IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.43/Zu7JuNko/index.php5
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.43/Zu7JuNko/index.php4
unknown
http://185.215.113.43/Zu7JuNko/index.phpncodedH
unknown
http://185.215.113.43/Zu7JuNko/index.phpy
unknown
http://185.215.113.43/Zu7JuNko/index.phpZ
unknown
http://185.215.113.43/Zu7JuNko/index.phpX
unknown
http://185.215.113.43/Zu7JuNko/index.php%
unknown
http://185.215.113.43/Zu7JuNko/index.phpE
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
http://185.215.113.43/Zu7JuNko/index.phpd
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
http://185.215.113.43/8
unknown
http://185.215.113.43/Zu7JuNko/index.php(
unknown
http://185.215.113.43/Zu7JuNko/index.phph
unknown
http://185.215.113.43/Zu7JuNko/index.phpL
unknown
http://185.215.113.43/Zu7JuNko/index.phpncodedo
unknown
http://185.215.113.43/Zu7JuNko/index.phpp
unknown
There are 8 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
721000
unkown
page execute and read and write
malicious
721000
unkown
page execute and read and write
malicious
4F20000
direct allocation
page read and write
malicious
4CF0000
direct allocation
page read and write
malicious
49A0000
direct allocation
page read and write
malicious
4970000
direct allocation
page read and write
malicious
721000
unkown
page execute and read and write
malicious
4F1000
unkown
page execute and read and write
malicious
4E70000
direct allocation
page execute and read and write
4A91000
heap
page read and write
416E000
stack
page read and write
4521000
heap
page read and write
BE4000
unkown
page execute and write copy
721000
unkown
page execute and write copy
44F1000
heap
page read and write
4861000
heap
page read and write
1157000
heap
page read and write
3D6F000
stack
page read and write
F4A000
heap
page read and write
4510000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
5F4000
heap
page read and write
4861000
heap
page read and write
5F0000
heap
page read and write
4A80000
direct allocation
page read and write
315E000
stack
page read and write
F2E000
stack
page read and write
4A80000
direct allocation
page read and write
311F000
stack
page read and write
3FEF000
stack
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
3EEE000
stack
page read and write
664C000
stack
page read and write
365F000
stack
page read and write
559000
unkown
page write copy
10EA000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
2967000
heap
page read and write
9B2000
unkown
page execute and read and write
1167000
heap
page read and write
4F20000
direct allocation
page read and write
4861000
heap
page read and write
126B000
heap
page read and write
33DF000
stack
page read and write
A30000
unkown
page execute and read and write
4861000
heap
page read and write
5F4000
heap
page read and write
C5B000
stack
page read and write
1195000
heap
page read and write
115C000
heap
page read and write
11AC000
heap
page read and write
782000
unkown
page execute and read and write
4861000
heap
page read and write
4CA0000
trusted library allocation
page read and write
4B40000
direct allocation
page execute and read and write
44DE000
stack
page read and write
425E000
stack
page read and write
5F4000
heap
page read and write
710000
direct allocation
page read and write
DE0000
heap
page read and write
6D60000
heap
page read and write
4861000
heap
page read and write
2D5F000
stack
page read and write
12DF000
stack
page read and write
FE0000
heap
page read and write
471F000
stack
page read and write
119C000
heap
page read and write
4DEE000
stack
page read and write
11AB000
heap
page read and write
4861000
heap
page read and write
475E000
stack
page read and write
3EDF000
stack
page read and write
4F2E000
stack
page read and write
351F000
stack
page read and write
296D000
heap
page read and write
1161000
heap
page read and write
11AB000
heap
page read and write
379F000
stack
page read and write
2ADF000
stack
page read and write
4861000
heap
page read and write
A40000
unkown
page execute and write copy
5F4000
heap
page read and write
39DF000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
3B5F000
stack
page read and write
305E000
stack
page read and write
43AF000
stack
page read and write
5130000
direct allocation
page execute and read and write
4EF0000
direct allocation
page execute and read and write
CC0000
direct allocation
page read and write
3B9E000
stack
page read and write
369E000
stack
page read and write
5F4000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
4D2E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
4B20000
direct allocation
page execute and read and write
C2E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
2C40000
direct allocation
page read and write
4AC0000
direct allocation
page execute and read and write
2B50000
heap
page read and write
125F000
stack
page read and write
4861000
heap
page read and write
3A1F000
stack
page read and write
2C40000
direct allocation
page read and write
5140000
direct allocation
page execute and read and write
33DE000
stack
page read and write
4861000
heap
page read and write
5110000
direct allocation
page execute and read and write
D42000
heap
page read and write
DD0000
direct allocation
page read and write
4861000
heap
page read and write
10C0000
heap
page read and write
5F4000
heap
page read and write
2C9E000
stack
page read and write
4861000
heap
page read and write
321E000
stack
page read and write
5090000
direct allocation
page execute and read and write
5F4000
heap
page read and write
309F000
stack
page read and write
51DE000
stack
page read and write
2B7F000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
4861000
heap
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
2FAF000
stack
page read and write
1197000
heap
page read and write
D6E000
stack
page read and write
4A80000
direct allocation
page read and write
45DF000
stack
page read and write
710000
direct allocation
page read and write
710000
direct allocation
page read and write
4861000
heap
page read and write
4D51000
direct allocation
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
DD0000
direct allocation
page read and write
4861000
heap
page read and write
DB0000
heap
page read and write
80F000
unkown
page execute and read and write
4861000
heap
page read and write
44F1000
heap
page read and write
4B00000
direct allocation
page execute and read and write
2E5F000
stack
page read and write
5F4000
heap
page read and write
4861000
heap
page read and write
5070000
direct allocation
page execute and read and write
4AAF000
stack
page read and write
4521000
heap
page read and write
4A90000
heap
page read and write
491F000
stack
page read and write
2CDF000
stack
page read and write
38AE000
stack
page read and write
4861000
heap
page read and write
A30000
unkown
page execute and read and write
322F000
stack
page read and write
D5D000
heap
page read and write
365E000
stack
page read and write
4861000
heap
page read and write
4E70000
direct allocation
page execute and read and write
42DF000
stack
page read and write
2F9E000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
329F000
stack
page read and write
11B1000
heap
page read and write
DD0000
direct allocation
page read and write
31DF000
stack
page read and write
4A80000
direct allocation
page read and write
4861000
heap
page read and write
721000
unkown
page execute and write copy
2960000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4861000
heap
page read and write
28BE000
stack
page read and write
4861000
heap
page read and write
38DF000
stack
page read and write
560000
heap
page read and write
6D70000
heap
page read and write
5F4000
heap
page read and write
42AE000
stack
page read and write
4871000
heap
page read and write
11C2000
heap
page read and write
4B30000
direct allocation
page execute and read and write
44F1000
heap
page read and write
4521000
heap
page read and write
4861000
heap
page read and write
2D9F000
stack
page read and write
4B60000
direct allocation
page execute and read and write
4861000
heap
page read and write
28D7000
heap
page read and write
4861000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
4A80000
direct allocation
page read and write
43DF000
stack
page read and write
4861000
heap
page read and write
4F5E000
stack
page read and write
1131000
heap
page read and write
5F5000
heap
page read and write
4CF0000
direct allocation
page read and write
DAE000
stack
page read and write
4861000
heap
page read and write
389F000
stack
page read and write
44F1000
heap
page read and write
376E000
stack
page read and write
6D61000
heap
page read and write
F7D000
stack
page read and write
DD0000
direct allocation
page read and write
3C9E000
stack
page read and write
455F000
stack
page read and write
119C000
heap
page read and write
6EE000
unkown
page execute and read and write
78B000
unkown
page execute and read and write
11B1000
heap
page read and write
710000
direct allocation
page read and write
44F1000
heap
page read and write
4861000
heap
page read and write
1180000
heap
page read and write
4F1000
unkown
page execute and write copy
11AB000
heap
page read and write
D2E000
stack
page read and write
3B1F000
stack
page read and write
4A91000
heap
page read and write
4861000
heap
page read and write
4C5B000
stack
page read and write
2B57000
heap
page read and write
5100000
direct allocation
page execute and read and write
4861000
heap
page read and write
4861000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
5070000
heap
page read and write
4A80000
direct allocation
page read and write
4861000
heap
page read and write
1163000
heap
page read and write
4EEF000
stack
page read and write
119D000
heap
page read and write
720000
unkown
page readonly
4B40000
direct allocation
page execute and read and write
3D5E000
stack
page read and write
6600000
heap
page read and write
49AC000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
EEF000
stack
page read and write
505F000
stack
page read and write
1155000
heap
page read and write
2C40000
direct allocation
page read and write
7CA000
unkown
page execute and read and write
35EF000
stack
page read and write
359F000
stack
page read and write
50A0000
direct allocation
page execute and read and write
30DE000
stack
page read and write
426F000
stack
page read and write
4A91000
heap
page read and write
710000
heap
page read and write
1118000
heap
page read and write
720000
unkown
page read and write
5E0000
heap
page read and write
3B5D000
stack
page read and write
28A0000
direct allocation
page read and write
4521000
heap
page read and write
1126000
heap
page read and write
4B70000
direct allocation
page execute and read and write
485F000
stack
page read and write
5F4000
heap
page read and write
409D000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
319E000
stack
page read and write
2C3E000
stack
page read and write
441F000
stack
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
9B4000
unkown
page execute and write copy
50E0000
direct allocation
page execute and read and write
375F000
stack
page read and write
F2E000
stack
page read and write
349E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
4861000
heap
page read and write
49DE000
stack
page read and write
5F4000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
44F1000
heap
page read and write
3DAE000
stack
page read and write
4930000
trusted library allocation
page read and write
2C40000
direct allocation
page read and write
102E000
stack
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
127B000
heap
page read and write
4861000
heap
page read and write
6BCE000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
481E000
stack
page read and write
10EE000
heap
page read and write
395F000
stack
page read and write
351E000
stack
page read and write
5F4000
heap
page read and write
11B1000
heap
page read and write
113F000
heap
page read and write
837E000
stack
page read and write
469F000
stack
page read and write
44F1000
heap
page read and write
DB0000
heap
page read and write
3ADE000
stack
page read and write
1DC000
stack
page read and write
3A1E000
stack
page read and write
4A80000
direct allocation
page read and write
2C40000
direct allocation
page read and write
5F4000
heap
page read and write
4B50000
direct allocation
page execute and read and write
11A9000
heap
page read and write
28B0000
direct allocation
page execute and read and write
800000
unkown
page execute and read and write
44F1000
heap
page read and write
4A80000
direct allocation
page read and write
435F000
stack
page read and write
720000
unkown
page readonly
3F1F000
stack
page read and write
3C9F000
stack
page read and write
A40000
unkown
page execute and write copy
4B00000
direct allocation
page execute and read and write
4AF0000
direct allocation
page execute and read and write
2C40000
direct allocation
page read and write
509E000
stack
page read and write
CEF000
stack
page read and write
DD0000
direct allocation
page read and write
91E000
unkown
page execute and read and write
4861000
heap
page read and write
451F000
stack
page read and write
11C2000
heap
page read and write
4E70000
direct allocation
page execute and read and write
10E0000
heap
page read and write
DD0000
direct allocation
page read and write
3C6E000
stack
page read and write
4B10000
direct allocation
page execute and read and write
4AB0000
direct allocation
page execute and read and write
4EC0000
direct allocation
page execute and read and write
355E000
stack
page read and write
EE0000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4861000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
78B000
unkown
page execute and read and write
DD0000
direct allocation
page read and write
DD0000
direct allocation
page read and write
65FF000
stack
page read and write
5F4000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
4B20000
direct allocation
page execute and read and write
49D1000
direct allocation
page read and write
CC0000
direct allocation
page read and write
401F000
stack
page read and write
782000
unkown
page execute and read and write
61F5000
heap
page read and write
A29000
unkown
page execute and read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
E7C000
stack
page read and write
44F1000
heap
page read and write
5B0000
heap
page read and write
459E000
stack
page read and write
3B2E000
stack
page read and write
2940000
heap
page read and write
A3F000
unkown
page execute and read and write
2FDF000
stack
page read and write
5F4000
heap
page read and write
117D000
heap
page read and write
4861000
heap
page read and write
78B000
unkown
page execute and read and write
11AB000
heap
page read and write
6D6E000
heap
page read and write
3A5E000
stack
page read and write
4F0000
unkown
page readonly
1180000
heap
page read and write
5F4000
heap
page read and write
BE4000
unkown
page execute and write copy
4861000
heap
page read and write
2C50000
heap
page read and write
4861000
heap
page read and write
3E5F000
stack
page read and write
4861000
heap
page read and write
720000
unkown
page read and write
29DF000
stack
page read and write
44F1000
heap
page read and write
2F1E000
stack
page read and write
10B0000
heap
page read and write
44F1000
heap
page read and write
379E000
stack
page read and write
4861000
heap
page read and write
789000
unkown
page write copy
61F6000
heap
page read and write
1117000
heap
page read and write
341E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
4E80000
direct allocation
page execute and read and write
4A80000
direct allocation
page read and write
30EF000
stack
page read and write
710000
direct allocation
page read and write
CEB000
heap
page read and write
405E000
stack
page read and write
5F4000
heap
page read and write
52DC000
stack
page read and write
1133000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
4F81000
direct allocation
page read and write
3E9E000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
3DDF000
stack
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
326E000
stack
page read and write
4521000
heap
page read and write
2EDF000
stack
page read and write
2940000
direct allocation
page execute and read and write
4E2F000
stack
page read and write
4A91000
heap
page read and write
613E000
stack
page read and write
810000
unkown
page execute and write copy
DD0000
direct allocation
page read and write
789000
unkown
page write copy
A29000
unkown
page execute and read and write
4A80000
direct allocation
page read and write
445E000
stack
page read and write
3DDE000
stack
page read and write
312E000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
399E000
stack
page read and write
8100000
heap
page read and write
439E000
stack
page read and write
3C2F000
stack
page read and write
640000
heap
page read and write
2F5F000
stack
page read and write
BE2000
unkown
page execute and read and write
4861000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
44F4000
heap
page read and write
40DF000
stack
page read and write
4861000
heap
page read and write
61F0000
heap
page read and write
11AC000
heap
page read and write
36DF000
stack
page read and write
4A91000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
1140000
heap
page read and write
3EAF000
stack
page read and write
4861000
heap
page read and write
540000
heap
page read and write
6AE000
stack
page read and write
293E000
stack
page read and write
5F4000
heap
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
4B80000
direct allocation
page execute and read and write
44F1000
heap
page read and write
4861000
heap
page read and write
2DDE000
stack
page read and write
3F9F000
stack
page read and write
6780000
heap
page read and write
44F0000
heap
page read and write
2E6F000
stack
page read and write
1133000
heap
page read and write
11A1000
heap
page read and write
4861000
heap
page read and write
4F0000
unkown
page read and write
2C40000
direct allocation
page read and write
710000
direct allocation
page read and write
3C5F000
stack
page read and write
386F000
stack
page read and write
44F1000
heap
page read and write
4500000
heap
page read and write
5F4000
heap
page read and write
55B000
unkown
page execute and read and write
552000
unkown
page execute and read and write
4861000
heap
page read and write
4E70000
direct allocation
page execute and read and write
3AEF000
stack
page read and write
63FF000
stack
page read and write
385E000
stack
page read and write
34AF000
stack
page read and write
4E40000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
412F000
stack
page read and write
4CAE000
stack
page read and write
4861000
heap
page read and write
4F00000
direct allocation
page execute and read and write
5F4000
heap
page read and write
495E000
stack
page read and write
419E000
stack
page read and write
7F9000
unkown
page execute and read and write
111E000
stack
page read and write
43EE000
stack
page read and write
10AE000
stack
page read and write
2D6F000
stack
page read and write
4A60000
heap
page read and write
4861000
heap
page read and write
44EF000
stack
page read and write
2EDF000
stack
page read and write
3D9F000
stack
page read and write
4960000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
4E70000
direct allocation
page execute and read and write
3D1F000
stack
page read and write
DD0000
direct allocation
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
47DF000
stack
page read and write
11B1000
heap
page read and write
34EE000
stack
page read and write
4A5F000
stack
page read and write
1141000
heap
page read and write
50A0000
direct allocation
page execute and read and write
6750000
heap
page read and write
4861000
heap
page read and write
1120000
heap
page read and write
720000
unkown
page read and write
41DE000
stack
page read and write
11AB000
heap
page read and write
F71000
heap
page read and write
4A91000
heap
page read and write
9FA000
unkown
page execute and read and write
4B90000
direct allocation
page execute and read and write
E90000
heap
page read and write
391E000
stack
page read and write
4861000
heap
page read and write
11AB000
heap
page read and write
402E000
stack
page read and write
11A4000
heap
page read and write
C6B000
stack
page read and write
106E000
stack
page read and write
502E000
stack
page read and write
34DF000
stack
page read and write
D28000
heap
page read and write
2C5F000
stack
page read and write
44F1000
heap
page read and write
4861000
heap
page read and write
431E000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
4860000
heap
page read and write
2C40000
direct allocation
page read and write
339F000
stack
page read and write
A29000
unkown
page execute and read and write
4A80000
direct allocation
page read and write
289E000
stack
page read and write
2BDF000
stack
page read and write
710000
direct allocation
page read and write
4861000
heap
page read and write
329E000
stack
page read and write
361F000
stack
page read and write
4A80000
direct allocation
page read and write
4DAE000
stack
page read and write
3CDE000
stack
page read and write
4861000
heap
page read and write
2C40000
direct allocation
page read and write
44F1000
heap
page read and write
461E000
stack
page read and write
4ED0000
trusted library allocation
page read and write
6EE000
stack
page read and write
4861000
heap
page read and write
1162000
heap
page read and write
5F4000
heap
page read and write
415F000
stack
page read and write
4861000
heap
page read and write
CD0000
direct allocation
page execute and read and write
4AF0000
direct allocation
page execute and read and write
405F000
stack
page read and write
2C40000
direct allocation
page read and write
3F5E000
stack
page read and write
710000
direct allocation
page read and write
37DE000
stack
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
4861000
heap
page read and write
301E000
stack
page read and write
119D000
heap
page read and write
4F10000
direct allocation
page execute and read and write
1131000
heap
page read and write
11C3000
heap
page read and write
5120000
direct allocation
page execute and read and write
1150000
heap
page read and write
64FF000
stack
page read and write
789000
unkown
page write copy
335E000
stack
page read and write
39AF000
stack
page read and write
F4E000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
4A80000
direct allocation
page read and write
44F1000
heap
page read and write
4861000
heap
page read and write
11AB000
heap
page read and write
531E000
stack
page read and write
823B000
stack
page read and write
1180000
heap
page read and write
6D70000
heap
page read and write
3E1E000
stack
page read and write
325F000
stack
page read and write
28FE000
stack
page read and write
496C000
stack
page read and write
5F4000
heap
page read and write
411E000
stack
page read and write
4861000
heap
page read and write
9FA000
unkown
page execute and read and write
5F4000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4861000
heap
page read and write
A3F000
unkown
page execute and read and write
4861000
heap
page read and write
6CCF000
stack
page read and write
4861000
heap
page read and write
2C57000
heap
page read and write
A3F000
unkown
page execute and read and write
285E000
stack
page read and write
5F4000
heap
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
CAE000
stack
page read and write
113F000
heap
page read and write
4861000
heap
page read and write
4B10000
direct allocation
page execute and read and write
35DE000
stack
page read and write
4861000
heap
page read and write
33AE000
stack
page read and write
11B1000
heap
page read and write
91E000
unkown
page execute and read and write
371E000
stack
page read and write
3C1E000
stack
page read and write
1157000
heap
page read and write
28C0000
direct allocation
page execute and read and write
44F1000
heap
page read and write
336F000
stack
page read and write
782000
unkown
page execute and read and write
A30000
unkown
page execute and read and write
4FD000
stack
page read and write
833C000
stack
page read and write
5074000
heap
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
2C40000
direct allocation
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
44F1000
heap
page read and write
2B6F000
stack
page read and write
419F000
stack
page read and write
4A01000
direct allocation
page read and write
4861000
heap
page read and write
61BE000
stack
page read and write
429F000
stack
page read and write
44F1000
heap
page read and write
281E000
stack
page read and write
50B0000
direct allocation
page execute and read and write
4861000
heap
page read and write
331F000
stack
page read and write
4861000
heap
page read and write
315F000
stack
page read and write
362E000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
2950000
direct allocation
page execute and read and write
A3F000
unkown
page execute and write copy
4861000
heap
page read and write
4861000
heap
page read and write
4F20000
direct allocation
page read and write
44F1000
heap
page read and write
91E000
unkown
page execute and read and write
28D0000
heap
page read and write
381F000
stack
page read and write
BE2000
unkown
page execute and read and write
1126000
heap
page read and write
2A6F000
stack
page read and write
1FC000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
4ADF000
stack
page read and write
345F000
stack
page read and write
4861000
heap
page read and write
44F1000
heap
page read and write
4861000
heap
page read and write
11A4000
heap
page read and write
2BFE000
stack
page read and write
789000
unkown
page write copy
50A0000
direct allocation
page execute and read and write
5F4000
heap
page read and write
4FD000
stack
page read and write
6776000
heap
page read and write
2B40000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
710000
direct allocation
page read and write
287F000
stack
page read and write
720000
unkown
page readonly
4AF0000
direct allocation
page execute and read and write
559000
unkown
page write copy
F40000
heap
page read and write
421F000
stack
page read and write
11A4000
heap
page read and write
42DE000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
5080000
direct allocation
page execute and read and write
441E000
stack
page read and write
2C6F000
stack
page read and write
5F4000
heap
page read and write
4861000
heap
page read and write
301F000
stack
page read and write
2C40000
direct allocation
page read and write
80F000
unkown
page execute and write copy
39EE000
stack
page read and write
4861000
heap
page read and write
2C40000
direct allocation
page read and write
4521000
heap
page read and write
38DE000
stack
page read and write
296B000
heap
page read and write
50F0000
direct allocation
page execute and read and write
2EAE000
stack
page read and write
1135000
heap
page read and write
449F000
stack
page read and write
1135000
heap
page read and write
2B3E000
stack
page read and write
4A80000
direct allocation
page read and write
710000
direct allocation
page read and write
5F4000
heap
page read and write
4861000
heap
page read and write
44F1000
heap
page read and write
617E000
stack
page read and write
3F1E000
stack
page read and write
4B50000
direct allocation
page execute and read and write
710000
direct allocation
page read and write
4861000
heap
page read and write
11A4000
heap
page read and write
847E000
stack
page read and write
2FEE000
stack
page read and write
EE5000
heap
page read and write
5F4000
heap
page read and write
4E60000
direct allocation
page execute and read and write
2DDF000
stack
page read and write
541E000
stack
page read and write
5F4000
heap
page read and write
710000
direct allocation
page read and write
BE4000
unkown
page execute and write copy
3FDE000
stack
page read and write
4861000
heap
page read and write
710000
direct allocation
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
DD0000
direct allocation
page read and write
44F1000
heap
page read and write
5F4000
heap
page read and write
1157000
heap
page read and write
28A0000
direct allocation
page read and write
3BDF000
stack
page read and write
11A4000
heap
page read and write
789000
unkown
page write copy
4861000
heap
page read and write
1180000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4B30000
direct allocation
page execute and read and write
A3F000
unkown
page execute and write copy
3A9F000
stack
page read and write
710000
direct allocation
page read and write
BE2000
unkown
page execute and read and write
1260000
heap
page read and write
46DE000
stack
page read and write
CE0000
heap
page read and write
721000
unkown
page execute and write copy
4EB0000
direct allocation
page execute and read and write
32DE000
stack
page read and write
2BBC000
stack
page read and write
44F1000
heap
page read and write
A3F000
unkown
page execute and write copy
50A0000
direct allocation
page execute and read and write
519F000
stack
page read and write
9FA000
unkown
page execute and read and write
674C000
stack
page read and write
44F1000
heap
page read and write
D5A000
stack
page read and write
2C40000
direct allocation
page read and write
1180000
heap
page read and write
44F1000
heap
page read and write
372F000
stack
page read and write
4CF0000
direct allocation
page read and write
50A0000
direct allocation
page execute and read and write
DE5000
heap
page read and write
A40000
unkown
page execute and write copy
4520000
heap
page read and write
4861000
heap
page read and write
5F4000
heap
page read and write
4861000
heap
page read and write
789000
unkown
page write copy
There are 792 hidden memdumps, click here to show them.