IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1007519001\62021a8f0e.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1007520001\978a305c02.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1007519001\62021a8f0e.exe
"C:\Users\user\AppData\Local\Temp\1007519001\62021a8f0e.exe"
malicious
C:\Users\user\AppData\Local\Temp\1007520001\978a305c02.exe
"C:\Users\user\AppData\Local\Temp\1007520001\978a305c02.exe"
malicious

URLs

Name
IP
Malicious
http://fvtekk5pn.top/v1/upload.php
34.116.198.130
malicious
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
malicious
http://html4/loose.dtd
unknown
http://185.215.113.16/steam/random.exeA
unknown
http://185.215.113.16/steam/random.exe;
unknown
http://31.41.244.11/files/random.exe5062384ed
unknown
https://curl.se/docs/http-cookies.html
unknown
https://cook-rain.sbs/api
188.114.96.3
http://185.215.113.16/steam/random.exe6139
unknown
http://185.215.113.16/steam/random.exe
unknown
https://cook-rain.sbs/
unknown
http://185.215.113.16/steam/random.exe21001
unknown
http://185.215.113.16/steam/random.exe1395d
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW17
unknown
http://185.215.113.43/Zu7JuNko/index.phpJ
unknown
https://curl.se/docs/alt-svc.html
unknown
p3ar11fter.sbs
http://185.215.113.16/steam/random.exe1395
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
http://.css
unknown
http://185.215.113.16/luma/random.exe
unknown
http://185.215.113.16/luma/random.exeH
unknown
https://cook-rain.sbs/apiata=
unknown
peepburry828.sbs
https://curl.se/docs/hsts.html
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
https://cook-rain.sbs:443/apiz
unknown
http://185.215.113.16/steam/random.exeencoded
unknown
http://31.41.244.11/files/random.exe5062384760
unknown
http://crl.micro
unknown
http://185.215.113.43/Zu7JuNko/index.php0001
unknown
http://185.215.113.16/steam/random.exe6395d
unknown
https://cook-rain.sbs/api%
unknown
p10tgrace.sbs
http://31.41.244.11/files/random.exe
unknown
https://ace-snapper-privately.ngrok-free.app/test/test
unknown
http://.jpg
unknown
http://185.215.113.16/steam/random.exe61395d7f
unknown
http://185.215.113.43/Zu7JuNko/index.phpl
unknown
processhol.sbs
http://185.215.113.16/luma/random.exe$
unknown
http://185.215.113.16/luma/random.exed
unknown
http://31.41.244.11/files/random.exeX4
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
cook-rain.sbs
188.114.96.3
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
188.114.96.3
cook-rain.sbs
European Union
34.116.198.130
home.fvtekk5pn.top
United States
185.215.113.16
unknown
Portugal
31.41.244.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
978a305c02.exe
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9D1000
unkown
page execute and read and write
malicious
9D1000
unkown
page execute and read and write
malicious
4ED0000
direct allocation
page read and write
malicious
51C0000
direct allocation
page read and write
malicious
9D1000
unkown
page execute and read and write
malicious
F91000
unkown
page execute and read and write
malicious
5780000
direct allocation
page read and write
malicious
51A0000
direct allocation
page read and write
malicious
D51000
unkown
page execute and read and write
malicious
ECE000
stack
page read and write
4D31000
heap
page read and write
765B000
heap
page read and write
CE8000
unkown
page execute and write copy
52F1000
heap
page read and write
3B8E000
stack
page read and write
14CF000
stack
page read and write
4D31000
heap
page read and write
7270000
direct allocation
page execute and read and write
74B000
stack
page read and write
492F000
stack
page read and write
8C9C000
stack
page read and write
2D47000
heap
page read and write
5380000
direct allocation
page execute and read and write
4C9F000
stack
page read and write
52F1000
heap
page read and write
1181000
unkown
page execute and read and write
614C000
stack
page read and write
7746000
heap
page read and write
6E3F000
stack
page read and write
5D2D000
stack
page read and write
76C1000
heap
page read and write
52F1000
heap
page read and write
52F1000
heap
page read and write
39DF000
stack
page read and write
52F1000
heap
page read and write
4D31000
heap
page read and write
5350000
direct allocation
page execute and read and write
52F1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
5030000
direct allocation
page execute and read and write
1B0F000
stack
page read and write
16E6000
heap
page read and write
2D8E000
stack
page read and write
A39000
unkown
page read and write
455E000
stack
page read and write
4A5E000
stack
page read and write
4D31000
heap
page read and write
6FA0000
trusted library allocation
page read and write
7270000
direct allocation
page execute and read and write
4D00000
direct allocation
page read and write
37DF000
stack
page read and write
4D31000
heap
page read and write
19E7000
heap
page read and write
9D1000
unkown
page execute and write copy
52DF000
stack
page read and write
7270000
direct allocation
page execute and read and write
152E000
stack
page read and write
3ECF000
stack
page read and write
1CBF000
heap
page read and write
1CE1000
heap
page read and write
4D20000
direct allocation
page read and write
4D31000
heap
page read and write
146E000
heap
page read and write
1443000
unkown
page execute and read and write
52F0000
heap
page read and write
3630000
direct allocation
page read and write
52F1000
heap
page read and write
77AF000
heap
page read and write
7270000
direct allocation
page execute and read and write
4D31000
heap
page read and write
4D50000
heap
page read and write
12A7000
unkown
page execute and write copy
13AA000
heap
page read and write
FE0000
direct allocation
page read and write
52F1000
heap
page read and write
5360000
direct allocation
page execute and read and write
137E000
stack
page read and write
1394000
heap
page read and write
4A11000
heap
page read and write
41CE000
stack
page read and write
5910000
direct allocation
page execute and read and write
4CDE000
stack
page read and write
565F000
stack
page read and write
4D31000
heap
page read and write
CCF000
unkown
page execute and read and write
1C00000
heap
page read and write
305D000
heap
page read and write
C10000
heap
page read and write
4D20000
direct allocation
page read and write
5950000
direct allocation
page execute and read and write
5340000
direct allocation
page execute and read and write
4D31000
heap
page read and write
53A0000
direct allocation
page execute and read and write
59A0000
direct allocation
page execute and read and write
6F7E000
stack
page read and write
7B0000
heap
page read and write
D50000
unkown
page readonly
15DA000
stack
page read and write
3F9E000
stack
page read and write
4E90000
direct allocation
page read and write
30EF000
stack
page read and write
4D31000
heap
page read and write
7656000
heap
page read and write
9D0000
unkown
page read and write
5380000
direct allocation
page execute and read and write
77A5000
heap
page read and write
17A1000
unkown
page execute and write copy
2D40000
heap
page read and write
7653000
heap
page read and write
52F1000
heap
page read and write
1C55000
heap
page read and write
4D31000
heap
page read and write
52F1000
heap
page read and write
3DEF000
stack
page read and write
772A000
heap
page read and write
4D31000
heap
page read and write
5930000
direct allocation
page execute and read and write
5780000
direct allocation
page read and write
5330000
direct allocation
page execute and read and write
51A0000
direct allocation
page read and write
C30000
heap
page read and write
F90000
unkown
page readonly
14E4000
heap
page read and write
52F1000
heap
page read and write
58CF000
stack
page read and write
440E000
stack
page read and write
9D0000
unkown
page readonly
9D1000
unkown
page execute and write copy
1C0A000
heap
page read and write
4D31000
heap
page read and write
5010000
direct allocation
page execute and read and write
FD0000
heap
page read and write
3630000
direct allocation
page read and write
B50000
unkown
page readonly
490E000
stack
page read and write
1299000
unkown
page execute and read and write
51C0000
direct allocation
page read and write
783F000
heap
page read and write
4A11000
heap
page read and write
5330000
direct allocation
page execute and read and write
C20000
direct allocation
page read and write
415F000
stack
page read and write
5330000
direct allocation
page execute and read and write
F90000
unkown
page read and write
57E1000
direct allocation
page read and write
52F1000
heap
page read and write
4A6F000
stack
page read and write
707F000
stack
page read and write
12FD000
stack
page read and write
458E000
stack
page read and write
530F000
stack
page read and write
53E0000
direct allocation
page execute and read and write
2FE7000
heap
page read and write
4D1F000
stack
page read and write
52F1000
heap
page read and write
77DF000
heap
page read and write
7785000
heap
page read and write
6060000
heap
page read and write
414F000
stack
page read and write
52F1000
heap
page read and write
3630000
direct allocation
page read and write
52F1000
heap
page read and write
5350000
direct allocation
page execute and read and write
3630000
direct allocation
page read and write
1475000
heap
page read and write
4A0F000
stack
page read and write
52F1000
heap
page read and write
41AF000
stack
page read and write
CE7000
unkown
page execute and read and write
1394000
heap
page read and write
52F1000
heap
page read and write
58F0000
direct allocation
page execute and read and write
E85000
unkown
page execute and write copy
7270000
direct allocation
page execute and read and write
352F000
stack
page read and write
4D31000
heap
page read and write
4A1F000
stack
page read and write
1380000
direct allocation
page read and write
52EF000
stack
page read and write
4A10000
heap
page read and write
C35000
heap
page read and write
4D31000
heap
page read and write
F1C000
stack
page read and write
52F1000
heap
page read and write
6C2E000
stack
page read and write
46DF000
stack
page read and write
52F1000
heap
page read and write
4F5E000
stack
page read and write
1394000
heap
page read and write
52F1000
heap
page read and write
54CE000
stack
page read and write
368E000
stack
page read and write
1CC6000
heap
page read and write
52F1000
heap
page read and write
3A5F000
stack
page read and write
4D00000
direct allocation
page read and write
52F1000
heap
page read and write
FE0000
direct allocation
page read and write
51EE000
stack
page read and write
52F1000
heap
page read and write
FFB000
unkown
page execute and read and write
79AB000
heap
page read and write
40DE000
stack
page read and write
C20000
direct allocation
page read and write
57CF000
stack
page read and write
52F1000
heap
page read and write
4A11000
heap
page read and write
1394000
heap
page read and write
77E1000
heap
page read and write
52F1000
heap
page read and write
1394000
heap
page read and write
52F1000
heap
page read and write
34CF000
stack
page read and write
1C89000
heap
page read and write
4D31000
heap
page read and write
4A11000
heap
page read and write
1056000
unkown
page execute and write copy
1C52000
heap
page read and write
4D31000
heap
page read and write
52F1000
heap
page read and write
315F000
stack
page read and write
4F0E000
stack
page read and write
4D31000
heap
page read and write
5370000
direct allocation
page execute and read and write
1CE3000
heap
page read and write
52F1000
heap
page read and write
4D40000
heap
page read and write
3630000
direct allocation
page read and write
4D31000
heap
page read and write
52F1000
heap
page read and write
338F000
stack
page read and write
4A11000
heap
page read and write
54F0000
remote allocation
page read and write
16B9000
heap
page read and write
5980000
direct allocation
page execute and read and write
1CC6000
heap
page read and write
CA4000
unkown
page execute and read and write
3F0E000
stack
page read and write
584E000
stack
page read and write
D95000
unkown
page execute and read and write
14DE000
stack
page read and write
47DE000
stack
page read and write
4A11000
heap
page read and write
14DB000
stack
page read and write
4D31000
heap
page read and write
4E90000
direct allocation
page read and write
1C47000
heap
page read and write
1CB7000
heap
page read and write
482E000
stack
page read and write
4D31000
heap
page read and write
5330000
direct allocation
page execute and read and write
781C000
heap
page read and write
4A11000
heap
page read and write
3F0F000
stack
page read and write
19E0000
heap
page read and write
7270000
direct allocation
page execute and read and write
52F1000
heap
page read and write
57AE000
stack
page read and write
48DF000
stack
page read and write
40AE000
stack
page read and write
1CCD000
heap
page read and write
777A000
heap
page read and write
490F000
stack
page read and write
52F1000
heap
page read and write
F1C000
stack
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
52F1000
heap
page read and write
3A6E000
stack
page read and write
3F5F000
stack
page read and write
4FCF000
stack
page read and write
1394000
heap
page read and write
52F1000
heap
page read and write
401F000
stack
page read and write
4D11000
heap
page read and write
3CDF000
stack
page read and write
4A11000
heap
page read and write
31EF000
stack
page read and write
4D00000
direct allocation
page read and write
52F1000
heap
page read and write
454F000
stack
page read and write
52F1000
heap
page read and write
1C7E000
heap
page read and write
4D31000
heap
page read and write
FF2000
unkown
page execute and read and write
465F000
stack
page read and write
77C5000
heap
page read and write
5330000
direct allocation
page execute and read and write
328F000
stack
page read and write
5960000
direct allocation
page execute and read and write
469E000
stack
page read and write
4DDF000
stack
page read and write
1C0E000
heap
page read and write
4D20000
direct allocation
page read and write
4D00000
direct allocation
page read and write
52F1000
heap
page read and write
7651000
heap
page read and write
52F1000
heap
page read and write
C20000
direct allocation
page read and write
1394000
heap
page read and write
4E1E000
stack
page read and write
785D000
heap
page read and write
3050000
heap
page read and write
4A11000
heap
page read and write
7654000
heap
page read and write
14E4000
heap
page read and write
1CB7000
heap
page read and write
1394000
heap
page read and write
52F1000
heap
page read and write
14E4000
heap
page read and write
378F000
stack
page read and write
4D31000
heap
page read and write
765F000
heap
page read and write
4D20000
direct allocation
page read and write
374F000
stack
page read and write
52F1000
heap
page read and write
1056000
unkown
page execute and read and write
CA4000
unkown
page execute and read and write
1C61000
heap
page read and write
904C000
stack
page read and write
4D31000
heap
page read and write
4D00000
direct allocation
page read and write
146E000
stack
page read and write
1057000
unkown
page execute and write copy
5910000
direct allocation
page execute and read and write
4D20000
direct allocation
page read and write
53D0000
direct allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
C20000
direct allocation
page read and write
4B5F000
stack
page read and write
514D000
stack
page read and write
16A7000
heap
page read and write
1C61000
heap
page read and write
7780000
heap
page read and write
7270000
direct allocation
page execute and read and write
4D31000
heap
page read and write
8B9B000
stack
page read and write
7656000
heap
page read and write
4D31000
heap
page read and write
52F1000
heap
page read and write
772C000
heap
page read and write
A39000
unkown
page write copy
50B0000
direct allocation
page execute and read and write
538F000
stack
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
5910000
direct allocation
page execute and read and write
58FE000
stack
page read and write
3E5E000
stack
page read and write
36AE000
stack
page read and write
400F000
stack
page read and write
52F1000
heap
page read and write
5090000
direct allocation
page execute and read and write
76C0000
heap
page read and write
7260000
direct allocation
page execute and read and write
7270000
direct allocation
page execute and read and write
7655000
heap
page read and write
4D31000
heap
page read and write
CE7000
unkown
page execute and read and write
50A0000
direct allocation
page execute and read and write
52F1000
heap
page read and write
CE7000
unkown
page execute and write copy
3630000
direct allocation
page read and write
52E0000
direct allocation
page read and write
4D00000
direct allocation
page read and write
7774000
heap
page read and write
4D00000
direct allocation
page read and write
775A000
heap
page read and write
A32000
unkown
page execute and read and write
1CBA000
heap
page read and write
42DE000
stack
page read and write
5350000
direct allocation
page execute and read and write
4A11000
heap
page read and write
4D31000
heap
page read and write
5B4C000
stack
page read and write
FE0000
direct allocation
page read and write
300E000
stack
page read and write
7270000
direct allocation
page execute and read and write
1394000
heap
page read and write
70B1000
heap
page read and write
15AE000
stack
page read and write
52F1000
heap
page read and write
CCF000
unkown
page execute and read and write
52E0000
direct allocation
page read and write
9D0000
unkown
page readonly
15EB000
stack
page read and write
3C8E000
stack
page read and write
1470000
heap
page read and write
2EDE000
stack
page read and write
2F5E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
318E000
stack
page read and write
5080000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
1CC8000
heap
page read and write
1C4C000
heap
page read and write
7744000
heap
page read and write
FF0000
heap
page read and write
3CCE000
stack
page read and write
5020000
direct allocation
page execute and read and write
54EB000
stack
page read and write
2EE0000
direct allocation
page execute and read and write
4A70000
heap
page read and write
7551000
heap
page read and write
3E1F000
stack
page read and write
3CAF000
stack
page read and write
391F000
stack
page read and write
505F000
stack
page read and write
42CE000
stack
page read and write
CD9000
unkown
page execute and read and write
328E000
stack
page read and write
5010000
direct allocation
page execute and read and write
1B4E000
stack
page read and write
5320000
direct allocation
page execute and read and write
335F000
stack
page read and write
1C54000
heap
page read and write
4BFE000
stack
page read and write
3E0E000
stack
page read and write
1BE0000
heap
page read and write
4D31000
heap
page read and write
33CF000
stack
page read and write
1B8E000
stack
page read and write
FF9000
unkown
page read and write
52F1000
heap
page read and write
2EF0000
direct allocation
page execute and read and write
52F1000
heap
page read and write
7A0000
heap
page read and write
13AE000
heap
page read and write
4D31000
heap
page read and write
624C000
stack
page read and write
52F1000
heap
page read and write
4D31000
heap
page read and write
1C8B000
heap
page read and write
137E000
stack
page read and write
5310000
direct allocation
page execute and read and write
162E000
stack
page read and write
1394000
heap
page read and write
7655000
heap
page read and write
79E7000
heap
page read and write
FE0000
direct allocation
page read and write
1380000
heap
page read and write
3C4F000
stack
page read and write
359E000
stack
page read and write
52E0000
direct allocation
page read and write
52F1000
heap
page read and write
52F1000
heap
page read and write
4A11000
heap
page read and write
4D00000
direct allocation
page read and write
52E0000
direct allocation
page read and write
59FF000
stack
page read and write
430E000
stack
page read and write
70B0000
heap
page read and write
77FF000
heap
page read and write
4D20000
direct allocation
page read and write
485E000
stack
page read and write
300E000
stack
page read and write
1264000
unkown
page execute and read and write
12A7000
unkown
page execute and read and write
38CF000
stack
page read and write
A3B000
unkown
page execute and read and write
52E0000
direct allocation
page read and write
500F000
stack
page read and write
58AF000
stack
page read and write
5040000
direct allocation
page execute and read and write
52E0000
direct allocation
page read and write
3A4E000
stack
page read and write
3CEE000
stack
page read and write
494E000
stack
page read and write
1668000
heap
page read and write
3B4E000
stack
page read and write
52F1000
heap
page read and write
4D00000
direct allocation
page read and write
52F1000
heap
page read and write
7270000
direct allocation
page execute and read and write
2F07000
heap
page read and write
B51000
unkown
page execute and write copy
395E000
stack
page read and write
52F1000
heap
page read and write
E85000
unkown
page execute and write copy
7654000
heap
page read and write
418E000
stack
page read and write
4D20000
direct allocation
page read and write
75A2000
direct allocation
page read and write
52F1000
heap
page read and write
7270000
direct allocation
page execute and read and write
4D31000
heap
page read and write
1BCE000
stack
page read and write
1480000
heap
page read and write
5010000
direct allocation
page execute and read and write
46AF000
stack
page read and write
C0E000
stack
page read and write
2F00000
heap
page read and write
5060000
direct allocation
page execute and read and write
14F0000
direct allocation
page execute and read and write
4D31000
heap
page read and write
A39000
unkown
page write copy
7805000
heap
page read and write
52F1000
heap
page read and write
A3B000
unkown
page execute and read and write
52F1000
heap
page read and write
314E000
stack
page read and write
4A11000
heap
page read and write
C20000
direct allocation
page read and write
AFB000
stack
page read and write
1CE1000
heap
page read and write
796A000
heap
page read and write
5070000
direct allocation
page execute and read and write
3C9E000
stack
page read and write
770B000
heap
page read and write
57D0000
heap
page read and write
A39000
unkown
page read and write
1394000
heap
page read and write
3C5F000
stack
page read and write
5010000
direct allocation
page execute and read and write
783F000
heap
page read and write
408E000
stack
page read and write
5900000
direct allocation
page execute and read and write
325F000
stack
page read and write
3D9F000
stack
page read and write
7654000
heap
page read and write
1CCA000
heap
page read and write
1BD0000
heap
page read and write
4D36000
heap
page read and write
468E000
stack
page read and write
1CB8000
heap
page read and write
CE7000
unkown
page execute and write copy
128F000
unkown
page execute and read and write
4A11000
heap
page read and write
419E000
stack
page read and write
37AF000
stack
page read and write
42CF000
stack
page read and write
D50000
unkown
page read and write
4A51000
heap
page read and write
4BDF000
stack
page read and write
6B51000
heap
page read and write
3BDE000
stack
page read and write
52F1000
heap
page read and write
3630000
direct allocation
page read and write
5221000
direct allocation
page read and write
428F000
stack
page read and write
33CE000
stack
page read and write
78A7000
heap
page read and write
A39000
unkown
page read and write
4D31000
heap
page read and write
7A37000
heap
page read and write
FE0000
direct allocation
page read and write
1394000
heap
page read and write
4D31000
heap
page read and write
431F000
stack
page read and write
52F1000
heap
page read and write
52F1000
heap
page read and write
5010000
direct allocation
page execute and read and write
59B0000
direct allocation
page execute and read and write
3630000
direct allocation
page read and write
52F1000
heap
page read and write
70D4000
heap
page read and write
77D7000
heap
page read and write
7650000
heap
page read and write
D3F000
stack
page read and write
14E4000
heap
page read and write
52F1000
heap
page read and write
14E4000
heap
page read and write
52F1000
heap
page read and write
432D000
stack
page read and write
4A11000
heap
page read and write
51C0000
direct allocation
page read and write
446E000
stack
page read and write
5350000
direct allocation
page execute and read and write
39CF000
stack
page read and write
F80000
heap
page read and write
2FE0000
heap
page read and write
5970000
direct allocation
page execute and read and write
F91000
unkown
page execute and write copy
4A20000
heap
page read and write
389F000
stack
page read and write
52F1000
heap
page read and write
52F1000
heap
page read and write
369F000
stack
page read and write
459F000
stack
page read and write
FCF000
stack
page read and write
73C000
stack
page read and write
7270000
direct allocation
page execute and read and write
7270000
direct allocation
page execute and read and write
1DFF000
stack
page read and write
78BC000
heap
page read and write
14E4000
heap
page read and write
7656000
heap
page read and write
300F000
stack
page read and write
3A1E000
stack
page read and write
1CA3000
heap
page read and write
4ECE000
stack
page read and write
54F0000
remote allocation
page read and write
1A05000
heap
page read and write
6FF0000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
5390000
direct allocation
page execute and read and write
52F1000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
4D31000
heap
page read and write
5780000
direct allocation
page read and write
1047000
unkown
page execute and read and write
70D5000
heap
page read and write
150E000
heap
page read and write
3630000
direct allocation
page read and write
33EF000
stack
page read and write
4A11000
heap
page read and write
7270000
direct allocation
page execute and read and write
FE0000
direct allocation
page read and write
FE0000
direct allocation
page read and write
3630000
direct allocation
page read and write
52F1000
heap
page read and write
2F1E000
stack
page read and write
5330000
direct allocation
page execute and read and write
4D31000
heap
page read and write
2D4C000
heap
page read and write
4D31000
heap
page read and write
6BEE000
stack
page read and write
FE0000
direct allocation
page read and write
47CF000
stack
page read and write
14E0000
heap
page read and write
779D000
heap
page read and write
6FF0000
direct allocation
page read and write
FE0000
direct allocation
page read and write
38CE000
stack
page read and write
786E000
heap
page read and write
FE0000
direct allocation
page read and write
41DF000
stack
page read and write
5010000
direct allocation
page execute and read and write
133F000
stack
page read and write
1C54000
heap
page read and write
355F000
stack
page read and write
594F000
stack
page read and write
5000000
direct allocation
page execute and read and write
52F1000
heap
page read and write
480E000
stack
page read and write
F36000
unkown
page execute and read and write
CA4000
unkown
page execute and read and write
164B000
heap
page read and write
1C7E000
heap
page read and write
52F1000
heap
page read and write
5050000
direct allocation
page execute and read and write
4D20000
direct allocation
page read and write
793E000
heap
page read and write
406F000
stack
page read and write
491E000
stack
page read and write
980000
heap
page read and write
52F1000
heap
page read and write
765D000
heap
page read and write
140E000
stack
page read and write
4D31000
heap
page read and write
5301000
heap
page read and write
765A000
heap
page read and write
524D000
stack
page read and write
76ED000
heap
page read and write
9D0000
unkown
page readonly
45DE000
stack
page read and write
4D31000
heap
page read and write
BC1000
unkown
page execute and read and write
F80000
heap
page read and write
4B9E000
stack
page read and write
1CCD000
heap
page read and write
7651000
heap
page read and write
3B9F000
stack
page read and write
52F1000
heap
page read and write
1CC7000
heap
page read and write
54F0000
remote allocation
page read and write
4D31000
heap
page read and write
52F1000
heap
page read and write
4A11000
heap
page read and write
4D31000
heap
page read and write
52F1000
heap
page read and write
76D0000
heap
page read and write
4D31000
heap
page read and write
2FDE000
stack
page read and write
4E10000
trusted library allocation
page read and write
52F1000
heap
page read and write
4D31000
heap
page read and write
3F4E000
stack
page read and write
390E000
stack
page read and write
1CA3000
heap
page read and write
51A0000
direct allocation
page read and write
5E2D000
stack
page read and write
310F000
stack
page read and write
5350000
direct allocation
page execute and read and write
4CFF000
stack
page read and write
404F000
stack
page read and write
7657000
heap
page read and write
4A51000
heap
page read and write
FE0000
direct allocation
page read and write
5B84000
heap
page read and write
133F000
stack
page read and write
2D3F000
stack
page read and write
FE0000
direct allocation
page read and write
7825000
heap
page read and write
576F000
stack
page read and write
4D31000
heap
page read and write
442F000
stack
page read and write
43DF000
stack
page read and write
1CCC000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
4D31000
heap
page read and write
32EF000
stack
page read and write
52F1000
heap
page read and write
1840000
heap
page read and write
9D0000
unkown
page read and write
3630000
direct allocation
page read and write
52F1000
heap
page read and write
A3B000
unkown
page execute and read and write
388F000
stack
page read and write
1445000
unkown
page execute and write copy
76D0000
heap
page read and write
7653000
heap
page read and write
456F000
stack
page read and write
1040000
unkown
page execute and read and write
52F1000
heap
page read and write
5350000
direct allocation
page execute and read and write
4D31000
heap
page read and write
43CF000
stack
page read and write
6C35000
heap
page read and write
7789000
heap
page read and write
5201000
direct allocation
page read and write
8F4C000
stack
page read and write
6FF0000
direct allocation
page read and write
5370000
direct allocation
page execute and read and write
9D1000
unkown
page execute and write copy
52E0000
direct allocation
page read and write
5A4D000
stack
page read and write
364F000
stack
page read and write
5010000
direct allocation
page execute and read and write
53CE000
stack
page read and write
562F000
stack
page read and write
52F1000
heap
page read and write
440F000
stack
page read and write
52F1000
heap
page read and write
4D00000
direct allocation
page read and write
5910000
direct allocation
page execute and read and write
51DE000
stack
page read and write
77FE000
heap
page read and write
3630000
direct allocation
page read and write
14E4000
heap
page read and write
4D11000
heap
page read and write
14A0000
heap
page read and write
2ECE000
stack
page read and write
450F000
stack
page read and write
198D000
stack
page read and write
7270000
direct allocation
page execute and read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
5990000
direct allocation
page execute and read and write
57CE000
stack
page read and write
36DE000
stack
page read and write
314F000
stack
page read and write
4D20000
direct allocation
page read and write
4D00000
direct allocation
page read and write
15E8000
unkown
page execute and write copy
7650000
heap
page read and write
70A0000
heap
page read and write
3F2F000
stack
page read and write
1638000
heap
page read and write
7659000
heap
page read and write
1CA3000
heap
page read and write
47CE000
stack
page read and write
FED000
stack
page read and write
52F1000
heap
page read and write
52F1000
heap
page read and write
1409000
heap
page read and write
765D000
heap
page read and write
52E0000
direct allocation
page read and write
C20000
direct allocation
page read and write
3BAE000
stack
page read and write
52E0000
direct allocation
page read and write
7650000
heap
page read and write
52F1000
heap
page read and write
1380000
direct allocation
page read and write
BC1000
unkown
page execute and read and write
52F1000
heap
page read and write
C20000
direct allocation
page read and write
52F1000
heap
page read and write
528E000
stack
page read and write
4D31000
heap
page read and write
7821000
heap
page read and write
4F31000
direct allocation
page read and write
4A11000
heap
page read and write
C20000
direct allocation
page read and write
DA8000
unkown
page execute and read and write
7654000
heap
page read and write
165C000
heap
page read and write
4A11000
heap
page read and write
5920000
direct allocation
page execute and read and write
1C5F000
heap
page read and write
4D31000
heap
page read and write
5010000
direct allocation
page execute and read and write
52F1000
heap
page read and write
38EF000
stack
page read and write
7270000
direct allocation
page execute and read and write
3DCF000
stack
page read and write
4D11000
heap
page read and write
7659000
heap
page read and write
444E000
stack
page read and write
4D31000
heap
page read and write
5320000
direct allocation
page execute and read and write
6C36000
heap
page read and write
52F1000
heap
page read and write
435E000
stack
page read and write
52F1000
heap
page read and write
304E000
stack
page read and write
182F000
stack
page read and write
FF9000
unkown
page write copy
52F1000
heap
page read and write
4D31000
heap
page read and write
4D11000
heap
page read and write
471E000
stack
page read and write
162F000
stack
page read and write
4ABE000
stack
page read and write
7718000
heap
page read and write
509E000
stack
page read and write
52F1000
heap
page read and write
52F1000
heap
page read and write
4A9F000
stack
page read and write
4A11000
heap
page read and write
38DE000
stack
page read and write
52F1000
heap
page read and write
1380000
direct allocation
page read and write
4B50000
trusted library allocation
page read and write
4A51000
heap
page read and write
76F9000
direct allocation
page read and write
CE7000
unkown
page execute and write copy
7658000
heap
page read and write
123E000
stack
page read and write
369F000
stack
page read and write
3B0F000
stack
page read and write
5390000
direct allocation
page execute and read and write
356E000
stack
page read and write
CD9000
unkown
page execute and read and write
A32000
unkown
page execute and read and write
14E4000
heap
page read and write
5780000
direct allocation
page read and write
496E000
stack
page read and write
52F1000
heap
page read and write
3E2E000
stack
page read and write
3630000
direct allocation
page read and write
342E000
stack
page read and write
7250000
direct allocation
page execute and read and write
52E0000
direct allocation
page read and write
14E4000
heap
page read and write
4D31000
heap
page read and write
449E000
stack
page read and write
C20000
direct allocation
page read and write
14E4000
heap
page read and write
5C8D000
stack
page read and write
1C83000
heap
page read and write
793F000
heap
page read and write
6F3F000
stack
page read and write
77DF000
heap
page read and write
3B4F000
stack
page read and write
4D31000
heap
page read and write
53F0000
trusted library allocation
page read and write
52F1000
heap
page read and write
1448000
heap
page read and write
7652000
heap
page read and write
1920000
heap
page read and write
7270000
direct allocation
page execute and read and write
CE8000
unkown
page execute and write copy
A32000
unkown
page execute and read and write
3D1E000
stack
page read and write
7652000
heap
page read and write
1663000
heap
page read and write
7270000
direct allocation
page execute and read and write
4E50000
trusted library allocation
page read and write
5010000
direct allocation
page execute and read and write
3C8F000
stack
page read and write
41EE000
stack
page read and write
2E9F000
stack
page read and write
5350000
direct allocation
page execute and read and write
7656000
heap
page read and write
3A2F000
stack
page read and write
FE0000
direct allocation
page read and write
4D31000
heap
page read and write
429F000
stack
page read and write
4A11000
heap
page read and write
76CE000
heap
page read and write
4D20000
direct allocation
page read and write
52E0000
direct allocation
page read and write
77C2000
heap
page read and write
3B1F000
stack
page read and write
149F000
stack
page read and write
48CF000
stack
page read and write
3A9E000
stack
page read and write
350F000
stack
page read and write
7819000
heap
page read and write
4A11000
heap
page read and write
350E000
stack
page read and write
7653000
heap
page read and write
7A0C000
heap
page read and write
421E000
stack
page read and write
7656000
heap
page read and write
552E000
stack
page read and write
1A00000
heap
page read and write
4E8D000
stack
page read and write
3EDF000
stack
page read and write
E83000
unkown
page execute and read and write
1413000
heap
page read and write
52F1000
heap
page read and write
52F1000
heap
page read and write
7848000
heap
page read and write
2E8F000
stack
page read and write
7654000
heap
page read and write
4D31000
heap
page read and write
32CE000
stack
page read and write
5910000
direct allocation
page execute and read and write
CE7000
unkown
page execute and read and write
7778000
heap
page read and write
4C1E000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4BBF000
stack
page read and write
5010000
direct allocation
page execute and read and write
404E000
stack
page read and write
76FB000
direct allocation
page read and write
E83000
unkown
page execute and read and write
481F000
stack
page read and write
405E000
stack
page read and write
52F1000
heap
page read and write
5940000
direct allocation
page execute and read and write
5360000
direct allocation
page execute and read and write
46EE000
stack
page read and write
7240000
direct allocation
page execute and read and write
4D00000
direct allocation
page read and write
770B000
heap
page read and write
4A51000
heap
page read and write
77C9000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
4D20000
direct allocation
page read and write
12A8000
unkown
page execute and write copy
381E000
stack
page read and write
8A0000
heap
page read and write
4D31000
heap
page read and write
3A0F000
stack
page read and write
4D30000
heap
page read and write
3B5E000
stack
page read and write
324F000
stack
page read and write
51AC000
stack
page read and write
6C30000
heap
page read and write
7979000
heap
page read and write
47EF000
stack
page read and write
52F1000
heap
page read and write
CE8000
unkown
page execute and write copy
7A24000
heap
page read and write
52F1000
heap
page read and write
454E000
stack
page read and write
1C84000
heap
page read and write
1CE1000
heap
page read and write
5340000
direct allocation
page execute and read and write
1630000
heap
page read and write
53B0000
direct allocation
page execute and read and write
14A5000
heap
page read and write
1390000
heap
page read and write
7791000
heap
page read and write
52F1000
heap
page read and write
13E4000
heap
page read and write
1CBE000
heap
page read and write
8A60000
heap
page read and write
53B0000
direct allocation
page execute and read and write
52F1000
heap
page read and write
3B6F000
stack
page read and write
519F000
stack
page read and write
C20000
direct allocation
page read and write
4D20000
direct allocation
page read and write
464F000
stack
page read and write
14E4000
heap
page read and write
441E000
stack
page read and write
5910000
direct allocation
page execute and read and write
7654000
heap
page read and write
C20000
direct allocation
page read and write
4D00000
direct allocation
page read and write
11FA000
unkown
page execute and read and write
13E8000
heap
page read and write
8DDE000
stack
page read and write
354E000
stack
page read and write
4D31000
heap
page read and write
52F1000
heap
page read and write
51C0000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
52F1000
heap
page read and write
1394000
heap
page read and write
4D31000
heap
page read and write
7902000
heap
page read and write
FF0000
heap
page read and write
1CCC000
heap
page read and write
1665000
heap
page read and write
13A0000
heap
page read and write
42EF000
stack
page read and write
4D31000
heap
page read and write
1CE4000
heap
page read and write
52E0000
direct allocation
page read and write
7656000
heap
page read and write
3A0E000
stack
page read and write
E85000
unkown
page execute and write copy
51A0000
direct allocation
page read and write
479F000
stack
page read and write
1019000
unkown
page execute and read and write
4A11000
heap
page read and write
765B000
heap
page read and write
56CE000
stack
page read and write
3057000
heap
page read and write
501E000
stack
page read and write
4A50000
heap
page read and write
E83000
unkown
page execute and read and write
305B000
heap
page read and write
1394000
heap
page read and write
A39000
unkown
page write copy
37CE000
stack
page read and write
4D20000
direct allocation
page read and write
4D31000
heap
page read and write
340E000
stack
page read and write
7270000
direct allocation
page execute and read and write
3DDE000
stack
page read and write
52F1000
heap
page read and write
19CE000
stack
page read and write
4ED4000
direct allocation
page read and write
5B8D000
stack
page read and write
790B000
heap
page read and write
366F000
stack
page read and write
3DCE000
stack
page read and write
4F1F000
stack
page read and write
77F0000
heap
page read and write
478F000
stack
page read and write
123E000
stack
page read and write
499E000
stack
page read and write
52F1000
heap
page read and write
1CB7000
heap
page read and write
4D31000
heap
page read and write
5053000
trusted library allocation
page read and write
4D20000
direct allocation
page read and write
4D31000
heap
page read and write
3F6E000
stack
page read and write
5330000
direct allocation
page execute and read and write
1394000
heap
page read and write
555E000
stack
page read and write
4D31000
heap
page read and write
379F000
stack
page read and write
3D8F000
stack
page read and write
7739000
heap
page read and write
345F000
stack
page read and write
150A000
heap
page read and write
78DD000
heap
page read and write
52E0000
direct allocation
page read and write
76F2000
heap
page read and write
C20000
direct allocation
page read and write
2FCF000
stack
page read and write
13DA000
heap
page read and write
378E000
stack
page read and write
12FD000
stack
page read and write
3F1E000
stack
page read and write
52F1000
heap
page read and write
360F000
stack
page read and write
3630000
direct allocation
page read and write
4E90000
direct allocation
page read and write
4D31000
heap
page read and write
4A4F000
stack
page read and write
4D31000
heap
page read and write
1640000
heap
page read and write
304E000
stack
page read and write
7270000
direct allocation
page execute and read and write
1CA3000
heap
page read and write
775E000
heap
page read and write
7652000
heap
page read and write
4D10000
heap
page read and write
CCF000
unkown
page execute and read and write
52F1000
heap
page read and write
1C81000
heap
page read and write
1CB7000
heap
page read and write
9D0000
unkown
page read and write
4D00000
direct allocation
page read and write
FEE000
stack
page read and write
52E0000
direct allocation
page read and write
FE0000
direct allocation
page read and write
5040000
direct allocation
page execute and read and write
4ADE000
stack
page read and write
566E000
stack
page read and write
52F1000
heap
page read and write
520C000
stack
page read and write
1CE3000
heap
page read and write
52F1000
heap
page read and write
46CE000
stack
page read and write
BC1000
unkown
page execute and read and write
83D000
stack
page read and write
11FB000
unkown
page execute and write copy
1500000
heap
page read and write
1CCD000
heap
page read and write
451F000
stack
page read and write
52F1000
heap
page read and write
C20000
direct allocation
page read and write
7810000
heap
page read and write
4E30000
trusted library allocation
page read and write
495F000
stack
page read and write
409F000
stack
page read and write
418E000
stack
page read and write
1464000
heap
page read and write
468F000
stack
page read and write
52F1000
heap
page read and write
4D31000
heap
page read and write
7815000
heap
page read and write
52F1000
heap
page read and write
445F000
stack
page read and write
7851000
heap
page read and write
45AE000
stack
page read and write
13F2000
heap
page read and write
765E000
heap
page read and write
1CA3000
heap
page read and write
52F1000
heap
page read and write
5B80000
heap
page read and write
168D000
heap
page read and write
364E000
stack
page read and write
392E000
stack
page read and write
4A11000
heap
page read and write
52F1000
heap
page read and write
CD9000
unkown
page execute and read and write
2F9E000
stack
page read and write
58E0000
direct allocation
page execute and read and write
52F1000
heap
page read and write
C20000
direct allocation
page read and write
52F1000
heap
page read and write
52F1000
heap
page read and write
D51000
unkown
page execute and write copy
8CDE000
stack
page read and write
52F1000
heap
page read and write
14E4000
heap
page read and write
5300000
direct allocation
page execute and read and write
37EE000
stack
page read and write
5010000
direct allocation
page execute and read and write
There are 1123 hidden memdumps, click here to show them.