IOC Report
555.exe

loading gif

Files

File Path
Type
Category
Malicious
555.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_555.exe_73a2317c9b18c06fb4572ea77cd525ee3f28dbd_69550887_1ab655c1\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D28.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Mar 22 22:53:11 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER497D.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E21.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\555.exe
"C:\Users\user\Desktop\555.exe"
malicious
C:\Users\user\Desktop\555.exe
C:\Users\user\Desktop\555.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6444 -s 1228

URLs

Name
IP
Malicious
http://dersed.com/freebl3.dll
unknown
malicious
http://dersed.com/freebl3.dllyD
unknown
malicious
http://dersed.com/nss3.dllv
unknown
http://dersed.com/vcruntime140.dllbg
unknown
http://dersed.com/288
unknown
http://dersed.com/vcruntime140.dll
unknown
http://dersed.com/softokn3.dllUD
unknown
http://dersed.com/vcruntime140.dll_i
unknown
http://dersed.com/msvcp140.dllGD
unknown
http://dersed.com/softokn3.dllmb
unknown
http://dersed.com/msvcp140.dll
unknown
http://dersed.com/nss3.dll
unknown
http://dersed.com/mozglue.dll
unknown
http://dersed.com/softokn3.dllLD
unknown
http://dersed.com/mozglue.dllkD
unknown
http://dersed.com/nss3.dllcom/freebl3.dll
unknown
http://ip-api.com/line/
unknown
http://dersed.com/softokn3.dll
unknown
http://dersed.com/vcruntime140.dllGc
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dersed.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
ProgramId
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
FileId
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
LowerCaseLongPath
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
LongPathHash
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Name
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Publisher
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Version
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
BinFileVersion
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
BinaryType
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
ProductName
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
ProductVersion
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
LinkDate
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
BinProductVersion
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Size
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Language
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
IsPeFile
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
IsOsComponent
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
47B2000
trusted library allocation
page read and write
malicious
48A5000
trusted library allocation
page read and write
malicious
474000
unkown
page readonly
malicious
474000
unkown
page readonly
malicious
474000
unkown
page readonly
malicious
4B5B000
trusted library allocation
page read and write
malicious
400000
unkown
page read and write
malicious
466000
unkown
page readonly
1572F040000
heap
page read and write
4869000
trusted library allocation
page read and write
1572F05A000
heap
page read and write
728000
heap
page read and write
1CEDF518000
heap
page read and write
1CEE41D0000
trusted library allocation
page read and write
1CEE4330000
remote allocation
page read and write
750000
heap
page read and write
1572F057000
heap
page read and write
1CEE4210000
trusted library allocation
page read and write
6DD000
heap
page read and write
846000
heap
page read and write
21066D89000
heap
page read and write
460000
unkown
page write copy
7E7000
heap
page read and write
EC272F7000
stack
page read and write
24FE000
stack
page read and write
21066DA5000
heap
page read and write
7E7000
heap
page read and write
846000
heap
page read and write
22ACD7E000
stack
page read and write
2EFE000
stack
page read and write
1CEE44E6000
heap
page read and write
1CEDEC00000
heap
page read and write
21066DD3000
heap
page read and write
1CEDF559000
heap
page read and write
1F046629000
heap
page read and write
489000
unkown
page read and write
1572EF30000
heap
page read and write
2D69B7F000
stack
page read and write
BAAC77F000
stack
page read and write
1CEDEC29000
heap
page read and write
6F5000
heap
page read and write
19F71EB0000
trusted library allocation
page read and write
BDF000
stack
page read and write
C70A87E000
stack
page read and write
EC274FE000
stack
page read and write
4840000
direct allocation
page execute and read and write
1CEE4330000
remote allocation
page read and write
2D696FE000
stack
page read and write
4878000
trusted library allocation
page read and write
620000
heap
page read and write
21066D83000
heap
page read and write
21066D9B000
heap
page read and write
460000
unkown
page write copy
1CEE0001000
trusted library allocation
page read and write
2021D6DF000
heap
page read and write
739000
heap
page read and write
13203690000
heap
page read and write
1CEDF415000
heap
page read and write
19A000
stack
page read and write
21066D8C000
heap
page read and write
1CEE44F2000
heap
page read and write
4850B7E000
stack
page read and write
1CEE42F0000
trusted library allocation
page read and write
1CEE41F0000
trusted library allocation
page read and write
1CEE4200000
trusted library allocation
page read and write
210662EB000
heap
page read and write
210662A9000
heap
page read and write
1CEDF513000
heap
page read and write
1CEE4214000
trusted library allocation
page read and write
58E000
stack
page read and write
846000
heap
page read and write
21066D81000
heap
page read and write
EC26F7E000
stack
page read and write
1CEE4330000
trusted library allocation
page read and write
132035C0000
trusted library allocation
page read and write
1CEDF3C0000
trusted library section
page readonly
2D698FB000
stack
page read and write
228F7360000
heap
page read and write
A50D4FD000
stack
page read and write
1CEDECFA000
heap
page read and write
1572F058000
heap
page read and write
21D97041000
heap
page read and write
3050000
remote allocation
page read and write
21066180000
trusted library allocation
page read and write
21066D73000
heap
page read and write
30000
heap
page read and write
2106624A000
heap
page read and write
2021D713000
heap
page read and write
19F7042A000
heap
page read and write
466000
unkown
page readonly
23426645000
heap
page read and write
BAAC87F000
stack
page read and write
228F7413000
heap
page read and write
2342667E000
heap
page read and write
706000
heap
page read and write
BAABDCE000
stack
page read and write
193737C000
stack
page read and write
1CEDEA30000
heap
page read and write
1CEDEC71000
heap
page read and write
21066D7C000
heap
page read and write
4850000
trusted library allocation
page read and write
1F046600000
heap
page read and write
4840000
direct allocation
page execute and read and write
23426656000
heap
page read and write
2CBD000
stack
page read and write
EC271FE000
stack
page read and write
2C7F000
stack
page read and write
1CEE4400000
heap
page read and write
6AC000
heap
page read and write
21066D9C000
heap
page read and write
193717E000
stack
page read and write
2B7F000
stack
page read and write
1CEE4200000
trusted library allocation
page read and write
1CEDF3B0000
trusted library section
page readonly
4840000
direct allocation
page execute and read and write
4840000
direct allocation
page execute and read and write
2384EAC5000
heap
page read and write
2384E931000
heap
page read and write
4770000
direct allocation
page execute and read and write
1572F07B000
heap
page read and write
670000
trusted library allocation
page read and write
C70A6FE000
stack
page read and write
2106624C000
heap
page read and write
42AEBFE000
stack
page read and write
487E000
trusted library allocation
page read and write
4948000
trusted library allocation
page read and write
2F40000
heap
page read and write
193767C000
stack
page read and write
4950000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
228F745A000
heap
page read and write
7E0000
heap
page read and write
4884000
trusted library allocation
page read and write
4840000
direct allocation
page execute and read and write
1CEDED13000
heap
page read and write
21066D5B000
heap
page read and write
210661F0000
remote allocation
page read and write
72E000
stack
page read and write
21066D8A000
heap
page read and write
1572F000000
heap
page read and write
6B5000
heap
page read and write
2384E936000
heap
page read and write
21D97100000
heap
page read and write
23426653000
heap
page read and write
21066DB2000
heap
page read and write
2342663C000
heap
page read and write
1CEE4502000
heap
page read and write
21066D94000
heap
page read and write
6373EFB000
stack
page read and write
E335C7F000
stack
page read and write
4840000
direct allocation
page execute and read and write
4840000
direct allocation
page execute and read and write
2530000
heap
page read and write
487B000
trusted library allocation
page read and write
451000
unkown
page readonly
5E5000
heap
page read and write
210662ED000
heap
page read and write
466000
unkown
page readonly
1572F013000
heap
page read and write
72E000
stack
page read and write
610000
heap
page read and write
1CEDEB40000
trusted library section
page read and write
ADF000
stack
page read and write
2520000
heap
page read and write
A50CFFB000
stack
page read and write
47B0000
direct allocation
page execute and read and write
1CEDE9C0000
heap
page read and write
21D97028000
heap
page read and write
2DBE000
stack
page read and write
21066D8B000
heap
page read and write
6E4000
heap
page read and write
2E100855000
heap
page read and write
2106625B000
heap
page read and write
BAAC6FF000
stack
page read and write
6B4000
heap
page read and write
491B000
trusted library allocation
page read and write
21066D50000
heap
page read and write
C70A97D000
stack
page read and write
1572F066000
heap
page read and write
4840000
direct allocation
page execute and read and write
722000
heap
page read and write
59E000
stack
page read and write
4896000
trusted library allocation
page read and write
718000
heap
page read and write
1572F002000
heap
page read and write
21D96F00000
trusted library allocation
page read and write
E33617F000
stack
page read and write
21D96DA0000
heap
page read and write
13203700000
heap
page read and write
21066D89000
heap
page read and write
6B5000
heap
page read and write
47B0000
direct allocation
page execute and read and write
13203665000
heap
page read and write
24BE000
stack
page read and write
6B1000
heap
page read and write
22AD177000
stack
page read and write
A50D1FC000
stack
page read and write
719000
heap
page read and write
401000
unkown
page execute read
2EFB000
stack
page read and write
2021D6C8000
heap
page read and write
BAAC27C000
stack
page read and write
2F40000
heap
page read and write
21066C02000
heap
page read and write
1CEE41DE000
trusted library allocation
page read and write
489000
unkown
page read and write
4840000
direct allocation
page execute and read and write
21D97802000
trusted library allocation
page read and write
21066D81000
heap
page read and write
460000
unkown
page write copy
1572F045000
heap
page read and write
2DBE000
stack
page read and write
9DF000
stack
page read and write
19F70513000
heap
page read and write
2D693FC000
stack
page read and write
21066D7F000
heap
page read and write
A50D9FE000
stack
page read and write
1CEE44DE000
heap
page read and write
21066D81000
heap
page read and write
2342668A000
heap
page read and write
1CEDEC8F000
heap
page read and write
1CEDEC8A000
heap
page read and write
1CEDED26000
heap
page read and write
451000
unkown
page readonly
2021D5D0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1572F044000
heap
page read and write
4840000
direct allocation
page execute and read and write
1CEDF518000
heap
page read and write
756000
heap
page read and write
451000
unkown
page readonly
1572F07E000
heap
page read and write
21067262000
heap
page read and write
19F703A0000
trusted library allocation
page read and write
451000
unkown
page readonly
21066D93000
heap
page read and write
21066D89000
heap
page read and write
2F40000
heap
page read and write
21D96D90000
heap
page read and write
228F7502000
heap
page read and write
2106624B000
heap
page read and write
21066271000
heap
page read and write
BAAC7FF000
stack
page read and write
24FE000
stack
page read and write
21D97013000
heap
page read and write
600000
heap
page read and write
1CEE4429000
heap
page read and write
4875000
trusted library allocation
page read and write
19F7044A000
heap
page read and write
1572F07A000
heap
page read and write
2D69C7F000
stack
page read and write
21066D89000
heap
page read and write
99000
stack
page read and write
2EFE000
stack
page read and write
486C000
trusted library allocation
page read and write
5E0000
heap
page read and write
21066D85000
heap
page read and write
288E000
stack
page read and write
23426629000
heap
page read and write
210662B3000
heap
page read and write
985DE7B000
stack
page read and write
2520000
heap
page read and write
A50D0FF000
stack
page read and write
2DBA000
stack
page read and write
1CEDF3F0000
trusted library section
page readonly
4840000
direct allocation
page execute and read and write
1CEE41F4000
trusted library allocation
page read and write
1572F05E000
heap
page read and write
2384E962000
heap
page read and write
21066DB2000
heap
page read and write
13203590000
heap
page read and write
19F7045A000
heap
page read and write
2F00000
trusted library section
page readonly
13203530000
heap
page read and write
2E10084A000
heap
page read and write
747000
heap
page read and write
21D97002000
heap
page read and write
1F046560000
trusted library allocation
page read and write
615000
heap
page read and write
460000
unkown
page write copy
19F7044A000
heap
page read and write
BAAC5FE000
stack
page read and write
1CEDF3D0000
trusted library section
page readonly
2021D6CF000
heap
page read and write
401000
unkown
page execute read
C70AAFD000
stack
page read and write
1F0464D0000
heap
page read and write
2021D686000
heap
page read and write
985E37E000
stack
page read and write
2C7F000
stack
page read and write
1572FA02000
trusted library allocation
page read and write
E33607C000
stack
page read and write
30000
heap
page read and write
1CEE42A0000
trusted library allocation
page read and write
21067202000
heap
page read and write
42AE7BF000
stack
page read and write
6CF000
heap
page read and write
72E000
stack
page read and write
401000
unkown
page execute read
13204002000
trusted library allocation
page read and write
1CEE4310000
trusted library allocation
page read and write
1CEDEB30000
trusted library allocation
page read and write
9D000
stack
page read and write
2520000
heap
page read and write
401000
unkown
page execute read
4840000
direct allocation
page execute and read and write
21066D8F000
heap
page read and write
400000
unkown
page readonly
210661F0000
remote allocation
page read and write
1F046590000
remote allocation
page read and write
2790000
trusted library allocation
page read and write
2384E943000
heap
page read and write
1CEDF701000
trusted library allocation
page read and write
23426550000
trusted library allocation
page read and write
BAAC177000
stack
page read and write
42AEAFF000
stack
page read and write
1F04663D000
heap
page read and write
4840000
direct allocation
page execute and read and write
74D000
heap
page read and write
1572F062000
heap
page read and write
2021D600000
heap
page read and write
4850E7E000
stack
page read and write
22AC94E000
stack
page read and write
21066D8A000
heap
page read and write
2E100800000
heap
page read and write
2384E951000
heap
page read and write
2E100813000
heap
page read and write
A50D3FE000
stack
page read and write
1CEDFBE0000
trusted library allocation
page read and write
19F70402000
heap
page read and write
47B0000
direct allocation
page execute and read and write
4840000
direct allocation
page execute and read and write
4840000
direct allocation
page execute and read and write
1CEDF3A0000
trusted library section
page readonly
3040000
trusted library allocation
page read and write
4866000
trusted library allocation
page read and write
3050000
remote allocation
page read and write
210660F0000
heap
page read and write
4887000
trusted library allocation
page read and write
E33627E000
stack
page read and write
4840000
direct allocation
page execute and read and write
2530000
heap
page read and write
401000
unkown
page execute read
1CEDECA2000
heap
page read and write
47B0000
direct allocation
page execute and read and write
2384E92B000
heap
page read and write
4840000
direct allocation
page execute and read and write
3040000
trusted library allocation
page read and write
2D69A77000
stack
page read and write
1CEDF502000
heap
page read and write
590000
trusted library allocation
page read and write
6FD000
heap
page read and write
400000
unkown
page readonly
19F70466000
heap
page read and write
400000
unkown
page readonly
6373CFE000
stack
page read and write
1572F102000
heap
page read and write
2E100908000
heap
page read and write
2DFD000
stack
page read and write
21066213000
heap
page read and write
A50D6FF000
stack
page read and write
2A7F000
stack
page read and write
400000
unkown
page readonly
6E9000
heap
page read and write
63739BB000
stack
page read and write
1572F083000
heap
page read and write
21066D23000
heap
page read and write
7E0000
heap
page read and write
1CEDF402000
heap
page read and write
222C000
stack
page read and write
47B0000
direct allocation
page execute and read and write
210661F0000
remote allocation
page read and write
19F703F0000
remote allocation
page read and write
ADF000
stack
page read and write
19F70459000
heap
page read and write
21066D8B000
heap
page read and write
21066D82000
heap
page read and write
228F7C70000
trusted library allocation
page read and write
21066DCD000
heap
page read and write
BAAC67E000
stack
page read and write
485068B000
stack
page read and write
615000
heap
page read and write
6DA000
heap
page read and write
19F70449000
heap
page read and write
1572F046000
heap
page read and write
2384E942000
heap
page read and write
1F04665C000
heap
page read and write
4840000
direct allocation
page execute and read and write
826000
heap
page read and write
9D000
stack
page read and write
985E27B000
stack
page read and write
23426691000
heap
page read and write
228F7467000
heap
page read and write
23426600000
heap
page read and write
1572F061000
heap
page read and write
1CEDEC56000
heap
page read and write
228F7E02000
trusted library allocation
page read and write
21066D81000
heap
page read and write
28CE000
stack
page read and write
5DE000
stack
page read and write
4840000
direct allocation
page execute and read and write
21066253000
heap
page read and write
826000
heap
page read and write
C70A9FF000
stack
page read and write
193727E000
stack
page read and write
BAABD4B000
stack
page read and write
1CEE44A2000
heap
page read and write
42AEC7C000
stack
page read and write
1572F029000
heap
page read and write
47B0000
direct allocation
page execute and read and write
21066D8F000
heap
page read and write
401000
unkown
page execute read
E335F7B000
stack
page read and write
4840000
direct allocation
page execute and read and write
2B7F000
stack
page read and write
21066229000
heap
page read and write
21066D59000
heap
page read and write
2E10088B000
heap
page read and write
1572EF40000
heap
page read and write
21066D8C000
heap
page read and write
2F41000
heap
page read and write
21066D93000
heap
page read and write
EC2717B000
stack
page read and write
6373C7E000
stack
page read and write
2500000
heap
page read and write
1572F077000
heap
page read and write
234263F0000
heap
page read and write
5DE000
stack
page read and write
21066D94000
heap
page read and write
4840000
direct allocation
page execute and read and write
210660E0000
heap
page read and write
455F000
stack
page read and write
4840000
direct allocation
page execute and read and write
2384E945000
heap
page read and write
21066D81000
heap
page read and write
210662C0000
heap
page read and write
BAACC7E000
stack
page read and write
1CEDEC13000
heap
page read and write
2D697FC000
stack
page read and write
1C0000
remote allocation
page read and write
21066D8F000
heap
page read and write
21066DB5000
heap
page read and write
21066D8D000
heap
page read and write
21D97113000
heap
page read and write
72C000
heap
page read and write
615000
heap
page read and write
2E100871000
heap
page read and write
2E10084E000
heap
page read and write
2500000
heap
page read and write
24BE000
stack
page read and write
ADF000
stack
page read and write
400000
unkown
page readonly
2021D641000
heap
page read and write
23426657000
heap
page read and write
1CEE0030000
trusted library allocation
page read and write
5DE000
stack
page read and write
21066D81000
heap
page read and write
21066DAB000
heap
page read and write
2384E942000
heap
page read and write
1CEE4410000
heap
page read and write
2360000
heap
page read and write
21D96E00000
heap
page read and write
2021E132000
heap
page read and write
1F0464C0000
heap
page read and write
1CEE4320000
trusted library allocation
page read and write
19F703C0000
trusted library allocation
page read and write
1CEE44A0000
heap
page read and write
1572F03B000
heap
page read and write
21066D92000
heap
page read and write
2900000
trusted library allocation
page read and write
74A000
heap
page read and write
13203713000
heap
page read and write
21067202000
heap
page read and write
9DF000
stack
page read and write
1CEDEC6C000
heap
page read and write
C70A5FE000
stack
page read and write
1572F042000
heap
page read and write
1F046590000
remote allocation
page read and write
47B0000
direct allocation
page execute and read and write
466000
unkown
page readonly
28E0000
heap
page read and write
2384E967000
heap
page read and write
13203520000
heap
page read and write
2A7F000
stack
page read and write
21D9706D000
heap
page read and write
21066D00000
heap
page read and write
EC273FE000
stack
page read and write
720000
heap
page read and write
4840000
direct allocation
page execute and read and write
753000
heap
page read and write
2384E951000
heap
page read and write
4840000
direct allocation
page execute and read and write
42AE73A000
stack
page read and write
2E10083C000
heap
page read and write
6373FF7000
stack
page read and write
5DE000
stack
page read and write
2021E100000
heap
page read and write
2384E966000
heap
page read and write
E335AFC000
stack
page read and write
48F000
unkown
page readonly
193707F000
stack
page read and write
1320367D000
heap
page read and write
1F046530000
heap
page read and write
E33637E000
stack
page read and write
21066D77000
heap
page read and write
EC26E7B000
stack
page read and write
47B0000
direct allocation
page execute and read and write
21066D93000
heap
page read and write
4893000
trusted library allocation
page read and write
1CEDEC76000
heap
page read and write
21067200000
heap
page read and write
4840000
direct allocation
page execute and read and write
C70A47B000
stack
page read and write
6BB000
heap
page read and write
2CBD000
stack
page read and write
76E000
stack
page read and write
590000
trusted library allocation
page read and write
2021D66E000
heap
page read and write
1F046590000
remote allocation
page read and write
1CEE40B0000
trusted library allocation
page read and write
BAAC47F000
stack
page read and write
2106624F000
heap
page read and write
1CEDF400000
heap
page read and write
193747C000
stack
page read and write
4872000
trusted library allocation
page read and write
284E000
stack
page read and write
2384E947000
heap
page read and write
21067202000
heap
page read and write
985E47E000
stack
page read and write
4840000
direct allocation
page execute and read and write
47B0000
direct allocation
page execute and read and write
21066D81000
heap
page read and write
E335D7F000
stack
page read and write
C70A77E000
stack
page read and write
7AE000
stack
page read and write
4840000
direct allocation
page execute and read and write
48F000
unkown
page readonly
2E100902000
heap
page read and write
2DFD000
stack
page read and write
7E7000
heap
page read and write
1CEDEC3D000
heap
page read and write
A50D2FF000
stack
page read and write
486F000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
13203600000
heap
page read and write
466000
unkown
page readonly
21067203000
heap
page read and write
466000
unkown
page readonly
712000
heap
page read and write
401000
unkown
page execute read
21066DB3000
heap
page read and write
2DBE000
stack
page read and write
2D6997F000
stack
page read and write
460000
unkown
page read and write
A50CB9B000
stack
page read and write
4890000
trusted library allocation
page read and write
21066D81000
heap
page read and write
EC2707B000
stack
page read and write
19F703F0000
remote allocation
page read and write
13203629000
heap
page read and write
228F7370000
heap
page read and write
13203655000
heap
page read and write
1CEDECAB000
heap
page read and write
722000
heap
page read and write
1CEE41D8000
trusted library allocation
page read and write
228F7477000
heap
page read and write
731000
heap
page read and write
228F7427000
heap
page read and write
836000
heap
page read and write
19F7045A000
heap
page read and write
1CEE4300000
trusted library allocation
page read and write
210662FC000
heap
page read and write
4840000
direct allocation
page execute and read and write
21D97053000
heap
page read and write
23426658000
heap
page read and write
19F70300000
heap
page read and write
22AD07F000
stack
page read and write
21066256000
heap
page read and write
21D97102000
heap
page read and write
42AEB78000
stack
page read and write
1CEE443A000
heap
page read and write
2DBA000
stack
page read and write
2106624E000
heap
page read and write
E335DFC000
stack
page read and write
2106721A000
heap
page read and write
1F046613000
heap
page read and write
2E100829000
heap
page read and write
228F7450000
heap
page read and write
21066313000
heap
page read and write
4840000
direct allocation
page execute and read and write
400000
unkown
page readonly
21066D4E000
heap
page read and write
460000
unkown
page write copy
63741FF000
stack
page read and write
21066302000
heap
page read and write
47B0000
direct allocation
page execute and read and write
2021D6DD000
heap
page read and write
836000
heap
page read and write
590000
trusted library allocation
page read and write
1CEDF559000
heap
page read and write
1320368B000
heap
page read and write
19F70502000
heap
page read and write
1CEDED02000
heap
page read and write
489F000
trusted library allocation
page read and write
2384E961000
heap
page read and write
2920000
trusted library allocation
page read and write
1CEE4030000
trusted library allocation
page read and write
1CEDEC9A000
heap
page read and write
21067202000
heap
page read and write
1572F063000
heap
page read and write
21066D18000
heap
page read and write
19A000
stack
page read and write
488A000
trusted library allocation
page read and write
2E100850000
heap
page read and write
1CEE4447000
heap
page read and write
2E100900000
heap
page read and write
42AEA7F000
stack
page read and write
2D6967E000
stack
page read and write
6BF000
heap
page read and write
BAAC97A000
stack
page read and write
465F000
stack
page read and write
228F7475000
heap
page read and write
1572F03D000
heap
page read and write
BDF000
stack
page read and write
1CEE41F1000
trusted library allocation
page read and write
48F000
unkown
page readonly
21066226000
heap
page read and write
30000
unkown
page read and write
2E100866000
heap
page read and write
21066D71000
heap
page read and write
23426708000
heap
page read and write
21066D95000
heap
page read and write
2500000
heap
page read and write
BDF000
stack
page read and write
1572F060000
heap
page read and write
4840000
direct allocation
page execute and read and write
2DBA000
stack
page read and write
193757E000
stack
page read and write
7E0000
heap
page read and write
1CEE42E0000
trusted library allocation
page read and write
21066D83000
heap
page read and write
1CEE4500000
heap
page read and write
19F72002000
trusted library allocation
page read and write
58E000
stack
page read and write
2384E942000
heap
page read and write
210662C7000
heap
page read and write
485078E000
stack
page read and write
22ACE78000
stack
page read and write
2B7F000
stack
page read and write
1CEE41D0000
trusted library allocation
page read and write
23426450000
heap
page read and write
228F7473000
heap
page read and write
19B000
stack
page read and write
2021D6BE000
heap
page read and write
2E100860000
heap
page read and write
4912000
trusted library allocation
page read and write
401000
unkown
page execute read
47B0000
direct allocation
page execute and read and write
297F000
stack
page read and write
7AE000
stack
page read and write
445F000
stack
page read and write
23426671000
heap
page read and write
21066DA4000
heap
page read and write
4850C7E000
stack
page read and write
1CEDF3E0000
trusted library section
page readonly
2230000
heap
page read and write
47B0000
direct allocation
page execute and read and write
19F70400000
heap
page read and write
2F00000
trusted library section
page readonly
617000
heap
page read and write
4850D7E000
stack
page read and write
1572F04E000
heap
page read and write
47B0000
direct allocation
page execute and read and write
A50D8FF000
stack
page read and write
30000
unkown
page read and write
A50D7FF000
stack
page read and write
2530000
heap
page read and write
1572F064000
heap
page read and write
21066DA0000
heap
page read and write
2364000
heap
page read and write
19F70370000
heap
page read and write
1320365E000
heap
page read and write
21067202000
heap
page read and write
2E1006F0000
heap
page read and write
2106625A000
heap
page read and write
19F70518000
heap
page read and write
1572F05D000
heap
page read and write
1CEE44EC000
heap
page read and write
21066D5E000
heap
page read and write
210662EE000
heap
page read and write
22AC8CC000
stack
page read and write
48F000
unkown
page readonly
1572F032000
heap
page read and write
4840000
direct allocation
page execute and read and write
21066D92000
heap
page read and write
228F7513000
heap
page read and write
58E000
stack
page read and write
2384E8A0000
heap
page read and write
2342664B000
heap
page read and write
2F00000
trusted library section
page readonly
488D000
trusted library allocation
page read and write
7AE000
stack
page read and write
94E000
stack
page read and write
21066D7B000
heap
page read and write
2E100913000
heap
page read and write
13203676000
heap
page read and write
4840000
direct allocation
page execute and read and write
228F73D0000
heap
page read and write
2EFB000
stack
page read and write
63740FF000
stack
page read and write
702000
heap
page read and write
19F70310000
heap
page read and write
21066D71000
heap
page read and write
489C000
trusted library allocation
page read and write
21066D89000
heap
page read and write
A50D5FE000
stack
page read and write
4670000
heap
page read and write
1572F048000
heap
page read and write
2021D702000
heap
page read and write
3040000
trusted library allocation
page read and write
485070E000
stack
page read and write
1F046702000
heap
page read and write
BAACA7C000
stack
page read and write
21066DA4000
heap
page read and write
4773000
direct allocation
page execute and read and write
21066308000
heap
page read and write
2021D629000
heap
page read and write
400000
unkown
page readonly
688000
heap
page read and write
21066150000
heap
page read and write
836000
heap
page read and write
21066D91000
heap
page read and write
1CEE0020000
trusted library allocation
page read and write
23426702000
heap
page read and write
1320363C000
heap
page read and write
2E100760000
heap
page read and write
19F703F0000
remote allocation
page read and write
1F047002000
trusted library allocation
page read and write
2021D613000
heap
page read and write
19F70413000
heap
page read and write
2E100790000
trusted library allocation
page read and write
2E101202000
trusted library allocation
page read and write
19F70475000
heap
page read and write
2A7F000
stack
page read and write
451000
unkown
page readonly
23426E02000
trusted library allocation
page read and write
1CEE44AB000
heap
page read and write
24FE000
stack
page read and write
228F7400000
heap
page read and write
1F046602000
heap
page read and write
21067203000
heap
page read and write
1CEE4505000
heap
page read and write
21066DA5000
heap
page read and write
228F7402000
heap
page read and write
228F7441000
heap
page read and write
6F9000
heap
page read and write
21066316000
heap
page read and write
2E100700000
heap
page read and write
2C7F000
stack
page read and write
1CEE4330000
remote allocation
page read and write
21066DAB000
heap
page read and write
985E17B000
stack
page read and write
210662E2000
heap
page read and write
23426713000
heap
page read and write
2EFB000
stack
page read and write
2EFE000
stack
page read and write
1CEE441B000
heap
page read and write
21066255000
heap
page read and write
6E0000
heap
page read and write
24BE000
stack
page read and write
2384EAC0000
heap
page read and write
6ED000
heap
page read and write
A4F000
stack
page read and write
21066D94000
heap
page read and write
400000
unkown
page readonly
13203708000
heap
page read and write
21066258000
heap
page read and write
2384E750000
heap
page read and write
4899000
trusted library allocation
page read and write
400000
unkown
page readonly
E3356BB000
stack
page read and write
1320364A000
heap
page read and write
1936ABB000
stack
page read and write
19F7048B000
heap
page read and write
21066D87000
heap
page read and write
21066D8B000
heap
page read and write
2021D5A0000
heap
page read and write
22ACF77000
stack
page read and write
13203660000
heap
page read and write
610000
heap
page read and write
21067202000
heap
page read and write
21066282000
heap
page read and write
401000
unkown
page execute read
BAAC37A000
stack
page read and write
21067202000
heap
page read and write
1572F069000
heap
page read and write
21066D71000
heap
page read and write
1CEE4502000
heap
page read and write
21066D9A000
heap
page read and write
2384E951000
heap
page read and write
1CEDE9D0000
heap
page read and write
21D97079000
heap
page read and write
759000
heap
page read and write
22AC9CE000
stack
page read and write
1572EFD0000
trusted library allocation
page read and write
6F1000
heap
page read and write
2021D530000
heap
page read and write
19A000
stack
page read and write
550000
trusted library allocation
page read and write
2DFD000
stack
page read and write
21066D75000
heap
page read and write
4840000
direct allocation
page execute and read and write
22AD2FB000
stack
page read and write
21066D7B000
heap
page read and write
21066D7B000
heap
page read and write
1C0000
remote allocation
page read and write
13203613000
heap
page read and write
297F000
stack
page read and write
E335EFA000
stack
page read and write
297F000
stack
page read and write
75E000
heap
page read and write
19F70500000
heap
page read and write
640000
heap
page read and write
1CEE0023000
trusted library allocation
page read and write
2238000
heap
page read and write
2021E002000
heap
page read and write
2021D666000
heap
page read and write
228F7456000
heap
page read and write
1CEE4460000
heap
page read and write
21066200000
heap
page read and write
2021D540000
heap
page read and write
2106623C000
heap
page read and write
489000
unkown
page read and write
2384E948000
heap
page read and write
13203702000
heap
page read and write
1CEE4040000
trusted library allocation
page read and write
606000
heap
page read and write
744000
heap
page read and write
21066D8F000
heap
page read and write
76E000
stack
page read and write
2384E880000
heap
page read and write
451000
unkown
page readonly
47B0000
direct allocation
page execute and read and write
76E000
stack
page read and write
21067221000
heap
page read and write
19F7043D000
heap
page read and write
4660000
heap
page read and write
21066D8D000
heap
page read and write
1572F059000
heap
page read and write
2342664D000
heap
page read and write
23426688000
heap
page read and write
21066D8D000
heap
page read and write
9DF000
stack
page read and write
21D97000000
heap
page read and write
21066D5D000
heap
page read and write
21066252000
heap
page read and write
23426650000
heap
page read and write
2E100866000
heap
page read and write
23426700000
heap
page read and write
1CEE44FC000
heap
page read and write
234263E0000
heap
page read and write
1572F041000
heap
page read and write
1CEE44FE000
heap
page read and write
1572F067000
heap
page read and write
6B4000
heap
page read and write
9D000
stack
page read and write
680000
heap
page read and write
23426613000
heap
page read and write
4881000
trusted library allocation
page read and write
21066D89000
heap
page read and write
1CEDF500000
heap
page read and write
1572F05C000
heap
page read and write
2384E936000
heap
page read and write
741000
heap
page read and write
2CBD000
stack
page read and write
826000
heap
page read and write
22AD1FF000
unkown
page read and write
610000
heap
page read and write
233E000
stack
page read and write
4840000
direct allocation
page execute and read and write
EC26EFE000
stack
page read and write
4840000
direct allocation
page execute and read and write
BAAC57B000
stack
page read and write
1CEE40C0000
trusted library allocation
page read and write
4840000
direct allocation
page execute and read and write
C70ABFD000
stack
page read and write
2E100860000
heap
page read and write
4840000
direct allocation
page execute and read and write
1320365A000
heap
page read and write
1CEDEC73000
heap
page read and write
1572EFA0000
heap
page read and write
2384E920000
heap
page read and write
19F71E70000
trusted library allocation
page read and write
There are 883 hidden memdumps, click here to show them.