IOC Report
recibo.exe

loading gif

Files

File Path
Type
Category
Malicious
recibo.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Adventure_19.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\FLADBARMEDES.tub
data
dropped
C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Rekorddage.Res7
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\emoji-body-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\iso_639-3.xml
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\lgpllibs.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\microphone-disabled-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nso5699.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\printer-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\recibo.exe
"C:\Users\user\Desktop\recibo.exe"
malicious

URLs

Name
IP
Malicious
http://www.sil.org/iso639-3/
unknown
http://www.vmware.com/0/
unknown
http://www.vmware.com/0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
https://mozilla.org0
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\centrumpartiers\sindstilstand
Tiebold
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SENGEKANTERNE\stubben
Roundabout87
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\dado
Foresprgselens98
HKEY_CURRENT_USER\Software\metaled\Filformatets
Expand String Value

Memdumps

Base Address
Regiontype
Protect
Malicious
2A50000
direct allocation
page execute and read and write
malicious
1CC9F615000
heap
page read and write
79CA15C000
stack
page read and write
18ECA02F000
heap
page read and write
1B26C002000
trusted library allocation
page read and write
1CCA44A4000
heap
page read and write
21A11902000
heap
page read and write
1A5B4B13000
heap
page read and write
1CCA4660000
trusted library allocation
page read and write
23DBB7D000
stack
page read and write
1B26B864000
heap
page read and write
1D8F7A00000
heap
page read and write
21A11845000
heap
page read and write
1CC9F702000
heap
page read and write
18EC9F00000
heap
page read and write
B3D7BCD000
stack
page read and write
18D17790000
heap
page read and write
18D177A2000
heap
page read and write
1CCA444A000
heap
page read and write
21A11869000
heap
page read and write
1CC9EBE0000
trusted library allocation
page read and write
2EF9CA69000
heap
page read and write
149E80A0000
remote allocation
page read and write
1D8F7B08000
heap
page read and write
1CCA4502000
heap
page read and write
FC3A7FB000
stack
page read and write
2460000
heap
page read and write
18D177B2000
heap
page read and write
18D17761000
heap
page read and write
62997F000
stack
page read and write
149E7829000
heap
page read and write
18D17791000
heap
page read and write
18D16EF6000
heap
page read and write
18D17761000
heap
page read and write
18D1777F000
heap
page read and write
17A74F70000
trusted library allocation
page read and write
18D1778D000
heap
page read and write
18D17793000
heap
page read and write
18EC9FB0000
remote allocation
page read and write
18D17789000
heap
page read and write
442000
unkown
page read and write
1A5B49B0000
trusted library allocation
page read and write
17A75050000
heap
page read and write
1CC9FC60000
trusted library allocation
page read and write
23FE000
stack
page read and write
2EF9CB80000
trusted library allocation
page read and write
1B26B875000
heap
page read and write
23DB9FD000
stack
page read and write
FC3AD7F000
stack
page read and write
1F5FCF00000
heap
page read and write
18D16EC8000
heap
page read and write
2B37D26D000
heap
page read and write
18D177AB000
heap
page read and write
2EF9CA70000
trusted library allocation
page read and write
18D17768000
heap
page read and write
5C8687F000
stack
page read and write
1F5FCE89000
heap
page read and write
1D8F7A13000
heap
page read and write
18D1779C000
heap
page read and write
21D55450000
heap
page read and write
2EF9CA20000
trusted library allocation
page read and write
2B37DB00000
heap
page read and write
1F8880B4000
heap
page read and write
18D17762000
heap
page read and write
27CF8202000
trusted library allocation
page read and write
1CC9ED07000
heap
page read and write
2EF9CA65000
heap
page read and write
27CF7860000
heap
page read and write
FE32979000
stack
page read and write
21A11860000
heap
page read and write
1B26B610000
heap
page read and write
18D1777B000
heap
page read and write
18ECA05F000
heap
page read and write
1CCA4461000
heap
page read and write
18D17C03000
heap
page read and write
18D16E3C000
heap
page read and write
17A75071000
heap
page read and write
18D177C0000
heap
page read and write
21A11829000
heap
page read and write
17A75102000
heap
page read and write
62957F000
stack
page read and write
1CCA441E000
heap
page read and write
1CC9ED25000
heap
page read and write
408000
unkown
page readonly
18D17783000
heap
page read and write
1CCA435E000
trusted library allocation
page read and write
1D8F7A4C000
heap
page read and write
149E7837000
heap
page read and write
69605F7000
stack
page read and write
18D16F13000
heap
page read and write
CD72FB000
stack
page read and write
18D16E29000
heap
page read and write
2EF9CAAF000
heap
page read and write
B3D7B4E000
stack
page read and write
1A5B4A64000
heap
page read and write
1B26B865000
heap
page read and write
1CCA4370000
trusted library allocation
page read and write
18D17C02000
heap
page read and write
18D16E5A000
heap
page read and write
18D1777F000
heap
page read and write
768000
heap
page read and write
27CF7A79000
heap
page read and write
21D55489000
heap
page read and write
1F887F10000
heap
page read and write
FC3AF7E000
stack
page read and write
18D1776E000
heap
page read and write
17A7504B000
heap
page read and write
18D1777F000
heap
page read and write
21D55330000
heap
page read and write
30000
heap
page read and write
2EF9CA10000
trusted library allocation
page read and write
2230000
heap
page read and write
CD787B000
stack
page read and write
21A1186F000
heap
page read and write
B3D7F7F000
stack
page read and write
1F8880D5000
heap
page read and write
18D16E4C000
heap
page read and write
21A1185B000
heap
page read and write
DAD05FE000
stack
page read and write
1CCA4371000
trusted library allocation
page read and write
21A11858000
heap
page read and write
27CF7A00000
heap
page read and write
1CCA44F3000
heap
page read and write
21A11830000
heap
page read and write
1CCA47A0000
trusted library allocation
page read and write
B3D8177000
stack
page read and write
21D55413000
heap
page read and write
1F8880A1000
heap
page read and write
88818FE000
stack
page read and write
18D17789000
heap
page read and write
21D5544C000
heap
page read and write
18D177AC000
heap
page read and write
1B26B600000
heap
page read and write
149E7834000
heap
page read and write
18D17713000
heap
page read and write
18D16E51000
heap
page read and write
21A1186B000
heap
page read and write
79CA1DE000
stack
page read and write
17A74E70000
heap
page read and write
1B26B670000
heap
page read and write
1F5FCD60000
trusted library allocation
page read and write
18D17789000
heap
page read and write
40A000
unkown
page read and write
69608FF000
stack
page read and write
18D16EAC000
heap
page read and write
18D17C03000
heap
page read and write
FC3A9FC000
stack
page read and write
18D177B5000
heap
page read and write
17A75013000
heap
page read and write
27CF7A68000
heap
page read and write
18D17772000
heap
page read and write
27CF7A64000
heap
page read and write
29A0000
trusted library allocation
page read and write
5C6000
heap
page read and write
401000
unkown
page execute read
18D17767000
heap
page read and write
1D8F78C0000
heap
page read and write
149E7813000
heap
page read and write
FE32B79000
stack
page read and write
1CC9F759000
heap
page read and write
23DB7FD000
stack
page read and write
149E7840000
heap
page read and write
18D1777B000
heap
page read and write
18D175F0000
remote allocation
page read and write
7B5000
heap
page read and write
69604FB000
stack
page read and write
18ECA03E000
heap
page read and write
23DBA7F000
stack
page read and write
228E000
stack
page read and write
21A11866000
heap
page read and write
1F5FCF02000
heap
page read and write
18D1778C000
heap
page read and write
2EF9CACC000
heap
page read and write
18D16E8B000
heap
page read and write
2980000
trusted library allocation
page read and write
17A7503C000
heap
page read and write
1B26B813000
heap
page read and write
1A5B4B08000
heap
page read and write
1F5FCF18000
heap
page read and write
732A0000
unkown
page readonly
1CC9EC00000
heap
page read and write
2990000
trusted library allocation
page read and write
18D1778D000
heap
page read and write
2EF9CA88000
heap
page read and write
5C8654A000
stack
page read and write
18D17761000
heap
page read and write
88811AB000
stack
page read and write
1CC9F600000
heap
page read and write
17C647F000
stack
page read and write
1CCA4640000
trusted library allocation
page read and write
18D17786000
heap
page read and write
1D8F7A56000
heap
page read and write
239F000
stack
page read and write
18D17761000
heap
page read and write
1D8F7A29000
heap
page read and write
695FFEE000
stack
page read and write
18D16EC2000
heap
page read and write
88814FF000
stack
page read and write
18EC9F90000
trusted library allocation
page read and write
21A1183E000
heap
page read and write
18D1777F000
heap
page read and write
1F5FCE27000
heap
page read and write
1B26B800000
heap
page read and write
2EF9C830000
heap
page read and write
18D17786000
heap
page read and write
6B169FA000
stack
page read and write
18D16F08000
heap
page read and write
2B37D313000
heap
page read and write
7AD000
heap
page read and write
1A5B4A3C000
heap
page read and write
21D55454000
heap
page read and write
149E8070000
trusted library allocation
page read and write
1CC9EBB0000
heap
page read and write
21A11620000
heap
page read and write
1F5FCDB0000
trusted library allocation
page read and write
21D55E02000
trusted library allocation
page read and write
99000
stack
page read and write
28AF000
stack
page read and write
1CCA4620000
trusted library allocation
page read and write
1F5FCDF0000
remote allocation
page read and write
B3D7ACB000
stack
page read and write
1CCA44FC000
heap
page read and write
18D1776D000
heap
page read and write
18D1776B000
heap
page read and write
18D16EAA000
heap
page read and write
21A11880000
heap
page read and write
2EF9CA00000
trusted library allocation
page read and write
88817FA000
stack
page read and write
18ECAA02000
trusted library allocation
page read and write
2B37D242000
heap
page read and write
19A000
stack
page read and write
1B26B85B000
heap
page read and write
18D17C02000
heap
page read and write
1B26B802000
heap
page read and write
1CCA4620000
trusted library allocation
page read and write
1CCA443D000
heap
page read and write
18ECA061000
heap
page read and write
797000
heap
page read and write
18D175F0000
remote allocation
page read and write
18D17781000
heap
page read and write
79CA87F000
stack
page read and write
1F5FCE58000
heap
page read and write
FE329F9000
stack
page read and write
1B26B829000
heap
page read and write
760000
heap
page read and write
21A1187C000
heap
page read and write
1F5FCE02000
heap
page read and write
1B26B86F000
heap
page read and write
2EF9C840000
trusted library allocation
page read and write
1CCA4620000
trusted library allocation
page read and write
21A11863000
heap
page read and write
CDBD17F000
stack
page read and write
18D1776D000
heap
page read and write
1CCA4507000
heap
page read and write
2F5D000
stack
page read and write
21A11843000
heap
page read and write
1F5FCE57000
heap
page read and write
1F5FCE47000
heap
page read and write
6B16FFC000
stack
page read and write
27CF7A3C000
heap
page read and write
18ECA05A000
heap
page read and write
18ECA000000
heap
page read and write
1CCA4380000
trusted library allocation
page read and write
27CF7B13000
heap
page read and write
18ECA002000
heap
page read and write
2B37CFE0000
heap
page read and write
79CA57B000
stack
page read and write
21A11886000
heap
page read and write
18D17789000
heap
page read and write
21D55340000
heap
page read and write
69603FF000
stack
page read and write
62967F000
stack
page read and write
21A1183B000
heap
page read and write
18D1776D000
heap
page read and write
1D8F7A3C000
heap
page read and write
1CC9ED14000
heap
page read and write
2B37CFD0000
heap
page read and write
18D17C02000
heap
page read and write
FC3A1DC000
stack
page read and write
23DB77E000
stack
page read and write
18D16DE0000
trusted library allocation
page read and write
88816FD000
stack
page read and write
18D17786000
heap
page read and write
1CCA4390000
trusted library allocation
page read and write
D7EB0FB000
stack
page read and write
18D17781000
heap
page read and write
1F8880BE000
heap
page read and write
1CC9ECAA000
heap
page read and write
1CCA44E7000
heap
page read and write
17C6677000
stack
page read and write
18D17794000
heap
page read and write
1CCA4500000
heap
page read and write
431000
unkown
page read and write
1D8F7850000
heap
page read and write
1CC9EB50000
heap
page read and write
1CCA46B0000
remote allocation
page read and write
1F8880D2000
heap
page read and write
DACFF2C000
stack
page read and write
18D175F0000
remote allocation
page read and write
628B5B000
stack
page read and write
18D16E27000
heap
page read and write
27CF7A02000
heap
page read and write
21D553D0000
trusted library allocation
page read and write
18D17761000
heap
page read and write
17C6577000
stack
page read and write
D7EB1FE000
stack
page read and write
21D55513000
heap
page read and write
1F5FCDF0000
remote allocation
page read and write
2EF9CAC5000
heap
page read and write
6B16BFE000
stack
page read and write
18D177AB000
heap
page read and write
CDBD57C000
stack
page read and write
1CCA445B000
heap
page read and write
21A11864000
heap
page read and write
149E7858000
heap
page read and write
18D17787000
heap
page read and write
1F8880B2000
heap
page read and write
7A6000
heap
page read and write
21A11780000
trusted library allocation
page read and write
1CC9ECFD000
heap
page read and write
40A000
unkown
page write copy
18D1777B000
heap
page read and write
21A11842000
heap
page read and write
1B26B913000
heap
page read and write
17A75000000
heap
page read and write
18D1777F000
heap
page read and write
1CC9EC8D000
heap
page read and write
D7EAEFB000
stack
page read and write
18ECA024000
heap
page read and write
1F5FCF13000
heap
page read and write
18D1777B000
heap
page read and write
6B16CFB000
stack
page read and write
CDBD27C000
stack
page read and write
18D17789000
heap
page read and write
21A1185A000
heap
page read and write
6B172FC000
stack
page read and write
21D55500000
heap
page read and write
1CC9EC13000
heap
page read and write
CDBD07F000
stack
page read and write
CD7B7E000
stack
page read and write
18D17794000
heap
page read and write
149E7770000
heap
page read and write
1CCA440C000
heap
page read and write
18D17767000
heap
page read and write
149E80A0000
remote allocation
page read and write
27CF79D0000
trusted library allocation
page read and write
2EF9CACC000
heap
page read and write
18D16E58000
heap
page read and write
1CCA0200000
trusted library allocation
page read and write
18D1777B000
heap
page read and write
27CF7B02000
heap
page read and write
FC3AB7B000
stack
page read and write
732A4000
unkown
page readonly
18D16EE2000
heap
page read and write
18D16EEE000
heap
page read and write
18D16E4D000
heap
page read and write
1A5B5402000
trusted library allocation
page read and write
1D8F79C0000
trusted library allocation
page read and write
21A11861000
heap
page read and write
17A75049000
heap
page read and write
1F5FCE48000
heap
page read and write
7A9000
heap
page read and write
CD737E000
stack
page read and write
1CCA44AD000
heap
page read and write
1CCA442B000
heap
page read and write
1F5FCC00000
heap
page read and write
FC3AE7D000
stack
page read and write
17C69FF000
unkown
page read and write
149E8202000
trusted library allocation
page read and write
1CCA4380000
trusted library allocation
page read and write
18D1776D000
heap
page read and write
CD73FE000
stack
page read and write
FE32AF9000
stack
page read and write
17A75090000
heap
page read and write
469000
unkown
page read and write
18ECA029000
heap
page read and write
149E7902000
heap
page read and write
B3D827F000
stack
page read and write
1F5FCE00000
heap
page read and write
21A1186D000
heap
page read and write
628F7B000
stack
page read and write
1D8F7860000
heap
page read and write
2EF9CA80000
heap
page read and write
1CC9EC26000
heap
page read and write
1F888040000
heap
page read and write
18D17767000
heap
page read and write
1F5FCE13000
heap
page read and write
27CF78D0000
heap
page read and write
1CC9F602000
heap
page read and write
DAD04FE000
stack
page read and write
18D177B5000
heap
page read and write
2EF9CACC000
heap
page read and write
1F8881E0000
heap
page read and write
1CCA4350000
trusted library allocation
page read and write
2290000
heap
page read and write
18D17C02000
heap
page read and write
1CCA4240000
trusted library allocation
page read and write
1CCA4690000
trusted library allocation
page read and write
21D55429000
heap
page read and write
18D1778B000
heap
page read and write
1F8880B6000
heap
page read and write
62907F000
stack
page read and write
18D16E4E000
heap
page read and write
1CC9EC79000
heap
page read and write
18ECA05D000
heap
page read and write
1D8F7A4B000
heap
page read and write
DACFFAE000
stack
page read and write
17A75113000
heap
page read and write
18D17715000
heap
page read and write
18ECA073000
heap
page read and write
149E7800000
heap
page read and write
2464000
heap
page read and write
18D16CE0000
heap
page read and write
1CC9EC94000
heap
page read and write
1CC9F713000
heap
page read and write
1D8F7B00000
heap
page read and write
2B37D040000
heap
page read and write
17A75029000
heap
page read and write
18D177A0000
heap
page read and write
149E77D0000
heap
page read and write
7A0000
heap
page read and write
1CCA4394000
trusted library allocation
page read and write
2B37D213000
heap
page read and write
18D16E4B000
heap
page read and write
2B37D288000
heap
page read and write
7AB000
heap
page read and write
18D17781000
heap
page read and write
18D177DB000
heap
page read and write
18D17765000
heap
page read and write
27CF7B00000
heap
page read and write
18D1777B000
heap
page read and write
1CCA4358000
trusted library allocation
page read and write
FE3254C000
stack
page read and write
18D17786000
heap
page read and write
21D55471000
heap
page read and write
18D16E55000
heap
page read and write
1A5B4920000
heap
page read and write
1A5B4A00000
heap
page read and write
17C63FB000
stack
page read and write
17C6979000
stack
page read and write
1CCA4680000
trusted library allocation
page read and write
6B17179000
stack
page read and write
1F5FCE48000
heap
page read and write
1F8880BE000
heap
page read and write
18D17789000
heap
page read and write
CD7977000
stack
page read and write
1CC9EC75000
heap
page read and write
18D16EB4000
heap
page read and write
1D8F7A7B000
heap
page read and write
18D17C02000
heap
page read and write
2B37D2E1000
heap
page read and write
17A7508D000
heap
page read and write
1F5FE802000
trusted library allocation
page read and write
6B16AFA000
stack
page read and write
1B26B823000
heap
page read and write
18D1775F000
heap
page read and write
1B26B83D000
heap
page read and write
42C000
unkown
page read and write
1A5B4B00000
heap
page read and write
1B26B902000
heap
page read and write
1A5B4A55000
heap
page read and write
18D1778B000
heap
page read and write
2B37D302000
heap
page read and write
17A75802000
trusted library allocation
page read and write
21A11859000
heap
page read and write
1CCA4400000
heap
page read and write
18D17767000
heap
page read and write
1D8F7B13000
heap
page read and write
17A75100000
heap
page read and write
305E000
stack
page read and write
1F5FCE25000
heap
page read and write
18D17789000
heap
page read and write
5C0000
heap
page read and write
FE32A7E000
stack
page read and write
18D177B0000
heap
page read and write
1F8880A6000
heap
page read and write
1F8880BE000
heap
page read and write
18EC9FB0000
remote allocation
page read and write
17C5F9B000
stack
page read and write
1F5FCC60000
heap
page read and write
21D55457000
heap
page read and write
18D1778D000
heap
page read and write
1CC9F759000
heap
page read and write
2EF9D8E0000
trusted library allocation
page read and write
18D16EDB000
heap
page read and write
18D1777F000
heap
page read and write
1D8F8202000
trusted library allocation
page read and write
D7EAFFB000
stack
page read and write
18D1778C000
heap
page read and write
18EC9F60000
heap
page read and write
2EF9CA60000
heap
page read and write
FC3AC7D000
stack
page read and write
23DB2FC000
stack
page read and write
17A75053000
heap
page read and write
1F888090000
heap
page read and write
CD777F000
stack
page read and write
2EF9D6C0000
trusted library allocation
page read and write
18D1777F000
heap
page read and write
18ECA070000
heap
page read and write
18D16E00000
heap
page read and write
21A11862000
heap
page read and write
69606FF000
stack
page read and write
18D17780000
heap
page read and write
2EF9C970000
heap
page read and write
18D17C19000
heap
page read and write
1F888060000
heap
page read and write
1F5FCE3D000
heap
page read and write
2EF9CACE000
heap
page read and write
2EF9D8D0000
heap
page readonly
88815FE000
stack
page read and write
FC3A97E000
stack
page read and write
1CC9F700000
heap
page read and write
1CC9F718000
heap
page read and write
5C865CF000
stack
page read and write
CDBD37C000
stack
page read and write
88819FF000
stack
page read and write
18D17767000
heap
page read and write
6B1667C000
stack
page read and write
46B000
unkown
page readonly
1A5B4A13000
heap
page read and write
1F5FCD80000
trusted library allocation
page read and write
18D17C02000
heap
page read and write
1A5B4A78000
heap
page read and write
21A11865000
heap
page read and write
6B174FF000
stack
page read and write
18D1774D000
heap
page read and write
17A75056000
heap
page read and write
18D17761000
heap
page read and write
400000
unkown
page readonly
1CCA44E9000
heap
page read and write
2B37D22A000
heap
page read and write
1CCA44E7000
heap
page read and write
793000
heap
page read and write
1CC9EB40000
heap
page read and write
DAD027E000
stack
page read and write
18D17763000
heap
page read and write
18D17C02000
heap
page read and write
18D16F16000
heap
page read and write
1A5B4A68000
heap
page read and write
5C86A78000
stack
page read and write
18D17C00000
heap
page read and write
1CCA47C0000
trusted library allocation
page read and write
21D55502000
heap
page read and write
1F5FCE75000
heap
page read and write
B3D847F000
stack
page read and write
79CA97F000
stack
page read and write
DAD03FE000
stack
page read and write
1A5B4A2A000
heap
page read and write
18D177B2000
heap
page read and write
2EF9D6C6000
trusted library allocation
page read and write
1A5B4910000
heap
page read and write
18D17791000
heap
page read and write
696027D000
stack
page read and write
21A11813000
heap
page read and write
17A75060000
heap
page read and write
27CF7A23000
heap
page read and write
69607FD000
stack
page read and write
18D16C70000
heap
page read and write
21A11846000
heap
page read and write
5C868F9000
stack
page read and write
79CA67B000
stack
page read and write
2B37DA02000
heap
page read and write
1F8880D0000
heap
page read and write
21A11848000
heap
page read and write
1CCA44F1000
heap
page read and write
B3D7EFC000
stack
page read and write
62917C000
stack
page read and write
18D1779B000
heap
page read and write
1F5FE7A0000
trusted library allocation
page read and write
17C677F000
stack
page read and write
17A75108000
heap
page read and write
1F8880A6000
heap
page read and write
2B37D2CF000
heap
page read and write
1D8F7A70000
heap
page read and write
1F5FCE61000
heap
page read and write
2B37DB32000
heap
page read and write
27CF7A57000
heap
page read and write
408000
unkown
page readonly
5D0000
heap
page read and write
1CCA4230000
trusted library allocation
page read and write
18D177A4000
heap
page read and write
1CCA4374000
trusted library allocation
page read and write
1B26B886000
heap
page read and write
17C687B000
stack
page read and write
17A75075000
heap
page read and write
1F5FCDF0000
remote allocation
page read and write
18D1778A000
heap
page read and write
18D16C80000
heap
page read and write
2EF9D8F0000
trusted library allocation
page read and write
1CCA44B0000
trusted library allocation
page read and write
1CC9EC8F000
heap
page read and write
21A11832000
heap
page read and write
1CCA44E1000
heap
page read and write
18D16E71000
heap
page read and write
21A1185D000
heap
page read and write
1CCA4670000
trusted library allocation
page read and write
21A1187D000
heap
page read and write
18D17711000
heap
page read and write
401000
unkown
page execute read
18D1779A000
heap
page read and write
18D1777F000
heap
page read and write
17A7504E000
heap
page read and write
18D1777B000
heap
page read and write
7BA000
heap
page read and write
1D8F7A4D000
heap
page read and write
8881AFA000
stack
page read and write
1F8880AF000
heap
page read and write
18D16E50000
heap
page read and write
1CC9F704000
heap
page read and write
18D177AD000
heap
page read and write
18D16E84000
heap
page read and write
18D1777F000
heap
page read and write
17A75060000
heap
page read and write
2EF9D940000
trusted library allocation
page read and write
62937D000
stack
page read and write
695FF6B000
stack
page read and write
6B16877000
stack
page read and write
1F8880B0000
heap
page read and write
1F8880D4000
heap
page read and write
21D5548C000
heap
page read and write
1CC9FD80000
trusted library allocation
page read and write
17C62FE000
stack
page read and write
1CC9EC29000
heap
page read and write
18D17786000
heap
page read and write
21D5544E000
heap
page read and write
17A74E00000
heap
page read and write
18ECA013000
heap
page read and write
18D17781000
heap
page read and write
21A11610000
heap
page read and write
1D8F7A6E000
heap
page read and write
1A5B4B02000
heap
page read and write
18D17791000
heap
page read and write
27CF7A13000
heap
page read and write
18D17781000
heap
page read and write
18D16E13000
heap
page read and write
CD7A7F000
stack
page read and write
1CCA46B0000
remote allocation
page read and write
149E7760000
heap
page read and write
27CF7A28000
heap
page read and write
5D5000
heap
page read and write
1CC9EC3D000
heap
page read and write
21D553A0000
heap
page read and write
18EC9EF0000
heap
page read and write
732A6000
unkown
page readonly
18D16F02000
heap
page read and write
400000
unkown
page readonly
D7EA9AC000
stack
page read and write
18D17761000
heap
page read and write
5C8697E000
stack
page read and write
21D55508000
heap
page read and write
149E80A0000
remote allocation
page read and write
2EF9C990000
heap
page read and write
CDBCF7E000
stack
page read and write
21D5543C000
heap
page read and write
1CCA4350000
trusted library allocation
page read and write
18D17781000
heap
page read and write
21D55400000
heap
page read and write
27CF7870000
heap
page read and write
18D17790000
heap
page read and write
5B0000
trusted library allocation
page read and write
1D8F7A6E000
heap
page read and write
79CA777000
stack
page read and write
1F5FCE2A000
heap
page read and write
1A5B4A83000
heap
page read and write
1CCA46B0000
remote allocation
page read and write
18D1777F000
heap
page read and write
1CC9ED02000
heap
page read and write
1CC9EC56000
heap
page read and write
21A11847000
heap
page read and write
1CC9F5E0000
trusted library allocation
page read and write
21D5547E000
heap
page read and write
DAD06FE000
stack
page read and write
21A11841000
heap
page read and write
18D1779A000
heap
page read and write
FC3A87E000
stack
page read and write
1F5FCE58000
heap
page read and write
888147E000
stack
page read and write
18D17793000
heap
page read and write
21D5544D000
heap
page read and write
23DB67E000
stack
page read and write
18D17790000
heap
page read and write
18D1779C000
heap
page read and write
1F8881E5000
heap
page read and write
18D17C20000
heap
page read and write
21A11680000
heap
page read and write
1D8F7A4F000
heap
page read and write
62977F000
stack
page read and write
1CC9ECAD000
heap
page read and write
1CC9ED02000
heap
page read and write
B3D837F000
stack
page read and write
1D8F7A90000
heap
page read and write
18EC9FB0000
remote allocation
page read and write
21A1182E000
heap
page read and write
B3D807B000
stack
page read and write
CDBC99B000
stack
page read and write
18D17789000
heap
page read and write
1CC9F718000
heap
page read and write
1CC9EC6F000
heap
page read and write
62987F000
stack
page read and write
1CC9ECFD000
heap
page read and write
2B37D200000
heap
page read and write
46B000
unkown
page readonly
1D8F7A86000
heap
page read and write
1CCA4504000
heap
page read and write
18D17602000
heap
page read and write
1CC9F5E3000
trusted library allocation
page read and write
17A74E10000
heap
page read and write
5C869FE000
stack
page read and write
62947D000
stack
page read and write
79CA47F000
stack
page read and write
18D17767000
heap
page read and write
FC3AAFC000
stack
page read and write
1CC9F5F0000
trusted library allocation
page read and write
21A11879000
heap
page read and write
1A5B4A5F000
heap
page read and write
1B26B770000
trusted library allocation
page read and write
18ECA102000
heap
page read and write
21A1184F000
heap
page read and write
CD76FB000
stack
page read and write
1F5FCBF0000
heap
page read and write
21A11800000
heap
page read and write
149E7802000
heap
page read and write
1A5B4980000
heap
page read and write
732A1000
unkown
page execute read
1CCA44A0000
trusted library allocation
page read and write
2B37D2C7000
heap
page read and write
18D17700000
heap
page read and write
17A75082000
heap
page read and write
18D1778A000
heap
page read and write
2B37D2BE000
heap
page read and write
18ECA04A000
heap
page read and write
1CC9EC9F000
heap
page read and write
1D8F7A53000
heap
page read and write
18D17C02000
heap
page read and write
2B37D140000
trusted library allocation
page read and write
1D8F7B02000
heap
page read and write
21A12002000
trusted library allocation
page read and write
1F8880B7000
heap
page read and write
17C627F000
stack
page read and write
There are 729 hidden memdumps, click here to show them.