IOC Report
recibo.exe

loading gif

Files

File Path
Type
Category
Malicious
recibo.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Adventure_19.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\FLADBARMEDES.tub
data
dropped
C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Rekorddage.Res7
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\emoji-body-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\iso_639-3.xml
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\lgpllibs.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\microphone-disabled-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nsf321E.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\printer-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\recibo.exe
"C:\Users\user\Desktop\recibo.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\recibo.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\recibo.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://127.0.0.1:HTTP/1.1
unknown
https://sectigo.com/CPS0
unknown
http://www.vmware.com/0
unknown
http://www.symauth.com/rpa00
unknown
https://drive.google.com/
unknown
http://zerossl.crt.sectigo.com/ZeroSSLRSADomainSecureSiteCA.crt0
unknown
http://98Z0mcMphF90Ln.net
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
unknown
https://drive.google.com/p
unknown
https://doc-0g-cc-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/c6f1jlki
unknown
http://www.sil.org/iso639-3/
unknown
http://www.vmware.com/0/
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://zerossl.ocsp.sectigo.com0
unknown
https://doc-0g-cc-docs.googleusercontent.com/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.symauth.com/cps0(
unknown
http://BPNlDG.com
unknown
https://mozilla.org0
unknown
http://mail.cortijocuevas.com
unknown
https://doc-0g-cc-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/c6f1jlkill7f0g8rg2nidoteuikk5gii/1653650775000/00619175272154792338/*/1EX-TfU9P_N_SsQAtVtT8-t2zzMXng6WS?e=download
142.250.185.65
http://cortijocuevas.com
unknown
https://doc-0g-cc-docs.googleusercontent.com/e
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cortijocuevas.com
168.119.38.32
malicious
mail.cortijocuevas.com
unknown
malicious
drive.google.com
172.217.16.142
googlehosted.l.googleusercontent.com
142.250.185.65
doc-0g-cc-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
168.119.38.32
cortijocuevas.com
Germany
malicious
172.217.16.142
drive.google.com
United States
142.250.185.65
googlehosted.l.googleusercontent.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\centrumpartiers\sindstilstand
Tiebold
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SENGEKANTERNE\stubben
Roundabout87
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\dado
Foresprgselens98
HKEY_CURRENT_USER\SOFTWARE\metaled\Filformatets
Expand String Value

Memdumps

Base Address
Regiontype
Protect
Malicious
D00000
remote allocation
page execute and read and write
malicious
2CB0000
direct allocation
page execute and read and write
malicious
1D471000
trusted library allocation
page read and write
malicious
5EA000
heap
page read and write
1FCF5000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1D190000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD62000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
CA0000
trusted library allocation
page read and write
1F6F0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
557000
heap
page read and write
22472078000
heap
page read and write
1F7B0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F680000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FDA0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1FDA0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD10000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
208E0000
trusted library allocation
page read and write
1C361000
heap
page read and write
224720C9000
heap
page read and write
1C361000
heap
page read and write
1FD4E000
stack
page read and write
1FCC0000
trusted library allocation
page read and write
5EA000
heap
page read and write
22472000000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
1CEA0000
remote allocation
page read and write
1FD80000
trusted library allocation
page execute and read and write
208E0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
204F6000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
28BF000
stack
page read and write
105A000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
5EA000
heap
page read and write
208F0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD50000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1CC90000
heap
page read and write
2247292B000
heap
page read and write
1FD50000
trusted library allocation
page read and write
1C361000
heap
page read and write
208E0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1E471000
trusted library allocation
page read and write
401000
unkown
page execute read
1C361000
heap
page read and write
23669275000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1D19B000
trusted library allocation
page execute and read and write
1FCC0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1FCE0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
598000
heap
page read and write
5DC000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1F6E0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
108B000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
F0E000
stack
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FD54000
trusted library allocation
page read and write
1C361000
heap
page read and write
8E1000
trusted library allocation
page read and write
1C361000
heap
page read and write
11F0000
trusted library allocation
page read and write
5EA000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
20B10000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
20950000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
7F960000
trusted library allocation
page execute and read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
2247292C000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
5EA000
heap
page read and write
22472902000
heap
page read and write
1C361000
heap
page read and write
1D40B000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F680000
trusted library allocation
page read and write
204CD000
stack
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1D160000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
5EA000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1075000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD20000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1F7B0000
trusted library allocation
page read and write
29BF000
stack
page read and write
1FD60000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FD75000
trusted library allocation
page read and write
22472974000
heap
page read and write
C80000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF5000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
236699F0000
trusted library allocation
page read and write
5BE000
heap
page read and write
1F7FC000
stack
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
20950000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1F7B0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1F7B0000
trusted library allocation
page read and write
1D412000
trusted library allocation
page read and write
1FD90000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FDD0000
trusted library allocation
page read and write
F40000
heap
page read and write
1C361000
heap
page read and write
400000
unkown
page readonly
1FD60000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1F7C0000
trusted library allocation
page read and write
1F7B0000
trusted library allocation
page read and write
1F632000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FDA0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
D47F77C000
stack
page read and write
4749000
trusted library allocation
page read and write
13AE000
stack
page read and write
1C361000
heap
page read and write
1FCDA000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F700000
trusted library allocation
page execute and read and write
22472090000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
940000
remote allocation
page read and write
1C361000
heap
page read and write
2366928C000
heap
page read and write
1F850000
trusted library allocation
page read and write
1C361000
heap
page read and write
22472910000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
401000
unkown
page execute read
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD90000
trusted library allocation
page execute and read and write
53239FA000
stack
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
23669400000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
19A000
stack
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
5C5000
heap
page read and write
1C361000
heap
page read and write
1FD95000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
1C361000
heap
page read and write
B80000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
23669080000
heap
page read and write
5EA000
heap
page read and write
1F685000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD50000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCCC000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF1000
trusted library allocation
page read and write
1FAAE000
stack
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
D47F87E000
stack
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
208D0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
1FD60000
trusted library allocation
page read and write
1FCF2000
trusted library allocation
page read and write
1F685000
trusted library allocation
page read and write
1FD00000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1D40E000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
23669213000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1FD00000
trusted library allocation
page read and write
1C361000
heap
page read and write
22472913000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
23669227000
heap
page read and write
1F685000
trusted library allocation
page read and write
11EE000
stack
page read and write
106E000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
540000
remote allocation
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
FF0000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF1000
trusted library allocation
page read and write
2E41000
heap
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
D00000
remote allocation
page execute and read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
23669282000
heap
page read and write
1FD50000
trusted library allocation
page read and write
1FCE0000
trusted library allocation
page read and write
1F7B0000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
1F850000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
20900000
trusted library allocation
page read and write
1C361000
heap
page read and write
2247297C000
heap
page read and write
1C361000
heap
page read and write
1F7B0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1D1E8000
trusted library allocation
page read and write
1C361000
heap
page read and write
10D0000
heap
page read and write
224727A0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF5000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1CEA0000
remote allocation
page read and write
1FCC0000
trusted library allocation
page read and write
D47F37E000
stack
page read and write
1FD30000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C5A0000
heap
page read and write
1FCE0000
trusted library allocation
page read and write
22472040000
heap
page read and write
1C361000
heap
page read and write
1FCE0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C5A7000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
C97000
trusted library allocation
page read and write
22472815000
heap
page read and write
1CFDF000
stack
page read and write
C40000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
20B00000
trusted library allocation
page read and write
1F685000
trusted library allocation
page read and write
1F7C0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
D47F2F9000
stack
page read and write
1FD70000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1D572000
trusted library allocation
page read and write
1F7C0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1D510000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
20940000
trusted library allocation
page execute and read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
208E0000
trusted library allocation
page read and write
5EA000
heap
page read and write
5EA000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
23669240000
heap
page read and write
ADE000
stack
page read and write
1FCF0000
trusted library allocation
page read and write
2247290E000
heap
page read and write
5EA000
heap
page read and write
1FD50000
trusted library allocation
page read and write
1FCB0000
trusted library allocation
page execute and read and write
1FCC0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1D98C000
trusted library allocation
page read and write
20BE0000
heap
page read and write
1C361000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
224720C1000
heap
page read and write
1D50C000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
23669242000
heap
page read and write
5EA000
heap
page read and write
2366928D000
heap
page read and write
20940000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
5EA000
heap
page read and write
2247206B000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1F63A000
trusted library allocation
page read and write
22472937000
heap
page read and write
1F7C0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
22472800000
heap
page read and write
1C361000
heap
page read and write
550000
heap
page read and write
1C361000
heap
page read and write
2CAD000
stack
page read and write
23669290000
heap
page read and write
22471E80000
heap
page read and write
1075000
heap
page read and write
1FD75000
trusted library allocation
page read and write
1FCE3000
trusted library allocation
page read and write
1C361000
heap
page read and write
2366927F000
heap
page read and write
1F680000
trusted library allocation
page read and write
1082000
heap
page read and write
1C361000
heap
page read and write
1CB7E000
stack
page read and write
1D192000
trusted library allocation
page read and write
1F646000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF8000
trusted library allocation
page read and write
1F685000
trusted library allocation
page read and write
20940000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1CB30000
trusted library allocation
page read and write
20B00000
trusted library allocation
page read and write
5EA000
heap
page read and write
2247295B000
heap
page read and write
1C361000
heap
page read and write
22472929000
heap
page read and write
22472098000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
208D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
23669289000
heap
page read and write
5EA000
heap
page read and write
1FDA0000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F7D0000
trusted library allocation
page read and write
1F606000
trusted library allocation
page read and write
71546000
unkown
page readonly
22472929000
heap
page read and write
1FD00000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1F690000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
F30000
unclassified section
page readonly
1FD75000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1FD85000
trusted library allocation
page read and write
1C361000
heap
page read and write
C90000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD10000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FD80000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1F6E0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1D150000
trusted library allocation
page read and write
1D5B5000
trusted library allocation
page read and write
1F7B9000
trusted library allocation
page read and write
1F7B0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
9DE000
stack
page read and write
1D460000
heap
page execute and read and write
1FD50000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FDC0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD75000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
1D598000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD50000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1D164000
trusted library allocation
page read and write
540000
remote allocation
page read and write
236691F0000
unclassified section
page readonly
1F570000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
204D4000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FCF3000
trusted library allocation
page read and write
208D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1D4C0000
trusted library allocation
page read and write
22472940000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
5EA000
heap
page read and write
12A0000
heap
page read and write
1C361000
heap
page read and write
1F62D000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
1FDA0000
trusted library section
page read and write
1D163000
trusted library allocation
page execute and read and write
1FCD0000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
1FD00000
trusted library allocation
page read and write
1D16D000
trusted library allocation
page execute and read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
53237FF000
stack
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
46B000
unkown
page readonly
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
2366928F000
heap
page read and write
1D426000
trusted library allocation
page read and write
1C361000
heap
page read and write
2414000
heap
page read and write
1C361000
heap
page read and write
208D0000
trusted library allocation
page read and write
1FCE0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F840000
heap
page execute and read and write
1F850000
trusted library allocation
page read and write
5EA000
heap
page read and write
2247205D000
heap
page read and write
208D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F7B0000
trusted library allocation
page read and write
442000
unkown
page read and write
2366923D000
heap
page read and write
1C361000
heap
page read and write
1D41A000
trusted library allocation
page read and write
5EA000
heap
page read and write
208F0000
trusted library allocation
page read and write
2247292C000
heap
page read and write
1C361000
heap
page read and write
20B00000
trusted library allocation
page read and write
1FCE0000
trusted library allocation
page read and write
1FD75000
trusted library allocation
page read and write
23669C02000
trusted library allocation
page read and write
22472802000
heap
page read and write
85F000
stack
page read and write
1FCF0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
22472100000
heap
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
20B00000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1D992000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1F860000
heap
page read and write
2366927D000
heap
page read and write
46B000
unkown
page readonly
1FD70000
trusted library allocation
page read and write
1FCE0000
trusted library allocation
page read and write
1FD00000
trusted library allocation
page read and write
23669288000
heap
page read and write
23AE000
stack
page read and write
1FCC0000
trusted library allocation
page read and write
224720C4000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1D59A000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
5EA000
heap
page read and write
12A7000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD50000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
2E40000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
5EA000
heap
page read and write
2247292C000
heap
page read and write
1F7D0000
trusted library allocation
page read and write
2366924E000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD50000
trusted library allocation
page read and write
40A000
unkown
page write copy
91D000
stack
page read and write
1FCC0000
trusted library allocation
page read and write
224720CC000
heap
page read and write
5EA000
heap
page read and write
1FDD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1CEA0000
remote allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD50000
trusted library allocation
page read and write
1E4D1000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1F5AB000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
C3E000
unkown
page read and write
1FCF0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FD00000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C360000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
2DB1000
trusted library allocation
page read and write
23669286000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FDC0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
22472013000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F5FA000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
1FDC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1F7B0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
2247296D000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
590000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
10D2000
heap
page read and write
1D129000
stack
page read and write
1FD10000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1D195000
trusted library allocation
page execute and read and write
C40000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FCF1000
trusted library allocation
page read and write
23669247000
heap
page read and write
1FDC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F61C000
trusted library allocation
page read and write
1D3F0000
trusted library allocation
page read and write
469000
unkown
page read and write
1F6C0000
trusted library allocation
page read and write
1C361000
heap
page read and write
532347B000
stack
page read and write
4DE000
stack
page read and write
1FCC0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
2247297C000
heap
page read and write
1F7B1000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
10DB000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF5000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
2247294B000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
22472941000
heap
page read and write
1F653000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FDC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
2366928B000
heap
page read and write
1FD10000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
408000
unkown
page readonly
20950000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
204D0000
trusted library allocation
page read and write
1FCF5000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1D02A000
stack
page read and write
1FCC0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1077000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
23669302000
heap
page read and write
1FDD0000
trusted library allocation
page read and write
1F7C0000
trusted library allocation
page read and write
1075000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1F6C0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1F7C0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1D421000
trusted library allocation
page read and write
1CEDE000
stack
page read and write
1FCF0000
trusted library allocation
page read and write
5EA000
heap
page read and write
22471E10000
heap
page read and write
23669233000
heap
page read and write
5EA000
heap
page read and write
1FCE0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
20890000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
51E000
stack
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F7C0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
204FC000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
22471F90000
unclassified section
page readonly
1F6E0000
trusted library allocation
page read and write
1FD80000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1F7C0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FD50000
trusted library allocation
page read and write
B85000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
2088D000
stack
page read and write
F44000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1F5E6000
trusted library allocation
page read and write
1D3CE000
stack
page read and write
5EA000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
20960000
trusted library allocation
page read and write
1C361000
heap
page read and write
1D1DE000
stack
page read and write
1FCF0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
F8C000
stack
page read and write
2470000
heap
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
540000
remote allocation
page read and write
1FD10000
trusted library allocation
page read and write
1C361000
heap
page read and write
2366921A000
heap
page read and write
1C361000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1082000
heap
page read and write
2C99000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
30000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
20950000
trusted library allocation
page read and write
1FD60000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F7C0000
trusted library allocation
page read and write
23669285000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
940000
remote allocation
page read and write
1C361000
heap
page read and write
1D2C0000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
23669265000
heap
page read and write
1C361000
heap
page read and write
1FDE0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD56000
trusted library allocation
page read and write
D47F47C000
stack
page read and write
1FCD0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
2247292B000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
22471FA0000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FDA0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
408000
unkown
page readonly
204F2000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FCF5000
trusted library allocation
page read and write
208E0000
trusted library allocation
page read and write
1FCF5000
trusted library allocation
page read and write
108B000
heap
page read and write
208E0000
trusted library allocation
page read and write
5EA000
heap
page read and write
CFE000
stack
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCE0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
208D0000
trusted library allocation
page read and write
22472976000
heap
page read and write
1C361000
heap
page read and write
1FCF5000
trusted library allocation
page read and write
1F65D000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
71544000
unkown
page readonly
22472098000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1F7B0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1F7B0000
trusted library allocation
page read and write
2247207C000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
940000
remote allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1D5C2000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
CBE000
stack
page read and write
1C361000
heap
page read and write
1039000
heap
page read and write
1C361000
heap
page read and write
2366922A000
heap
page read and write
10D0000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1E499000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF5000
trusted library allocation
page read and write
1FD75000
trusted library allocation
page read and write
1C361000
heap
page read and write
2410000
heap
page read and write
1FD70000
trusted library allocation
page read and write
AE0000
heap
page read and write
5EA000
heap
page read and write
5DF000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
22472970000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
10CE000
heap
page read and write
20B10000
trusted library allocation
page read and write
1FD16000
trusted library allocation
page read and write
940000
remote allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
23669290000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FD72000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1C361000
heap
page read and write
98000
stack
page read and write
5EA000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1F7C0000
trusted library allocation
page read and write
1D18A000
trusted library allocation
page execute and read and write
1F863000
heap
page read and write
555000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1D5CE000
trusted library allocation
page read and write
1C361000
heap
page read and write
22472102000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
D47F07B000
stack
page read and write
71540000
unkown
page readonly
5EA000
heap
page read and write
1FD90000
trusted library allocation
page read and write
23669254000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1D41E000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FD00000
trusted library allocation
page read and write
1C361000
heap
page read and write
22472976000
heap
page read and write
431000
unkown
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
10DE000
heap
page read and write
23669220000
heap
page read and write
1C361000
heap
page read and write
1D180000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FDE0000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
5E2000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
23669281000
heap
page read and write
1D400000
trusted library allocation
page read and write
5EA000
heap
page read and write
1081000
heap
page read and write
1D170000
trusted library allocation
page read and write
1D2BC000
stack
page read and write
5EA000
heap
page read and write
2247297C000
heap
page read and write
20940000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF1000
trusted library allocation
page read and write
1F5D9000
trusted library allocation
page read and write
1F56E000
stack
page read and write
5C9000
heap
page read and write
1F685000
trusted library allocation
page read and write
1C361000
heap
page read and write
22472974000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
23669290000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F7D0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1F685000
trusted library allocation
page read and write
22472072000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F6C0000
trusted library allocation
page execute and read and write
1FCC0000
trusted library allocation
page read and write
1FCF5000
trusted library allocation
page read and write
D47F67F000
stack
page read and write
208E0000
trusted library allocation
page read and write
2247292D000
heap
page read and write
C7E000
stack
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
23669284000
heap
page read and write
1D5C6000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FCC1000
trusted library allocation
page read and write
1D182000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
208F0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1F680000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
2366926D000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF5000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
22472113000
heap
page read and write
1C361000
heap
page read and write
2247207B000
heap
page read and write
1080000
heap
page read and write
1F66E000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1088000
heap
page read and write
22472929000
heap
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
2366924B000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
2366927E000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FD50000
trusted library allocation
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
1FD00000
trusted library allocation
page execute and read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1CC7F000
stack
page read and write
1C361000
heap
page read and write
1F600000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FCF5000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
5EA000
heap
page read and write
1FD70000
trusted library allocation
page read and write
53238FF000
stack
page read and write
1C361000
heap
page read and write
2BAC000
stack
page read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
FF8000
heap
page read and write
1F7B0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
950000
unclassified section
page readonly
1C361000
heap
page read and write
71541000
unkown
page execute read
1D5D9000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
22472024000
heap
page read and write
208E0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1D42D000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FE1E000
stack
page read and write
1D186000
trusted library allocation
page execute and read and write
1C361000
heap
page read and write
1FD70000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FCD1000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCF0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD00000
trusted library allocation
page read and write
1F7C0000
trusted library allocation
page read and write
22472932000
heap
page read and write
5EA000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
22472956000
heap
page read and write
1D450000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
204F0000
trusted library allocation
page read and write
1D3E0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1D4BA000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1D5D7000
trusted library allocation
page read and write
22472900000
heap
page read and write
1C361000
heap
page read and write
1D197000
trusted library allocation
page execute and read and write
42C000
unkown
page read and write
1FD70000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD50000
trusted library allocation
page read and write
22472027000
heap
page read and write
4710000
trusted library allocation
page read and write
1C361000
heap
page read and write
2247296B000
heap
page read and write
1C361000
heap
page read and write
1F670000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
236690E0000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
204F8000
trusted library allocation
page read and write
1F7C0000
trusted library allocation
page read and write
23669252000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
23669227000
heap
page read and write
1F6D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
10CB000
heap
page read and write
1C361000
heap
page read and write
940000
remote allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
22472970000
heap
page read and write
1FD7E000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
22472083000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1D3D0000
trusted library allocation
page execute and read and write
1FCF0000
trusted library allocation
page read and write
1F58E000
trusted library allocation
page read and write
1FD70000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FD60000
trusted library allocation
page read and write
8B0000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1085000
heap
page read and write
107E000
heap
page read and write
95F000
stack
page read and write
236E000
stack
page read and write
1FCF0000
trusted library allocation
page read and write
1FD75000
trusted library allocation
page read and write
1F7D0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F680000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
23669251000
heap
page read and write
1FCD1000
trusted library allocation
page read and write
1C361000
heap
page read and write
C60000
trusted library allocation
page read and write
2247292D000
heap
page read and write
1F680000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
40A000
unkown
page read and write
1FCAE000
stack
page read and write
1FDC0000
trusted library allocation
page read and write
1082000
heap
page read and write
1FD70000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
2247297C000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1F685000
trusted library allocation
page read and write
1F7B0000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FDB0000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
D47F57B000
stack
page read and write
5EA000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1D440000
trusted library allocation
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCE0000
trusted library allocation
page read and write
400000
unkown
page readonly
23669200000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FD10000
trusted library allocation
page read and write
2247292F000
heap
page read and write
5EA000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1FD00000
trusted library allocation
page read and write
1C361000
heap
page read and write
1FDB0000
trusted library allocation
page read and write
1FCC0000
trusted library allocation
page read and write
208D0000
trusted library allocation
page read and write
1F6D0000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
10CB000
heap
page read and write
1C361000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
5EA000
heap
page read and write
1FD60000
trusted library allocation
page read and write
1FCF0000
trusted library allocation
page read and write
1C361000
heap
page read and write
2247293B000
heap
page read and write
1C361000
heap
page read and write
1FCD0000
trusted library allocation
page read and write
224720D6000
heap
page read and write
2420000
trusted library allocation
page read and write
1C361000
heap
page read and write
1D17D000
trusted library allocation
page execute and read and write
1FCF5000
trusted library allocation
page read and write
108B000
heap
page read and write
5EA000
heap
page read and write
There are 1478 hidden memdumps, click here to show them.