Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
recibo.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Adventure_19.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\FLADBARMEDES.tub
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Rekorddage.Res7
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\emoji-body-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\iso_639-3.xml
|
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lgpllibs.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\microphone-disabled-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nso5699.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\printer-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\recibo.exe
|
"C:\Users\user\Desktop\recibo.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.sil.org/iso639-3/
|
unknown
|
||
http://www.vmware.com/0/
|
unknown
|
||
http://www.vmware.com/0
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
https://mozilla.org0
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\centrumpartiers\sindstilstand
|
Tiebold
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SENGEKANTERNE\stubben
|
Roundabout87
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\dado
|
Foresprgselens98
|
||
HKEY_CURRENT_USER\Software\metaled\Filformatets
|
Expand String Value
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A50000
|
direct allocation
|
page execute and read and write
|
||
1CC9F615000
|
heap
|
page read and write
|
||
79CA15C000
|
stack
|
page read and write
|
||
18ECA02F000
|
heap
|
page read and write
|
||
1B26C002000
|
trusted library allocation
|
page read and write
|
||
1CCA44A4000
|
heap
|
page read and write
|
||
21A11902000
|
heap
|
page read and write
|
||
1A5B4B13000
|
heap
|
page read and write
|
||
1CCA4660000
|
trusted library allocation
|
page read and write
|
||
23DBB7D000
|
stack
|
page read and write
|
||
1B26B864000
|
heap
|
page read and write
|
||
1D8F7A00000
|
heap
|
page read and write
|
||
21A11845000
|
heap
|
page read and write
|
||
1CC9F702000
|
heap
|
page read and write
|
||
18EC9F00000
|
heap
|
page read and write
|
||
B3D7BCD000
|
stack
|
page read and write
|
||
18D17790000
|
heap
|
page read and write
|
||
18D177A2000
|
heap
|
page read and write
|
||
1CCA444A000
|
heap
|
page read and write
|
||
21A11869000
|
heap
|
page read and write
|
||
1CC9EBE0000
|
trusted library allocation
|
page read and write
|
||
2EF9CA69000
|
heap
|
page read and write
|
||
149E80A0000
|
remote allocation
|
page read and write
|
||
1D8F7B08000
|
heap
|
page read and write
|
||
1CCA4502000
|
heap
|
page read and write
|
||
FC3A7FB000
|
stack
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
18D177B2000
|
heap
|
page read and write
|
||
18D17761000
|
heap
|
page read and write
|
||
62997F000
|
stack
|
page read and write
|
||
149E7829000
|
heap
|
page read and write
|
||
18D17791000
|
heap
|
page read and write
|
||
18D16EF6000
|
heap
|
page read and write
|
||
18D17761000
|
heap
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
17A74F70000
|
trusted library allocation
|
page read and write
|
||
18D1778D000
|
heap
|
page read and write
|
||
18D17793000
|
heap
|
page read and write
|
||
18EC9FB0000
|
remote allocation
|
page read and write
|
||
18D17789000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page read and write
|
||
1A5B49B0000
|
trusted library allocation
|
page read and write
|
||
17A75050000
|
heap
|
page read and write
|
||
1CC9FC60000
|
trusted library allocation
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
2EF9CB80000
|
trusted library allocation
|
page read and write
|
||
1B26B875000
|
heap
|
page read and write
|
||
23DB9FD000
|
stack
|
page read and write
|
||
FC3AD7F000
|
stack
|
page read and write
|
||
1F5FCF00000
|
heap
|
page read and write
|
||
18D16EC8000
|
heap
|
page read and write
|
||
2B37D26D000
|
heap
|
page read and write
|
||
18D177AB000
|
heap
|
page read and write
|
||
2EF9CA70000
|
trusted library allocation
|
page read and write
|
||
18D17768000
|
heap
|
page read and write
|
||
5C8687F000
|
stack
|
page read and write
|
||
1F5FCE89000
|
heap
|
page read and write
|
||
1D8F7A13000
|
heap
|
page read and write
|
||
18D1779C000
|
heap
|
page read and write
|
||
21D55450000
|
heap
|
page read and write
|
||
2EF9CA20000
|
trusted library allocation
|
page read and write
|
||
2B37DB00000
|
heap
|
page read and write
|
||
1F8880B4000
|
heap
|
page read and write
|
||
18D17762000
|
heap
|
page read and write
|
||
27CF8202000
|
trusted library allocation
|
page read and write
|
||
1CC9ED07000
|
heap
|
page read and write
|
||
2EF9CA65000
|
heap
|
page read and write
|
||
27CF7860000
|
heap
|
page read and write
|
||
FE32979000
|
stack
|
page read and write
|
||
21A11860000
|
heap
|
page read and write
|
||
1B26B610000
|
heap
|
page read and write
|
||
18D1777B000
|
heap
|
page read and write
|
||
18ECA05F000
|
heap
|
page read and write
|
||
1CCA4461000
|
heap
|
page read and write
|
||
18D17C03000
|
heap
|
page read and write
|
||
18D16E3C000
|
heap
|
page read and write
|
||
17A75071000
|
heap
|
page read and write
|
||
18D177C0000
|
heap
|
page read and write
|
||
21A11829000
|
heap
|
page read and write
|
||
17A75102000
|
heap
|
page read and write
|
||
62957F000
|
stack
|
page read and write
|
||
1CCA441E000
|
heap
|
page read and write
|
||
1CC9ED25000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
18D17783000
|
heap
|
page read and write
|
||
1CCA435E000
|
trusted library allocation
|
page read and write
|
||
1D8F7A4C000
|
heap
|
page read and write
|
||
149E7837000
|
heap
|
page read and write
|
||
69605F7000
|
stack
|
page read and write
|
||
18D16F13000
|
heap
|
page read and write
|
||
CD72FB000
|
stack
|
page read and write
|
||
18D16E29000
|
heap
|
page read and write
|
||
2EF9CAAF000
|
heap
|
page read and write
|
||
B3D7B4E000
|
stack
|
page read and write
|
||
1A5B4A64000
|
heap
|
page read and write
|
||
1B26B865000
|
heap
|
page read and write
|
||
1CCA4370000
|
trusted library allocation
|
page read and write
|
||
18D17C02000
|
heap
|
page read and write
|
||
18D16E5A000
|
heap
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
27CF7A79000
|
heap
|
page read and write
|
||
21D55489000
|
heap
|
page read and write
|
||
1F887F10000
|
heap
|
page read and write
|
||
FC3AF7E000
|
stack
|
page read and write
|
||
18D1776E000
|
heap
|
page read and write
|
||
17A7504B000
|
heap
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
21D55330000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2EF9CA10000
|
trusted library allocation
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
CD787B000
|
stack
|
page read and write
|
||
21A1186F000
|
heap
|
page read and write
|
||
B3D7F7F000
|
stack
|
page read and write
|
||
1F8880D5000
|
heap
|
page read and write
|
||
18D16E4C000
|
heap
|
page read and write
|
||
21A1185B000
|
heap
|
page read and write
|
||
DAD05FE000
|
stack
|
page read and write
|
||
1CCA4371000
|
trusted library allocation
|
page read and write
|
||
21A11858000
|
heap
|
page read and write
|
||
27CF7A00000
|
heap
|
page read and write
|
||
1CCA44F3000
|
heap
|
page read and write
|
||
21A11830000
|
heap
|
page read and write
|
||
1CCA47A0000
|
trusted library allocation
|
page read and write
|
||
B3D8177000
|
stack
|
page read and write
|
||
21D55413000
|
heap
|
page read and write
|
||
1F8880A1000
|
heap
|
page read and write
|
||
88818FE000
|
stack
|
page read and write
|
||
18D17789000
|
heap
|
page read and write
|
||
21D5544C000
|
heap
|
page read and write
|
||
18D177AC000
|
heap
|
page read and write
|
||
1B26B600000
|
heap
|
page read and write
|
||
149E7834000
|
heap
|
page read and write
|
||
18D17713000
|
heap
|
page read and write
|
||
18D16E51000
|
heap
|
page read and write
|
||
21A1186B000
|
heap
|
page read and write
|
||
79CA1DE000
|
stack
|
page read and write
|
||
17A74E70000
|
heap
|
page read and write
|
||
1B26B670000
|
heap
|
page read and write
|
||
1F5FCD60000
|
trusted library allocation
|
page read and write
|
||
18D17789000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
69608FF000
|
stack
|
page read and write
|
||
18D16EAC000
|
heap
|
page read and write
|
||
18D17C03000
|
heap
|
page read and write
|
||
FC3A9FC000
|
stack
|
page read and write
|
||
18D177B5000
|
heap
|
page read and write
|
||
17A75013000
|
heap
|
page read and write
|
||
27CF7A68000
|
heap
|
page read and write
|
||
18D17772000
|
heap
|
page read and write
|
||
27CF7A64000
|
heap
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
18D17767000
|
heap
|
page read and write
|
||
1D8F78C0000
|
heap
|
page read and write
|
||
149E7813000
|
heap
|
page read and write
|
||
FE32B79000
|
stack
|
page read and write
|
||
1CC9F759000
|
heap
|
page read and write
|
||
23DB7FD000
|
stack
|
page read and write
|
||
149E7840000
|
heap
|
page read and write
|
||
18D1777B000
|
heap
|
page read and write
|
||
18D175F0000
|
remote allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
69604FB000
|
stack
|
page read and write
|
||
18ECA03E000
|
heap
|
page read and write
|
||
23DBA7F000
|
stack
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
21A11866000
|
heap
|
page read and write
|
||
1F5FCF02000
|
heap
|
page read and write
|
||
18D1778C000
|
heap
|
page read and write
|
||
2EF9CACC000
|
heap
|
page read and write
|
||
18D16E8B000
|
heap
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
17A7503C000
|
heap
|
page read and write
|
||
1B26B813000
|
heap
|
page read and write
|
||
1A5B4B08000
|
heap
|
page read and write
|
||
1F5FCF18000
|
heap
|
page read and write
|
||
732A0000
|
unkown
|
page readonly
|
||
1CC9EC00000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
18D1778D000
|
heap
|
page read and write
|
||
2EF9CA88000
|
heap
|
page read and write
|
||
5C8654A000
|
stack
|
page read and write
|
||
18D17761000
|
heap
|
page read and write
|
||
88811AB000
|
stack
|
page read and write
|
||
1CC9F600000
|
heap
|
page read and write
|
||
17C647F000
|
stack
|
page read and write
|
||
1CCA4640000
|
trusted library allocation
|
page read and write
|
||
18D17786000
|
heap
|
page read and write
|
||
1D8F7A56000
|
heap
|
page read and write
|
||
239F000
|
stack
|
page read and write
|
||
18D17761000
|
heap
|
page read and write
|
||
1D8F7A29000
|
heap
|
page read and write
|
||
695FFEE000
|
stack
|
page read and write
|
||
18D16EC2000
|
heap
|
page read and write
|
||
88814FF000
|
stack
|
page read and write
|
||
18EC9F90000
|
trusted library allocation
|
page read and write
|
||
21A1183E000
|
heap
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
1F5FCE27000
|
heap
|
page read and write
|
||
1B26B800000
|
heap
|
page read and write
|
||
2EF9C830000
|
heap
|
page read and write
|
||
18D17786000
|
heap
|
page read and write
|
||
6B169FA000
|
stack
|
page read and write
|
||
18D16F08000
|
heap
|
page read and write
|
||
2B37D313000
|
heap
|
page read and write
|
||
7AD000
|
heap
|
page read and write
|
||
1A5B4A3C000
|
heap
|
page read and write
|
||
21D55454000
|
heap
|
page read and write
|
||
149E8070000
|
trusted library allocation
|
page read and write
|
||
1CC9EBB0000
|
heap
|
page read and write
|
||
21A11620000
|
heap
|
page read and write
|
||
1F5FCDB0000
|
trusted library allocation
|
page read and write
|
||
21D55E02000
|
trusted library allocation
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
1CCA4620000
|
trusted library allocation
|
page read and write
|
||
1F5FCDF0000
|
remote allocation
|
page read and write
|
||
B3D7ACB000
|
stack
|
page read and write
|
||
1CCA44FC000
|
heap
|
page read and write
|
||
18D1776D000
|
heap
|
page read and write
|
||
18D1776B000
|
heap
|
page read and write
|
||
18D16EAA000
|
heap
|
page read and write
|
||
21A11880000
|
heap
|
page read and write
|
||
2EF9CA00000
|
trusted library allocation
|
page read and write
|
||
88817FA000
|
stack
|
page read and write
|
||
18ECAA02000
|
trusted library allocation
|
page read and write
|
||
2B37D242000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1B26B85B000
|
heap
|
page read and write
|
||
18D17C02000
|
heap
|
page read and write
|
||
1B26B802000
|
heap
|
page read and write
|
||
1CCA4620000
|
trusted library allocation
|
page read and write
|
||
1CCA443D000
|
heap
|
page read and write
|
||
18ECA061000
|
heap
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
18D175F0000
|
remote allocation
|
page read and write
|
||
18D17781000
|
heap
|
page read and write
|
||
79CA87F000
|
stack
|
page read and write
|
||
1F5FCE58000
|
heap
|
page read and write
|
||
FE329F9000
|
stack
|
page read and write
|
||
1B26B829000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
21A1187C000
|
heap
|
page read and write
|
||
1F5FCE02000
|
heap
|
page read and write
|
||
1B26B86F000
|
heap
|
page read and write
|
||
2EF9C840000
|
trusted library allocation
|
page read and write
|
||
1CCA4620000
|
trusted library allocation
|
page read and write
|
||
21A11863000
|
heap
|
page read and write
|
||
CDBD17F000
|
stack
|
page read and write
|
||
18D1776D000
|
heap
|
page read and write
|
||
1CCA4507000
|
heap
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
21A11843000
|
heap
|
page read and write
|
||
1F5FCE57000
|
heap
|
page read and write
|
||
1F5FCE47000
|
heap
|
page read and write
|
||
6B16FFC000
|
stack
|
page read and write
|
||
27CF7A3C000
|
heap
|
page read and write
|
||
18ECA05A000
|
heap
|
page read and write
|
||
18ECA000000
|
heap
|
page read and write
|
||
1CCA4380000
|
trusted library allocation
|
page read and write
|
||
27CF7B13000
|
heap
|
page read and write
|
||
18ECA002000
|
heap
|
page read and write
|
||
2B37CFE0000
|
heap
|
page read and write
|
||
79CA57B000
|
stack
|
page read and write
|
||
21A11886000
|
heap
|
page read and write
|
||
18D17789000
|
heap
|
page read and write
|
||
21D55340000
|
heap
|
page read and write
|
||
69603FF000
|
stack
|
page read and write
|
||
62967F000
|
stack
|
page read and write
|
||
21A1183B000
|
heap
|
page read and write
|
||
18D1776D000
|
heap
|
page read and write
|
||
1D8F7A3C000
|
heap
|
page read and write
|
||
1CC9ED14000
|
heap
|
page read and write
|
||
2B37CFD0000
|
heap
|
page read and write
|
||
18D17C02000
|
heap
|
page read and write
|
||
FC3A1DC000
|
stack
|
page read and write
|
||
23DB77E000
|
stack
|
page read and write
|
||
18D16DE0000
|
trusted library allocation
|
page read and write
|
||
88816FD000
|
stack
|
page read and write
|
||
18D17786000
|
heap
|
page read and write
|
||
1CCA4390000
|
trusted library allocation
|
page read and write
|
||
D7EB0FB000
|
stack
|
page read and write
|
||
18D17781000
|
heap
|
page read and write
|
||
1F8880BE000
|
heap
|
page read and write
|
||
1CC9ECAA000
|
heap
|
page read and write
|
||
1CCA44E7000
|
heap
|
page read and write
|
||
17C6677000
|
stack
|
page read and write
|
||
18D17794000
|
heap
|
page read and write
|
||
1CCA4500000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
1D8F7850000
|
heap
|
page read and write
|
||
1CC9EB50000
|
heap
|
page read and write
|
||
1CCA46B0000
|
remote allocation
|
page read and write
|
||
1F8880D2000
|
heap
|
page read and write
|
||
DACFF2C000
|
stack
|
page read and write
|
||
18D175F0000
|
remote allocation
|
page read and write
|
||
628B5B000
|
stack
|
page read and write
|
||
18D16E27000
|
heap
|
page read and write
|
||
27CF7A02000
|
heap
|
page read and write
|
||
21D553D0000
|
trusted library allocation
|
page read and write
|
||
18D17761000
|
heap
|
page read and write
|
||
17C6577000
|
stack
|
page read and write
|
||
D7EB1FE000
|
stack
|
page read and write
|
||
21D55513000
|
heap
|
page read and write
|
||
1F5FCDF0000
|
remote allocation
|
page read and write
|
||
2EF9CAC5000
|
heap
|
page read and write
|
||
6B16BFE000
|
stack
|
page read and write
|
||
18D177AB000
|
heap
|
page read and write
|
||
CDBD57C000
|
stack
|
page read and write
|
||
1CCA445B000
|
heap
|
page read and write
|
||
21A11864000
|
heap
|
page read and write
|
||
149E7858000
|
heap
|
page read and write
|
||
18D17787000
|
heap
|
page read and write
|
||
1F8880B2000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
21A11780000
|
trusted library allocation
|
page read and write
|
||
1CC9ECFD000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
18D1777B000
|
heap
|
page read and write
|
||
21A11842000
|
heap
|
page read and write
|
||
1B26B913000
|
heap
|
page read and write
|
||
17A75000000
|
heap
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
1CC9EC8D000
|
heap
|
page read and write
|
||
D7EAEFB000
|
stack
|
page read and write
|
||
18ECA024000
|
heap
|
page read and write
|
||
1F5FCF13000
|
heap
|
page read and write
|
||
18D1777B000
|
heap
|
page read and write
|
||
6B16CFB000
|
stack
|
page read and write
|
||
CDBD27C000
|
stack
|
page read and write
|
||
18D17789000
|
heap
|
page read and write
|
||
21A1185A000
|
heap
|
page read and write
|
||
6B172FC000
|
stack
|
page read and write
|
||
21D55500000
|
heap
|
page read and write
|
||
1CC9EC13000
|
heap
|
page read and write
|
||
CDBD07F000
|
stack
|
page read and write
|
||
CD7B7E000
|
stack
|
page read and write
|
||
18D17794000
|
heap
|
page read and write
|
||
149E7770000
|
heap
|
page read and write
|
||
1CCA440C000
|
heap
|
page read and write
|
||
18D17767000
|
heap
|
page read and write
|
||
149E80A0000
|
remote allocation
|
page read and write
|
||
27CF79D0000
|
trusted library allocation
|
page read and write
|
||
2EF9CACC000
|
heap
|
page read and write
|
||
18D16E58000
|
heap
|
page read and write
|
||
1CCA0200000
|
trusted library allocation
|
page read and write
|
||
18D1777B000
|
heap
|
page read and write
|
||
27CF7B02000
|
heap
|
page read and write
|
||
FC3AB7B000
|
stack
|
page read and write
|
||
732A4000
|
unkown
|
page readonly
|
||
18D16EE2000
|
heap
|
page read and write
|
||
18D16EEE000
|
heap
|
page read and write
|
||
18D16E4D000
|
heap
|
page read and write
|
||
1A5B5402000
|
trusted library allocation
|
page read and write
|
||
1D8F79C0000
|
trusted library allocation
|
page read and write
|
||
21A11861000
|
heap
|
page read and write
|
||
17A75049000
|
heap
|
page read and write
|
||
1F5FCE48000
|
heap
|
page read and write
|
||
7A9000
|
heap
|
page read and write
|
||
CD737E000
|
stack
|
page read and write
|
||
1CCA44AD000
|
heap
|
page read and write
|
||
1CCA442B000
|
heap
|
page read and write
|
||
1F5FCC00000
|
heap
|
page read and write
|
||
FC3AE7D000
|
stack
|
page read and write
|
||
17C69FF000
|
unkown
|
page read and write
|
||
149E8202000
|
trusted library allocation
|
page read and write
|
||
1CCA4380000
|
trusted library allocation
|
page read and write
|
||
18D1776D000
|
heap
|
page read and write
|
||
CD73FE000
|
stack
|
page read and write
|
||
FE32AF9000
|
stack
|
page read and write
|
||
17A75090000
|
heap
|
page read and write
|
||
469000
|
unkown
|
page read and write
|
||
18ECA029000
|
heap
|
page read and write
|
||
149E7902000
|
heap
|
page read and write
|
||
B3D827F000
|
stack
|
page read and write
|
||
1F5FCE00000
|
heap
|
page read and write
|
||
21A1186D000
|
heap
|
page read and write
|
||
628F7B000
|
stack
|
page read and write
|
||
1D8F7860000
|
heap
|
page read and write
|
||
2EF9CA80000
|
heap
|
page read and write
|
||
1CC9EC26000
|
heap
|
page read and write
|
||
1F888040000
|
heap
|
page read and write
|
||
18D17767000
|
heap
|
page read and write
|
||
1F5FCE13000
|
heap
|
page read and write
|
||
27CF78D0000
|
heap
|
page read and write
|
||
1CC9F602000
|
heap
|
page read and write
|
||
DAD04FE000
|
stack
|
page read and write
|
||
18D177B5000
|
heap
|
page read and write
|
||
2EF9CACC000
|
heap
|
page read and write
|
||
1F8881E0000
|
heap
|
page read and write
|
||
1CCA4350000
|
trusted library allocation
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
18D17C02000
|
heap
|
page read and write
|
||
1CCA4240000
|
trusted library allocation
|
page read and write
|
||
1CCA4690000
|
trusted library allocation
|
page read and write
|
||
21D55429000
|
heap
|
page read and write
|
||
18D1778B000
|
heap
|
page read and write
|
||
1F8880B6000
|
heap
|
page read and write
|
||
62907F000
|
stack
|
page read and write
|
||
18D16E4E000
|
heap
|
page read and write
|
||
1CC9EC79000
|
heap
|
page read and write
|
||
18ECA05D000
|
heap
|
page read and write
|
||
1D8F7A4B000
|
heap
|
page read and write
|
||
DACFFAE000
|
stack
|
page read and write
|
||
17A75113000
|
heap
|
page read and write
|
||
18D17715000
|
heap
|
page read and write
|
||
18ECA073000
|
heap
|
page read and write
|
||
149E7800000
|
heap
|
page read and write
|
||
2464000
|
heap
|
page read and write
|
||
18D16CE0000
|
heap
|
page read and write
|
||
1CC9EC94000
|
heap
|
page read and write
|
||
1CC9F713000
|
heap
|
page read and write
|
||
1D8F7B00000
|
heap
|
page read and write
|
||
2B37D040000
|
heap
|
page read and write
|
||
17A75029000
|
heap
|
page read and write
|
||
18D177A0000
|
heap
|
page read and write
|
||
149E77D0000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1CCA4394000
|
trusted library allocation
|
page read and write
|
||
2B37D213000
|
heap
|
page read and write
|
||
18D16E4B000
|
heap
|
page read and write
|
||
2B37D288000
|
heap
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
18D17781000
|
heap
|
page read and write
|
||
18D177DB000
|
heap
|
page read and write
|
||
18D17765000
|
heap
|
page read and write
|
||
27CF7B00000
|
heap
|
page read and write
|
||
18D1777B000
|
heap
|
page read and write
|
||
1CCA4358000
|
trusted library allocation
|
page read and write
|
||
FE3254C000
|
stack
|
page read and write
|
||
18D17786000
|
heap
|
page read and write
|
||
21D55471000
|
heap
|
page read and write
|
||
18D16E55000
|
heap
|
page read and write
|
||
1A5B4920000
|
heap
|
page read and write
|
||
1A5B4A00000
|
heap
|
page read and write
|
||
17C63FB000
|
stack
|
page read and write
|
||
17C6979000
|
stack
|
page read and write
|
||
1CCA4680000
|
trusted library allocation
|
page read and write
|
||
6B17179000
|
stack
|
page read and write
|
||
1F5FCE48000
|
heap
|
page read and write
|
||
1F8880BE000
|
heap
|
page read and write
|
||
18D17789000
|
heap
|
page read and write
|
||
CD7977000
|
stack
|
page read and write
|
||
1CC9EC75000
|
heap
|
page read and write
|
||
18D16EB4000
|
heap
|
page read and write
|
||
1D8F7A7B000
|
heap
|
page read and write
|
||
18D17C02000
|
heap
|
page read and write
|
||
2B37D2E1000
|
heap
|
page read and write
|
||
17A7508D000
|
heap
|
page read and write
|
||
1F5FE802000
|
trusted library allocation
|
page read and write
|
||
6B16AFA000
|
stack
|
page read and write
|
||
1B26B823000
|
heap
|
page read and write
|
||
18D1775F000
|
heap
|
page read and write
|
||
1B26B83D000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
1A5B4B00000
|
heap
|
page read and write
|
||
1B26B902000
|
heap
|
page read and write
|
||
1A5B4A55000
|
heap
|
page read and write
|
||
18D1778B000
|
heap
|
page read and write
|
||
2B37D302000
|
heap
|
page read and write
|
||
17A75802000
|
trusted library allocation
|
page read and write
|
||
21A11859000
|
heap
|
page read and write
|
||
1CCA4400000
|
heap
|
page read and write
|
||
18D17767000
|
heap
|
page read and write
|
||
1D8F7B13000
|
heap
|
page read and write
|
||
17A75100000
|
heap
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
1F5FCE25000
|
heap
|
page read and write
|
||
18D17789000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
FE32A7E000
|
stack
|
page read and write
|
||
18D177B0000
|
heap
|
page read and write
|
||
1F8880A6000
|
heap
|
page read and write
|
||
1F8880BE000
|
heap
|
page read and write
|
||
18EC9FB0000
|
remote allocation
|
page read and write
|
||
17C5F9B000
|
stack
|
page read and write
|
||
1F5FCC60000
|
heap
|
page read and write
|
||
21D55457000
|
heap
|
page read and write
|
||
18D1778D000
|
heap
|
page read and write
|
||
1CC9F759000
|
heap
|
page read and write
|
||
2EF9D8E0000
|
trusted library allocation
|
page read and write
|
||
18D16EDB000
|
heap
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
1D8F8202000
|
trusted library allocation
|
page read and write
|
||
D7EAFFB000
|
stack
|
page read and write
|
||
18D1778C000
|
heap
|
page read and write
|
||
18EC9F60000
|
heap
|
page read and write
|
||
2EF9CA60000
|
heap
|
page read and write
|
||
FC3AC7D000
|
stack
|
page read and write
|
||
23DB2FC000
|
stack
|
page read and write
|
||
17A75053000
|
heap
|
page read and write
|
||
1F888090000
|
heap
|
page read and write
|
||
CD777F000
|
stack
|
page read and write
|
||
2EF9D6C0000
|
trusted library allocation
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
18ECA070000
|
heap
|
page read and write
|
||
18D16E00000
|
heap
|
page read and write
|
||
21A11862000
|
heap
|
page read and write
|
||
69606FF000
|
stack
|
page read and write
|
||
18D17780000
|
heap
|
page read and write
|
||
2EF9C970000
|
heap
|
page read and write
|
||
18D17C19000
|
heap
|
page read and write
|
||
1F888060000
|
heap
|
page read and write
|
||
1F5FCE3D000
|
heap
|
page read and write
|
||
2EF9CACE000
|
heap
|
page read and write
|
||
2EF9D8D0000
|
heap
|
page readonly
|
||
88815FE000
|
stack
|
page read and write
|
||
FC3A97E000
|
stack
|
page read and write
|
||
1CC9F700000
|
heap
|
page read and write
|
||
1CC9F718000
|
heap
|
page read and write
|
||
5C865CF000
|
stack
|
page read and write
|
||
CDBD37C000
|
stack
|
page read and write
|
||
88819FF000
|
stack
|
page read and write
|
||
18D17767000
|
heap
|
page read and write
|
||
6B1667C000
|
stack
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
1A5B4A13000
|
heap
|
page read and write
|
||
1F5FCD80000
|
trusted library allocation
|
page read and write
|
||
18D17C02000
|
heap
|
page read and write
|
||
1A5B4A78000
|
heap
|
page read and write
|
||
21A11865000
|
heap
|
page read and write
|
||
6B174FF000
|
stack
|
page read and write
|
||
18D1774D000
|
heap
|
page read and write
|
||
17A75056000
|
heap
|
page read and write
|
||
18D17761000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1CCA44E9000
|
heap
|
page read and write
|
||
2B37D22A000
|
heap
|
page read and write
|
||
1CCA44E7000
|
heap
|
page read and write
|
||
793000
|
heap
|
page read and write
|
||
1CC9EB40000
|
heap
|
page read and write
|
||
DAD027E000
|
stack
|
page read and write
|
||
18D17763000
|
heap
|
page read and write
|
||
18D17C02000
|
heap
|
page read and write
|
||
18D16F16000
|
heap
|
page read and write
|
||
1A5B4A68000
|
heap
|
page read and write
|
||
5C86A78000
|
stack
|
page read and write
|
||
18D17C00000
|
heap
|
page read and write
|
||
1CCA47C0000
|
trusted library allocation
|
page read and write
|
||
21D55502000
|
heap
|
page read and write
|
||
1F5FCE75000
|
heap
|
page read and write
|
||
B3D847F000
|
stack
|
page read and write
|
||
79CA97F000
|
stack
|
page read and write
|
||
DAD03FE000
|
stack
|
page read and write
|
||
1A5B4A2A000
|
heap
|
page read and write
|
||
18D177B2000
|
heap
|
page read and write
|
||
2EF9D6C6000
|
trusted library allocation
|
page read and write
|
||
1A5B4910000
|
heap
|
page read and write
|
||
18D17791000
|
heap
|
page read and write
|
||
696027D000
|
stack
|
page read and write
|
||
21A11813000
|
heap
|
page read and write
|
||
17A75060000
|
heap
|
page read and write
|
||
27CF7A23000
|
heap
|
page read and write
|
||
69607FD000
|
stack
|
page read and write
|
||
18D16C70000
|
heap
|
page read and write
|
||
21A11846000
|
heap
|
page read and write
|
||
5C868F9000
|
stack
|
page read and write
|
||
79CA67B000
|
stack
|
page read and write
|
||
2B37DA02000
|
heap
|
page read and write
|
||
1F8880D0000
|
heap
|
page read and write
|
||
21A11848000
|
heap
|
page read and write
|
||
1CCA44F1000
|
heap
|
page read and write
|
||
B3D7EFC000
|
stack
|
page read and write
|
||
62917C000
|
stack
|
page read and write
|
||
18D1779B000
|
heap
|
page read and write
|
||
1F5FE7A0000
|
trusted library allocation
|
page read and write
|
||
17C677F000
|
stack
|
page read and write
|
||
17A75108000
|
heap
|
page read and write
|
||
1F8880A6000
|
heap
|
page read and write
|
||
2B37D2CF000
|
heap
|
page read and write
|
||
1D8F7A70000
|
heap
|
page read and write
|
||
1F5FCE61000
|
heap
|
page read and write
|
||
2B37DB32000
|
heap
|
page read and write
|
||
27CF7A57000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
5D0000
|
heap
|
page read and write
|
||
1CCA4230000
|
trusted library allocation
|
page read and write
|
||
18D177A4000
|
heap
|
page read and write
|
||
1CCA4374000
|
trusted library allocation
|
page read and write
|
||
1B26B886000
|
heap
|
page read and write
|
||
17C687B000
|
stack
|
page read and write
|
||
17A75075000
|
heap
|
page read and write
|
||
1F5FCDF0000
|
remote allocation
|
page read and write
|
||
18D1778A000
|
heap
|
page read and write
|
||
18D16C80000
|
heap
|
page read and write
|
||
2EF9D8F0000
|
trusted library allocation
|
page read and write
|
||
1CCA44B0000
|
trusted library allocation
|
page read and write
|
||
1CC9EC8F000
|
heap
|
page read and write
|
||
21A11832000
|
heap
|
page read and write
|
||
1CCA44E1000
|
heap
|
page read and write
|
||
18D16E71000
|
heap
|
page read and write
|
||
21A1185D000
|
heap
|
page read and write
|
||
1CCA4670000
|
trusted library allocation
|
page read and write
|
||
21A1187D000
|
heap
|
page read and write
|
||
18D17711000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
18D1779A000
|
heap
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
17A7504E000
|
heap
|
page read and write
|
||
18D1777B000
|
heap
|
page read and write
|
||
7BA000
|
heap
|
page read and write
|
||
1D8F7A4D000
|
heap
|
page read and write
|
||
8881AFA000
|
stack
|
page read and write
|
||
1F8880AF000
|
heap
|
page read and write
|
||
18D16E50000
|
heap
|
page read and write
|
||
1CC9F704000
|
heap
|
page read and write
|
||
18D177AD000
|
heap
|
page read and write
|
||
18D16E84000
|
heap
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
17A75060000
|
heap
|
page read and write
|
||
2EF9D940000
|
trusted library allocation
|
page read and write
|
||
62937D000
|
stack
|
page read and write
|
||
695FF6B000
|
stack
|
page read and write
|
||
6B16877000
|
stack
|
page read and write
|
||
1F8880B0000
|
heap
|
page read and write
|
||
1F8880D4000
|
heap
|
page read and write
|
||
21D5548C000
|
heap
|
page read and write
|
||
1CC9FD80000
|
trusted library allocation
|
page read and write
|
||
17C62FE000
|
stack
|
page read and write
|
||
1CC9EC29000
|
heap
|
page read and write
|
||
18D17786000
|
heap
|
page read and write
|
||
21D5544E000
|
heap
|
page read and write
|
||
17A74E00000
|
heap
|
page read and write
|
||
18ECA013000
|
heap
|
page read and write
|
||
18D17781000
|
heap
|
page read and write
|
||
21A11610000
|
heap
|
page read and write
|
||
1D8F7A6E000
|
heap
|
page read and write
|
||
1A5B4B02000
|
heap
|
page read and write
|
||
18D17791000
|
heap
|
page read and write
|
||
27CF7A13000
|
heap
|
page read and write
|
||
18D17781000
|
heap
|
page read and write
|
||
18D16E13000
|
heap
|
page read and write
|
||
CD7A7F000
|
stack
|
page read and write
|
||
1CCA46B0000
|
remote allocation
|
page read and write
|
||
149E7760000
|
heap
|
page read and write
|
||
27CF7A28000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
1CC9EC3D000
|
heap
|
page read and write
|
||
21D553A0000
|
heap
|
page read and write
|
||
18EC9EF0000
|
heap
|
page read and write
|
||
732A6000
|
unkown
|
page readonly
|
||
18D16F02000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
D7EA9AC000
|
stack
|
page read and write
|
||
18D17761000
|
heap
|
page read and write
|
||
5C8697E000
|
stack
|
page read and write
|
||
21D55508000
|
heap
|
page read and write
|
||
149E80A0000
|
remote allocation
|
page read and write
|
||
2EF9C990000
|
heap
|
page read and write
|
||
CDBCF7E000
|
stack
|
page read and write
|
||
21D5543C000
|
heap
|
page read and write
|
||
1CCA4350000
|
trusted library allocation
|
page read and write
|
||
18D17781000
|
heap
|
page read and write
|
||
21D55400000
|
heap
|
page read and write
|
||
27CF7870000
|
heap
|
page read and write
|
||
18D17790000
|
heap
|
page read and write
|
||
5B0000
|
trusted library allocation
|
page read and write
|
||
1D8F7A6E000
|
heap
|
page read and write
|
||
79CA777000
|
stack
|
page read and write
|
||
1F5FCE2A000
|
heap
|
page read and write
|
||
1A5B4A83000
|
heap
|
page read and write
|
||
1CCA46B0000
|
remote allocation
|
page read and write
|
||
18D1777F000
|
heap
|
page read and write
|
||
1CC9ED02000
|
heap
|
page read and write
|
||
1CC9EC56000
|
heap
|
page read and write
|
||
21A11847000
|
heap
|
page read and write
|
||
1CC9F5E0000
|
trusted library allocation
|
page read and write
|
||
21D5547E000
|
heap
|
page read and write
|
||
DAD06FE000
|
stack
|
page read and write
|
||
21A11841000
|
heap
|
page read and write
|
||
18D1779A000
|
heap
|
page read and write
|
||
FC3A87E000
|
stack
|
page read and write
|
||
1F5FCE58000
|
heap
|
page read and write
|
||
888147E000
|
stack
|
page read and write
|
||
18D17793000
|
heap
|
page read and write
|
||
21D5544D000
|
heap
|
page read and write
|
||
23DB67E000
|
stack
|
page read and write
|
||
18D17790000
|
heap
|
page read and write
|
||
18D1779C000
|
heap
|
page read and write
|
||
1F8881E5000
|
heap
|
page read and write
|
||
18D17C20000
|
heap
|
page read and write
|
||
21A11680000
|
heap
|
page read and write
|
||
1D8F7A4F000
|
heap
|
page read and write
|
||
62977F000
|
stack
|
page read and write
|
||
1CC9ECAD000
|
heap
|
page read and write
|
||
1CC9ED02000
|
heap
|
page read and write
|
||
B3D837F000
|
stack
|
page read and write
|
||
1D8F7A90000
|
heap
|
page read and write
|
||
18EC9FB0000
|
remote allocation
|
page read and write
|
||
21A1182E000
|
heap
|
page read and write
|
||
B3D807B000
|
stack
|
page read and write
|
||
CDBC99B000
|
stack
|
page read and write
|
||
18D17789000
|
heap
|
page read and write
|
||
1CC9F718000
|
heap
|
page read and write
|
||
1CC9EC6F000
|
heap
|
page read and write
|
||
62987F000
|
stack
|
page read and write
|
||
1CC9ECFD000
|
heap
|
page read and write
|
||
2B37D200000
|
heap
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
1D8F7A86000
|
heap
|
page read and write
|
||
1CCA4504000
|
heap
|
page read and write
|
||
18D17602000
|
heap
|
page read and write
|
||
1CC9F5E3000
|
trusted library allocation
|
page read and write
|
||
17A74E10000
|
heap
|
page read and write
|
||
5C869FE000
|
stack
|
page read and write
|
||
62947D000
|
stack
|
page read and write
|
||
79CA47F000
|
stack
|
page read and write
|
||
18D17767000
|
heap
|
page read and write
|
||
FC3AAFC000
|
stack
|
page read and write
|
||
1CC9F5F0000
|
trusted library allocation
|
page read and write
|
||
21A11879000
|
heap
|
page read and write
|
||
1A5B4A5F000
|
heap
|
page read and write
|
||
1B26B770000
|
trusted library allocation
|
page read and write
|
||
18ECA102000
|
heap
|
page read and write
|
||
21A1184F000
|
heap
|
page read and write
|
||
CD76FB000
|
stack
|
page read and write
|
||
1F5FCBF0000
|
heap
|
page read and write
|
||
21A11800000
|
heap
|
page read and write
|
||
149E7802000
|
heap
|
page read and write
|
||
1A5B4980000
|
heap
|
page read and write
|
||
732A1000
|
unkown
|
page execute read
|
||
1CCA44A0000
|
trusted library allocation
|
page read and write
|
||
2B37D2C7000
|
heap
|
page read and write
|
||
18D17700000
|
heap
|
page read and write
|
||
17A75082000
|
heap
|
page read and write
|
||
18D1778A000
|
heap
|
page read and write
|
||
2B37D2BE000
|
heap
|
page read and write
|
||
18ECA04A000
|
heap
|
page read and write
|
||
1CC9EC9F000
|
heap
|
page read and write
|
||
1D8F7A53000
|
heap
|
page read and write
|
||
18D17C02000
|
heap
|
page read and write
|
||
2B37D140000
|
trusted library allocation
|
page read and write
|
||
1D8F7B02000
|
heap
|
page read and write
|
||
21A12002000
|
trusted library allocation
|
page read and write
|
||
1F8880B7000
|
heap
|
page read and write
|
||
17C627F000
|
stack
|
page read and write
|
There are 729 hidden memdumps, click here to show them.