IOC Report
skuld3.exe

loading gif

Files

File Path
Type
Category
Malicious
skuld3.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\skuld3.exe
"C:\Users\user\Desktop\skuld3.exe"
malicious
C:\Windows\System32\attrib.exe
attrib +h +s C:\Users\user\Desktop\skuld3.exe
malicious
C:\Windows\System32\attrib.exe
attrib +h +s C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
malicious
C:\Windows\System32\fodhelper.exe
fodhelper
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
malicious
C:\Windows\System32\fodhelper.exe
fodhelper
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get UUID
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C fodhelper
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C fodhelper
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
malicious
https://api.ipify.org/-DisableIOAVProtection-DisableScriptScanning%s
unknown
malicious
https://discordapp.com/api/webhooks/1293231846204903474/NlFoQQli1eEBiZ1mTgA4lGWcgDGUPQu-TH2KjA0djnkL
unknown
https://github.com/hackirby/wallets-injection/raw/main/atomic.asarhttps://github.com/hackirby/wallet
unknown
https://raw.githubusercontent.com/hackirby/discord-injection/main/injection.js1157920892103562487626
unknown
https://avatars.githubusercontent.com/u/145487845?v=4sqlite:
unknown
https://api.gofile.io/getServerhttps://%s.gofile.io/uploadFilesql:
unknown
https://i.ibb.co/GFZ2tHJ/shakabaiano-1674282487.jpgJSON
unknown
http://ip-api.com/json
unknown
https://discord.com/api/v9/users/
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.13.205
malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
104.26.13.205
api.ipify.org
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\partmgr
EnableCounterForIoctl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Realtek HD Audio Universal Service
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
DelegateExecute
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
DelegateExecute

Memdumps

Base Address
Regiontype
Protect
Malicious
941000
unkown
page execute and read and write
malicious
D71000
unkown
page execute and read and write
malicious
D71000
unkown
page execute and read and write
malicious
D71000
unkown
page execute and read and write
malicious
D71000
unkown
page execute and read and write
malicious
C00021A000
direct allocation
page read and write
229FA855000
heap
page read and write
C000198000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
C000080000
direct allocation
page read and write
1986B240000
heap
page read and write
C000194000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
229D3BB0000
heap
page read and write
C000168000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
2CB3F340000
heap
page read and write
AD4F9FF000
stack
page read and write
19871F00000
direct allocation
page read and write
C000184000
direct allocation
page read and write
C00023E000
direct allocation
page read and write
223DC809000
heap
page read and write
C000204000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
1D726830000
heap
page read and write
229FAF33000
heap
page read and write
C00002C000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
223DC050000
heap
page read and write
C000008000
direct allocation
page read and write
C000041000
direct allocation
page read and write
19871F50000
direct allocation
page read and write
1F43DE10000
direct allocation
page read and write
172B000
unkown
page execute and read and write
223DC0C9000
heap
page read and write
C0001D6000
direct allocation
page read and write
223DC0AF000
heap
page read and write
223DC0A1000
heap
page read and write
C000092000
direct allocation
page read and write
223DC7F8000
heap
page read and write
C0000AA000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
223DC0A3000
heap
page read and write
C0001CE000
direct allocation
page read and write
177B000
unkown
page execute and read and write
229D3BFC000
heap
page read and write
525AB7E000
stack
page read and write
C000116000
direct allocation
page read and write
1F4630F1000
direct allocation
page read and write
FD6D9FE000
stack
page read and write
2CB3F330000
direct allocation
page read and write
C000012000
direct allocation
page read and write
223DC812000
heap
page read and write
C000064000
direct allocation
page read and write
C00014A000
direct allocation
page read and write
9A605FF000
stack
page read and write
C0001CA000
direct allocation
page read and write
9316E7E000
stack
page read and write
C00020E000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
17B7000
unkown
page write copy
C000010000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
1770000
unkown
page execute and read and write
223DC322000
heap
page read and write
C000150000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
1D581E40000
heap
page read and write
C000054000
direct allocation
page read and write
148C000
unkown
page execute and write copy
5E29BFC000
stack
page read and write
C0000F0000
direct allocation
page read and write
C000010000
direct allocation
page read and write
FD6DBFF000
stack
page read and write
21F79500000
direct allocation
page read and write
1D724C20000
heap
page read and write
C000010000
direct allocation
page read and write
C000086000
direct allocation
page read and write
9A5F9CE000
stack
page read and write
C000144000
direct allocation
page read and write
21F7ADD0000
heap
page read and write
229FAF30000
heap
page read and write
C00011A000
direct allocation
page read and write
229F8FC0000
direct allocation
page read and write
C000076000
direct allocation
page read and write
229D3BF6000
heap
page read and write
C000200000
direct allocation
page read and write
C00014C000
direct allocation
page read and write
223DC320000
heap
page read and write
C000060000
direct allocation
page read and write
525AA7F000
stack
page read and write
FD6E1FE000
stack
page read and write
C000060000
direct allocation
page read and write
C0000EA000
direct allocation
page read and write
21F7AE00000
heap
page read and write
5E295FC000
stack
page read and write
C0000AC000
direct allocation
page read and write
223DC0BA000
heap
page read and write
C00003A000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
229D3BFC000
heap
page read and write
1986B2A0000
heap
page read and write
223DC809000
heap
page read and write
C00015E000
direct allocation
page read and write
C000062000
direct allocation
page read and write
C000204000
direct allocation
page read and write
C000144000
direct allocation
page read and write
223DC0C7000
heap
page read and write
C000208000
direct allocation
page read and write
C0001A0000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
17B7000
unkown
page write copy
C000002000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
D70000
unkown
page readonly
21F342C0000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C000131000
direct allocation
page read and write
C0001D6000
direct allocation
page read and write
C000176000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
5E293FB000
stack
page read and write
C000002000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000114000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C0001CC000
direct allocation
page read and write
C0001B8000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
C0001BC000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
999A1F9000
stack
page read and write
19871F20000
direct allocation
page read and write
C0001D4000
direct allocation
page read and write
223DC0C6000
heap
page read and write
223DC150000
heap
page read and write
C000166000
direct allocation
page read and write
C000051000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
223DC323000
heap
page read and write
5E28FFE000
stack
page read and write
C000080000
direct allocation
page read and write
C000051000
direct allocation
page read and write
229D3BE9000
heap
page read and write
C000056000
direct allocation
page read and write
223DC7F2000
heap
page read and write
C00000A000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C00015A000
direct allocation
page read and write
223DC0AF000
heap
page read and write
C000004000
direct allocation
page read and write
C000014000
direct allocation
page read and write
15043FF000
stack
page read and write
C00000E000
direct allocation
page read and write
1742000
unkown
page execute and read and write
C000078000
direct allocation
page read and write
C00017E000
direct allocation
page read and write
C0001BC000
direct allocation
page read and write
198706B0000
heap
page read and write
223DC0A1000
heap
page read and write
C0001FE000
direct allocation
page read and write
223DC0C3000
heap
page read and write
D70000
unkown
page readonly
C00015A000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
1319000
unkown
page execute and read and write
C00003F000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
C000016000
direct allocation
page read and write
1D724F20000
heap
page read and write
223DE08E000
heap
page read and write
21F79581000
direct allocation
page read and write
C000120000
direct allocation
page read and write
C000064000
direct allocation
page read and write
C00021C000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C000186000
direct allocation
page read and write
C000146000
direct allocation
page read and write
C000109000
direct allocation
page read and write
2CB3F448000
direct allocation
page read and write
223DC7EC000
heap
page read and write
1742000
unkown
page execute and read and write
1742000
unkown
page execute and read and write
5E28DCE000
stack
page read and write
17AC000
unkown
page execute and read and write
172B000
unkown
page execute and read and write
223DC270000
trusted library allocation
page read and write
C0001BE000
direct allocation
page read and write
223DC81A000
heap
page read and write
C0001AA000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
17B7000
unkown
page read and write
C000164000
direct allocation
page read and write
229D3BF2000
heap
page read and write
C00005A000
direct allocation
page read and write
C000004000
direct allocation
page read and write
2CB65F40000
heap
page read and write
1F43DE18000
direct allocation
page read and write
C000116000
direct allocation
page read and write
C000124000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
C00020A000
direct allocation
page read and write
C0001B2000
direct allocation
page read and write
2CB646B1000
direct allocation
page read and write
223DC7F0000
heap
page read and write
C000192000
direct allocation
page read and write
C0000E4000
direct allocation
page read and write
C000156000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C000176000
direct allocation
page read and write
2CB3F34C000
heap
page read and write
223DC327000
heap
page read and write
C00018C000
direct allocation
page read and write
C000098000
direct allocation
page read and write
223DC7ED000
heap
page read and write
C000120000
direct allocation
page read and write
C0001DE000
direct allocation
page read and write
C000078000
direct allocation
page read and write
223DC0CF000
heap
page read and write
223DC0C7000
heap
page read and write
C000170000
direct allocation
page read and write
223DC058000
heap
page read and write
1312000
unkown
page execute and read and write
C00015E000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
1F43DC20000
heap
page read and write
525AAFE000
stack
page read and write
229D3C3F000
heap
page read and write
C0001BA000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
21F341C0000
heap
page read and write
C00007A000
direct allocation
page read and write
C000056000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C00025C000
direct allocation
page read and write
FD6DFFE000
stack
page read and write
C000114000
direct allocation
page read and write
223DC7F0000
heap
page read and write
C00014A000
direct allocation
page read and write
1749000
unkown
page execute and read and write
C0000BE000
direct allocation
page read and write
2CB66080000
heap
page read and write
1D581E60000
heap
page read and write
C00002C000
direct allocation
page read and write
223DC0C7000
heap
page read and write
AD4F7FF000
stack
page read and write
999A17E000
stack
page read and write
21F340B0000
heap
page read and write
223DC327000
heap
page read and write
C000182000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
525ABFF000
stack
page read and write
229FA7B0000
direct allocation
page read and write
1F43DE14000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C00005E000
direct allocation
page read and write
17B5000
unkown
page execute and write copy
C000130000
direct allocation
page read and write
223DC7E8000
heap
page read and write
21F342C8000
direct allocation
page read and write
1F4648E0000
direct allocation
page read and write
223DC7EE000
heap
page read and write
C00000C000
direct allocation
page read and write
223DC32B000
heap
page read and write
C000202000
direct allocation
page read and write
1504DFF000
stack
page read and write
21F341E2000
heap
page read and write
C000178000
direct allocation
page read and write
223DC230000
heap
page read and write
C0001A8000
direct allocation
page read and write
C000018000
direct allocation
page read and write
C000150000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
223DC32A000
heap
page read and write
1770000
unkown
page execute and read and write
C000060000
direct allocation
page read and write
223DE096000
heap
page read and write
C0001D2000
direct allocation
page read and write
223DC809000
heap
page read and write
223DC250000
heap
page read and write
223DC2F0000
heap
page read and write
C000064000
direct allocation
page read and write
1D724BE0000
heap
page read and write
C000004000
direct allocation
page read and write
931717C000
stack
page read and write
1F43DD1D000
heap
page read and write
C000004000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
525A7BF000
stack
page read and write
C000180000
direct allocation
page read and write
C00005E000
direct allocation
page read and write
C000190000
direct allocation
page read and write
C0001AE000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C000051000
direct allocation
page read and write
C0000E6000
direct allocation
page read and write
172B000
unkown
page execute and read and write
C00024A000
direct allocation
page read and write
223DC35E000
heap
page read and write
C00020C000
direct allocation
page read and write
C0001CA000
direct allocation
page read and write
C000248000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
21F79520000
heap
page read and write
1340000
unkown
page execute and read and write
17AC000
unkown
page execute and read and write
C000184000
direct allocation
page read and write
C000066000
direct allocation
page read and write
198706D1000
direct allocation
page read and write
C0001DA000
direct allocation
page read and write
17B5000
unkown
page execute and write copy
19871FA0000
heap
page read and write
1986B26A000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C000152000
direct allocation
page read and write
C000044000
direct allocation
page read and write
223DC067000
heap
page read and write
C00003F000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
229D3C12000
heap
page read and write
AD4F5CE000
stack
page read and write
C000056000
direct allocation
page read and write
C000096000
direct allocation
page read and write
1986B2A8000
heap
page read and write
223DC0AE000
heap
page read and write
17AC000
unkown
page execute and read and write
C00019C000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
C000206000
direct allocation
page read and write
19872040000
heap
page read and write
C000044000
direct allocation
page read and write
C0001BC000
direct allocation
page read and write
C0001A2000
direct allocation
page read and write
C000156000
direct allocation
page read and write
223DC0BA000
heap
page read and write
229FA850000
heap
page read and write
C000194000
direct allocation
page read and write
229F8F81000
direct allocation
page read and write
229D3B18000
direct allocation
page read and write
223DC7F5000
heap
page read and write
223DC0CF000
heap
page read and write
223DC0B2000
heap
page read and write
C000016000
direct allocation
page read and write
C000056000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C000080000
direct allocation
page read and write
2CB65EE0000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
15047FE000
stack
page read and write
C000000000
direct allocation
page read and write
223DC0C3000
heap
page read and write
C0000C4000
direct allocation
page read and write
C000018000
direct allocation
page read and write
C0001C2000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C000120000
direct allocation
page read and write
C000164000
direct allocation
page read and write
2CB65F20000
direct allocation
page read and write
1F4648F0000
direct allocation
page read and write
C000188000
direct allocation
page read and write
229D3BFE000
heap
page read and write
12FB000
unkown
page execute and read and write
C000168000
direct allocation
page read and write
D70000
unkown
page readonly
C000054000
direct allocation
page read and write
C00005E000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
223DE084000
heap
page read and write
C000046000
direct allocation
page read and write
223DC815000
heap
page read and write
223DC0C3000
heap
page read and write
C000186000
direct allocation
page read and write
C000206000
direct allocation
page read and write
C000222000
direct allocation
page read and write
15049FF000
stack
page read and write
C000018000
direct allocation
page read and write
1F464980000
heap
page read and write
C000064000
direct allocation
page read and write
C000120000
direct allocation
page read and write
177B000
unkown
page execute and read and write
223DE08D000
heap
page read and write
C000146000
direct allocation
page read and write
C000182000
direct allocation
page read and write
C000014000
direct allocation
page read and write
C0001AE000
direct allocation
page read and write
C0001C0000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
C000072000
direct allocation
page read and write
229D3BE0000
heap
page read and write
C00007A000
direct allocation
page read and write
C000162000
direct allocation
page read and write
AD4FBFF000
stack
page read and write
223DC0B4000
heap
page read and write
C0001B6000
direct allocation
page read and write
999A27B000
stack
page read and write
C0001B4000
direct allocation
page read and write
999A0FE000
stack
page read and write
C0001B2000
direct allocation
page read and write
137C000
unkown
page execute and read and write
C000046000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
FD6D7CE000
stack
page read and write
C000120000
direct allocation
page read and write
C000160000
direct allocation
page read and write
21F341CB000
heap
page read and write
C000246000
direct allocation
page read and write
C00020A000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
223DC0B7000
heap
page read and write
C0000B8000
direct allocation
page read and write
93170FE000
stack
page read and write
1F43DD10000
heap
page read and write
223DE081000
heap
page read and write
5E29DFF000
stack
page read and write
C0001C8000
direct allocation
page read and write
223DC2A0000
heap
page read and write
C0000C6000
direct allocation
page read and write
C000116000
direct allocation
page read and write
C0001EC000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C000184000
direct allocation
page read and write
223DC813000
heap
page read and write
C000150000
direct allocation
page read and write
1F463090000
heap
page read and write
223DC7E0000
heap
page read and write
9A601FF000
stack
page read and write
C00001A000
direct allocation
page read and write
229FA7E0000
direct allocation
page read and write
1986B264000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
C000051000
direct allocation
page read and write
C000148000
direct allocation
page read and write
1742000
unkown
page execute and read and write
940000
unkown
page readonly
C000118000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C000170000
direct allocation
page read and write
C000122000
direct allocation
page read and write
AD4FFFF000
stack
page read and write
223DC0A1000
heap
page read and write
2CB65F00000
direct allocation
page read and write
1F463070000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000062000
direct allocation
page read and write
1D724F25000
heap
page read and write
1387000
unkown
page write copy
223DC0B1000
heap
page read and write
C00016E000
direct allocation
page read and write
93171FE000
stack
page read and write
21F342C4000
direct allocation
page read and write
C000138000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
223DC325000
heap
page read and write
C00003A000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
148C000
unkown
page execute and write copy
C0001C0000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
223DE083000
heap
page read and write
C00012E000
direct allocation
page read and write
229D3B10000
direct allocation
page read and write
1F43DE1A000
direct allocation
page read and write
229FA810000
direct allocation
page read and write
C000150000
direct allocation
page read and write
C00016C000
direct allocation
page read and write
17B7000
unkown
page write copy
C000046000
direct allocation
page read and write
1F464B20000
heap
page read and write
21F7AD80000
direct allocation
page read and write
223DC0B2000
heap
page read and write
C00003F000
direct allocation
page read and write
C0001FC000
direct allocation
page read and write
C000258000
direct allocation
page read and write
C000066000
direct allocation
page read and write
2CB64690000
heap
page read and write
223DC0AF000
heap
page read and write
21F341CD000
heap
page read and write
17B5000
unkown
page execute and write copy
C000188000
direct allocation
page read and write
19870711000
direct allocation
page read and write
19871F40000
direct allocation
page read and write
C000244000
direct allocation
page read and write
C000031000
direct allocation
page read and write
1D582050000
heap
page read and write
1D582140000
heap
page read and write
C000062000
direct allocation
page read and write
C0001E0000
direct allocation
page read and write
148C000
unkown
page execute and write copy
999A2FF000
stack
page read and write
9316FFB000
stack
page read and write
C00001E000
direct allocation
page read and write
C0001CC000
direct allocation
page read and write
999A07C000
stack
page read and write
C00005C000
direct allocation
page read and write
C000108000
direct allocation
page read and write
17B7000
unkown
page write copy
C00011A000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
C000106000
direct allocation
page read and write
223DC0BA000
heap
page read and write
C00014E000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
C000218000
direct allocation
page read and write
C000106000
direct allocation
page read and write
229F8F85000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
223DC062000
heap
page read and write
19870690000
direct allocation
page read and write
C000214000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C000004000
direct allocation
page read and write
223DC32E000
heap
page read and write
C000008000
direct allocation
page read and write
D70000
unkown
page readonly
223DC7E7000
heap
page read and write
15041CE000
stack
page read and write
C00019E000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
C000180000
direct allocation
page read and write
223DC32E000
heap
page read and write
1986B260000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
C000200000
direct allocation
page read and write
5E297FC000
stack
page read and write
223DC7F5000
heap
page read and write
229D3BE9000
heap
page read and write
C00022E000
direct allocation
page read and write
C0001B0000
direct allocation
page read and write
9316EFE000
stack
page read and write
C00000E000
direct allocation
page read and write
C000162000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C000162000
direct allocation
page read and write
C000000000
direct allocation
page read and write
1D5821D5000
heap
page read and write
C0001C0000
direct allocation
page read and write
229D3C3F000
heap
page read and write
C0001D2000
direct allocation
page read and write
C0000EC000
direct allocation
page read and write
229FA860000
heap
page read and write
C00007A000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C000041000
direct allocation
page read and write
C000188000
direct allocation
page read and write
C000186000
direct allocation
page read and write
223DC270000
trusted library allocation
page read and write
C00002A000
direct allocation
page read and write
C000076000
direct allocation
page read and write
229D3BE6000
heap
page read and write
D70000
unkown
page readonly
223DE080000
heap
page read and write
C000018000
direct allocation
page read and write
1986B2AD000
heap
page read and write
223DC270000
trusted library allocation
page read and write
C000090000
direct allocation
page read and write
2CB3F220000
heap
page read and write
229FA800000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
1F43DD1B000
heap
page read and write
FD6E3FE000
stack
page read and write
C000056000
direct allocation
page read and write
C0001CE000
direct allocation
page read and write
C000041000
direct allocation
page read and write
C000012000
direct allocation
page read and write
229D3B14000
direct allocation
page read and write
1749000
unkown
page execute and read and write
5E299FE000
stack
page read and write
C000137000
direct allocation
page read and write
229FA812000
direct allocation
page read and write
C00024E000
direct allocation
page read and write
148C000
unkown
page execute and write copy
9A5FDFF000
stack
page read and write
19870713000
direct allocation
page read and write
223DC7F0000
heap
page read and write
C00011E000
direct allocation
page read and write
1D582030000
heap
page read and write
229D3BE4000
heap
page read and write
D70000
unkown
page readonly
223DC324000
heap
page read and write
C000182000
direct allocation
page read and write
229D3AF0000
heap
page read and write
C000008000
direct allocation
page read and write
229F8FCB000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
223DC35A000
heap
page read and write
C000060000
direct allocation
page read and write
177B000
unkown
page execute and read and write
C0001DC000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
223DC35D000
heap
page read and write
999A1F6000
stack
page read and write
C000132000
direct allocation
page read and write
1D581E69000
heap
page read and write
C0001E6000
direct allocation
page read and write
223DC0B1000
heap
page read and write
C0001D0000
direct allocation
page read and write
223DC0C0000
heap
page read and write
223DC088000
heap
page read and write
C00005C000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C000104000
direct allocation
page read and write
229FA7F0000
direct allocation
page read and write
229D3BE6000
heap
page read and write
C0001AA000
direct allocation
page read and write
C000016000
direct allocation
page read and write
223DE094000
heap
page read and write
C0001BA000
direct allocation
page read and write
C000022000
direct allocation
page read and write
9316F76000
stack
page read and write
C00012E000
direct allocation
page read and write
223DC0A1000
heap
page read and write
C000106000
direct allocation
page read and write
17B7000
unkown
page read and write
223DC0B1000
heap
page read and write
525A738000
stack
page read and write
C00014C000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
C0001A2000
direct allocation
page read and write
C0001D2000
direct allocation
page read and write
9316BFC000
stack
page read and write
C0001D4000
direct allocation
page read and write
AD501FF000
stack
page read and write
1D724BB0000
heap
page read and write
C000132000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C0000A8000
direct allocation
page read and write
223DC0CA000
heap
page read and write
19871F30000
direct allocation
page read and write
223DE094000
heap
page read and write
C000158000
direct allocation
page read and write
21F7ADB0000
direct allocation
page read and write
229D3B90000
heap
page read and write
C000062000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C000031000
direct allocation
page read and write
229D3B1A000
direct allocation
page read and write
229D3C3D000
heap
page read and write
931707E000
stack
page read and write
105C000
unkown
page execute and write copy
C000130000
direct allocation
page read and write
21F7ADC0000
direct allocation
page read and write
21F7AD90000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
223DC80C000
heap
page read and write
FD6DDFE000
stack
page read and write
C000118000
direct allocation
page read and write
C000074000
direct allocation
page read and write
223DC086000
heap
page read and write
C000130000
direct allocation
page read and write
9A5FFFF000
stack
page read and write
1770000
unkown
page execute and read and write
C00025E000
direct allocation
page read and write
21F7AD70000
direct allocation
page read and write
C000072000
direct allocation
page read and write
223DC355000
heap
page read and write
C0001D0000
direct allocation
page read and write
1385000
unkown
page execute and write copy
229D3C3D000
heap
page read and write
C00002E000
direct allocation
page read and write
15045FF000
stack
page read and write
C000051000
direct allocation
page read and write
223DC0C3000
heap
page read and write
C0001BA000
direct allocation
page read and write
9A5FBFE000
stack
page read and write
C000118000
direct allocation
page read and write
1F464920000
direct allocation
page read and write
C0001A6000
direct allocation
page read and write
17AC000
unkown
page execute and read and write
223DC32A000
heap
page read and write
C0000F6000
direct allocation
page read and write
C0001E4000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
223DE082000
heap
page read and write
5E291FE000
stack
page read and write
223DC0B7000
heap
page read and write
C000100000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
C000135000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
C000054000
direct allocation
page read and write
1D724BC0000
heap
page read and write
C0001B8000
direct allocation
page read and write
C000014000
direct allocation
page read and write
C000082000
direct allocation
page read and write
C000054000
direct allocation
page read and write
19871F60000
direct allocation
page read and write
C000208000
direct allocation
page read and write
999A3FC000
stack
page read and write
C000080000
direct allocation
page read and write
223DC7F1000
heap
page read and write
229D3B70000
direct allocation
page read and write
C000108000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
1504BFE000
stack
page read and write
D70000
unkown
page readonly
1986B268000
direct allocation
page read and write
1F464900000
direct allocation
page read and write
C000094000
direct allocation
page read and write
229FAEB0000
heap
page read and write
C000046000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
1749000
unkown
page execute and read and write
C000031000
direct allocation
page read and write
223DC0CF000
heap
page read and write
C000044000
direct allocation
page read and write
2CB3F44A000
direct allocation
page read and write
223DC270000
trusted library allocation
page read and write
C000074000
direct allocation
page read and write
C000018000
direct allocation
page read and write
C000054000
direct allocation
page read and write
9A603FE000
stack
page read and write
940000
unkown
page readonly
C000216000
direct allocation
page read and write
1387000
unkown
page read and write
223DC350000
heap
page read and write
1749000
unkown
page execute and read and write
177B000
unkown
page execute and read and write
C000044000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C000008000
direct allocation
page read and write
223DC0AA000
heap
page read and write
C000002000
direct allocation
page read and write
2CB65F60000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
17B7000
unkown
page read and write
223DC09F000
heap
page read and write
17B7000
unkown
page read and write
C00001E000
direct allocation
page read and write
C000116000
direct allocation
page read and write
C000140000
direct allocation
page read and write
C000041000
direct allocation
page read and write
C000152000
direct allocation
page read and write
C000062000
direct allocation
page read and write
134B000
unkown
page execute and read and write
C000132000
direct allocation
page read and write
223DC32A000
heap
page read and write
C000016000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
AD4FDFF000
stack
page read and write
C00005E000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
223DE094000
heap
page read and write
C00009A000
direct allocation
page read and write
1D5821D0000
heap
page read and write
1D724C28000
heap
page read and write
C000014000
direct allocation
page read and write
C000132000
direct allocation
page read and write
2CB65F30000
direct allocation
page read and write
C00014C000
direct allocation
page read and write
C000130000
direct allocation
page read and write
C0000E8000
direct allocation
page read and write
D70000
unkown
page readonly
C000128000
direct allocation
page read and write
999A47E000
stack
page read and write
223DC0B9000
heap
page read and write
C000046000
direct allocation
page read and write
C000066000
direct allocation
page read and write
C000126000
direct allocation
page read and write
C000041000
direct allocation
page read and write
C000064000
direct allocation
page read and write
229D3BBC000
heap
page read and write
1770000
unkown
page execute and read and write
2CB646F1000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
2CB3F444000
direct allocation
page read and write
223DC809000
heap
page read and write
21F342CA000
direct allocation
page read and write
229FA7D0000
direct allocation
page read and write
C000106000
direct allocation
page read and write
1F464930000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
2CB65F10000
direct allocation
page read and write
223DE08E000
heap
page read and write
C000074000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
223DC0BC000
heap
page read and write
C000074000
direct allocation
page read and write
C000186000
direct allocation
page read and write
999A37E000
stack
page read and write
C000010000
direct allocation
page read and write
172B000
unkown
page execute and read and write
223DC80A000
heap
page read and write
17B5000
unkown
page execute and write copy
C000060000
direct allocation
page read and write
223DC0B7000
heap
page read and write
C000160000
direct allocation
page read and write
2CB3F440000
direct allocation
page read and write
C000206000
direct allocation
page read and write
There are 802 hidden memdumps, click here to show them.