IOC Report
W5kZFcSOtE.exe

loading gifFilesProcessesURLsIPsMemdumps321010010Label

Files

File Path
Type
Category
Malicious
Download
W5kZFcSOtE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\W5kZFcSOtE.exe
"C:\Users\user\Desktop\W5kZFcSOtE.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.43/Zu7JuNko/index.php5
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.43/Zu7JuNko/index.php:
unknown
http://185.215.113.43/Zu7JuNko/index.phpQ#
unknown
http://185.215.113.43/Zu7JuNko/index.php-#
unknown
http://185.215.113.43/Zu7JuNko/index.phpM#
unknown
http://185.215.113.43/Zu7JuNko/index.php/index.php
unknown
http://185.215.113.43/Jx
unknown
http://185.215.113.43/Zu7JuNko/index.phpi#
unknown
http://185.215.113.43/
unknown
http://185.215.113.43/Zu7JuNko/index.phpHa
unknown
http://185.215.113.43/Zu7JuNko/index.phpE
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
http://185.215.113.43/Zu7JuNko/index.phpF
unknown
http://185.215.113.43/Zu7JuNko/index.phpi
unknown
http://185.215.113.43/Zu7JuNko/index.phpqYo30zpOYVp
unknown
http://185.215.113.43/Zu7JuNko/index.phpy1mb3JtLXVybGVuY29kZWQ=
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
http://185.215.113.43/Zu7JuNko/index.phpncodedN
unknown
http://185.215.113.43/Zu7JuNko/index.phpQ
unknown
There are 10 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
AE1000
unkown
page execute and read and write
malicious
3C1000
unkown
page execute and read and write
malicious
3C1000
unkown
page execute and read and write
malicious
5B6000
unkown
page execute and read and write
4DA1000
heap
page read and write
46BE000
stack
page read and write
14D4000
heap
page read and write
394000
heap
page read and write
306E000
stack
page read and write
4D90000
direct allocation
page read and write
137E000
heap
page read and write
3ECE000
stack
page read and write
14D4000
heap
page read and write
6D4000
unkown
page execute and write copy
4B81000
heap
page read and write
42B000
unkown
page execute and read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
537F000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
367E000
stack
page read and write
4DA1000
heap
page read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
6BE000
unkown
page execute and read and write
429000
unkown
page read and write
4B81000
heap
page read and write
5180000
direct allocation
page execute and read and write
320F000
stack
page read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
6C6000
unkown
page execute and read and write
4B81000
heap
page read and write
4950000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
4B81000
heap
page read and write
2F1F000
stack
page read and write
53CC000
stack
page read and write
4D90000
direct allocation
page read and write
137C000
heap
page read and write
990000
direct allocation
page read and write
53C0000
direct allocation
page execute and read and write
3FCF000
stack
page read and write
4391000
heap
page read and write
394000
heap
page read and write
4DA1000
heap
page read and write
43CE000
stack
page read and write
4DA0000
heap
page read and write
484E000
stack
page read and write
3D8E000
stack
page read and write
4970000
direct allocation
page execute and read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
AD4000
heap
page read and write
64E5000
heap
page read and write
4DA1000
heap
page read and write
38E000
stack
page read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
14D4000
heap
page read and write
42B000
unkown
page execute and read and write
4B81000
heap
page read and write
2E4F000
stack
page read and write
4DA1000
heap
page read and write
990000
direct allocation
page read and write
2FAE000
stack
page read and write
4A10000
direct allocation
page execute and read and write
157F000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
5D1E000
stack
page read and write
4B81000
heap
page read and write
4D90000
direct allocation
page read and write
6B05000
heap
page read and write
AD4000
heap
page read and write
12BA000
heap
page read and write
4DA1000
heap
page read and write
4C4F000
stack
page read and write
53B0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
130D000
heap
page read and write
4B81000
heap
page read and write
284F000
stack
page read and write
4DA1000
heap
page read and write
1290000
direct allocation
page read and write
4B81000
heap
page read and write
394000
heap
page read and write
4B81000
heap
page read and write
363F000
stack
page read and write
AD4000
heap
page read and write
39CE000
stack
page read and write
4B81000
heap
page read and write
353E000
stack
page read and write
9B0000
heap
page read and write
555B000
stack
page read and write
5A8F000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4BA0000
heap
page read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
51A0000
direct allocation
page execute and read and write
5150000
heap
page read and write
1376000
heap
page read and write
4B81000
heap
page read and write
4D90000
direct allocation
page read and write
48CE000
stack
page read and write
3087000
heap
page read and write
AD4000
heap
page read and write
137E000
heap
page read and write
B42000
unkown
page execute and read and write
14D4000
heap
page read and write
6D5000
unkown
page execute and write copy
DBE000
heap
page read and write
4B81000
heap
page read and write
4A7E000
stack
page read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
3A3E000
stack
page read and write
453F000
stack
page read and write
4B81000
heap
page read and write
5258000
stack
page read and write
1379000
heap
page read and write
4DA1000
heap
page read and write
F8F000
unkown
page execute and read and write
990000
direct allocation
page read and write
4B80000
heap
page read and write
4B81000
heap
page read and write
14D4000
heap
page read and write
144A000
heap
page read and write
5430000
direct allocation
page execute and read and write
4B81000
heap
page read and write
DE6000
unkown
page execute and read and write
32BE000
stack
page read and write
137C000
heap
page read and write
539C000
stack
page read and write
4DA1000
heap
page read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
394000
heap
page read and write
4B81000
heap
page read and write
49A0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
3070000
heap
page read and write
DB3000
unkown
page execute and read and write
3D4F000
stack
page read and write
1290000
direct allocation
page read and write
6920000
heap
page read and write
1290000
direct allocation
page read and write
5390000
direct allocation
page execute and read and write
AD4000
heap
page read and write
388E000
stack
page read and write
4DA1000
heap
page read and write
67EF000
stack
page read and write
1300000
heap
page read and write
35CF000
stack
page read and write
137C000
heap
page read and write
527B000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
1290000
direct allocation
page read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
51B0000
direct allocation
page execute and read and write
FAC000
stack
page read and write
4DA1000
heap
page read and write
2F20000
direct allocation
page read and write
AD4000
heap
page read and write
D3E000
stack
page read and write
4B81000
heap
page read and write
1290000
direct allocation
page read and write
3C0000
unkown
page read and write
4DA1000
heap
page read and write
A20000
heap
page read and write
302E000
stack
page read and write
4DA1000
heap
page read and write
990000
direct allocation
page read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
34FF000
stack
page read and write
310E000
stack
page read and write
5B6000
unkown
page execute and read and write
49CF000
stack
page read and write
38BF000
stack
page read and write
86F000
unkown
page execute and read and write
AD4000
heap
page read and write
12B0000
heap
page read and write
9AA000
stack
page read and write
14D4000
heap
page read and write
4DA1000
heap
page read and write
DDE000
unkown
page execute and read and write
1375000
heap
page read and write
990000
direct allocation
page read and write
97F000
stack
page read and write
3C0F000
stack
page read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
3C1000
unkown
page execute and write copy
4B81000
heap
page read and write
4D90000
direct allocation
page read and write
AD4000
heap
page read and write
488F000
stack
page read and write
4B81000
heap
page read and write
422000
unkown
page execute and write copy
4DA1000
heap
page read and write
377F000
stack
page read and write
6D4000
unkown
page execute and read and write
1367000
heap
page read and write
2F30000
heap
page read and write
870C000
stack
page read and write
5BDC000
stack
page read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
478E000
stack
page read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
14D4000
heap
page read and write
DA0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
410F000
stack
page read and write
4B81000
heap
page read and write
1290000
direct allocation
page read and write
990000
direct allocation
page read and write
5C1D000
stack
page read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
414E000
stack
page read and write
328F000
stack
page read and write
549F000
stack
page read and write
274F000
stack
page read and write
990000
direct allocation
page read and write
4B81000
heap
page read and write
6F8B000
stack
page read and write
5230000
direct allocation
page read and write
4B81000
heap
page read and write
384F000
stack
page read and write
4B4E000
stack
page read and write
394000
heap
page read and write
457E000
stack
page read and write
5420000
direct allocation
page execute and read and write
429000
unkown
page write copy
39FF000
stack
page read and write
AD4000
heap
page read and write
14D4000
heap
page read and write
424F000
stack
page read and write
4DA1000
heap
page read and write
428E000
stack
page read and write
3C4E000
stack
page read and write
422000
unkown
page execute and read and write
47FE000
stack
page read and write
14D4000
heap
page read and write
AD4000
heap
page read and write
474F000
stack
page read and write
3080000
heap
page read and write
6D7C000
stack
page read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
591F000
stack
page read and write
2BCF000
stack
page read and write
2A8F000
stack
page read and write
4B81000
heap
page read and write
14D4000
heap
page read and write
14C0000
heap
page read and write
709F000
heap
page read and write
338F000
stack
page read and write
1290000
direct allocation
page read and write
51D0000
direct allocation
page execute and read and write
334F000
stack
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
51C0000
direct allocation
page execute and read and write
B42000
unkown
page execute and write copy
4B81000
heap
page read and write
69D0000
heap
page read and write
DB0000
heap
page read and write
4B81000
heap
page read and write
5150000
direct allocation
page execute and read and write
13F2000
heap
page read and write
1392000
heap
page read and write
69C0000
heap
page read and write
298E000
stack
page read and write
370F000
stack
page read and write
12BE000
heap
page read and write
4D90000
direct allocation
page read and write
4DA1000
heap
page read and write
AD4000
heap
page read and write
86F000
unkown
page execute and read and write
4B90000
heap
page read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
327F000
stack
page read and write
5230000
direct allocation
page read and write
4DA1000
heap
page read and write
990000
direct allocation
page read and write
4C8E000
stack
page read and write
493E000
stack
page read and write
4B81000
heap
page read and write
12FD000
stack
page read and write
3F3E000
stack
page read and write
4B81000
heap
page read and write
2FCE000
stack
page read and write
5170000
direct allocation
page execute and read and write
4B81000
heap
page read and write
14D4000
heap
page read and write
400E000
stack
page read and write
438F000
stack
page read and write
CD6000
unkown
page execute and read and write
5ADD000
stack
page read and write
303F000
stack
page read and write
464E000
stack
page read and write
4DA1000
heap
page read and write
641B000
stack
page read and write
AD4000
heap
page read and write
4B7F000
stack
page read and write
4BB0000
heap
page read and write
53C0000
direct allocation
page execute and read and write
450E000
stack
page read and write
4D90000
direct allocation
page read and write
1368000
heap
page read and write
4B0F000
stack
page read and write
66EF000
stack
page read and write
14D4000
heap
page read and write
6BE000
unkown
page execute and read and write
390000
heap
page read and write
990000
direct allocation
page read and write
14D4000
heap
page read and write
64E0000
heap
page read and write
1437000
heap
page read and write
5230000
direct allocation
page read and write
4D90000
direct allocation
page read and write
14D4000
heap
page read and write
417F000
stack
page read and write
DF5000
unkown
page execute and write copy
14D4000
heap
page read and write
708C000
stack
page read and write
1310000
heap
page read and write
2F37000
heap
page read and write
13C0000
heap
page read and write
4B81000
heap
page read and write
49B0000
direct allocation
page execute and read and write
1392000
heap
page read and write
AD4000
heap
page read and write
167E000
stack
page read and write
990000
direct allocation
page read and write
14D4000
heap
page read and write
6C3D000
stack
page read and write
5180000
direct allocation
page execute and read and write
3C0F000
stack
page read and write
4B81000
heap
page read and write
4960000
direct allocation
page execute and read and write
3ACF000
stack
page read and write
49F0000
direct allocation
page execute and read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
AE0000
unkown
page read and write
4D90000
direct allocation
page read and write
AD4000
heap
page read and write
3E8F000
stack
page read and write
4DA1000
heap
page read and write
AD4000
heap
page read and write
A10000
heap
page read and write
4D90000
direct allocation
page read and write
467F000
stack
page read and write
12F5000
heap
page read and write
4DA4000
heap
page read and write
9C000
stack
page read and write
8C10000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
4B81000
heap
page read and write
127E000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
AD4000
heap
page read and write
49E0000
direct allocation
page execute and read and write
A8E000
stack
page read and write
4B81000
heap
page read and write
443E000
stack
page read and write
4FC0000
trusted library allocation
page read and write
1382000
heap
page read and write
AD4000
heap
page read and write
12E6000
heap
page read and write
1290000
direct allocation
page read and write
4B81000
heap
page read and write
123B000
stack
page read and write
4B81000
heap
page read and write
990000
direct allocation
page read and write
14D0000
heap
page read and write
1382000
heap
page read and write
B49000
unkown
page read and write
AD4000
heap
page read and write
6B08000
heap
page read and write
4DA1000
heap
page read and write
294F000
stack
page read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
AD4000
heap
page read and write
134D000
heap
page read and write
3C0000
unkown
page readonly
44CF000
stack
page read and write
324E000
stack
page read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
5160000
direct allocation
page execute and read and write
64DE000
stack
page read and write
DBA000
heap
page read and write
422000
unkown
page execute and read and write
4DA1000
heap
page read and write
1351000
heap
page read and write
DD8000
heap
page read and write
4B81000
heap
page read and write
2F20000
direct allocation
page read and write
70A1000
heap
page read and write
33BF000
stack
page read and write
4DA1000
heap
page read and write
AD4000
heap
page read and write
B4B000
unkown
page execute and read and write
394000
heap
page read and write
7090000
heap
page read and write
34E000
stack
page read and write
D80000
direct allocation
page read and write
65EE000
stack
page read and write
4DA1000
heap
page read and write
B49000
unkown
page write copy
4B81000
heap
page read and write
FFE000
stack
page read and write
4A0E000
stack
page read and write
4DA1000
heap
page read and write
4980000
direct allocation
page execute and read and write
370F000
stack
page read and write
1382000
heap
page read and write
4DA1000
heap
page read and write
438F000
stack
page read and write
394000
heap
page read and write
8AB000
stack
page read and write
14D4000
heap
page read and write
348F000
stack
page read and write
693000
unkown
page execute and read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
51F0000
direct allocation
page execute and read and write
980000
heap
page read and write
AD4000
heap
page read and write
2ACE000
stack
page read and write
6D3E000
stack
page read and write
33FE000
stack
page read and write
308D000
heap
page read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
35CF000
stack
page read and write
4B81000
heap
page read and write
43FF000
stack
page read and write
1368000
heap
page read and write
AD4000
heap
page read and write
4DA1000
heap
page read and write
394000
heap
page read and write
5180000
direct allocation
page execute and read and write
34CE000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
407E000
stack
page read and write
136E000
heap
page read and write
AE1000
unkown
page execute and write copy
428E000
stack
page read and write
348F000
stack
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
38FE000
stack
page read and write
3E8F000
stack
page read and write
4B81000
heap
page read and write
4970000
direct allocation
page execute and read and write
2F8F000
stack
page read and write
1351000
heap
page read and write
AD4000
heap
page read and write
4970000
direct allocation
page execute and read and write
14D4000
heap
page read and write
394000
heap
page read and write
1290000
direct allocation
page read and write
398F000
stack
page read and write
709D000
heap
page read and write
49D0000
direct allocation
page execute and read and write
2D0F000
stack
page read and write
16AE000
stack
page read and write
4970000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
51E0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
403F000
stack
page read and write
581E000
stack
page read and write
AD0000
heap
page read and write
CFE000
stack
page read and write
394000
heap
page read and write
4A3F000
stack
page read and write
136E000
heap
page read and write
70A4000
heap
page read and write
14D4000
heap
page read and write
4970000
direct allocation
page execute and read and write
4FD4000
heap
page read and write
3FCF000
stack
page read and write
53A0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
429000
unkown
page write copy
4DA1000
heap
page read and write
5400000
direct allocation
page execute and read and write
2E8E000
stack
page read and write
51E0000
heap
page read and write
394000
heap
page read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
53C0000
direct allocation
page execute and read and write
990000
direct allocation
page read and write
4B81000
heap
page read and write
2E0000
heap
page read and write
388E000
stack
page read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
AD4000
heap
page read and write
4DA1000
heap
page read and write
1290000
direct allocation
page read and write
14D4000
heap
page read and write
AD4000
heap
page read and write
460E000
stack
page read and write
14D4000
heap
page read and write
3B0E000
stack
page read and write
69CE000
heap
page read and write
3C7F000
stack
page read and write
4DA1000
heap
page read and write
5450000
direct allocation
page execute and read and write
47D0000
trusted library allocation
page read and write
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
990000
direct allocation
page read and write
14D4000
heap
page read and write
3C1000
unkown
page execute and write copy
4DA1000
heap
page read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
313F000
stack
page read and write
14D4000
heap
page read and write
422000
unkown
page execute and write copy
4DA1000
heap
page read and write
4BA8000
heap
page read and write
AD4000
heap
page read and write
5200000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
4DC0000
heap
page read and write
5440000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
384F000
stack
page read and write
1366000
heap
page read and write
2D4E000
stack
page read and write
14D4000
heap
page read and write
5180000
direct allocation
page execute and read and write
645E000
stack
page read and write
4B81000
heap
page read and write
DF4000
unkown
page execute and write copy
14D4000
heap
page read and write
3C0000
unkown
page read and write
14D4000
heap
page read and write
394000
heap
page read and write
374E000
stack
page read and write
142E000
heap
page read and write
990000
direct allocation
page read and write
4DA1000
heap
page read and write
1290000
direct allocation
page read and write
414E000
stack
page read and write
3C0000
unkown
page readonly
338E000
stack
page read and write
AD4000
heap
page read and write
360E000
stack
page read and write
AD4000
heap
page read and write
4B81000
heap
page read and write
3B3F000
stack
page read and write
4B81000
heap
page read and write
17AF000
stack
page read and write
4990000
direct allocation
page execute and read and write
5180000
direct allocation
page execute and read and write
AE0000
unkown
page readonly
394000
heap
page read and write
3D4F000
stack
page read and write
513F000
stack
page read and write
14D4000
heap
page read and write
137E000
stack
page read and write
14D4000
heap
page read and write
4B81000
heap
page read and write
317E000
stack
page read and write
AD4000
heap
page read and write
14D4000
heap
page read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4970000
direct allocation
page execute and read and write
5210000
direct allocation
page execute and read and write
D80000
direct allocation
page read and write
3C4E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
4DA1000
heap
page read and write
1280000
heap
page read and write
4B81000
heap
page read and write
AD4000
heap
page read and write
D80000
direct allocation
page read and write
4390000
heap
page read and write
4DB0000
heap
page read and write
ACE000
stack
page read and write
4DA1000
heap
page read and write
4B81000
heap
page read and write
37BE000
stack
page read and write
360E000
stack
page read and write
394000
heap
page read and write
9B7000
heap
page read and write
6B03000
heap
page read and write
137E000
heap
page read and write
53E0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
53C0000
direct allocation
page execute and read and write
200000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
13BE000
stack
page read and write
13F8000
heap
page read and write
AD4000
heap
page read and write
4B98000
heap
page read and write
6C6000
unkown
page execute and read and write
DCF000
heap
page read and write
4B81000
heap
page read and write
3ECE000
stack
page read and write
4391000
heap
page read and write
4B81000
heap
page read and write
429000
unkown
page read and write
394000
heap
page read and write
4DA1000
heap
page read and write
3CBE000
stack
page read and write
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
AD4000
heap
page read and write
398F000
stack
page read and write
AD4000
heap
page read and write
6B00000
heap
page read and write
14D4000
heap
page read and write
4DA1000
heap
page read and write
503E000
stack
page read and write
DF4000
unkown
page execute and read and write
400E000
stack
page read and write
318F000
stack
page read and write
693000
unkown
page execute and read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
374E000
stack
page read and write
3D8E000
stack
page read and write
4DA1000
heap
page read and write
51E0000
trusted library allocation
page read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
3B0E000
stack
page read and write
4B81000
heap
page read and write
3B7E000
stack
page read and write
42FE000
stack
page read and write
13C7000
heap
page read and write
598E000
stack
page read and write
3DFE000
stack
page read and write
4DA1000
heap
page read and write
4D8F000
stack
page read and write
1393000
heap
page read and write
141E000
heap
page read and write
494F000
stack
page read and write
1366000
heap
page read and write
1290000
direct allocation
page read and write
47BF000
stack
page read and write
3ACF000
stack
page read and write
53C0000
direct allocation
page execute and read and write
5410000
direct allocation
page execute and read and write
42BE000
stack
page read and write
1290000
direct allocation
page read and write
4B81000
heap
page read and write
53F0000
direct allocation
page execute and read and write
6D5000
unkown
page execute and write copy
424F000
stack
page read and write
9FE000
stack
page read and write
4FD0000
heap
page read and write
2FEC000
stack
page read and write
4DA1000
heap
page read and write
53C0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
308B000
heap
page read and write
1392000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
3EFF000
stack
page read and write
D7E000
stack
page read and write
2F20000
direct allocation
page read and write
14D4000
heap
page read and write
AD4000
heap
page read and write
6D4000
unkown
page execute and write copy
34CE000
stack
page read and write
4B81000
heap
page read and write
1290000
direct allocation
page read and write
6D4000
unkown
page execute and read and write
14D4000
heap
page read and write
4DA1000
heap
page read and write
48FF000
stack
page read and write
410F000
stack
page read and write
535B000
stack
page read and write
4A00000
direct allocation
page execute and read and write
649E000
stack
page read and write
4B81000
heap
page read and write
3DBF000
stack
page read and write
DD6000
heap
page read and write
19D000
stack
page read and write
5180000
direct allocation
page execute and read and write
4B81000
heap
page read and write
4DA1000
heap
page read and write
4391000
heap
page read and write
30CF000
stack
page read and write
49C0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
39CE000
stack
page read and write
2C0E000
stack
page read and write
41BE000
stack
page read and write
AD4000
heap
page read and write
68EF000
stack
page read and write
There are 724 hidden memdumps, click here to show them.