IOC Report
setup.exe

loading gif

Files

File Path
Type
Category
Malicious
setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\explorti.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://185.215.113.19/
unknown
malicious
http://185.215.113.19/Vi9leo/index.phpppData
unknown
http://185.215.113.19/=
unknown
http://185.215.113.19/Vi9leo/index.php1
unknown
http://185.215.113.19/Vi9leo/index.phpQ
unknown
http://185.215.113.19/Vi9leo/index.phpC:
unknown
http://185.215.113.19/Vi9leo/index.php6
unknown
http://185.215.113.19/Vi9leo/index.phpV
unknown
http://185.215.113.19/Vi9leo/index.phpeb8a7
unknown
http://185.215.113.19/Vi9leo/index.phpWindows
unknown
http://185.215.113.19/Vi9leo/index.phpm32
unknown
http://185.215.113.19/Vi9leo/index.php54
unknown
http://185.215.113.19/Vi9leo/index.phpon
unknown
http://185.215.113.19/Vi9leo/index.phpL3
unknown
http://185.215.113.19/Vi9leo/index.php&
unknown
http://185.215.113.19/Vi9leo/index.php(
unknown
http://185.215.113.19/Vi9leo/index.phpoft
unknown
http://185.215.113.19/Vi9leo/index.phprosoft
unknown
There are 9 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.19
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F51000
unkown
page execute and read and write
malicious
4F40000
direct allocation
page read and write
malicious
5740000
direct allocation
page read and write
malicious
49F0000
direct allocation
page read and write
malicious
3C1000
unkown
page execute and read and write
malicious
4A80000
direct allocation
page read and write
malicious
F51000
unkown
page execute and read and write
malicious
F51000
unkown
page execute and read and write
malicious
52B1000
heap
page read and write
30BF000
stack
page read and write
F84000
heap
page read and write
1310000
direct allocation
page read and write
43AF000
stack
page read and write
5150000
direct allocation
page execute and read and write
3A6F000
stack
page read and write
2E7E000
stack
page read and write
F84000
heap
page read and write
5110000
direct allocation
page execute and read and write
50FF000
stack
page read and write
1310000
direct allocation
page read and write
834000
heap
page read and write
4F30000
direct allocation
page read and write
2E3F000
stack
page read and write
4AB1000
heap
page read and write
8A8C000
stack
page read and write
4A51000
direct allocation
page read and write
5090000
direct allocation
page execute and read and write
140D000
unkown
page execute and read and write
3AAE000
stack
page read and write
3AEF000
stack
page read and write
4BBF000
stack
page read and write
34BE000
stack
page read and write
406F000
stack
page read and write
834000
heap
page read and write
188A000
heap
page read and write
4571000
heap
page read and write
296D000
heap
page read and write
4FA1000
direct allocation
page read and write
337E000
stack
page read and write
2930000
heap
page read and write
660000
heap
page read and write
4AC1000
heap
page read and write
4571000
heap
page read and write
6DD000
unkown
page execute and read and write
EFE000
stack
page read and write
37AF000
stack
page read and write
FB9000
unkown
page read and write
2BFE000
stack
page read and write
4601000
heap
page read and write
1310000
direct allocation
page read and write
39EE000
stack
page read and write
1424000
heap
page read and write
4B2F000
stack
page read and write
2CAE000
stack
page read and write
F84000
heap
page read and write
19D4000
heap
page read and write
126D000
unkown
page execute and read and write
664000
heap
page read and write
3EAF000
stack
page read and write
664000
heap
page read and write
36AE000
stack
page read and write
4AB1000
heap
page read and write
3DAE000
stack
page read and write
133A000
heap
page read and write
6686000
heap
page read and write
19B0000
heap
page read and write
4AB1000
heap
page read and write
19D4000
heap
page read and write
664000
heap
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
44EF000
stack
page read and write
1310000
direct allocation
page read and write
8A91000
heap
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
387E000
stack
page read and write
38AE000
stack
page read and write
3C1000
unkown
page execute and write copy
664000
heap
page read and write
35BF000
stack
page read and write
46EF000
stack
page read and write
F80000
heap
page read and write
4AB1000
heap
page read and write
834000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
87D000
unkown
page execute and read and write
4AB1000
heap
page read and write
664000
heap
page read and write
740000
heap
page read and write
49AE000
stack
page read and write
2F2F000
stack
page read and write
4AB1000
heap
page read and write
F20000
direct allocation
page read and write
4AB1000
heap
page read and write
4DEE000
stack
page read and write
37EE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
13AF000
heap
page read and write
4570000
heap
page read and write
356E000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
50D0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4B50000
direct allocation
page execute and read and write
1404000
heap
page read and write
19D4000
heap
page read and write
6FD000
stack
page read and write
13AE000
heap
page read and write
664000
heap
page read and write
42B000
unkown
page execute and read and write
1408000
heap
page read and write
33E7000
heap
page read and write
2FBE000
stack
page read and write
F20000
direct allocation
page read and write
436E000
stack
page read and write
3F6E000
stack
page read and write
4571000
heap
page read and write
7110000
heap
page read and write
F84000
heap
page read and write
F20000
direct allocation
page read and write
5D0000
heap
page read and write
58C0000
direct allocation
page execute and read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
125E000
unkown
page execute and read and write
4AB1000
heap
page read and write
2D3E000
stack
page read and write
3FEF000
stack
page read and write
6D0000
direct allocation
page read and write
4AB1000
heap
page read and write
6D0000
direct allocation
page read and write
5100000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
F50000
unkown
page readonly
FB9000
unkown
page read and write
19D4000
heap
page read and write
4571000
heap
page read and write
4B2F000
stack
page read and write
2ABE000
stack
page read and write
126D000
unkown
page execute and write copy
4C80000
direct allocation
page execute and read and write
4571000
heap
page read and write
3C0000
unkown
page read and write
834000
heap
page read and write
834000
heap
page read and write
84A4000
heap
page read and write
476F000
stack
page read and write
4571000
heap
page read and write
13E7000
heap
page read and write
3CEF000
stack
page read and write
44FE000
stack
page read and write
1310000
direct allocation
page read and write
4C00000
direct allocation
page execute and read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
4C60000
direct allocation
page execute and read and write
366F000
stack
page read and write
323E000
stack
page read and write
6D0000
direct allocation
page read and write
19D4000
heap
page read and write
5910000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
F84000
heap
page read and write
426F000
stack
page read and write
664000
heap
page read and write
53B0000
trusted library allocation
page read and write
4571000
heap
page read and write
834000
heap
page read and write
F84000
heap
page read and write
5920000
direct allocation
page execute and read and write
2EEF000
stack
page read and write
446E000
stack
page read and write
FB9000
unkown
page write copy
4C00000
direct allocation
page execute and read and write
3F6F000
stack
page read and write
577E000
stack
page read and write
4AB1000
heap
page read and write
664000
heap
page read and write
19D4000
heap
page read and write
5960000
direct allocation
page execute and read and write
45FF000
stack
page read and write
6C0000
heap
page read and write
506E000
stack
page read and write
FD4000
heap
page read and write
126D000
unkown
page execute and write copy
F50000
unkown
page readonly
665E000
stack
page read and write
F84000
heap
page read and write
2CFF000
stack
page read and write
F20000
direct allocation
page read and write
4EBE000
stack
page read and write
13F8000
heap
page read and write
6680000
heap
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
49EF000
stack
page read and write
758000
heap
page read and write
4AB1000
heap
page read and write
446F000
stack
page read and write
4AB1000
heap
page read and write
373E000
stack
page read and write
4571000
heap
page read and write
4590000
heap
page read and write
4C3C000
stack
page read and write
EBB000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
F90000
heap
page read and write
6D0000
direct allocation
page read and write
6D0000
direct allocation
page read and write
1310000
direct allocation
page read and write
32EE000
stack
page read and write
4571000
heap
page read and write
58D0000
direct allocation
page execute and read and write
31AE000
stack
page read and write
1310000
direct allocation
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
1310000
direct allocation
page read and write
720000
heap
page read and write
4601000
heap
page read and write
6D0000
direct allocation
page read and write
4C70000
direct allocation
page execute and read and write
2E2F000
stack
page read and write
4AB1000
heap
page read and write
332E000
stack
page read and write
2F7F000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
140E000
heap
page read and write
4DAF000
stack
page read and write
125E000
unkown
page execute and read and write
523F000
stack
page read and write
3EBE000
stack
page read and write
4AB1000
heap
page read and write
881E000
stack
page read and write
4571000
heap
page read and write
126E000
unkown
page execute and write copy
3BAD000
stack
page read and write
4AB1000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
73E000
heap
page read and write
3E6E000
stack
page read and write
333F000
stack
page read and write
FB9000
unkown
page read and write
153E000
stack
page read and write
416E000
stack
page read and write
4571000
heap
page read and write
122B000
unkown
page execute and read and write
4571000
heap
page read and write
664000
heap
page read and write
4AB1000
heap
page read and write
F40000
direct allocation
page read and write
4CAE000
stack
page read and write
4AB1000
heap
page read and write
F84000
heap
page read and write
4AB1000
heap
page read and write
F1B000
stack
page read and write
58C0000
direct allocation
page execute and read and write
140B000
heap
page read and write
4AB1000
heap
page read and write
496F000
stack
page read and write
4AB1000
heap
page read and write
189D000
heap
page read and write
F84000
heap
page read and write
39BE000
stack
page read and write
2DEE000
stack
page read and write
50C0000
direct allocation
page execute and read and write
F84000
heap
page read and write
45EE000
stack
page read and write
6C7000
unkown
page execute and read and write
4AB1000
heap
page read and write
664000
heap
page read and write
F51000
unkown
page execute and write copy
F84000
heap
page read and write
4C6F000
stack
page read and write
126D000
unkown
page execute and write copy
661E000
stack
page read and write
4FBF000
stack
page read and write
664000
heap
page read and write
4571000
heap
page read and write
664000
heap
page read and write
36AF000
stack
page read and write
338E000
stack
page read and write
13B1000
heap
page read and write
2930000
direct allocation
page read and write
126D000
unkown
page execute and read and write
664000
heap
page read and write
3D2E000
stack
page read and write
F20000
direct allocation
page read and write
69CE000
stack
page read and write
F84000
heap
page read and write
33E0000
heap
page read and write
664000
heap
page read and write
4571000
heap
page read and write
34EE000
stack
page read and write
4AB1000
heap
page read and write
4600000
heap
page read and write
4B50000
direct allocation
page execute and read and write
19D4000
heap
page read and write
1393000
heap
page read and write
830000
heap
page read and write
19D4000
heap
page read and write
372F000
stack
page read and write
664000
heap
page read and write
4AB1000
heap
page read and write
52B1000
heap
page read and write
4C40000
direct allocation
page execute and read and write
383F000
stack
page read and write
4D7E000
stack
page read and write
664000
heap
page read and write
A0F000
stack
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
19D4000
heap
page read and write
4B6E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
1411000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
F84000
heap
page read and write
45AF000
stack
page read and write
140D000
unkown
page execute and read and write
F20000
direct allocation
page read and write
4AB1000
heap
page read and write
664000
heap
page read and write
FBB000
unkown
page execute and read and write
58F0000
direct allocation
page execute and read and write
834000
heap
page read and write
53AE000
stack
page read and write
126E000
unkown
page execute and write copy
5140000
direct allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
4571000
heap
page read and write
3BFF000
stack
page read and write
F84000
heap
page read and write
F1E000
stack
page read and write
718000
heap
page read and write
56D000
stack
page read and write
664000
heap
page read and write
4AB1000
heap
page read and write
4B70000
direct allocation
page execute and read and write
37EF000
stack
page read and write
41EE000
stack
page read and write
429000
unkown
page write copy
3DEF000
stack
page read and write
140F000
unkown
page execute and write copy
F84000
heap
page read and write
5950000
direct allocation
page execute and read and write
1310000
direct allocation
page read and write
302F000
stack
page read and write
31C000
stack
page read and write
432E000
stack
page read and write
F20000
direct allocation
page read and write
19C0000
direct allocation
page read and write
4AB1000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
50C0000
direct allocation
page execute and read and write
31FF000
stack
page read and write
19D4000
heap
page read and write
2C6F000
stack
page read and write
140E000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
13FD000
heap
page read and write
19C0000
direct allocation
page read and write
3FAE000
stack
page read and write
3ABF000
stack
page read and write
F40000
direct allocation
page read and write
356F000
stack
page read and write
F84000
heap
page read and write
31EE000
stack
page read and write
664000
heap
page read and write
587F000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
19C0000
direct allocation
page read and write
58B0000
direct allocation
page execute and read and write
85DB000
stack
page read and write
3EEE000
stack
page read and write
5900000
direct allocation
page execute and read and write
33EF000
stack
page read and write
386F000
stack
page read and write
44AE000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
4571000
heap
page read and write
502F000
stack
page read and write
32EF000
stack
page read and write
4F2E000
stack
page read and write
4C00000
direct allocation
page execute and read and write
382E000
stack
page read and write
316F000
stack
page read and write
114A000
unkown
page execute and read and write
40AE000
stack
page read and write
4AB1000
heap
page read and write
6D0000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
664000
heap
page read and write
19C0000
direct allocation
page read and write
6ACF000
stack
page read and write
871E000
stack
page read and write
F50000
unkown
page read and write
306E000
stack
page read and write
52B1000
heap
page read and write
13BC000
heap
page read and write
4AB1000
heap
page read and write
126D000
unkown
page execute and read and write
FB9000
unkown
page write copy
4AB1000
heap
page read and write
472E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
2F2E000
stack
page read and write
3FBF000
stack
page read and write
19C0000
direct allocation
page read and write
4AB1000
heap
page read and write
1810000
heap
page read and write
664000
heap
page read and write
292F000
stack
page read and write
346E000
stack
page read and write
4571000
heap
page read and write
31AF000
stack
page read and write
4AAF000
stack
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
58C0000
direct allocation
page execute and read and write
19D4000
heap
page read and write
F20000
direct allocation
page read and write
342F000
stack
page read and write
44BF000
stack
page read and write
4AB1000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4571000
heap
page read and write
4571000
heap
page read and write
F84000
heap
page read and write
13F8000
heap
page read and write
5730000
direct allocation
page read and write
4AB1000
heap
page read and write
4D3B000
stack
page read and write
422000
unkown
page execute and read and write
2930000
direct allocation
page read and write
640000
heap
page read and write
4AB1000
heap
page read and write
5BA000
unkown
page execute and read and write
30AE000
stack
page read and write
4AB1000
heap
page read and write
1310000
direct allocation
page read and write
3A2F000
stack
page read and write
834000
heap
page read and write
43BE000
stack
page read and write
3D7E000
stack
page read and write
4F2D000
stack
page read and write
187E000
stack
page read and write
392E000
stack
page read and write
4571000
heap
page read and write
664000
heap
page read and write
52B1000
heap
page read and write
6AE0000
heap
page read and write
3E7F000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
2960000
heap
page read and write
4571000
heap
page read and write
53BE000
stack
page read and write
5730000
direct allocation
page read and write
730000
heap
page read and write
40FF000
stack
page read and write
4571000
heap
page read and write
F51000
unkown
page execute and write copy
2967000
heap
page read and write
13B4000
heap
page read and write
FD0000
heap
page read and write
13EB000
heap
page read and write
392F000
stack
page read and write
456F000
stack
page read and write
13F8000
heap
page read and write
2BBF000
stack
page read and write
4580000
heap
page read and write
4B30000
direct allocation
page execute and read and write
3C3E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
1424000
heap
page read and write
4571000
heap
page read and write
35FE000
stack
page read and write
3E2F000
stack
page read and write
3FFE000
stack
page read and write
36FF000
stack
page read and write
4571000
heap
page read and write
3C0000
unkown
page readonly
14AC000
stack
page read and write
4571000
heap
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
19C0000
direct allocation
page read and write
834000
heap
page read and write
15AD000
stack
page read and write
19C0000
direct allocation
page read and write
7101000
heap
page read and write
41EF000
stack
page read and write
4AB1000
heap
page read and write
1411000
heap
page read and write
1330000
heap
page read and write
F20000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4700000
trusted library allocation
page read and write
F84000
heap
page read and write
6D0000
direct allocation
page read and write
E7E000
stack
page read and write
19C0000
direct allocation
page read and write
6D0000
direct allocation
page read and write
5160000
direct allocation
page execute and read and write
834000
heap
page read and write
F51000
unkown
page execute and write copy
F20000
direct allocation
page read and write
4AB1000
heap
page read and write
6D0000
direct allocation
page read and write
35EF000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
3C6E000
stack
page read and write
4AB1000
heap
page read and write
140B000
heap
page read and write
507F000
stack
page read and write
4571000
heap
page read and write
2F6E000
stack
page read and write
4C90000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
19D0000
heap
page read and write
FB2000
unkown
page execute and read and write
4F7E000
stack
page read and write
5940000
direct allocation
page execute and read and write
1587000
heap
page read and write
42EF000
stack
page read and write
1310000
direct allocation
page read and write
396E000
stack
page read and write
423F000
stack
page read and write
413E000
stack
page read and write
30FE000
stack
page read and write
F20000
direct allocation
page read and write
664000
heap
page read and write
429000
unkown
page read and write
1427000
heap
page read and write
47AE000
stack
page read and write
19C0000
direct allocation
page read and write
292F000
stack
page read and write
4571000
heap
page read and write
38EF000
stack
page read and write
4C20000
direct allocation
page execute and read and write
35AE000
stack
page read and write
1349000
heap
page read and write
4B50000
direct allocation
page execute and read and write
3B6F000
stack
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
53B0000
heap
page read and write
710E000
heap
page read and write
664000
heap
page read and write
4B50000
direct allocation
page execute and read and write
19D4000
heap
page read and write
4571000
heap
page read and write
664000
heap
page read and write
664000
heap
page read and write
664000
heap
page read and write
1410000
heap
page read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
58C0000
direct allocation
page execute and read and write
4BB0000
trusted library allocation
page read and write
6DE000
unkown
page execute and write copy
4571000
heap
page read and write
7100000
heap
page read and write
7110000
heap
page read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
526E000
stack
page read and write
4F30000
direct allocation
page read and write
42AE000
stack
page read and write
F84000
heap
page read and write
664000
heap
page read and write
4571000
heap
page read and write
362E000
stack
page read and write
4571000
heap
page read and write
482F000
stack
page read and write
48ED000
stack
page read and write
140D000
unkown
page execute and read and write
4571000
heap
page read and write
114A000
unkown
page execute and read and write
1257000
unkown
page execute and read and write
48AF000
stack
page read and write
87F000
unkown
page execute and write copy
397F000
stack
page read and write
6685000
heap
page read and write
4571000
heap
page read and write
537D000
stack
page read and write
2B6F000
stack
page read and write
3CAE000
stack
page read and write
6D0000
direct allocation
page read and write
1424000
heap
page read and write
50F0000
direct allocation
page execute and read and write
46C000
stack
page read and write
1391000
heap
page read and write
4571000
heap
page read and write
898C000
stack
page read and write
B4F000
stack
page read and write
297E000
stack
page read and write
4AB1000
heap
page read and write
2A7F000
stack
page read and write
390000
heap
page read and write
FB9000
unkown
page write copy
5130000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
664000
heap
page read and write
4571000
heap
page read and write
664000
heap
page read and write
664000
heap
page read and write
19D4000
heap
page read and write
19C0000
direct allocation
page read and write
1404000
heap
page read and write
F84000
heap
page read and write
51AE000
stack
page read and write
3CEE000
stack
page read and write
4601000
heap
page read and write
140B000
heap
page read and write
2930000
direct allocation
page read and write
F20000
direct allocation
page read and write
513E000
stack
page read and write
F84000
heap
page read and write
3BAF000
stack
page read and write
4571000
heap
page read and write
4C30000
direct allocation
page execute and read and write
140B000
heap
page read and write
4571000
heap
page read and write
5730000
direct allocation
page read and write
4AB1000
heap
page read and write
4F30000
direct allocation
page read and write
A4E000
stack
page read and write
1580000
heap
page read and write
4571000
heap
page read and write
3D3F000
stack
page read and write
1403000
heap
page read and write
4AB1000
heap
page read and write
73A000
heap
page read and write
4B60000
direct allocation
page execute and read and write
1257000
unkown
page execute and read and write
FB2000
unkown
page execute and read and write
4A2C000
stack
page read and write
4E7F000
stack
page read and write
486E000
stack
page read and write
84A0000
heap
page read and write
F50000
unkown
page read and write
342E000
stack
page read and write
4571000
heap
page read and write
2A6F000
stack
page read and write
4571000
heap
page read and write
1257000
unkown
page execute and read and write
140F000
unkown
page execute and write copy
1411000
heap
page read and write
3B2E000
stack
page read and write
664000
heap
page read and write
F40000
direct allocation
page read and write
4FFE000
stack
page read and write
41AF000
stack
page read and write
4C00000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
12FA000
stack
page read and write
4571000
heap
page read and write
13F8000
heap
page read and write
834000
heap
page read and write
13E7000
heap
page read and write
58A0000
direct allocation
page execute and read and write
664000
heap
page read and write
4571000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
32AF000
stack
page read and write
4B80000
direct allocation
page execute and read and write
664000
heap
page read and write
69B000
unkown
page execute and read and write
664000
heap
page read and write
6D0000
direct allocation
page read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
122B000
unkown
page execute and read and write
4AB1000
heap
page read and write
1BAF000
stack
page read and write
39AF000
stack
page read and write
352F000
stack
page read and write
52B0000
heap
page read and write
1880000
heap
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
698F000
stack
page read and write
1388000
heap
page read and write
664000
heap
page read and write
527E000
stack
page read and write
1980000
heap
page read and write
FB2000
unkown
page execute and read and write
3BEE000
stack
page read and write
4571000
heap
page read and write
688F000
stack
page read and write
664000
heap
page read and write
58E0000
direct allocation
page execute and read and write
F84000
heap
page read and write
2DAF000
stack
page read and write
8A90000
heap
page read and write
13FA000
heap
page read and write
1390000
heap
page read and write
4571000
heap
page read and write
2937000
heap
page read and write
13E7000
heap
page read and write
834000
heap
page read and write
3D6F000
stack
page read and write
52AF000
stack
page read and write
57A1000
direct allocation
page read and write
F84000
heap
page read and write
4670000
trusted library allocation
page read and write
422E000
stack
page read and write
126E000
unkown
page execute and write copy
412F000
stack
page read and write
1390000
heap
page read and write
40AF000
stack
page read and write
52AE000
stack
page read and write
437F000
stack
page read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
1310000
direct allocation
page read and write
4AB1000
heap
page read and write
50E0000
direct allocation
page execute and read and write
4571000
heap
page read and write
F20000
direct allocation
page read and write
1310000
direct allocation
page read and write
834000
heap
page read and write
3FE000
stack
page read and write
664000
heap
page read and write
F84000
heap
page read and write
432F000
stack
page read and write
8AAF000
heap
page read and write
4571000
heap
page read and write
19C0000
direct allocation
page read and write
834000
heap
page read and write
6D0000
direct allocation
page read and write
125E000
unkown
page execute and read and write
3E2E000
stack
page read and write
4AB1000
heap
page read and write
F84000
heap
page read and write
4AE1000
direct allocation
page read and write
114A000
unkown
page execute and read and write
462F000
stack
page read and write
4AB0000
heap
page read and write
F20000
direct allocation
page read and write
4EEF000
stack
page read and write
1411000
heap
page read and write
4AB1000
heap
page read and write
F3E000
stack
page read and write
4571000
heap
page read and write
FBB000
unkown
page execute and read and write
4AB1000
heap
page read and write
40EE000
stack
page read and write
4AB1000
heap
page read and write
140F000
unkown
page execute and write copy
F84000
heap
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
664000
heap
page read and write
442F000
stack
page read and write
F50000
unkown
page read and write
4AB1000
heap
page read and write
F84000
heap
page read and write
3AFE000
stack
page read and write
19C0000
direct allocation
page read and write
43EE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
4571000
heap
page read and write
157E000
stack
page read and write
380000
heap
page read and write
664000
heap
page read and write
834000
heap
page read and write
664000
heap
page read and write
86DC000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
1425000
heap
page read and write
376E000
stack
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
6CE000
unkown
page execute and read and write
4B40000
direct allocation
page execute and read and write
36EE000
stack
page read and write
19C0000
direct allocation
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
3A6E000
stack
page read and write
19D4000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
54BC000
stack
page read and write
140B000
heap
page read and write
F84000
heap
page read and write
4AB1000
heap
page read and write
4A2E000
stack
page read and write
5890000
direct allocation
page execute and read and write
6E0000
heap
page read and write
58C0000
direct allocation
page execute and read and write
5930000
direct allocation
page execute and read and write
4571000
heap
page read and write
2950000
direct allocation
page execute and read and write
49B0000
heap
page read and write
58C0000
direct allocation
page execute and read and write
4571000
heap
page read and write
452E000
stack
page read and write
19D4000
heap
page read and write
6E7000
heap
page read and write
664000
heap
page read and write
4ABE000
stack
page read and write
1404000
heap
page read and write
3C2F000
stack
page read and write
4571000
heap
page read and write
4AB1000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
4601000
heap
page read and write
122B000
unkown
page execute and read and write
664000
heap
page read and write
516F000
stack
page read and write
427E000
stack
page read and write
4C00000
direct allocation
page execute and read and write
3F2F000
stack
page read and write
4AB1000
heap
page read and write
4571000
heap
page read and write
FA0000
heap
page read and write
4AB1000
heap
page read and write
1310000
direct allocation
page read and write
4AB1000
heap
page read and write
6DD000
unkown
page execute and write copy
664000
heap
page read and write
466E000
stack
page read and write
F50000
unkown
page readonly
8AAE000
heap
page read and write
402E000
stack
page read and write
84A2000
heap
page read and write
4571000
heap
page read and write
FBB000
unkown
page execute and read and write
4571000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
6D0000
direct allocation
page read and write
4AB1000
heap
page read and write
306F000
stack
page read and write
347F000
stack
page read and write
4AB1000
heap
page read and write
1300000
heap
page read and write
19C0000
direct allocation
page read and write
33CE000
stack
page read and write
There are 857 hidden memdumps, click here to show them.