IOC Report
555.exe

loading gif

Files

File Path
Type
Category
Malicious
555.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_555.exe_73a2317c9b18c06fb4572ea77cd525ee3f28dbd_69550887_14ead3ce\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_555.exe_73a2317c9b18c06fb4572ea77cd525ee3f28dbd_69550887_1ab655c1\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC93E.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Mar 23 07:02:58 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC5C.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCDC5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D28.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Mar 22 22:53:11 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER497D.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E21.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\555.exe
"C:\Users\user\Desktop\555.exe"
malicious
C:\Users\user\Desktop\555.exe
C:\Users\user\Desktop\555.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6872 -s 1180
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6444 -s 1228

URLs

Name
IP
Malicious
http://dersed.com/freebl3.dll
unknown
malicious
http://dersed.com/freebl3.dllyD
unknown
malicious
http://ip-api.com/line/
unknown
http://dersed.com/nss3.dllv
unknown
http://dersed.com/vcruntime140.dllbg
unknown
http://dersed.com/288
unknown
http://dersed.com/vcruntime140.dll
unknown
http://dersed.com/softokn3.dllUD
unknown
http://dersed.com/vcruntime140.dll_i
unknown
http://dersed.com/msvcp140.dllGD
unknown
http://dersed.com/softokn3.dllmb
unknown
http://dersed.com/msvcp140.dll
unknown
http://dersed.com/nss3.dll
unknown
http://dersed.com/mozglue.dll
unknown
http://dersed.com/softokn3.dllLD
unknown
http://dersed.com/mozglue.dllkD
unknown
http://dersed.com/nss3.dllcom/freebl3.dll
unknown
http://dersed.com/softokn3.dll
unknown
http://dersed.com/vcruntime140.dllGc
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dersed.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
ProgramId
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
FileId
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
LowerCaseLongPath
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
LongPathHash
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
Name
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
Publisher
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
Version
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
BinFileVersion
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
BinaryType
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
ProductName
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
ProductVersion
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
LinkDate
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
BinProductVersion
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
Size
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
Language
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
IsPeFile
malicious
\REGISTRY\A\{672f463c-baaf-fd5b-54a9-e7320b9c4ec4}\Root\InventoryApplicationFile\555.exe|72eb515
IsOsComponent
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
ProgramId
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
FileId
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
LowerCaseLongPath
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
LongPathHash
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Name
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Publisher
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Version
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
BinFileVersion
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
BinaryType
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
ProductName
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
ProductVersion
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
LinkDate
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
BinProductVersion
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Size
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
Language
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
IsPeFile
malicious
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
IsOsComponent
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
474000
unkown
page readonly
malicious
474000
unkown
page readonly
malicious
400000
unkown
page read and write
malicious
4B63000
trusted library allocation
page read and write
malicious
47CA000
trusted library allocation
page read and write
malicious
48D8000
trusted library allocation
page read and write
malicious
474000
unkown
page readonly
malicious
24750699000
heap
page read and write
8EF000
stack
page read and write
1BBBF5C0000
heap
page read and write
1DA10D87000
heap
page read and write
B3A3D7A000
stack
page read and write
250C8CF9000
heap
page read and write
400000
unkown
page readonly
247506B8000
heap
page read and write
E1E814E000
stack
page read and write
1DA1043C000
heap
page read and write
1DA10D99000
heap
page read and write
24750580000
heap
page read and write
26576A02000
heap
page read and write
1DA10D9B000
heap
page read and write
1DA10481000
heap
page read and write
466000
unkown
page readonly
1CE81625000
heap
page read and write
A48DC7E000
stack
page read and write
2B40000
direct allocation
page execute and read and write
2640000
heap
page read and write
23787945000
heap
page read and write
29CE000
stack
page read and write
7DA000
heap
page read and write
E1E80CB000
stack
page read and write
17BBA852000
heap
page read and write
2475161D000
heap
page read and write
2B40000
direct allocation
page execute and read and write
2B40000
direct allocation
page execute and read and write
250C8CE2000
heap
page read and write
30000
unkown
page read and write
2B40000
direct allocation
page execute and read and write
21CE000
stack
page read and write
2C4E000
stack
page read and write
1DA10D9B000
heap
page read and write
1DA10DA6000
heap
page read and write
247506AE000
heap
page read and write
401000
unkown
page execute read
2C4A000
stack
page read and write
250C8A70000
trusted library allocation
page read and write
2B40000
direct allocation
page execute and read and write
250C3476000
heap
page read and write
4A4D9FE000
stack
page read and write
E1E86F7000
stack
page read and write
487B000
trusted library allocation
page read and write
466000
unkown
page readonly
1DA10D81000
heap
page read and write
25BD3630000
heap
page read and write
17BBA854000
heap
page read and write
25BD37D4000
heap
page read and write
2B40000
direct allocation
page execute and read and write
401000
unkown
page execute read
805000
heap
page read and write
C5B76FF000
stack
page read and write
1DA10D99000
heap
page read and write
1DA10D95000
heap
page read and write
2B40000
direct allocation
page execute and read and write
66E000
stack
page read and write
25BD37C2000
heap
page read and write
6DD2F7E000
stack
page read and write
2475069F000
heap
page read and write
1CE81678000
heap
page read and write
1BBBF853000
heap
page read and write
C5B7EFF000
stack
page read and write
1DA10D14000
heap
page read and write
26F95C02000
trusted library allocation
page read and write
236CB180000
trusted library allocation
page read and write
2EF0000
remote allocation
page read and write
2070F708000
heap
page read and write
250C349E000
heap
page read and write
4680000
heap
page read and write
48F000
unkown
page readonly
7DF000
heap
page read and write
19A000
stack
page read and write
26576A2A000
heap
page read and write
1A0D41A0000
heap
page read and write
250C346F000
heap
page read and write
489F000
trusted library allocation
page read and write
1DA10D78000
heap
page read and write
2B40000
direct allocation
page execute and read and write
278F000
stack
page read and write
24751700000
heap
page read and write
1DA10D81000
heap
page read and write
9D9B0FC000
stack
page read and write
86DF7FD000
stack
page read and write
A48D77D000
stack
page read and write
1A0D4575000
heap
page read and write
1DA10449000
heap
page read and write
24751658000
heap
page read and write
30000
unkown
page read and write
1CE81665000
heap
page read and write
401000
unkown
page execute read
1CE8165C000
heap
page read and write
6DD3278000
stack
page read and write
24750652000
heap
page read and write
22D5000
heap
page read and write
1DA10D78000
heap
page read and write
4A4DAFB000
stack
page read and write
460000
unkown
page read and write
74C000
stack
page read and write
48AE000
trusted library allocation
page read and write
1DA10D82000
heap
page read and write
2070F702000
heap
page read and write
17BBAA25000
heap
page read and write
236CBCF0000
trusted library allocation
page read and write
1BBBF813000
heap
page read and write
250C8AE0000
trusted library allocation
page read and write
79E000
heap
page read and write
250C3502000
heap
page read and write
17BBA7E3000
heap
page read and write
451000
unkown
page readonly
2475063B000
heap
page read and write
23787938000
heap
page read and write
236CAD70000
heap
page read and write
1CE8166E000
heap
page read and write
23787B10000
heap
page read and write
250C8C00000
heap
page read and write
250C3D04000
heap
page read and write
710000
heap
page read and write
2070F613000
heap
page read and write
1DA11202000
heap
page read and write
1CE81550000
heap
page read and write
250C89A0000
trusted library allocation
page read and write
794000
heap
page read and write
26F95400000
heap
page read and write
25BD39D5000
heap
page read and write
4899000
trusted library allocation
page read and write
17BBA852000
heap
page read and write
19B000
stack
page read and write
17BBA80D000
heap
page read and write
17BBA7B4000
heap
page read and write
805000
heap
page read and write
2240000
heap
page read and write
4890000
trusted library allocation
page read and write
9D9B67E000
stack
page read and write
400000
unkown
page readonly
1BBBF882000
heap
page read and write
25BD37ED000
heap
page read and write
1DA10D97000
heap
page read and write
1DA10D7B000
heap
page read and write
19A000
stack
page read and write
2475065F000
heap
page read and write
236CB1B5000
heap
page read and write
4A4D5AE000
stack
page read and write
85D3DCA000
stack
page read and write
1DA10D84000
heap
page read and write
C3906EA000
stack
page read and write
236CAE70000
trusted library allocation
page read and write
86DF97D000
stack
page read and write
1BBBF902000
heap
page read and write
1DA1121A000
heap
page read and write
2070F600000
heap
page read and write
1DA10DC3000
heap
page read and write
2475171B000
heap
page read and write
25BD37E9000
heap
page read and write
99000
stack
page read and write
A48D2FB000
stack
page read and write
250C3D13000
heap
page read and write
17BBA7E3000
heap
page read and write
1DA10D63000
heap
page read and write
9EF000
stack
page read and write
7FB000
heap
page read and write
1DA10D99000
heap
page read and write
1BBBF908000
heap
page read and write
B3A3C77000
stack
page read and write
170B2FE000
stack
page read and write
250C3BF3000
trusted library allocation
page read and write
2070F65E000
heap
page read and write
1CFEDC41000
heap
page read and write
4887000
trusted library allocation
page read and write
1DA10516000
heap
page read and write
401000
unkown
page execute read
2378791B000
heap
page read and write
2B40000
direct allocation
page execute and read and write
837000
heap
page read and write
2B40000
direct allocation
page execute and read and write
2B40000
direct allocation
page execute and read and write
C390C7C000
stack
page read and write
17BBA81D000
heap
page read and write
170B4FC000
stack
page read and write
1DA1044D000
heap
page read and write
750000
trusted library allocation
page read and write
1DA10DAE000
heap
page read and write
487E000
trusted library allocation
page read and write
466000
unkown
page readonly
1CE81685000
heap
page read and write
1BBBF829000
heap
page read and write
1CE81663000
heap
page read and write
236CBAA0000
trusted library allocation
page read and write
1DA10D9B000
heap
page read and write
250C8AE0000
remote allocation
page read and write
78C000
heap
page read and write
2070F657000
heap
page read and write
25BD37E1000
heap
page read and write
1CFEDC29000
heap
page read and write
1BBBF84D000
heap
page read and write
2070F65D000
heap
page read and write
2240000
heap
page read and write
2B4D000
stack
page read and write
2070F64D000
heap
page read and write
451000
unkown
page readonly
1CFEDC13000
heap
page read and write
1CE814E0000
heap
page read and write
23DD000
stack
page read and write
1DA10D53000
heap
page read and write
1DA10D9B000
heap
page read and write
26577202000
trusted library allocation
page read and write
17BBA854000
heap
page read and write
794000
heap
page read and write
250C32C0000
heap
page read and write
1DA10D9F000
heap
page read and write
25BD39D0000
heap
page read and write
2B0F000
stack
page read and write
250C89B0000
trusted library allocation
page read and write
24751600000
heap
page read and write
1CE814F0000
heap
page read and write
247506FD000
heap
page read and write
250C89C0000
trusted library allocation
page read and write
1DA10D78000
heap
page read and write
17BBAA20000
heap
page read and write
1DA10D7E000
heap
page read and write
1DA10DCB000
heap
page read and write
81D000
heap
page read and write
7E3000
heap
page read and write
250C348D000
heap
page read and write
2B40000
direct allocation
page execute and read and write
B3A3E7B000
stack
page read and write
9D9B57E000
stack
page read and write
E4185AB000
stack
page read and write
6EE000
stack
page read and write
236CB1B9000
heap
page read and write
6C5000
heap
page read and write
7C5000
heap
page read and write
2B40000
direct allocation
page execute and read and write
250C8AA0000
trusted library allocation
page read and write
805000
heap
page read and write
C5B7D7F000
stack
page read and write
26F95B50000
trusted library allocation
page read and write
1DA10D25000
heap
page read and write
24750629000
heap
page read and write
1DA10D7A000
heap
page read and write
570000
heap
page read and write
1CE81642000
heap
page read and write
83D000
heap
page read and write
253E000
stack
page read and write
2070F66A000
heap
page read and write
E418AFE000
stack
page read and write
1DA104AF000
heap
page read and write
2474000
heap
page read and write
E1E81CF000
stack
page read and write
2B40000
direct allocation
page execute and read and write
26576A3D000
heap
page read and write
760000
heap
page read and write
E1E88FF000
stack
page read and write
4A4D87E000
stack
page read and write
1DA10D85000
heap
page read and write
1DA10D85000
heap
page read and write
250C3413000
heap
page read and write
2B40000
direct allocation
page execute and read and write
2B40000
direct allocation
page execute and read and write
851000
heap
page read and write
4783000
direct allocation
page execute and read and write
17BBA80D000
heap
page read and write
1DA10D63000
heap
page read and write
2B40000
direct allocation
page execute and read and write
9D9B87F000
stack
page read and write
E8BC27F000
stack
page read and write
250C8860000
trusted library allocation
page read and write
1CFEDC58000
heap
page read and write
1DA10502000
heap
page read and write
26F9543C000
heap
page read and write
250C8C56000
heap
page read and write
236CBCD0000
heap
page readonly
263F000
stack
page read and write
24750795000
heap
page read and write
250C89B0000
trusted library allocation
page read and write
24750D40000
trusted library allocation
page read and write
2475066B000
heap
page read and write
23787B20000
heap
page read and write
25BD37E9000
heap
page read and write
828000
heap
page read and write
250C87F0000
trusted library allocation
page read and write
236CAE00000
heap
page read and write
25BD3780000
heap
page read and write
811000
heap
page read and write
9D000
stack
page read and write
5C8000
heap
page read and write
489000
unkown
page read and write
1DA10D9E000
heap
page read and write
236CADE0000
heap
page read and write
48BA000
trusted library allocation
page read and write
23787890000
heap
page read and write
2C9E000
stack
page read and write
250C3502000
heap
page read and write
250C34FD000
heap
page read and write
2C9E000
stack
page read and write
247506D9000
heap
page read and write
7F4000
heap
page read and write
E4189F9000
stack
page read and write
30000
heap
page read and write
17BBA7B2000
heap
page read and write
1CE81600000
heap
page read and write
1CFEDC00000
heap
page read and write
825000
heap
page read and write
489C000
trusted library allocation
page read and write
1DA10451000
heap
page read and write
467F000
stack
page read and write
4780000
direct allocation
page execute and read and write
21CE000
stack
page read and write
2A0E000
stack
page read and write
1CE8166C000
heap
page read and write
2DE0000
heap
page read and write
1CE8163A000
heap
page read and write
250C3516000
heap
page read and write
17BBA7B4000
heap
page read and write
1CE81662000
heap
page read and write
2B40000
direct allocation
page execute and read and write
1CFEE202000
trusted library allocation
page read and write
1DA10454000
heap
page read and write
2070F661000
heap
page read and write
1DA10D95000
heap
page read and write
17BBA879000
heap
page read and write
26F95508000
heap
page read and write
1A0D4070000
heap
page read and write
19A000
stack
page read and write
6DD337E000
stack
page read and write
2450000
heap
page read and write
24750E02000
heap
page read and write
C5B797C000
stack
page read and write
250C8C2E000
heap
page read and write
1BBBF86A000
heap
page read and write
1DA10D82000
heap
page read and write
460000
unkown
page write copy
E8BC1FE000
stack
page read and write
7AF000
heap
page read and write
D60AA7B000
stack
page read and write
250C3C02000
heap
page read and write
1DA10D79000
heap
page read and write
7D2000
heap
page read and write
1CE81632000
heap
page read and write
250C8C40000
heap
page read and write
8EF000
stack
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
1DA10D87000
heap
page read and write
550000
trusted library allocation
page read and write
278F000
stack
page read and write
E1E85FB000
stack
page read and write
1CE81613000
heap
page read and write
4A4D52B000
stack
page read and write
E4188FD000
stack
page read and write
1CFEDC02000
heap
page read and write
2B40000
direct allocation
page execute and read and write
250C8A50000
trusted library allocation
page read and write
1DA104E3000
heap
page read and write
17BBA630000
heap
page read and write
250C89C4000
trusted library allocation
page read and write
2B40000
direct allocation
page execute and read and write
26F95502000
heap
page read and write
170B57F000
stack
page read and write
1DA1045C000
heap
page read and write
250C8A90000
trusted library allocation
page read and write
1CE81645000
heap
page read and write
17BBA788000
heap
page read and write
B3A45FC000
stack
page read and write
247507B8000
heap
page read and write
6DD3078000
stack
page read and write
C39076F000
stack
page read and write
24750644000
heap
page read and write
48A2000
trusted library allocation
page read and write
1DA104D6000
heap
page read and write
6DD2AEB000
stack
page read and write
250C8BE0000
trusted library allocation
page read and write
2070F62A000
heap
page read and write
1CE8163D000
heap
page read and write
809000
heap
page read and write
250C3507000
heap
page read and write
28CE000
stack
page read and write
26F95466000
heap
page read and write
236CAEDC000
heap
page read and write
6F0000
heap
page read and write
1DA10DCB000
heap
page read and write
E1E87FE000
stack
page read and write
25BD37D2000
heap
page read and write
250C3479000
heap
page read and write
86DF47F000
stack
page read and write
1DA104C8000
heap
page read and write
1DA10D65000
heap
page read and write
24750F3D000
heap
page read and write
C390A7F000
stack
page read and write
E8BC0FB000
stack
page read and write
26576A00000
heap
page read and write
170B3FB000
stack
page read and write
17BBA87C000
heap
page read and write
D60AFFF000
stack
page read and write
1CE81660000
heap
page read and write
A48CEBC000
stack
page read and write
265769A0000
remote allocation
page read and write
25BD37D6000
heap
page read and write
25BD37ED000
heap
page read and write
1DA104E9000
heap
page read and write
1DA1045B000
heap
page read and write
250C8CDD000
heap
page read and write
250C3492000
heap
page read and write
489000
unkown
page read and write
247506E4000
heap
page read and write
1DA11202000
heap
page read and write
C390BFE000
stack
page read and write
C3907EE000
stack
page read and write
1DA10D9D000
heap
page read and write
247505E0000
heap
page read and write
2B4D000
stack
page read and write
2430000
heap
page read and write
26F9544E000
heap
page read and write
250C3400000
heap
page read and write
2ACF000
stack
page read and write
170AFFA000
stack
page read and write
1DA10D9F000
heap
page read and write
1DA10D83000
heap
page read and write
A48D57D000
stack
page read and write
250C89A1000
trusted library allocation
page read and write
48B1000
trusted library allocation
page read and write
1BBBF83C000
heap
page read and write
1DA10D89000
heap
page read and write
250C3D00000
heap
page read and write
250C8CA3000
heap
page read and write
D60AAFE000
stack
page read and write
236CBCE0000
trusted library allocation
page read and write
451000
unkown
page readonly
1CFEDC5A000
heap
page read and write
85D427E000
stack
page read and write
401000
unkown
page execute read
236CAD80000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
466000
unkown
page readonly
6AE000
stack
page read and write
1CFEE1A0000
trusted library allocation
page read and write
1DA11202000
heap
page read and write
714000
heap
page read and write
9D000
stack
page read and write
C5B7A7A000
stack
page read and write
1DA10D51000
heap
page read and write
24750688000
heap
page read and write
1DA10457000
heap
page read and write
250C8C13000
heap
page read and write
250C4370000
trusted library allocation
page read and write
265769A0000
remote allocation
page read and write
E418B79000
stack
page read and write
170B47D000
stack
page read and write
48F000
unkown
page readonly
400000
unkown
page readonly
842000
heap
page read and write
1DA10D85000
heap
page read and write
25BD37ED000
heap
page read and write
26F95413000
heap
page read and write
5D1000
heap
page read and write
1DA10D9A000
heap
page read and write
23787B15000
heap
page read and write
D60AB7E000
stack
page read and write
17BBA8A0000
heap
page read and write
6DD3177000
stack
page read and write
6AE000
stack
page read and write
2B40000
direct allocation
page execute and read and write
2B40000
direct allocation
page execute and read and write
B3A437A000
stack
page read and write
4893000
trusted library allocation
page read and write
22D0000
heap
page read and write
1CE8165A000
heap
page read and write
24750613000
heap
page read and write
1DA104E4000
heap
page read and write
1DA10D25000
heap
page read and write
2070F668000
heap
page read and write
1DA10508000
heap
page read and write
1C0000
remote allocation
page read and write
2B40000
direct allocation
page execute and read and write
4884000
trusted library allocation
page read and write
26F95470000
heap
page read and write
26F95380000
heap
page read and write
250C8AE0000
remote allocation
page read and write
1DA11202000
heap
page read and write
24751713000
heap
page read and write
2B40000
direct allocation
page execute and read and write
17BBA880000
heap
page read and write
26F9544C000
heap
page read and write
25BD37F8000
heap
page read and write
2C4A000
stack
page read and write
25BD37FD000
heap
page read and write
17BBB100000
heap
page read and write
17BBA7EF000
heap
page read and write
24750600000
heap
page read and write
2070F63C000
heap
page read and write
1DA10456000
heap
page read and write
B3A47FE000
stack
page read and write
400000
unkown
page readonly
26F95500000
heap
page read and write
2070F700000
heap
page read and write
2070F658000
heap
page read and write
1CE8165F000
heap
page read and write
2DE0000
heap
page read and write
2070F660000
heap
page read and write
30000
heap
page read and write
1DA10B10000
remote allocation
page read and write
250C343D000
heap
page read and write
1DA10D63000
heap
page read and write
7CE000
heap
page read and write
1DA10DB1000
heap
page read and write
451000
unkown
page readonly
17BBA7EB000
heap
page read and write
250C8AC0000
trusted library allocation
page read and write
2648000
heap
page read and write
1DA10D81000
heap
page read and write
250C8CA6000
heap
page read and write
2DE0000
heap
page read and write
1DA10D99000
heap
page read and write
80D000
heap
page read and write
E8BC17E000
stack
page read and write
D60AEF7000
stack
page read and write
236CAE80000
heap
page read and write
265769A0000
remote allocation
page read and write
C390B78000
stack
page read and write
250C47F0000
trusted library allocation
page read and write
86DF6FE000
stack
page read and write
1DA10D82000
heap
page read and write
2A0E000
stack
page read and write
48A8000
trusted library allocation
page read and write
250C8C4D000
heap
page read and write
1A0D4570000
heap
page read and write
25BD37C7000
heap
page read and write
1DA10D9B000
heap
page read and write
26F95402000
heap
page read and write
1BBBF876000
heap
page read and write
4A4DCFE000
stack
page read and write
250C8AB0000
trusted library allocation
page read and write
17BBA9D0000
remote allocation
page read and write
2B40000
direct allocation
page execute and read and write
236CB1C0000
trusted library allocation
page read and write
1DA104AB000
heap
page read and write
26576810000
heap
page read and write
24750713000
heap
page read and write
2240000
heap
page read and write
250C3456000
heap
page read and write
17BBA81C000
heap
page read and write
1DA10D7D000
heap
page read and write
247506CF000
heap
page read and write
577000
heap
page read and write
250C3C00000
heap
page read and write
25BD37FE000
heap
page read and write
250C3454000
heap
page read and write
1BBBF800000
heap
page read and write
1DA10D8F000
heap
page read and write
D60ADFB000
stack
page read and write
220E000
stack
page read and write
2B40000
direct allocation
page execute and read and write
250C8A50000
trusted library allocation
page read and write
1DA10DAA000
heap
page read and write
2B40000
direct allocation
page execute and read and write
1DA10D63000
heap
page read and write
26576970000
trusted library allocation
page read and write
26F9548A000
heap
page read and write
250C8980000
trusted library allocation
page read and write
1DA11202000
heap
page read and write
1BBBFE02000
trusted library allocation
page read and write
1DA10D7B000
heap
page read and write
17BBA7E3000
heap
page read and write
B3A3A7B000
stack
page read and write
1DA102F0000
heap
page read and write
5D1000
heap
page read and write
1DA10D9E000
heap
page read and write
1CE8164E000
heap
page read and write
1CFEDD13000
heap
page read and write
E8BBC8C000
stack
page read and write
831000
heap
page read and write
250C8870000
trusted library allocation
page read and write
170B27E000
stack
page read and write
236CB120000
trusted library allocation
page read and write
24750F38000
heap
page read and write
2B40000
direct allocation
page execute and read and write
2070F65C000
heap
page read and write
24750FF6000
heap
page read and write
2D9E000
stack
page read and write
1C0000
remote allocation
page read and write
1A0D41C0000
heap
page read and write
1DA1044A000
heap
page read and write
1DA1044E000
heap
page read and write
250C8980000
trusted library allocation
page read and write
1DA1047D000
heap
page read and write
1DA10280000
heap
page read and write
E1E84FC000
stack
page read and write
1DA104F5000
heap
page read and write
1DA10D84000
heap
page read and write
17BBA780000
heap
page read and write
48F000
unkown
page readonly
1DA10D82000
heap
page read and write
466000
unkown
page readonly
86DF87E000
stack
page read and write
48F000
unkown
page readonly
401000
unkown
page execute read
9D9B1FE000
stack
page read and write
250C8CFB000
heap
page read and write
250C4280000
trusted library allocation
page read and write
1CFEDC75000
heap
page read and write
5D1000
heap
page read and write
4896000
trusted library allocation
page read and write
2470000
heap
page read and write
1CFED9E0000
heap
page read and write
6DD3477000
stack
page read and write
451000
unkown
page readonly
2B40000
direct allocation
page execute and read and write
401000
unkown
page execute read
236CAE87000
heap
page read and write
1DA10D81000
heap
page read and write
1DA10D25000
heap
page read and write
26F95482000
heap
page read and write
A5F000
stack
page read and write
236CAED5000
heap
page read and write
1DA103F0000
trusted library allocation
page read and write
17BBA7E6000
heap
page read and write
17BBA7C4000
heap
page read and write
1CE8165E000
heap
page read and write
460000
unkown
page write copy
278F000
stack
page read and write
2EE0000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
247506BB000
heap
page read and write
4881000
trusted library allocation
page read and write
250C34AB000
heap
page read and write
2B40000
direct allocation
page execute and read and write
C5B767C000
stack
page read and write
250C8D00000
heap
page read and write
2070F540000
heap
page read and write
1DA10400000
heap
page read and write
85D417E000
stack
page read and write
2B40000
direct allocation
page execute and read and write
2B40000
direct allocation
page execute and read and write
1DA10429000
heap
page read and write
1DA10D25000
heap
page read and write
4690000
heap
page read and write
1DA10D78000
heap
page read and write
17BBA7E3000
heap
page read and write
250C32B0000
heap
page read and write
2070F688000
heap
page read and write
2070F669000
heap
page read and write
1CE81646000
heap
page read and write
710000
heap
page read and write
247506FF000
heap
page read and write
577000
heap
page read and write
5C8000
heap
page read and write
1BBBF7F0000
trusted library allocation
page read and write
17BBA80D000
heap
page read and write
2D9E000
stack
page read and write
1DA10D7D000
heap
page read and write
24751602000
heap
page read and write
1DA10DAC000
heap
page read and write
250C3D58000
heap
page read and write
250C8CAF000
heap
page read and write
1DA10D7D000
heap
page read and write
2070F663000
heap
page read and write
806000
heap
page read and write
E41897E000
stack
page read and write
17BBA852000
heap
page read and write
700000
heap
page read and write
D60B0FF000
stack
page read and write
25BD37E9000
heap
page read and write
26576A5C000
heap
page read and write
1DA10B10000
remote allocation
page read and write
2475067F000
heap
page read and write
1DA10D64000
heap
page read and write
2EE0000
trusted library allocation
page read and write
2475062F000
heap
page read and write
247506FB000
heap
page read and write
1DA10D76000
heap
page read and write
1DA10DBB000
heap
page read and write
1CE81631000
heap
page read and write
247507E1000
heap
page read and write
1DA10D9B000
heap
page read and write
1DA10D9E000
heap
page read and write
1A0D42B0000
heap
page read and write
488D000
trusted library allocation
page read and write
86DF0FB000
stack
page read and write
1DA10413000
heap
page read and write
1CE8167B000
heap
page read and write
550000
trusted library allocation
page read and write
1DA10D76000
heap
page read and write
4A4DBF7000
stack
page read and write
1DA10D81000
heap
page read and write
247507FD000
heap
page read and write
1DA10D99000
heap
page read and write
1DA11200000
heap
page read and write
25BD37F7000
heap
page read and write
7D6000
heap
page read and write
1DA10448000
heap
page read and write
1DA10D9B000
heap
page read and write
1CE81E02000
trusted library allocation
page read and write
1A0D42B8000
heap
page read and write
2B40000
direct allocation
page execute and read and write
9D9B77E000
stack
page read and write
95E000
stack
page read and write
250C8CF3000
heap
page read and write
26F95466000
heap
page read and write
250C34A7000
heap
page read and write
1BBBF82C000
heap
page read and write
1DA11221000
heap
page read and write
6F0000
heap
page read and write
170B37E000
stack
page read and write
26F95390000
heap
page read and write
26F9544B000
heap
page read and write
9EF000
stack
page read and write
170B5FF000
stack
page read and write
400000
unkown
page readonly
1DA10447000
heap
page read and write
236CB1A0000
trusted library allocation
page read and write
A48D97F000
stack
page read and write
236CAEDC000
heap
page read and write
236CBD40000
trusted library allocation
page read and write
83A000
heap
page read and write
25BD37E1000
heap
page read and write
250C8988000
trusted library allocation
page read and write
710000
heap
page read and write
1CE81644000
heap
page read and write
48A5000
trusted library allocation
page read and write
1DA11202000
heap
page read and write
1DA11203000
heap
page read and write
2B40000
direct allocation
page execute and read and write
29CF000
stack
page read and write
250C3BF0000
trusted library allocation
page read and write
26F95513000
heap
page read and write
288F000
stack
page read and write
2B40000
direct allocation
page execute and read and write
E418A7D000
stack
page read and write
2D9E000
stack
page read and write
1DA10D7B000
heap
page read and write
2B40000
direct allocation
page execute and read and write
247506CB000
heap
page read and write
1DA10DDC000
heap
page read and write
17BBA7C4000
heap
page read and write
250C34FD000
heap
page read and write
1DA10D81000
heap
page read and write
17BBA852000
heap
page read and write
1DA104B5000
heap
page read and write
768000
heap
page read and write
250C8A50000
trusted library allocation
page read and write
2070F550000
heap
page read and write
2DE1000
heap
page read and write
2B40000
direct allocation
page execute and read and write
1CE81702000
heap
page read and write
1CE81657000
heap
page read and write
1CE81641000
heap
page read and write
C390AFE000
stack
page read and write
17BBB101000
heap
page read and write
1DA10D9B000
heap
page read and write
250C3D18000
heap
page read and write
6DD34FF000
unkown
page read and write
4860000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
24750D90000
trusted library allocation
page read and write
1DA10D82000
heap
page read and write
25BD37C7000
heap
page read and write
24750F00000
heap
page read and write
17BBA854000
heap
page read and write
570000
heap
page read and write
A48D87E000
stack
page read and write
17BBA7EF000
heap
page read and write
834000
heap
page read and write
2B20000
trusted library allocation
page read and write
250C3429000
heap
page read and write
1DA10D76000
heap
page read and write
1DA1046D000
heap
page read and write
6AE000
stack
page read and write
6C0000
heap
page read and write
24750F63000
heap
page read and write
6EE000
stack
page read and write
86DF57C000
stack
page read and write
2C4E000
stack
page read and write
9EF000
stack
page read and write
2B40000
direct allocation
page execute and read and write
400000
unkown
page readonly
17BBA7AD000
heap
page read and write
C5B787B000
stack
page read and write
28CE000
stack
page read and write
250C3C15000
heap
page read and write
2B40000
direct allocation
page execute and read and write
9D9B17E000
stack
page read and write
1DA10D99000
heap
page read and write
7CB000
heap
page read and write
C5B7C7B000
stack
page read and write
26576A13000
heap
page read and write
2B40000
direct allocation
page execute and read and write
85D41FF000
stack
page read and write
24750590000
heap
page read and write
1DA10DB8000
heap
page read and write
1DA10C02000
heap
page read and write
2070F5B0000
heap
page read and write
5C8000
heap
page read and write
17BBA9D0000
remote allocation
page read and write
23787AE0000
heap
page read and write
2B40000
direct allocation
page execute and read and write
2B40000
direct allocation
page execute and read and write
1DA10D97000
heap
page read and write
9D000
stack
page read and write
220E000
stack
page read and write
4927000
trusted library allocation
page read and write
2EF0000
remote allocation
page read and write
466000
unkown
page readonly
1DA1044C000
heap
page read and write
250C8C63000
heap
page read and write
236CB1B0000
heap
page read and write
1CE8166A000
heap
page read and write
2070F67F000
heap
page read and write
1DA10B10000
remote allocation
page read and write
1BBBF620000
heap
page read and write
1DA10D9B000
heap
page read and write
1DA10D98000
heap
page read and write
250C3D02000
heap
page read and write
236CAECE000
heap
page read and write
1DA10D00000
heap
page read and write
250C8AE0000
remote allocation
page read and write
6DD2BEE000
stack
page read and write
2B0E000
stack
page read and write
1DA10452000
heap
page read and write
2B40000
direct allocation
page execute and read and write
82E000
heap
page read and write
25BD37E1000
heap
page read and write
1CFEDA40000
heap
page read and write
8EF000
stack
page read and write
2B40000
direct allocation
page execute and read and write
17BBA7C4000
heap
page read and write
1DA11202000
heap
page read and write
250C8CB6000
heap
page read and write
1CE81667000
heap
page read and write
1DA10D1D000
heap
page read and write
2B0F000
stack
page read and write
250C8C20000
heap
page read and write
17BBA87C000
heap
page read and write
250C3A80000
trusted library allocation
page read and write
451000
unkown
page readonly
250C34AB000
heap
page read and write
2B40000
direct allocation
page execute and read and write
82B000
heap
page read and write
250C8D02000
heap
page read and write
1DA11262000
heap
page read and write
400000
unkown
page readonly
1DA10513000
heap
page read and write
26F95449000
heap
page read and write
2070F67F000
heap
page read and write
250C8D04000
heap
page read and write
1DA104E6000
heap
page read and write
1DA10D78000
heap
page read and write
2070F713000
heap
page read and write
2070F666000
heap
page read and write
7AF000
heap
page read and write
1DA11203000
heap
page read and write
1C0000
remote allocation
page read and write
2B40000
direct allocation
page execute and read and write
D60AC7C000
stack
page read and write
250C8D02000
heap
page read and write
7E7000
heap
page read and write
29CF000
stack
page read and write
26F9542A000
heap
page read and write
2C4E000
stack
page read and write
1CE81580000
trusted library allocation
page read and write
1DA10D63000
heap
page read and write
460000
unkown
page write copy
2420000
trusted library allocation
page read and write
7BD000
heap
page read and write
26576800000
heap
page read and write
D60ACFF000
stack
page read and write
577000
heap
page read and write
1CFEDD02000
heap
page read and write
1DA10470000
heap
page read and write
26F9544F000
heap
page read and write
1DA1046D000
heap
page read and write
460000
unkown
page write copy
17BBA7C4000
heap
page read and write
E41887E000
stack
page read and write
250C3474000
heap
page read and write
28CE000
stack
page read and write
1DA10D25000
heap
page read and write
1CE81658000
heap
page read and write
250C8CDD000
heap
page read and write
26F9544A000
heap
page read and write
247506E1000
heap
page read and write
25BD37B0000
heap
page read and write
250C898E000
trusted library allocation
page read and write
288F000
stack
page read and write
A48DA7E000
stack
page read and write
2B40000
direct allocation
page execute and read and write
2475063E000
heap
page read and write
1BBBF900000
heap
page read and write
250C8BC0000
trusted library allocation
page read and write
1DA10DA7000
heap
page read and write
489000
unkown
page read and write
1DA11202000
heap
page read and write
C5B7B7E000
stack
page read and write
1BBBF5B0000
heap
page read and write
2C4A000
stack
page read and write
250C3320000
heap
page read and write
79A000
heap
page read and write
1DA10D68000
heap
page read and write
25BD3760000
heap
page read and write
6AE000
stack
page read and write
2A0E000
stack
page read and write
2070FE02000
trusted library allocation
page read and write
24750650000
heap
page read and write
4960000
trusted library allocation
page read and write
815000
heap
page read and write
1CFED9D0000
heap
page read and write
2475160A000
heap
page read and write
1BBBF913000
heap
page read and write
2B0F000
stack
page read and write
25BD37D5000
heap
page read and write
17BBA876000
heap
page read and write
17BBA9D0000
remote allocation
page read and write
1DA104C1000
heap
page read and write
2B40000
direct allocation
page execute and read and write
24750649000
heap
page read and write
1CE81647000
heap
page read and write
2475065D000
heap
page read and write
1DA10D9F000
heap
page read and write
250C3D18000
heap
page read and write
488A000
trusted library allocation
page read and write
2B4D000
stack
page read and write
803000
heap
page read and write
1DA10D7C000
heap
page read and write
21CE000
stack
page read and write
250C8AD0000
trusted library allocation
page read and write
48AB000
trusted library allocation
page read and write
22C0000
trusted library allocation
page read and write
17BBA854000
heap
page read and write
29CF000
stack
page read and write
2480000
trusted library allocation
page read and write
1DA10484000
heap
page read and write
2070F5E0000
trusted library allocation
page read and write
24751602000
heap
page read and write
23787910000
heap
page read and write
26576870000
heap
page read and write
24750637000
heap
page read and write
460000
unkown
page write copy
A48D47E000
stack
page read and write
26F953F0000
heap
page read and write
2B40000
direct allocation
page execute and read and write
7C1000
heap
page read and write
25BD37B9000
heap
page read and write
400000
unkown
page readonly
26F95451000
heap
page read and write
4A4DDFF000
stack
page read and write
B3A407B000
stack
page read and write
288F000
stack
page read and write
86DF5FE000
stack
page read and write
2C9E000
stack
page read and write
24750683000
heap
page read and write
26F95488000
heap
page read and write
24751643000
heap
page read and write
250C4261000
trusted library allocation
page read and write
6EE000
stack
page read and write
A48DB7F000
stack
page read and write
803000
heap
page read and write
236CAEDC000
heap
page read and write
7FB000
heap
page read and write
220E000
stack
page read and write
620000
trusted library allocation
page read and write
250C3D59000
heap
page read and write
26576B02000
heap
page read and write
B3A3F7E000
stack
page read and write
17BBA7EF000
heap
page read and write
550000
trusted library allocation
page read and write
1DA11202000
heap
page read and write
1CE8167C000
heap
page read and write
401000
unkown
page execute read
24751702000
heap
page read and write
C5B7E7B000
stack
page read and write
24750FDD000
heap
page read and write
2B40000
direct allocation
page execute and read and write
6DD2B6E000
stack
page read and write
570000
heap
page read and write
2B40000
direct allocation
page execute and read and write
1CE81629000
heap
page read and write
6F0000
heap
page read and write
250C89A4000
trusted library allocation
page read and write
1DA10D7B000
heap
page read and write
1DA10290000
heap
page read and write
1DA10D84000
heap
page read and write
1CE8167F000
heap
page read and write
There are 978 hidden memdumps, click here to show them.