IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.43/Zu7JuNko/index.php4
unknown
http://185.215.113.43/Zu7JuNko/index.php:
unknown
http://185.215.113.43/Zu7JuNko/index.php8
unknown
http://185.215.113.43/Zu7JuNko/index.php;
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
http://185.215.113.43/Zu7JuNko/index.php&
unknown
http://185.215.113.43/Zu7JuNko/index.phpD
unknown
http://185.215.113.43/Zu7JuNko/index.php15.113.43a
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
http://185.215.113.43/Zu7JuNko/index.phpH
unknown
http://185.215.113.43/Zu7JuNko/index.php-
unknown
http://185.215.113.43/Zu7JuNko/index.phpn
unknown
http://185.215.113.43/Zu7JuNko/index.phpL
unknown
http://185.215.113.43/Zu7JuNko/index.phpl
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D61000
unkown
page execute and read and write
malicious
D61000
unkown
page execute and read and write
malicious
5580000
direct allocation
page read and write
malicious
D61000
unkown
page execute and read and write
malicious
51D0000
direct allocation
page read and write
malicious
4850000
direct allocation
page read and write
malicious
B41000
unkown
page execute and read and write
malicious
5210000
direct allocation
page read and write
malicious
32A0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
404E000
stack
page read and write
331E000
stack
page read and write
1484000
heap
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
41DF000
stack
page read and write
5350000
direct allocation
page execute and read and write
3D1E000
stack
page read and write
CE4000
heap
page read and write
711E000
heap
page read and write
53C0000
direct allocation
page execute and read and write
1484000
heap
page read and write
624000
heap
page read and write
33BF000
stack
page read and write
1470000
direct allocation
page read and write
8A9C000
stack
page read and write
3ECE000
stack
page read and write
450E000
stack
page read and write
1470000
direct allocation
page read and write
CE4000
heap
page read and write
2ACF000
stack
page read and write
4D91000
heap
page read and write
471E000
stack
page read and write
1484000
heap
page read and write
8AA0000
heap
page read and write
4C2E000
stack
page read and write
447F000
stack
page read and write
4D91000
heap
page read and write
51D0000
direct allocation
page read and write
3147000
heap
page read and write
1484000
heap
page read and write
5710000
direct allocation
page execute and read and write
4D91000
heap
page read and write
49C0000
direct allocation
page execute and read and write
2B0E000
stack
page read and write
CE4000
heap
page read and write
16D4000
heap
page read and write
39CE000
stack
page read and write
4D30000
direct allocation
page read and write
167E000
stack
page read and write
1484000
heap
page read and write
DC2000
unkown
page execute and read and write
1FD000
stack
page read and write
5730000
direct allocation
page execute and read and write
D40000
direct allocation
page read and write
624000
heap
page read and write
2F9D000
heap
page read and write
49F0000
direct allocation
page execute and read and write
540000
heap
page read and write
D40000
direct allocation
page read and write
65C6000
heap
page read and write
2FCF000
stack
page read and write
4D91000
heap
page read and write
3D4F000
stack
page read and write
5EE000
stack
page read and write
6AF0000
heap
page read and write
34CF000
stack
page read and write
1076000
unkown
page execute and write copy
4D41000
heap
page read and write
CE4000
heap
page read and write
B40000
unkown
page readonly
4D91000
heap
page read and write
D3B000
stack
page read and write
D40000
direct allocation
page read and write
4D91000
heap
page read and write
160E000
heap
page read and write
55BE000
stack
page read and write
388F000
stack
page read and write
16D4000
heap
page read and write
5BBD000
stack
page read and write
4D41000
heap
page read and write
DCB000
unkown
page execute and read and write
3ECF000
stack
page read and write
5350000
direct allocation
page execute and read and write
D40000
direct allocation
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
4D91000
heap
page read and write
5350000
direct allocation
page execute and read and write
464E000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
364E000
stack
page read and write
1484000
heap
page read and write
4D91000
heap
page read and write
1460000
heap
page read and write
4D42000
heap
page read and write
CE4000
heap
page read and write
4960000
heap
page read and write
CE4000
heap
page read and write
16B3000
heap
page read and write
327E000
stack
page read and write
FF1000
unkown
page execute and write copy
30DB000
stack
page read and write
1067000
unkown
page execute and read and write
4A20000
direct allocation
page execute and read and write
3BDE000
stack
page read and write
D40000
direct allocation
page read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
1430000
heap
page read and write
5350000
direct allocation
page execute and read and write
4D41000
heap
page read and write
16B3000
heap
page read and write
324F000
stack
page read and write
4D91000
heap
page read and write
D40000
direct allocation
page read and write
DC9000
unkown
page write copy
4E40000
trusted library allocation
page read and write
5271000
direct allocation
page read and write
3120000
direct allocation
page execute and read and write
4AAF000
stack
page read and write
4D41000
heap
page read and write
CE4000
heap
page read and write
435E000
stack
page read and write
4D91000
heap
page read and write
360F000
stack
page read and write
E47000
unkown
page execute and read and write
32A0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
3E1F000
stack
page read and write
4E7F000
stack
page read and write
398F000
stack
page read and write
1484000
heap
page read and write
1484000
heap
page read and write
4D41000
heap
page read and write
1484000
heap
page read and write
3B9F000
stack
page read and write
460F000
stack
page read and write
CE4000
heap
page read and write
535C000
stack
page read and write
4ABF000
stack
page read and write
1075000
unkown
page execute and read and write
16B0000
heap
page read and write
7120000
heap
page read and write
4D41000
heap
page read and write
49E0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
5200000
heap
page read and write
12AC000
stack
page read and write
46FF000
stack
page read and write
1484000
heap
page read and write
DC9000
unkown
page write copy
4C8E000
stack
page read and write
1075000
unkown
page execute and read and write
3A5F000
stack
page read and write
1438000
heap
page read and write
3E3F000
stack
page read and write
481F000
stack
page read and write
4B0F000
stack
page read and write
16BC000
heap
page read and write
5CBE000
stack
page read and write
4D41000
heap
page read and write
4D91000
heap
page read and write
374F000
stack
page read and write
5350000
direct allocation
page execute and read and write
CE4000
heap
page read and write
1470000
direct allocation
page read and write
CE4000
heap
page read and write
4D91000
heap
page read and write
175B000
heap
page read and write
378E000
stack
page read and write
4D91000
heap
page read and write
624000
heap
page read and write
4D41000
heap
page read and write
16C0000
direct allocation
page read and write
56D0000
direct allocation
page execute and read and write
CE4000
heap
page read and write
1484000
heap
page read and write
593E000
stack
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
CE4000
heap
page read and write
4D41000
heap
page read and write
4D30000
direct allocation
page read and write
1680000
heap
page read and write
3D8E000
stack
page read and write
102D000
unkown
page execute and read and write
4AEE000
stack
page read and write
CE4000
heap
page read and write
1484000
heap
page read and write
4D91000
heap
page read and write
391F000
stack
page read and write
CE4000
heap
page read and write
53B0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
1730000
direct allocation
page read and write
CE4000
heap
page read and write
BA9000
unkown
page write copy
44BE000
stack
page read and write
38CE000
stack
page read and write
16E0000
heap
page read and write
16B3000
heap
page read and write
4D91000
heap
page read and write
D30000
heap
page read and write
8ABF000
heap
page read and write
16D4000
heap
page read and write
CE4000
heap
page read and write
5101000
heap
page read and write
438F000
stack
page read and write
314E000
stack
page read and write
CE4000
heap
page read and write
530F000
stack
page read and write
F4C000
unkown
page execute and read and write
487E000
stack
page read and write
16C0000
direct allocation
page read and write
433F000
stack
page read and write
4D30000
direct allocation
page read and write
CE4000
heap
page read and write
1075000
unkown
page execute and read and write
3A0E000
stack
page read and write
16D4000
heap
page read and write
4D30000
direct allocation
page read and write
16CC000
heap
page read and write
31DE000
stack
page read and write
4D30000
direct allocation
page read and write
5AE000
stack
page read and write
4D91000
heap
page read and write
5380000
direct allocation
page execute and read and write
1470000
direct allocation
page read and write
414F000
stack
page read and write
16C0000
direct allocation
page read and write
34BF000
stack
page read and write
4D91000
heap
page read and write
520C000
stack
page read and write
323E000
stack
page read and write
5360000
direct allocation
page execute and read and write
1067000
unkown
page execute and read and write
4D91000
heap
page read and write
BAB000
unkown
page execute and read and write
35BF000
stack
page read and write
53F0000
direct allocation
page execute and read and write
1484000
heap
page read and write
84B4000
heap
page read and write
49B0000
direct allocation
page execute and read and write
524E000
stack
page read and write
319F000
stack
page read and write
33CE000
stack
page read and write
D60000
unkown
page read and write
272F000
stack
page read and write
1484000
heap
page read and write
D40000
direct allocation
page read and write
4D91000
heap
page read and write
49CF000
stack
page read and write
CE4000
heap
page read and write
CE4000
heap
page read and write
4D30000
direct allocation
page read and write
1470000
direct allocation
page read and write
36BF000
stack
page read and write
31FE000
stack
page read and write
483E000
stack
page read and write
1484000
heap
page read and write
4D91000
heap
page read and write
49AE000
stack
page read and write
4D41000
heap
page read and write
624000
heap
page read and write
4D91000
heap
page read and write
53E0000
direct allocation
page execute and read and write
4D41000
heap
page read and write
16C0000
direct allocation
page read and write
4D41000
heap
page read and write
3C4F000
stack
page read and write
4D41000
heap
page read and write
16C0000
direct allocation
page read and write
16C0000
direct allocation
page read and write
4D91000
heap
page read and write
624000
heap
page read and write
43D1000
heap
page read and write
1600000
heap
page read and write
4D91000
heap
page read and write
4D7E000
stack
page read and write
DC2000
unkown
page execute and read and write
CE4000
heap
page read and write
BA2000
unkown
page execute and read and write
D61000
unkown
page execute and write copy
4D91000
heap
page read and write
CE4000
heap
page read and write
5204000
heap
page read and write
1211000
unkown
page execute and write copy
4D41000
heap
page read and write
1484000
heap
page read and write
899B000
stack
page read and write
4EBE000
stack
page read and write
2D4F000
stack
page read and write
96F000
stack
page read and write
D60000
unkown
page read and write
421E000
stack
page read and write
355F000
stack
page read and write
4D41000
heap
page read and write
76E000
stack
page read and write
624000
heap
page read and write
400F000
stack
page read and write
1484000
heap
page read and write
350E000
stack
page read and write
1484000
heap
page read and write
45BF000
stack
page read and write
146A000
heap
page read and write
374E000
stack
page read and write
684F000
stack
page read and write
4A00000
direct allocation
page execute and read and write
1650000
heap
page read and write
56F0000
direct allocation
page execute and read and write
1484000
heap
page read and write
5370000
direct allocation
page execute and read and write
5B7D000
stack
page read and write
1484000
heap
page read and write
4D91000
heap
page read and write
1688000
heap
page read and write
5231000
direct allocation
page read and write
4D41000
heap
page read and write
328E000
stack
page read and write
13AD000
stack
page read and write
D60000
unkown
page read and write
428E000
stack
page read and write
4D91000
heap
page read and write
395E000
stack
page read and write
4D60000
heap
page read and write
2F8C000
stack
page read and write
5350000
direct allocation
page execute and read and write
5330000
direct allocation
page execute and read and write
624000
heap
page read and write
36FE000
stack
page read and write
14A9000
heap
page read and write
49C0000
direct allocation
page execute and read and write
32B7000
heap
page read and write
410F000
stack
page read and write
16BD000
heap
page read and write
4DA2000
heap
page read and write
16C6000
heap
page read and write
5350000
direct allocation
page execute and read and write
16C0000
direct allocation
page read and write
388E000
stack
page read and write
CE4000
heap
page read and write
3290000
direct allocation
page execute and read and write
3E5E000
stack
page read and write
5350000
direct allocation
page execute and read and write
E0D000
unkown
page execute and read and write
165C000
heap
page read and write
4D91000
heap
page read and write
D2C000
unkown
page execute and read and write
4A30000
direct allocation
page execute and read and write
5100000
heap
page read and write
4D41000
heap
page read and write
1484000
heap
page read and write
5380000
direct allocation
page execute and read and write
1610000
heap
page read and write
4D41000
heap
page read and write
4D91000
heap
page read and write
16D0000
heap
page read and write
1490000
heap
page read and write
698F000
stack
page read and write
4D41000
heap
page read and write
53C0000
direct allocation
page execute and read and write
309F000
stack
page read and write
CE0000
heap
page read and write
1484000
heap
page read and write
E55000
unkown
page execute and read and write
624000
heap
page read and write
393F000
stack
page read and write
1470000
direct allocation
page read and write
310F000
stack
page read and write
1484000
heap
page read and write
56E0000
direct allocation
page execute and read and write
4D41000
heap
page read and write
345E000
stack
page read and write
120F000
unkown
page execute and read and write
4D41000
heap
page read and write
3C8E000
stack
page read and write
4D91000
heap
page read and write
56C0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
1075000
unkown
page execute and write copy
85EB000
stack
page read and write
40BF000
stack
page read and write
CE4000
heap
page read and write
CE4000
heap
page read and write
1630000
heap
page read and write
1484000
heap
page read and write
CE4000
heap
page read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
5750000
direct allocation
page execute and read and write
5101000
heap
page read and write
D40000
direct allocation
page read and write
4D91000
heap
page read and write
27C0000
heap
page read and write
169F000
heap
page read and write
43CF000
stack
page read and write
2C4E000
stack
page read and write
4D41000
heap
page read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
478E000
stack
page read and write
4D41000
heap
page read and write
53A0000
direct allocation
page execute and read and write
CE4000
heap
page read and write
4D8F000
stack
page read and write
620000
heap
page read and write
169F000
heap
page read and write
624000
heap
page read and write
D40000
direct allocation
page read and write
16B5000
heap
page read and write
348F000
stack
page read and write
158E000
stack
page read and write
341F000
stack
page read and write
534F000
stack
page read and write
4D41000
heap
page read and write
4B4E000
stack
page read and write
5370000
direct allocation
page execute and read and write
2F90000
heap
page read and write
1470000
direct allocation
page read and write
4D90000
heap
page read and write
3ACF000
stack
page read and write
CE4000
heap
page read and write
3FBE000
stack
page read and write
1211000
unkown
page execute and write copy
1679000
heap
page read and write
4D41000
heap
page read and write
65C0000
heap
page read and write
49BE000
stack
page read and write
4D91000
heap
page read and write
32A0000
direct allocation
page execute and read and write
CE4000
heap
page read and write
4D50000
heap
page read and write
4D41000
heap
page read and write
4D91000
heap
page read and write
4C4F000
stack
page read and write
D40000
direct allocation
page read and write
16C0000
direct allocation
page read and write
4DA1000
heap
page read and write
564F000
stack
page read and write
4D41000
heap
page read and write
120F000
unkown
page execute and read and write
4D91000
heap
page read and write
CE4000
heap
page read and write
E56000
unkown
page execute and write copy
16D4000
heap
page read and write
4D91000
heap
page read and write
1470000
direct allocation
page read and write
5A3F000
stack
page read and write
4D91000
heap
page read and write
460000
heap
page read and write
16B3000
heap
page read and write
1484000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
1652000
heap
page read and write
1484000
heap
page read and write
4D91000
heap
page read and write
15E0000
direct allocation
page read and write
1653000
heap
page read and write
4D41000
heap
page read and write
D60000
unkown
page readonly
16DF000
heap
page read and write
338E000
stack
page read and write
16C0000
direct allocation
page read and write
1484000
heap
page read and write
4A10000
direct allocation
page execute and read and write
338F000
stack
page read and write
409F000
stack
page read and write
4D2F000
stack
page read and write
276E000
stack
page read and write
4D30000
direct allocation
page read and write
2D8E000
stack
page read and write
4D91000
heap
page read and write
5101000
heap
page read and write
3140000
heap
page read and write
4D41000
heap
page read and write
16D4000
heap
page read and write
53E0000
direct allocation
page execute and read and write
105A000
unkown
page execute and read and write
105A000
unkown
page execute and read and write
43D1000
heap
page read and write
4A0E000
stack
page read and write
4D91000
heap
page read and write
2F4E000
stack
page read and write
437E000
stack
page read and write
49D0000
direct allocation
page execute and read and write
495F000
stack
page read and write
5350000
direct allocation
page execute and read and write
624000
heap
page read and write
56BF000
stack
page read and write
1681000
heap
page read and write
34CE000
stack
page read and write
4BEF000
stack
page read and write
4D41000
heap
page read and write
15E0000
direct allocation
page read and write
49C0000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
3BBF000
stack
page read and write
4A50000
direct allocation
page execute and read and write
D40000
direct allocation
page read and write
55E1000
direct allocation
page read and write
B41000
unkown
page execute and write copy
16D4000
heap
page read and write
459F000
stack
page read and write
4D41000
heap
page read and write
4FBF000
stack
page read and write
1470000
direct allocation
page read and write
54FB000
stack
page read and write
4D41000
heap
page read and write
4D91000
heap
page read and write
1470000
direct allocation
page read and write
DC9000
unkown
page write copy
4D91000
heap
page read and write
1497000
heap
page read and write
334F000
stack
page read and write
369F000
stack
page read and write
400E000
stack
page read and write
4D91000
heap
page read and write
1484000
heap
page read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
AF0000
heap
page read and write
4D41000
heap
page read and write
65C5000
heap
page read and write
DC2000
unkown
page execute and read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
53B0000
direct allocation
page execute and read and write
4FFE000
stack
page read and write
4D30000
direct allocation
page read and write
12FA000
stack
page read and write
4D3F000
stack
page read and write
449E000
stack
page read and write
3B0E000
stack
page read and write
16D4000
heap
page read and write
169F000
heap
page read and write
3ABE000
stack
page read and write
4D91000
heap
page read and write
B00000
heap
page read and write
5200000
trusted library allocation
page read and write
4D41000
heap
page read and write
474F000
stack
page read and write
3B0F000
stack
page read and write
3FCF000
stack
page read and write
4D91000
heap
page read and write
1484000
heap
page read and write
35CF000
stack
page read and write
CE4000
heap
page read and write
3E7E000
stack
page read and write
674E000
stack
page read and write
498F000
stack
page read and write
381E000
stack
page read and write
4D41000
heap
page read and write
FC000
stack
page read and write
4BFF000
stack
page read and write
428F000
stack
page read and write
624000
heap
page read and write
8AC3000
heap
page read and write
624000
heap
page read and write
16D4000
heap
page read and write
57CE000
stack
page read and write
4D41000
heap
page read and write
1A1F000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
872E000
stack
page read and write
1740000
direct allocation
page execute and read and write
4D91000
heap
page read and write
17FE000
stack
page read and write
167A000
heap
page read and write
1076000
unkown
page execute and write copy
1470000
direct allocation
page read and write
E3A000
unkown
page execute and read and write
1470000
direct allocation
page read and write
4D41000
heap
page read and write
16C0000
direct allocation
page read and write
4D91000
heap
page read and write
4D30000
direct allocation
page read and write
169F000
heap
page read and write
FEF000
unkown
page execute and read and write
51D0000
heap
page read and write
370F000
stack
page read and write
CE4000
heap
page read and write
5320000
direct allocation
page execute and read and write
4D91000
heap
page read and write
16BD000
heap
page read and write
324F000
stack
page read and write
43D0000
heap
page read and write
4D41000
heap
page read and write
423E000
stack
page read and write
4D41000
heap
page read and write
397E000
stack
page read and write
7111000
heap
page read and write
5A7D000
stack
page read and write
27AE000
stack
page read and write
4D41000
heap
page read and write
CE4000
heap
page read and write
B40000
unkown
page read and write
37FF000
stack
page read and write
CE4000
heap
page read and write
77A000
heap
page read and write
4D91000
heap
page read and write
DC9000
unkown
page write copy
359E000
stack
page read and write
16C9000
heap
page read and write
16B3000
heap
page read and write
1484000
heap
page read and write
4D41000
heap
page read and write
102D000
unkown
page execute and read and write
4D91000
heap
page read and write
16DF000
heap
page read and write
15CE000
stack
page read and write
4D41000
heap
page read and write
DC9000
unkown
page write copy
4D30000
direct allocation
page read and write
497F000
stack
page read and write
4D41000
heap
page read and write
3B4E000
stack
page read and write
3DCE000
stack
page read and write
4D91000
heap
page read and write
4990000
direct allocation
page execute and read and write
49C0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
105A000
unkown
page execute and read and write
4D41000
heap
page read and write
1076000
unkown
page execute and write copy
16D4000
heap
page read and write
41FF000
stack
page read and write
5350000
direct allocation
page execute and read and write
CE4000
heap
page read and write
5390000
direct allocation
page execute and read and write
3A7F000
stack
page read and write
360E000
stack
page read and write
624000
heap
page read and write
42CE000
stack
page read and write
43CE000
stack
page read and write
4D91000
heap
page read and write
16C0000
direct allocation
page read and write
311E000
stack
page read and write
1484000
heap
page read and write
69CE000
stack
page read and write
4E90000
trusted library allocation
page read and write
F4C000
unkown
page execute and read and write
1075000
unkown
page execute and write copy
D61000
unkown
page execute and write copy
86EC000
stack
page read and write
309F000
stack
page read and write
4D41000
heap
page read and write
48B1000
direct allocation
page read and write
16C0000
direct allocation
page read and write
4D41000
heap
page read and write
50FF000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
15F0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
3C0F000
stack
page read and write
140E000
stack
page read and write
485E000
stack
page read and write
1480000
heap
page read and write
CE4000
heap
page read and write
164C000
heap
page read and write
5340000
direct allocation
page execute and read and write
CE4000
heap
page read and write
CE4000
heap
page read and write
688E000
stack
page read and write
45FE000
stack
page read and write
7110000
heap
page read and write
3A9E000
stack
page read and write
48CE000
stack
page read and write
CE4000
heap
page read and write
384F000
stack
page read and write
3F0E000
stack
page read and write
28CF000
stack
page read and write
4D30000
direct allocation
page read and write
CE4000
heap
page read and write
BA9000
unkown
page write copy
1470000
direct allocation
page read and write
102D000
unkown
page execute and read and write
16CF000
heap
page read and write
16D4000
heap
page read and write
4D91000
heap
page read and write
554E000
stack
page read and write
2C0F000
stack
page read and write
4D91000
heap
page read and write
E55000
unkown
page execute and write copy
4D91000
heap
page read and write
39CF000
stack
page read and write
882E000
stack
page read and write
3F7F000
stack
page read and write
16C9000
heap
page read and write
4A40000
direct allocation
page execute and read and write
84B0000
heap
page read and write
36DE000
stack
page read and write
4D41000
heap
page read and write
16CF000
heap
page read and write
4D41000
heap
page read and write
1484000
heap
page read and write
16CF000
heap
page read and write
418E000
stack
page read and write
CE4000
heap
page read and write
1484000
heap
page read and write
49C0000
direct allocation
page execute and read and write
1730000
direct allocation
page read and write
3130000
direct allocation
page execute and read and write
4D40000
heap
page read and write
4D91000
heap
page read and write
4D30000
direct allocation
page read and write
4D41000
heap
page read and write
578F000
stack
page read and write
D61000
unkown
page execute and write copy
4D41000
heap
page read and write
3CDF000
stack
page read and write
CE4000
heap
page read and write
2E8F000
stack
page read and write
16D4000
heap
page read and write
1484000
heap
page read and write
CE4000
heap
page read and write
4D91000
heap
page read and write
CE4000
heap
page read and write
3E8F000
stack
page read and write
CE4000
heap
page read and write
1750000
heap
page read and write
624000
heap
page read and write
300E000
stack
page read and write
A8B000
stack
page read and write
49C0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
1484000
heap
page read and write
5180000
heap
page read and write
3D3E000
stack
page read and write
53A0000
direct allocation
page execute and read and write
44D0000
trusted library allocation
page read and write
160A000
heap
page read and write
4C3E000
stack
page read and write
4D91000
heap
page read and write
1075000
unkown
page execute and write copy
3BFE000
stack
page read and write
431F000
stack
page read and write
5101000
heap
page read and write
4D41000
heap
page read and write
32A0000
direct allocation
page execute and read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
165F000
heap
page read and write
7120000
heap
page read and write
27C7000
heap
page read and write
4D91000
heap
page read and write
2ECE000
stack
page read and write
171E000
stack
page read and write
46DF000
stack
page read and write
2F97000
heap
page read and write
169F000
heap
page read and write
414E000
stack
page read and write
DCB000
unkown
page execute and read and write
4D91000
heap
page read and write
5350000
direct allocation
page execute and read and write
144E000
stack
page read and write
51D0000
direct allocation
page read and write
3D8F000
stack
page read and write
3F9E000
stack
page read and write
40FE000
stack
page read and write
1484000
heap
page read and write
4D91000
heap
page read and write
1680000
heap
page read and write
27B0000
direct allocation
page read and write
37DF000
stack
page read and write
4AFE000
stack
page read and write
1067000
unkown
page execute and read and write
6ACF000
stack
page read and write
770000
heap
page read and write
4D91000
heap
page read and write
72E000
stack
page read and write
32B0000
heap
page read and write
120F000
unkown
page execute and read and write
165C000
heap
page read and write
1211000
unkown
page execute and write copy
3CFF000
stack
page read and write
176B000
heap
page read and write
488F000
stack
page read and write
4D41000
heap
page read and write
DCB000
unkown
page execute and read and write
4D91000
heap
page read and write
49A0000
direct allocation
page execute and read and write
16B5000
heap
page read and write
4D91000
heap
page read and write
F4C000
unkown
page execute and read and write
4D91000
heap
page read and write
488E000
stack
page read and write
1484000
heap
page read and write
1470000
direct allocation
page read and write
16D4000
heap
page read and write
624000
heap
page read and write
CE4000
heap
page read and write
1484000
heap
page read and write
16D4000
heap
page read and write
4D41000
heap
page read and write
4D41000
heap
page read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
3F5F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
383E000
stack
page read and write
D40000
direct allocation
page read and write
45DE000
stack
page read and write
5360000
direct allocation
page execute and read and write
D40000
direct allocation
page read and write
44CE000
stack
page read and write
610000
heap
page read and write
473E000
stack
page read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
C8C000
stack
page read and write
58CF000
stack
page read and write
3280000
direct allocation
page execute and read and write
5390000
direct allocation
page execute and read and write
43D1000
heap
page read and write
5740000
direct allocation
page execute and read and write
4D41000
heap
page read and write
5350000
direct allocation
page execute and read and write
4D91000
heap
page read and write
16C0000
direct allocation
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
1484000
heap
page read and write
3C4E000
stack
page read and write
77E000
heap
page read and write
4D91000
heap
page read and write
16C0000
direct allocation
page read and write
5720000
direct allocation
page execute and read and write
1484000
heap
page read and write
CE4000
heap
page read and write
131D000
stack
page read and write
DC9000
unkown
page write copy
4D91000
heap
page read and write
568E000
stack
page read and write
4D91000
heap
page read and write
4D41000
heap
page read and write
D60000
unkown
page readonly
D60000
unkown
page readonly
16D4000
heap
page read and write
445E000
stack
page read and write
D00000
heap
page read and write
D40000
direct allocation
page read and write
5700000
direct allocation
page execute and read and write
27B0000
direct allocation
page read and write
1660000
heap
page read and write
1484000
heap
page read and write
32A0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
1484000
heap
page read and write
16DF000
heap
page read and write
CE4000
heap
page read and write
4D30000
direct allocation
page read and write
32DF000
stack
page read and write
4D41000
heap
page read and write
424F000
stack
page read and write
4D30000
direct allocation
page read and write
4D91000
heap
page read and write
29CF000
stack
page read and write
40DE000
stack
page read and write
32A0000
direct allocation
page execute and read and write
There are 861 hidden memdumps, click here to show them.