and write
2478B313000
heap
page read and write
242A2C02000
heap
page read and write
302BC79000
stack
page read and write
242A277A000
heap
page read and write
18470820000
heap
page read and write
2478AA6E000
heap
page read and write
580000
heap
page read and write
242A1C5C000
heap
page read and write
242A2799000
heap
page read and write
242A2777000
heap
page read and write
2AC93A31000
heap
page read and write
242A277D000
heap
page read and write
2B94AE28000
heap
page read and write
242A1C60000
heap
page read and write
242A277E000
heap
page read and write
24790500000
heap
page read and write
2005D720000
heap
page read and write
26206510000
heap
page read and write
2AC93A52000
heap
page read and write
7FFA668DF000
unkown
page readonly
2005D824000
heap
page read and write
1900E708000
heap
page read and write
18470648000
heap
page read and write
140CE7C000
stack
page read and write
2AC938F0000
heap
page read and write
26206520000
remote allocation
page read and write
18470490000
heap
page read and write
262061B0000
heap
page read and write
242A1C7F000
heap
page read and write
1E048FD000
stack
page read and write
2630000
remote allocation
page read and write
7FFA668B0000
unkown
page readonly
24790170000
trusted library allocation
page read and write
2478AA8A000
heap
page read and write
242A2753000
heap
page read and write
2479044C000
heap
page read and write
B5EBD8D000
stack
page read and write
180000000
direct allocation
page read and write
6CAF97F000
stack
page read and write
242A2791000
heap
page read and write
2478AA73000
heap
page read and write
2478AAAB000
heap
page read and write
1900E65F000
heap
page read and write
18EA656A000
heap
page read and write
18470740000
direct allocation
page execute and read and write
5EF59F9000
stack
page read and write
184705F0000
heap
page read and write
302BE7F000
stack
page read and write
7FFA668B1000
unkown
page execute read
7FFA668DF000
unkown
page readonly
18EA67A5000
heap
page read and write
A30000
heap
page read and write
22B8DE29000
heap
page read and write
242A2C20000
heap
page read and write
1F372EE0000
heap
page read and write
659000
heap
page read and write
26206290000
heap
page read and write
2380000
heap
page read and write
6CAF67E000
stack
page read and write
242A1CE8000
heap
page read and write
242A277B000
heap
page read and write
8A8B97E000
stack
page read and write
20CF000
stack
page read and write
19630850000
heap
page read and write
1900E652000
heap
page read and write
F47527F000
stack
page read and write
242A27B9000
heap
page read and write
26206240000
heap
page read and write
242A1C5B000
heap
page read and write
18470648000
heap
page read and write
1AF9F77E000
heap
page read and write
2630000
remote allocation
page read and write
19630902000
heap
page read and write
2478A900000
heap
page read and write
654EC7F000
stack
page read and write
2478B359000
heap
page read and write
1AF9F660000
heap
page read and write
242A1C00000
heap
page read and write
242A1D13000
heap
page read and write
242A2727000
heap
page read and write
30AF27B000
stack
page read and write
247900C1000
trusted library allocation
page read and write
18002E000
direct allocation
page readonly
26206460000
direct allocation
page execute and read and write
2B94AF00000
heap
page read and write
242A2790000
heap
page read and write
19630730000
heap
page read and write
1AF9F782000
heap
page read and write
26206470000
heap
page read and write
2478BED1000
trusted library allocation
page read and write
1F36F5B0000
heap
page read and write
5D1000
heap
page read and write
654E67B000
stack
page read and write
247904FE000
heap
page read and write
6CAF09B000
stack
page read and write
242A2777000
heap
page read and write
242A2792000
heap
page read and write
26206520000
remote allocation
page read and write
2B94AE5A000
heap
page read and write
1AF9F776000
heap
page read and write
2478AA00000
heap
page read and write
180000000
direct allocation
page read and write
180030000
direct allocation
page readonly
2478B300000
heap
page read and write
7FFA668DB000
unkown
page read and write
24790200000
remote allocation
page read and write
18EA67A0000
heap
page read and write
18470490000
unkown
page read and write
18EA6548000
heap
page read and write
242A277A000
heap
page read and write
242A2793000
heap
page read and write
247900A0000
trusted library allocation
page read and write
242A2C02000
heap
page read and write
180000000
direct allocation
page read and write
18002E000
direct allocation
page readonly
6CAF19E000
stack
page read and write
26206220000
heap
page read and write
247904AB000
heap
page read and write
22B8DE51000
heap
page read and write
590000
heap
page read and write
242A2790000
heap
page read and write
242A2779000
heap
page read and write
247900AE000
trusted library allocation
page read and write
19630913000
heap
page read and write
18472140000
heap
page read and write
2005D5C0000
heap
page read and write
2479043F000
heap
page read and write
2B94AE13000
heap
page read and write
23AC000
stack
page read and write
1AFA29D0000
heap
page read and write
184705D0000
heap
page read and write
247904AD000
heap
page read and write
242A2763000
heap
page read and write
24790320000
trusted library allocation
page read and write
18EA6540000
heap
page read and write
18EA6557000
heap
page read and write
1F36F4A1000
heap
page read and write
760000
heap
page read and write
B0000
heap
page read and write
22B8E802000
trusted library allocation
page read and write
26AF000
stack
page read and write
19630800000
heap
page read and write
7FFA668B0000
unkown
page readonly
242A2779000
heap
page read and write
1F370F90000
heap
page read and write
7FFA668B0000
unkown
page readonly
2005E410000
trusted library allocation
page read and write
18470820000
heap
page read and write
242A1C86000
heap
page read and write
2005E670000
trusted library allocation
page read and write
1AF9F500000
heap
page read and write
7FFA668DB000
unkown
page read and write
F70297E000
stack
page read and write
2AC93890000
heap
page read and write
242A279D000
heap
page read and write
22B8DE52000
heap
page read and write
24790414000
heap
page read and write
2478FF90000
trusted library allocation
page read and write
1F36F49C000
heap
page read and write
18470780000
heap
page readonly
242A1C5E000
heap
page read and write
242A2779000
heap
page read and write
26206540000
heap
page read and write
2AC93A29000
heap
page read and write
A35000
heap
page read and write
242A27B9000
heap
page read and write
2478AA75000
heap
page read and write
E1B527B000
stack
page read and write
62A000
heap
page read and write
262E000
stack
page read and write
140CE7C000
stack
page read and write
184705D0000
heap
page read and write
24790502000
heap
page read and write
18EA6490000
heap
page read and write
26206290000
heap
page read and write
2478A890000
heap
page read and write
1F36F6A5000
heap
page read and write
2005E680000
trusted library allocation
page read and write
2478AA91000
heap
page read and write
F4752FF000
stack
page read and write
242A279B000
heap
page read and write
242A278E000
heap
page read and write
18470865000
heap
page read and write
22B8DE6D000
heap
page read and write
2478AA29000
heap
page read and write
1AF9FA10000
heap
page read and write
76B000
heap
page read and write
24790200000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
2005D7B0000
heap
page read and write
180030000
direct allocation
page readonly
1900E63C000
heap
page read and write
214E000
stack
page read and write
8A8B87E000
stack
page read and write
247904B1000
heap
page read and write
1900E629000
heap
page read and write
26206470000
heap
page read and write
7FFA668DB000
unkown
page read and write
7FFA668DF000
unkown
page readonly
2478AA78000
heap
page read and write
1650F360000
heap
page read and write
1900E613000
heap
page read and write
180030000
direct allocation
page readonly
242A2793000
heap
page read and write
2005D7A0000
trusted library allocation
page read and write
785000
heap
page read and write
51AC0FE000
stack
page read and write
242A27CA000
heap
page read and write
242A1BF0000
heap
page read and write
24790502000
heap
page read and write
18002F000
direct allocation
page read and write
1AF9F640000
heap
page read and write
2005D7B9000
heap
page read and write
247904EE000
heap
page read and write
585000
heap
page read and write
18002E000
direct allocation
page readonly
242A1D16000
heap
page read and write
247904F4000
heap
page read and write
221C000
stack
page read and write
242A1C67000
heap
page read and write
242A2550000
remote allocation
page read and write
180030000
direct allocation
page readonly
242A2C02000
heap
page read and write
22B8DE70000
heap
page read and write
1AF9F779000
heap
page read and write
1900E700000
heap
page read and write
1AF9F782000
heap
page read and write
6CAF4FB000
stack
page read and write
7FFA668DB000
unkown
page read and write
247900E4000
trusted library allocation
page read and write
242A1C6D000
heap
page read and write
242B000
stack
page read and write
654E6FE000
stack
page read and write
262064B0000
heap
page readonly
18470820000
heap
page read and write
26206290000
heap
page read and write
B5EBD0E000
stack
page read and write
242A279B000
heap
page read and write
242A277E000
heap
page read and write
7E0000
heap
page read and write
2478AA3D000
heap
page read and write
2005E660000
heap
page readonly
1F36F478000
heap
page read and write
26206220000
heap
page read and write
2B94AE00000
heap
page read and write
22B8DCE0000
heap
page read and write
22B8DCD0000
heap
page read and write
262061B0000
unkown
page read and write
1F36F4AD000
heap
page read and write
1F36F450000
heap
page read and write
E1B5D7B000
stack
page read and write
2B94AE6E000
heap
page read and write
242A2760000
heap
page read and write
2005D7B5000
heap
page read and write
7C2000
heap
page read and write
7FFA668B1000
unkown
page execute read
F47527F000
stack
page read and write
242A27AC000
heap
page read and write
2B94AD90000
trusted library allocation
page read and write
247902E0000
trusted library allocation
page read and write
1AF9F791000
heap
page read and write
7FFA668D2000
unkown
page readonly
2478AB02000
heap
page read and write
196306C0000
heap
page read and write
30AF3FE000
stack
page read and write
520000
heap
page readonly
26206470000
heap
page read and write
26206545000
heap
page read and write
2478B302000
heap
page read and write
2478AA8C000
heap
page read and write
2478AAFC000
heap
page read and write
242A279B000
heap
page read and write
2478BEF0000
trusted library allocation
page read and write
26206460000
direct allocation
page execute and read and write
242A279C000
heap
page read and write
7FFA668B1000
unkown
page execute read
5E3000
heap
page read and write
1F36F489000
heap
page read and write
51AC37E000
stack
page read and write
26206240000
heap
page read and write
7FFA668D2000
unkown
page readonly
247900D0000
trusted library allocation
page read and write
2478AAA2000
heap
page read and write
1900E600000
heap
page read and write
30AF5FE000
stack
page read and write
242A1D02000
heap
page read and write
1AF9FA1B000
heap
page read and write
2AC93A43000
heap
page read and write
2736000
heap
page read and write
1900E702000
heap
page read and write
7FFA668B0000
unkown
page readonly
2478BEF3000
trusted library allocation
page read and write
7FFA668D2000
unkown
page readonly
2B94AD60000
heap
page read and write
3B0000
direct allocation
page execute and read and write
1F36F498000
heap
page read and write
6CAF11E000
stack
page read and write
540000
trusted library allocation
page read and write
242A2764000
heap
page read and write
1F3726E0000
trusted library allocation
page read and write
242A2C19000
heap
page read and write
24790170000
trusted library allocation
page read and write
18470490000
unkown
page read and write
242A2788000
heap
page read and write
26206540000
heap
page read and write
242A1C5D000
heap
page read and write
2005D700000
heap
page read and write
231B000
stack
page read and write
2AC938A0000
heap
page read and write
242A277A000
heap
page read and write
242A2777000
heap
page read and write
7FFA668B0000
unkown
page readonly
2478AAA8000
heap
page read and write
26206240000
heap
page read and write
7FFA668B0000
unkown
page readonly
2478AA58000
heap
page read and write
18EA6557000
heap
page read and write
184707E0000
remote allocation
page read and write
1F36F48D000
heap
page read and write
242A27A3000
heap
page read and write
7FFA668B1000
unkown
page execute read
242A2793000
heap
page read and write
7FFA668B1000
unkown
page execute read
242A277C000
heap
page read and write
242A1C63000
heap
page read and write
247904DD000
heap
page read and write
6CAF87F000
stack
page read and write
340000
heap
page read and write
30AF17E000
stack
page read and write
24790170000
trusted library allocation
page read and write
242A1CE8000
heap
page read and write
242A2799000
heap
page read and write
2478AAAB000
heap
page read and write
19630908000
heap
page read and write
22B8DE00000
heap
page read and write
242A2750000
heap
page read and write
242A1C7F000
heap
page read and write
19631202000
trusted library allocation
page read and write
7FFA668DF000
unkown
page readonly
18470640000
heap
page read and write
247900C0000
trusted library allocation
page read and write
7FFA668DF000
unkown
page readonly
360000
heap
page read and write
262061B0000
unkown
page read and write
242A1C13000
heap
page read and write
24790180000
trusted library allocation
page read and write
51AC1FE000
stack
page read and write
18470860000
heap
page read and write
1AF9F7A0000
heap
page read and write
5EF57F7000
stack
page read and write
302BD7E000
stack
page read and write
26206510000
heap
page read and write
6CAF777000
stack
page read and write
18002E000
direct allocation
page readonly
1FE0000
heap
page read and write
2479042D000
heap
page read and write
51AC07A000
stack
page read and write
2478AB07000
heap
page read and write
F47527F000
stack
page read and write
247901F0000
trusted library allocation
page read and write
242A2792000
heap
page read and write
2005D8D0000
trusted library allocation
page read and write
22B8DF00000
heap
page read and write
184705F0000
heap
page read and write
242A1CC0000
heap
page read and write
247904F4000
heap
page read and write
242A2790000
heap
page read and write
18470865000
heap
page read and write
1963084D000
heap
page read and write
654E77E000
stack
page read and write
1F36F2F0000
heap
page read and write
247904DA000
heap
page read and write
7FFA668D2000
unkown
page readonly
22B8DE49000
heap
page read and write
247904F7000
heap
page read and write
2AC93A37000
heap
page read and write
242A277C000
heap
page read and write
242A27B3000
heap
page read and write
659000
heap
page read and write
2478B358000
heap
page read and write
242A2772000
heap
page read and write
1AFA2B00000
trusted library allocation
page read and write
140CEFF000
stack
page read and write
5D1000
heap
page read and write
There are 747 hidden memdumps, click here to show them.