IOC Report
dFVyelEPsf.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
dFVyelEPsf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\random[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1075538001\bd03a8025c.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1075542001\8dcfe9a593.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dFVyelEPsf.exe
"C:\Users\user\Desktop\dFVyelEPsf.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1075538001\bd03a8025c.exe
"C:\Users\user\AppData\Local\Temp\1075538001\bd03a8025c.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
suggestyuoz.biz
malicious
pleasedcfrown.biz
malicious
impolitewearr.biz
malicious
hoursuhouy.biz
malicious
lightdeerysua.biz
malicious
edcatiofireeu.shop
malicious
affordtempyo.biz
malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://player.vimeo.com
unknown
http://185.215.113.75/files/ReverseSheller/random.exe
unknown
http://185.215.113.43/Zu7JuNko/index.php$v
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=gOyfgA0bHRkL&am
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
https://pleasedcfrown.biz/apiG
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=aiN5PFKWybrq&a
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
https://suggestyuoz.biz/api
unknown
http://185.215.113.43/Zu7JuNko/index.php0b71f45034799d2e017bfe3d1482b#
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://developers.google.com/protocol-buffers/docs/reference/go/faq#namespace-conflictinvalid
unknown
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
http://185.215.113.75/files/ReverseSheller/random.exeqos.dllc
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://community.fastly.steamstatic.com/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli
unknown
https://steam.tv/
unknown
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://steamcommunity.com/_
unknown
toppyneedus.biz
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://lightdeerysua.biz/api
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=vybk
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
http://185.215.113.75/files/ReverseSheller/random.exe23456789
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
https://steamloopback.host
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
http://185.215.113.75/files/ReverseSheller/random.exeS
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=Eq36AUaEgab8&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=GlKQ1cghJWE2&l=english&_c
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steamcommunity.com/5
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
unknown
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
unknown
http://185.215.113.43/Zu7JuNko/index.phpUsers
unknown
https://recaptcha.net
unknown
http://185.215.113.43/Zu7JuNko/index.php8001
unknown
https://store.steampowered.com/
unknown
https://steamcommunity.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://127.0.0.1:27060
unknown
http://185.215.113.43/Zu7JuNko/index.phpded9
unknown
http://185.215.113.43/Zu7JuNko/index.phpcodedl
unknown
http://185.215.113.75/files/rast333a/random.exe
unknown
http://185.215.113.43/Zu7JuNko/index.php~
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
unknown
https://affordtempyo.biz/apiw
unknown
https://mixedrecipew.biz/api?
unknown
http://185.215.113.43/Zu7JuNko/index.php2001
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
unknown
https://help.steampowered.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
lightdeerysua.biz
unknown
malicious
affordtempyo.biz
unknown
malicious
pleasedcfrown.biz
unknown
malicious
mixedrecipew.biz
unknown
malicious
hoursuhouy.biz
unknown
malicious
steamcommunity.com
104.102.49.254
edcatiofireeu.shop
unknown
impolitewearr.biz
unknown
toppyneedus.biz
unknown
suggestyuoz.biz
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.75
unknown
Portugal
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
9FC0000
direct allocation
page read and write
malicious
B91000
unkown
page execute and read and write
malicious
9F70000
direct allocation
page read and write
malicious
B91000
unkown
page execute and read and write
malicious
9F0A000
direct allocation
page read and write
malicious
CF1000
unkown
page execute and read and write
malicious
102D000
unkown
page execute and write copy
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
595E000
stack
page read and write
15B4000
heap
page read and write
14CC000
heap
page read and write
4B4E000
stack
page read and write
16E7000
heap
page read and write
4B0F000
stack
page read and write
153C000
stack
page read and write
471E000
stack
page read and write
4D6E000
stack
page read and write
4E81000
heap
page read and write
9C62000
direct allocation
page read and write
792000
heap
page read and write
888E000
stack
page read and write
314E000
stack
page read and write
E97000
unkown
page execute and write copy
9CBA000
direct allocation
page read and write
BFB000
unkown
page execute and read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
6936000
heap
page read and write
4E81000
heap
page read and write
15B4000
heap
page read and write
CF0000
unkown
page read and write
143E000
stack
page read and write
E56000
unkown
page readonly
E96000
unkown
page execute and read and write
4E81000
heap
page read and write
4C2E000
stack
page read and write
4E81000
heap
page read and write
460F000
stack
page read and write
4E81000
heap
page read and write
14FC000
heap
page read and write
3200000
heap
page read and write
5FFD000
stack
page read and write
A8E000
stack
page read and write
4ED1000
heap
page read and write
4EC0000
direct allocation
page read and write
4EC0000
direct allocation
page read and write
4E81000
heap
page read and write
434F000
stack
page read and write
FE7000
unkown
page execute and read and write
651000
remote allocation
page execute read
4E70000
direct allocation
page read and write
6C73000
heap
page read and write
E40000
remote allocation
page read and write
3E1F000
stack
page read and write
15B4000
heap
page read and write
4EC0000
direct allocation
page read and write
14D0000
heap
page read and write
5580000
direct allocation
page execute and read and write
DE8000
unkown
page read and write
4ED1000
heap
page read and write
420F000
stack
page read and write
4E80000
heap
page read and write
49CE000
stack
page read and write
1842000
heap
page read and write
744000
heap
page read and write
15B0000
heap
page read and write
445F000
stack
page read and write
464E000
stack
page read and write
4E81000
heap
page read and write
9D5C000
direct allocation
page read and write
2A1FF000
stack
page read and write
53D0000
direct allocation
page execute and read and write
780000
heap
page read and write
15B4000
heap
page read and write
398E000
stack
page read and write
15B4000
heap
page read and write
451000
unkown
page execute read
54A0000
direct allocation
page execute and read and write
4EC0000
direct allocation
page read and write
E96000
unkown
page execute and write copy
3A8F000
stack
page read and write
4ED1000
heap
page read and write
9C0E000
direct allocation
page read and write
9C74000
direct allocation
page read and write
312F000
stack
page read and write
3D1E000
stack
page read and write
BF2000
unkown
page execute and read and write
BFB000
unkown
page execute and read and write
11F0000
heap
page read and write
5520000
direct allocation
page execute and read and write
478E000
stack
page read and write
4ED1000
heap
page read and write
102B000
unkown
page execute and read and write
4E81000
heap
page read and write
77B000
heap
page read and write
1480000
heap
page read and write
D9F000
unkown
page write copy
4630000
heap
page read and write
4EA0000
heap
page read and write
4D5F000
stack
page read and write
450E000
stack
page read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
11C7000
heap
page read and write
9CA0000
direct allocation
page read and write
15AE000
stack
page read and write
744000
heap
page read and write
4F80000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
4EC0000
direct allocation
page read and write
4EC0000
direct allocation
page read and write
14AE000
heap
page read and write
ED2000
unkown
page execute and read and write
1680000
direct allocation
page read and write
49CF000
stack
page read and write
4E81000
heap
page read and write
1545000
heap
page read and write
4E70000
direct allocation
page read and write
4EC0000
direct allocation
page read and write
CF0000
unkown
page readonly
786000
heap
page read and write
78F000
heap
page read and write
330F000
stack
page read and write
5570000
direct allocation
page execute and read and write
9D28000
direct allocation
page read and write
4E81000
heap
page read and write
53A0000
direct allocation
page execute and read and write
48CE000
stack
page read and write
9C56000
direct allocation
page read and write
9C8A000
direct allocation
page read and write
1475000
heap
page read and write
15B4000
heap
page read and write
3A9E000
stack
page read and write
4AEE000
stack
page read and write
77B000
heap
page read and write
116D000
stack
page read and write
448F000
stack
page read and write
15C0000
heap
page read and write
4ED1000
heap
page read and write
395E000
stack
page read and write
1770000
heap
page read and write
9D50000
direct allocation
page read and write
39CE000
stack
page read and write
4E70000
direct allocation
page read and write
4E92000
heap
page read and write
4E70000
direct allocation
page read and write
884C000
stack
page read and write
4ED1000
heap
page read and write
3BDE000
stack
page read and write
2A0FC000
stack
page read and write
DE3000
unkown
page read and write
15B4000
heap
page read and write
4E81000
heap
page read and write
D5B000
unkown
page execute and read and write
15B4000
heap
page read and write
1680000
direct allocation
page read and write
7280000
heap
page read and write
77B000
heap
page read and write
4ED1000
heap
page read and write
15B4000
heap
page read and write
E96000
unkown
page execute and write copy
9C1A000
direct allocation
page read and write
4ED1000
heap
page read and write
4E81000
heap
page read and write
535E000
stack
page read and write
1680000
direct allocation
page read and write
8BFC000
stack
page read and write
DF1000
unkown
page read and write
4ED1000
heap
page read and write
1680000
direct allocation
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
1805000
heap
page read and write
14E5000
heap
page read and write
15B4000
heap
page read and write
45EE000
stack
page read and write
4DB1000
heap
page read and write
15B4000
heap
page read and write
54A0000
direct allocation
page execute and read and write
3C0F000
stack
page read and write
1590000
direct allocation
page read and write
9D70000
direct allocation
page read and write
4AAF000
stack
page read and write
4E81000
heap
page read and write
9C18000
direct allocation
page read and write
4ED1000
heap
page read and write
5360000
direct allocation
page read and write
4EC0000
direct allocation
page read and write
14E5000
heap
page read and write
A0EE000
direct allocation
page read and write
45DE000
stack
page read and write
29DFF000
stack
page read and write
E40000
remote allocation
page read and write
450000
unkown
page readonly
5530000
direct allocation
page execute and read and write
421E000
stack
page read and write
4ED1000
heap
page read and write
4C10000
heap
page read and write
3F8F000
stack
page read and write
4C7F000
stack
page read and write
4ED1000
heap
page read and write
FDF000
unkown
page execute and read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
5510000
direct allocation
page execute and read and write
534C000
stack
page read and write
481F000
stack
page read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
15B4000
heap
page read and write
4ED1000
heap
page read and write
4E81000
heap
page read and write
435E000
stack
page read and write
9C0A000
direct allocation
page read and write
1088000
direct allocation
page read and write
188E000
stack
page read and write
4E70000
direct allocation
page read and write
9ED0000
direct allocation
page read and write
320F000
stack
page read and write
DE2000
unkown
page write copy
5D3D000
stack
page read and write
9D84000
direct allocation
page read and write
14F3000
heap
page read and write
9C98000
direct allocation
page read and write
78F000
heap
page read and write
438F000
stack
page read and write
6E0000
heap
page read and write
14E7000
heap
page read and write
759000
heap
page read and write
44CE000
stack
page read and write
4E81000
heap
page read and write
15B4000
heap
page read and write
9C12000
direct allocation
page read and write
1080000
direct allocation
page read and write
9C24000
direct allocation
page read and write
73D000
heap
page read and write
1490000
heap
page read and write
409F000
stack
page read and write
4E81000
heap
page read and write
4DB1000
heap
page read and write
5720000
heap
page read and write
E40000
remote allocation
page read and write
330F000
stack
page read and write
53E0000
direct allocation
page execute and read and write
4DB1000
heap
page read and write
9C00000
direct allocation
page read and write
759000
heap
page read and write
5500000
direct allocation
page execute and read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
381E000
stack
page read and write
545F000
stack
page read and write
B90000
unkown
page readonly
4E81000
heap
page read and write
4ED1000
heap
page read and write
4EC0000
direct allocation
page read and write
431F000
stack
page read and write
4ED0000
heap
page read and write
4ED1000
heap
page read and write
370F000
stack
page read and write
5360000
direct allocation
page read and write
4E81000
heap
page read and write
A4E000
stack
page read and write
3C0E000
stack
page read and write
9C36000
direct allocation
page read and write
4E81000
heap
page read and write
786000
heap
page read and write
7DB000
heap
page read and write
4D9E000
stack
page read and write
792000
heap
page read and write
3D4E000
stack
page read and write
14B7000
heap
page read and write
CF1000
unkown
page execute and write copy
4ED1000
heap
page read and write
4DB1000
heap
page read and write
5230000
direct allocation
page read and write
690E000
stack
page read and write
72D000
heap
page read and write
E1A000
unkown
page readonly
9CB2000
direct allocation
page read and write
360F000
stack
page read and write
414E000
stack
page read and write
9D16000
direct allocation
page read and write
53AC000
stack
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
6C50000
heap
page read and write
118D000
unkown
page execute and write copy
4DB0000
heap
page read and write
4ED1000
heap
page read and write
4C4F000
stack
page read and write
B50000
heap
page read and write
400E000
stack
page read and write
5550000
direct allocation
page execute and read and write
4E81000
heap
page read and write
15B4000
heap
page read and write
54D0000
direct allocation
page execute and read and write
15B4000
heap
page read and write
178E000
stack
page read and write
1680000
direct allocation
page read and write
15B4000
heap
page read and write
155E000
stack
page read and write
4ED1000
heap
page read and write
9C76000
direct allocation
page read and write
D9F000
unkown
page read and write
4ED1000
heap
page read and write
E16000
unkown
page read and write
4E70000
direct allocation
page read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
4E81000
heap
page read and write
102D000
unkown
page execute and write copy
3207000
heap
page read and write
4ED1000
heap
page read and write
BF9000
unkown
page read and write
11BD000
stack
page read and write
9C52000
direct allocation
page read and write
308E000
stack
page read and write
57DE000
stack
page read and write
9CA8000
direct allocation
page read and write
9C30000
direct allocation
page read and write
9C9E000
direct allocation
page read and write
9E30000
direct allocation
page read and write
4ED1000
heap
page read and write
4E81000
heap
page read and write
54AF000
stack
page read and write
731000
heap
page read and write
4ED1000
heap
page read and write
15B2000
direct allocation
page read and write
53C0000
direct allocation
page execute and read and write
9CAE000
direct allocation
page read and write
4ED1000
heap
page read and write
73C000
heap
page read and write
1070000
heap
page read and write
697000
remote allocation
page execute and read and write
15B4000
heap
page read and write
4E81000
heap
page read and write
5430000
direct allocation
page execute and read and write
9C60000
direct allocation
page read and write
6C3F000
stack
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
456D000
stack
page read and write
4B0E000
stack
page read and write
4E81000
heap
page read and write
15B4000
heap
page read and write
5500000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
9D26000
direct allocation
page read and write
14AD000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4E81000
heap
page read and write
54B0000
direct allocation
page execute and read and write
162C000
stack
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
A75000
unkown
page readonly
4E81000
heap
page read and write
9C06000
direct allocation
page read and write
650000
remote allocation
page execute and read and write
7270000
heap
page read and write
46DF000
stack
page read and write
169A000
heap
page read and write
BF9000
unkown
page read and write
1430000
heap
page read and write
4E81000
heap
page read and write
54E0000
direct allocation
page execute and read and write
17D0000
heap
page read and write
688E000
stack
page read and write
4DB1000
heap
page read and write
3ECE000
stack
page read and write
4C5E000
stack
page read and write
450000
unkown
page readonly
5E3D000
stack
page read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
4E9F000
stack
page read and write
4ED1000
heap
page read and write
102B000
unkown
page execute and read and write
4E81000
heap
page read and write
5540000
direct allocation
page execute and read and write
54F0000
direct allocation
page execute and read and write
1670000
heap
page read and write
4E70000
direct allocation
page read and write
9C90000
direct allocation
page read and write
1420000
heap
page read and write
D52000
unkown
page execute and write copy
15B4000
heap
page read and write
4ED1000
heap
page read and write
3ACF000
stack
page read and write
43CE000
stack
page read and write
4EC0000
direct allocation
page read and write
6A5000
remote allocation
page readonly
54E0000
direct allocation
page execute and read and write
4C8E000
stack
page read and write
9F5A000
direct allocation
page read and write
9C2C000
direct allocation
page read and write
7271000
heap
page read and write
6F0000
heap
page read and write
5520000
direct allocation
page execute and read and write
316E000
stack
page read and write
8AFB000
stack
page read and write
75C000
heap
page read and write
D59000
unkown
page write copy
53C0000
direct allocation
page execute and read and write
15B4000
heap
page read and write
14F5000
heap
page read and write
14EE000
heap
page read and write
15B4000
heap
page read and write
14D0000
heap
page read and write
870000
heap
page read and write
54F0000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
9C1E000
direct allocation
page read and write
15B4000
heap
page read and write
4EE0000
heap
page read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
15B4000
heap
page read and write
15B4000
heap
page read and write
15B4000
heap
page read and write
9C68000
direct allocation
page read and write
10C0000
heap
page read and write
9D68000
direct allocation
page read and write
4E81000
heap
page read and write
5420000
direct allocation
page execute and read and write
BF2000
unkown
page execute and write copy
1540000
heap
page read and write
4ED1000
heap
page read and write
3D4F000
stack
page read and write
1400000
heap
page read and write
9D56000
direct allocation
page read and write
1511000
heap
page read and write
4E81000
heap
page read and write
9D2E000
direct allocation
page read and write
B60000
heap
page read and write
4E81000
heap
page read and write
9C20000
direct allocation
page read and write
4ED1000
heap
page read and write
BF2000
unkown
page execute and read and write
14ED000
heap
page read and write
5ABE000
stack
page read and write
424F000
stack
page read and write
4E81000
heap
page read and write
AEC000
stack
page read and write
394F000
stack
page read and write
1778000
heap
page read and write
9D5E000
direct allocation
page read and write
10C5000
heap
page read and write
5230000
direct allocation
page read and write
14E5000
heap
page read and write
37DF000
stack
page read and write
9CAA000
direct allocation
page read and write
5480000
direct allocation
page execute and read and write
1110000
direct allocation
page read and write
4ED1000
heap
page read and write
14D0000
heap
page read and write
4E81000
heap
page read and write
E87000
unkown
page execute and read and write
15B4000
heap
page read and write
17A2000
heap
page read and write
17FB000
heap
page read and write
9C9C000
direct allocation
page read and write
3B9F000
stack
page read and write
14F8000
heap
page read and write
17A8000
heap
page read and write
459F000
stack
page read and write
9D42000
direct allocation
page read and write
6C74000
heap
page read and write
E54000
unkown
page execute and read and write
15B4000
heap
page read and write
A73000
unkown
page readonly
4E81000
heap
page read and write
15B4000
heap
page read and write
5310000
direct allocation
page read and write
9CB0000
direct allocation
page read and write
1120000
direct allocation
page read and write
4E81000
heap
page read and write
4EC0000
direct allocation
page read and write
54C0000
direct allocation
page execute and read and write
3FCF000
stack
page read and write
9C22000
direct allocation
page read and write
898E000
stack
page read and write
3E5E000
stack
page read and write
9D12000
direct allocation
page read and write
4E91000
heap
page read and write
4E81000
heap
page read and write
D59000
unkown
page read and write
4EC0000
direct allocation
page read and write
9D8A000
direct allocation
page read and write
428E000
stack
page read and write
68CE000
stack
page read and write
3E8E000
stack
page read and write
780000
heap
page read and write
4ED1000
heap
page read and write
495F000
stack
page read and write
1680000
direct allocation
page read and write
4E81000
heap
page read and write
9C6E000
direct allocation
page read and write
E56000
unkown
page readonly
4ED1000
heap
page read and write
15B4000
heap
page read and write
180E000
heap
page read and write
1680000
direct allocation
page read and write
4E81000
heap
page read and write
147B000
heap
page read and write
424E000
stack
page read and write
410E000
stack
page read and write
9D40000
direct allocation
page read and write
5450000
direct allocation
page execute and read and write
358F000
stack
page read and write
9C34000
direct allocation
page read and write
4E81000
heap
page read and write
DE6000
unkown
page write copy
9CA4000
direct allocation
page read and write
40CF000
stack
page read and write
4D90000
heap
page read and write
484F000
stack
page read and write
4ED1000
heap
page read and write
874B000
stack
page read and write
4E81000
heap
page read and write
15B4000
heap
page read and write
1680000
direct allocation
page read and write
A0FE000
direct allocation
page read and write
4E81000
heap
page read and write
7D6000
heap
page read and write
E96000
unkown
page execute and read and write
4E81000
heap
page read and write
9C92000
direct allocation
page read and write
334E000
stack
page read and write
310E000
stack
page read and write
875000
heap
page read and write
438E000
stack
page read and write
4D2F000
stack
page read and write
61A0000
heap
page read and write
384E000
stack
page read and write
9D6C000
direct allocation
page read and write
17E7000
heap
page read and write
7A0000
heap
page read and write
9D1A000
direct allocation
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
75C000
heap
page read and write
9C96000
direct allocation
page read and write
9CCE000
direct allocation
page read and write
4E70000
direct allocation
page read and write
7A0000
heap
page read and write
9C41000
direct allocation
page read and write
5540000
direct allocation
page execute and read and write
78F000
heap
page read and write
4ED1000
heap
page read and write
148E000
heap
page read and write
53C0000
direct allocation
page execute and read and write
B91000
unkown
page execute and write copy
345F000
stack
page read and write
771000
heap
page read and write
4ED1000
heap
page read and write
4E81000
heap
page read and write
14B3000
heap
page read and write
9C6C000
direct allocation
page read and write
5CFC000
stack
page read and write
11C0000
heap
page read and write
9C4C000
direct allocation
page read and write
1511000
heap
page read and write
9C08000
direct allocation
page read and write
344F000
stack
page read and write
325F000
stack
page read and write
9D00000
direct allocation
page read and write
4ED1000
heap
page read and write
9C7A000
direct allocation
page read and write
4ED1000
heap
page read and write
9D4A000
direct allocation
page read and write
4E81000
heap
page read and write
5530000
direct allocation
page execute and read and write
5470000
heap
page read and write
4E70000
direct allocation
page read and write
DED000
stack
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
370E000
stack
page read and write
B90000
unkown
page readonly
E19000
unkown
page write copy
5A5E000
stack
page read and write
4E81000
heap
page read and write
786000
heap
page read and write
14AA000
heap
page read and write
16CF000
stack
page read and write
4ED1000
heap
page read and write
9D0C000
direct allocation
page read and write
1483000
heap
page read and write
348E000
stack
page read and write
4ED1000
heap
page read and write
E87000
unkown
page execute and read and write
3DC000
stack
page read and write
9C16000
direct allocation
page read and write
3A5F000
stack
page read and write
5724000
heap
page read and write
E19000
unkown
page write copy
9CB6000
direct allocation
page read and write
9D10000
direct allocation
page read and write
1DD000
stack
page read and write
4E81000
heap
page read and write
5390000
direct allocation
page execute and read and write
4960000
heap
page read and write
9C7C000
direct allocation
page read and write
15C5000
heap
page read and write
E7F000
unkown
page execute and read and write
4ED1000
heap
page read and write
15B4000
heap
page read and write
6935000
heap
page read and write
54A0000
direct allocation
page execute and read and write
15B4000
heap
page read and write
14E5000
heap
page read and write
4ED1000
heap
page read and write
14E5000
heap
page read and write
5470000
direct allocation
page execute and read and write
9CA6000
direct allocation
page read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
335F000
stack
page read and write
727E000
heap
page read and write
4E6F000
stack
page read and write
5310000
direct allocation
page read and write
4E81000
heap
page read and write
14FB000
heap
page read and write
15EE000
stack
page read and write
4ED1000
heap
page read and write
9CB4000
direct allocation
page read and write
4ED1000
heap
page read and write
E54000
unkown
page execute and read and write
9BED000
stack
page read and write
9C46000
direct allocation
page read and write
4C0F000
stack
page read and write
792000
heap
page read and write
4E70000
direct allocation
page read and write
5BBF000
stack
page read and write
770000
heap
page read and write
E2D000
stack
page read and write
4ACF000
stack
page read and write
5EFD000
stack
page read and write
FF6000
unkown
page execute and read and write
1680000
direct allocation
page read and write
A19C000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
3E4F000
stack
page read and write
388E000
stack
page read and write
485E000
stack
page read and write
9C86000
direct allocation
page read and write
5230000
direct allocation
page read and write
15B4000
heap
page read and write
14FC000
heap
page read and write
9CB8000
direct allocation
page read and write
7280000
heap
page read and write
15B4000
heap
page read and write
41DF000
stack
page read and write
31AE000
stack
page read and write
4DB1000
heap
page read and write
3ACE000
stack
page read and write
BEB000
stack
page read and write
FF6000
unkown
page execute and write copy
4ED1000
heap
page read and write
40DE000
stack
page read and write
169E000
heap
page read and write
8612000
heap
page read and write
4E81000
heap
page read and write
4D8F000
stack
page read and write
15B4000
heap
page read and write
3FCE000
stack
page read and write
355F000
stack
page read and write
5410000
direct allocation
page execute and read and write
BF9000
unkown
page write copy
FF7000
unkown
page execute and write copy
84E000
stack
page read and write
E1A000
unkown
page readonly
14E5000
heap
page read and write
176B000
stack
page read and write
302F000
stack
page read and write
14D0000
heap
page read and write
4ED1000
heap
page read and write
9C72000
direct allocation
page read and write
156E000
stack
page read and write
4E81000
heap
page read and write
10BC000
stack
page read and write
8E4000
unkown
page readonly
451000
unkown
page execute read
45AD000
stack
page read and write
4B7D000
stack
page read and write
9C04000
direct allocation
page read and write
369F000
stack
page read and write
1560000
heap
page read and write
4E81000
heap
page read and write
6B3F000
stack
page read and write
474E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
3150000
heap
page read and write
30CC000
stack
page read and write
118B000
unkown
page execute and read and write
9D8E000
direct allocation
page read and write
1680000
direct allocation
page read and write
1490000
heap
page read and write
4BEF000
stack
page read and write
695000
remote allocation
page readonly
9D34000
direct allocation
page read and write
9C84000
direct allocation
page read and write
112D000
stack
page read and write
54D0000
direct allocation
page execute and read and write
35CE000
stack
page read and write
710000
heap
page read and write
15B4000
heap
page read and write
4E81000
heap
page read and write
474F000
stack
page read and write
B90000
unkown
page read and write
3D0F000
stack
page read and write
6930000
heap
page read and write
488F000
stack
page read and write
5BFE000
stack
page read and write
4ED1000
heap
page read and write
14F3000
heap
page read and write
488E000
stack
page read and write
15B4000
heap
page read and write
9C14000
direct allocation
page read and write
380F000
stack
page read and write
4E70000
direct allocation
page read and write
1680000
direct allocation
page read and write
9D3B000
direct allocation
page read and write
4E70000
direct allocation
page read and write
B91000
unkown
page execute and write copy
56DE000
stack
page read and write
4EC0000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
1690000
heap
page read and write
9CC4000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
5400000
direct allocation
page execute and read and write
14FB000
heap
page read and write
BF2000
unkown
page execute and write copy
3E8F000
stack
page read and write
340F000
stack
page read and write
54F0000
direct allocation
page execute and read and write
5590000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
440000
heap
page read and write
49AE000
stack
page read and write
4E81000
heap
page read and write
451000
unkown
page execute read
4E70000
direct allocation
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
1680000
direct allocation
page read and write
4E81000
heap
page read and write
449E000
stack
page read and write
8E4000
unkown
page readonly
F5D000
stack
page read and write
54F0000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
5560000
direct allocation
page execute and read and write
16ED000
heap
page read and write
7E6000
heap
page read and write
14FE000
stack
page read and write
4EC0000
direct allocation
page read and write
CEA000
stack
page read and write
3C4E000
stack
page read and write
4ED1000
heap
page read and write
15B4000
heap
page read and write
31EE000
stack
page read and write
384F000
stack
page read and write
14BF000
stack
page read and write
15B4000
heap
page read and write
D52000
unkown
page execute and read and write
172E000
stack
page read and write
D72000
unkown
page execute and read and write
E7F000
unkown
page execute and read and write
9CAC000
direct allocation
page read and write
4E81000
heap
page read and write
1570000
direct allocation
page read and write
FB4000
unkown
page execute and read and write
53C0000
direct allocation
page execute and read and write
3F5F000
stack
page read and write
410F000
stack
page read and write
4ED1000
heap
page read and write
3B0E000
stack
page read and write
537F000
stack
page read and write
4E81000
heap
page read and write
14E5000
heap
page read and write
4ED1000
heap
page read and write
B8F000
stack
page read and write
DDF000
unkown
page read and write
8610000
heap
page read and write
9D30000
direct allocation
page read and write
1680000
direct allocation
page read and write
1540000
heap
page read and write
460E000
stack
page read and write
569B000
stack
page read and write
4A0E000
stack
page read and write
498F000
stack
page read and write
4ED1000
heap
page read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
159E000
stack
page read and write
54F0000
direct allocation
page execute and read and write
3BCF000
stack
page read and write
7A0000
heap
page read and write
4E81000
heap
page read and write
15B4000
heap
page read and write
45CF000
stack
page read and write
15B4000
heap
page read and write
9D4E000
direct allocation
page read and write
4E81000
heap
page read and write
9C9A000
direct allocation
page read and write
1512000
heap
page read and write
53C0000
direct allocation
page execute and read and write
4E70000
direct allocation
page read and write
9CC2000
direct allocation
page read and write
36DE000
stack
page read and write
15B4000
heap
page read and write
6A3F000
stack
page read and write
4E81000
heap
page read and write
143E000
heap
page read and write
2A00C000
direct allocation
page read and write
E97000
unkown
page execute and write copy
4E81000
heap
page read and write
4E81000
heap
page read and write
391F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4E81000
heap
page read and write
1482000
heap
page read and write
3CDF000
stack
page read and write
5440000
direct allocation
page execute and read and write
D90000
heap
page read and write
4ED1000
heap
page read and write
E11000
unkown
page read and write
5490000
direct allocation
page execute and read and write
4E81000
heap
page read and write
9D60000
direct allocation
page read and write
5360000
direct allocation
page read and write
2A00A000
direct allocation
page read and write
9D1E000
direct allocation
page read and write
4E81000
heap
page read and write
359E000
stack
page read and write
16E0000
heap
page read and write
166E000
stack
page read and write
44CF000
stack
page read and write
63C000
stack
page read and write
143A000
heap
page read and write
3F9E000
stack
page read and write
9C6A000
direct allocation
page read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
54F0000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
1680000
direct allocation
page read and write
4A7D000
stack
page read and write
717000
heap
page read and write
29EFE000
stack
page read and write
54F0000
direct allocation
page execute and read and write
350F000
stack
page read and write
DAA000
unkown
page write copy
1578000
direct allocation
page read and write
4E81000
heap
page read and write
3D8E000
stack
page read and write
4E81000
heap
page read and write
D72000
unkown
page execute and read and write
A73000
unkown
page readonly
BF9000
unkown
page write copy
4ED1000
heap
page read and write
5310000
direct allocation
page read and write
398F000
stack
page read and write
6C60000
heap
page read and write
4ED1000
heap
page read and write
780000
heap
page read and write
A010000
direct allocation
page read and write
4EB0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4E81000
heap
page read and write
36CF000
stack
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
5510000
direct allocation
page execute and read and write
4E81000
heap
page read and write
4ED1000
heap
page read and write
29FFF000
stack
page read and write
15A0000
heap
page read and write
6C6D000
heap
page read and write
15B4000
heap
page read and write
B90000
unkown
page read and write
A0FE000
direct allocation
page read and write
3157000
heap
page read and write
374E000
stack
page read and write
527E000
stack
page read and write
4ED1000
heap
page read and write
470F000
stack
page read and write
A75000
unkown
page readonly
7A0000
heap
page read and write
15B4000
heap
page read and write
9C78000
direct allocation
page read and write
153F000
stack
page read and write
9C94000
direct allocation
page read and write
15B4000
heap
page read and write
There are 895 hidden memdumps, click here to show them.