IOC Report
setup.exe

loading gif

Files

File Path
Type
Category
Malicious
setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo
unknown
malicious
http://185.215.1
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.2
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php-
unknown
http://185.215.113.16/Jo89Ku7d/index.phpHead
unknown
http://185.215.113.16/Jo89Ku7d/index.phpIG
unknown
http://185.215.113.16/Jo89Ku7d/index.phph
unknown
http://185.215.113.16/Jo89Ku7d/index.php$
unknown
http://185.215.113.16/Jo89Ku7d/index.phpd
unknown
http://185.215.113.16/Jo89Ku7d/index.php#
unknown
http://185.215.113.16/Jo89Ku7d/index.php_
unknown
http://185.215.113.16/Jo89Ku7d/index.phpzRm4SJjISZA3JNjZ64n0LR=E?
unknown
http://185.215.113.16/Jo89Ku7d/index.phpX
unknown
http://185.215.113.16/Jo89Ku7d/index.phpW
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedi
unknown
http://185.215.113.16/Jo89Ku7d/index.phpT
unknown
http://185.215.113.16/Jo89Ku7d/index.phpS
unknown
http://185.215.113.16/Jo89Ku7d/index.phpeGk
unknown
http://185.215.113.16/Jo89Ku7d/index.phpP
unknown
http://185.215.113.16/Jo89Ku7d/index.phpcoded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpH
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.php8
unknown
http://185.215.113.16/Jo89Ku7d/index.php7
unknown
http://185.215.113.16/Jo89Ku7d/index.phpw
unknown
http://185.215.113.16/Jo89Ku7d/index.php6
unknown
http://185.215.113.16/Jo89Ku7d/index.php3
unknown
http://185.215.113.16/Jo89Ku7d/index.phps
unknown
http://185.215.113.16/Jo89Ku7d/index.phpp
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4CF0000
direct allocation
page read and write
malicious
501000
unkown
page execute and read and write
malicious
4AB0000
direct allocation
page read and write
malicious
191000
unkown
page execute and read and write
malicious
501000
unkown
page execute and read and write
malicious
501000
unkown
page execute and read and write
malicious
4CF0000
direct allocation
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
F60000
heap
page read and write
384E000
stack
page read and write
3C2F000
stack
page read and write
4E70000
direct allocation
page execute and read and write
125F000
stack
page read and write
2E4E000
stack
page read and write
1215000
heap
page read and write
4911000
heap
page read and write
9C9000
unkown
page execute and read and write
348E000
stack
page read and write
4630000
heap
page read and write
4851000
heap
page read and write
3FCE000
stack
page read and write
399E000
stack
page read and write
4911000
heap
page read and write
E94000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4EC0000
direct allocation
page execute and read and write
4DF1000
direct allocation
page read and write
4911000
heap
page read and write
35DE000
stack
page read and write
C40000
direct allocation
page read and write
828D000
heap
page read and write
6EEE000
heap
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
4C20000
direct allocation
page execute and read and write
E94000
heap
page read and write
DD0000
heap
page read and write
2F9E000
stack
page read and write
314F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
E94000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
371E000
stack
page read and write
6EF0000
heap
page read and write
4E70000
direct allocation
page execute and read and write
485F000
stack
page read and write
2A30000
direct allocation
page read and write
7E1000
unkown
page execute and read and write
63E6000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4851000
heap
page read and write
4911000
heap
page read and write
421F000
stack
page read and write
2A70000
direct allocation
page read and write
440F000
stack
page read and write
569000
unkown
page write copy
4C00000
direct allocation
page execute and read and write
304E000
stack
page read and write
1467000
heap
page read and write
490F000
stack
page read and write
4A4000
heap
page read and write
3D4E000
stack
page read and write
8380000
heap
page read and write
4851000
heap
page read and write
322F000
stack
page read and write
3A4E000
stack
page read and write
190000
unkown
page read and write
EA4000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
2A70000
direct allocation
page read and write
30CE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
3D1F000
stack
page read and write
4C10000
direct allocation
page execute and read and write
10C8000
heap
page read and write
4911000
heap
page read and write
4C10000
direct allocation
page execute and read and write
569000
unkown
page read and write
4EF0000
direct allocation
page execute and read and write
4911000
heap
page read and write
823000
unkown
page execute and read and write
2CCF000
stack
page read and write
814000
unkown
page execute and read and write
4921000
heap
page read and write
4911000
heap
page read and write
37CE000
stack
page read and write
372F000
stack
page read and write
2D6E000
stack
page read and write
4D50000
trusted library allocation
page read and write
3B4F000
stack
page read and write
4A0000
heap
page read and write
2FAF000
stack
page read and write
500000
unkown
page readonly
4CE0000
direct allocation
page read and write
2E0F000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
9E0000
direct allocation
page read and write
4851000
heap
page read and write
11F9000
heap
page read and write
E94000
heap
page read and write
555F000
stack
page read and write
4911000
heap
page read and write
350F000
stack
page read and write
4851000
heap
page read and write
56B000
unkown
page execute and read and write
4851000
heap
page read and write
4851000
heap
page read and write
51AE000
stack
page read and write
56B000
unkown
page execute and read and write
411E000
stack
page read and write
474E000
stack
page read and write
4911000
heap
page read and write
1240000
direct allocation
page read and write
8281000
heap
page read and write
2A30000
direct allocation
page read and write
E94000
heap
page read and write
2D0E000
stack
page read and write
4851000
heap
page read and write
4BEF000
stack
page read and write
E94000
heap
page read and write
2A40000
heap
page read and write
E94000
heap
page read and write
29CE000
stack
page read and write
106F000
stack
page read and write
4911000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4E70000
direct allocation
page execute and read and write
114A000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
EA4000
heap
page read and write
501B000
stack
page read and write
2D50000
direct allocation
page execute and read and write
4911000
heap
page read and write
4F50000
direct allocation
page execute and read and write
3E5F000
stack
page read and write
10DE000
heap
page read and write
2F0E000
stack
page read and write
662F000
stack
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
42CF000
stack
page read and write
4851000
heap
page read and write
2E1F000
stack
page read and write
3FDE000
stack
page read and write
E94000
heap
page read and write
500000
unkown
page readonly
4911000
heap
page read and write
E94000
heap
page read and write
490000
heap
page read and write
3DAE000
stack
page read and write
4A70000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
9C9000
unkown
page execute and read and write
7E1000
unkown
page execute and read and write
4911000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
416E000
stack
page read and write
42AE000
stack
page read and write
3E8E000
stack
page read and write
C5C000
stack
page read and write
4851000
heap
page read and write
44DE000
stack
page read and write
370E000
stack
page read and write
4851000
heap
page read and write
EA4000
heap
page read and write
3B2E000
stack
page read and write
9E0000
direct allocation
page read and write
309F000
stack
page read and write
122E000
heap
page read and write
4911000
heap
page read and write
2D2F000
stack
page read and write
82A7000
heap
page read and write
4B3000
unkown
page execute and write copy
4911000
heap
page read and write
4851000
heap
page read and write
EA4000
heap
page read and write
4E70000
direct allocation
page execute and read and write
47CF000
stack
page read and write
67AE000
stack
page read and write
4911000
heap
page read and write
394F000
stack
page read and write
1F9000
unkown
page write copy
4911000
heap
page read and write
2A30000
direct allocation
page read and write
460E000
stack
page read and write
4CE0000
direct allocation
page read and write
4911000
heap
page read and write
2A4D000
heap
page read and write
49D000
unkown
page execute and read and write
386F000
stack
page read and write
814000
unkown
page execute and read and write
4ED0000
direct allocation
page execute and read and write
E94000
heap
page read and write
2D84000
heap
page read and write
2DCE000
stack
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
4A4000
heap
page read and write
1240000
direct allocation
page read and write
468F000
stack
page read and write
F6E000
stack
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
80D000
unkown
page execute and read and write
4851000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4D2E000
stack
page read and write
1220000
heap
page read and write
4911000
heap
page read and write
E94000
heap
page read and write
4851000
heap
page read and write
2CDF000
stack
page read and write
418F000
stack
page read and write
42D000
stack
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
4E40000
direct allocation
page execute and read and write
389000
unkown
page execute and read and write
4911000
heap
page read and write
1440000
direct allocation
page read and write
471000
unkown
page execute and read and write
4E60000
direct allocation
page execute and read and write
1240000
direct allocation
page read and write
2FEE000
stack
page read and write
C6B000
heap
page read and write
4A4000
unkown
page execute and read and write
4ED0000
direct allocation
page execute and read and write
DE0000
heap
page read and write
425E000
stack
page read and write
1199000
heap
page read and write
32CE000
stack
page read and write
4911000
heap
page read and write
113E000
stack
page read and write
11A6000
heap
page read and write
4C10000
direct allocation
page execute and read and write
3C6E000
stack
page read and write
344F000
stack
page read and write
1460000
heap
page read and write
2B8F000
stack
page read and write
43AF000
stack
page read and write
4CE0000
direct allocation
page read and write
4851000
heap
page read and write
500000
unkown
page read and write
E94000
heap
page read and write
4E70000
direct allocation
page execute and read and write
6EF0000
heap
page read and write
85FE000
stack
page read and write
4911000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4851000
heap
page read and write
659000
unkown
page execute and read and write
4911000
heap
page read and write
569000
unkown
page write copy
4911000
heap
page read and write
501000
unkown
page execute and write copy
545E000
stack
page read and write
2F5F000
stack
page read and write
4911000
heap
page read and write
E94000
heap
page read and write
9E0000
direct allocation
page read and write
559D000
stack
page read and write
6EE1000
heap
page read and write
823000
unkown
page execute and write copy
4851000
heap
page read and write
569000
unkown
page write copy
1140000
heap
page read and write
3F8F000
stack
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
9CB000
unkown
page execute and write copy
4911000
heap
page read and write
2A47000
heap
page read and write
10FD000
heap
page read and write
56B000
unkown
page execute and read and write
9E0000
direct allocation
page read and write
3A0F000
stack
page read and write
11C2000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4E40000
direct allocation
page execute and read and write
824000
unkown
page execute and write copy
DC0000
heap
page read and write
569000
unkown
page read and write
9E0000
direct allocation
page read and write
E94000
heap
page read and write
335E000
stack
page read and write
51AE000
stack
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
56DD000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
121B000
heap
page read and write
1240000
direct allocation
page read and write
4911000
heap
page read and write
2F8E000
stack
page read and write
1240000
direct allocation
page read and write
4851000
heap
page read and write
4F10000
direct allocation
page execute and read and write
318E000
stack
page read and write
1240000
direct allocation
page read and write
C40000
direct allocation
page read and write
EA4000
heap
page read and write
4CE0000
direct allocation
page read and write
85BC000
stack
page read and write
143F000
stack
page read and write
308F000
stack
page read and write
EA4000
heap
page read and write
EA4000
heap
page read and write
4C60000
direct allocation
page execute and read and write
8280000
heap
page read and write
C3E000
stack
page read and write
4911000
heap
page read and write
424E000
stack
page read and write
2EAE000
stack
page read and write
3F0F000
stack
page read and write
331F000
stack
page read and write
EA4000
heap
page read and write
4911000
heap
page read and write
1220000
heap
page read and write
4E80000
direct allocation
page execute and read and write
359F000
stack
page read and write
E30000
heap
page read and write
EA4000
heap
page read and write
68AF000
stack
page read and write
1240000
direct allocation
page read and write
4911000
heap
page read and write
30DE000
stack
page read and write
4AEE000
stack
page read and write
4A4000
heap
page read and write
4911000
heap
page read and write
41CE000
stack
page read and write
40DE000
stack
page read and write
4C90000
direct allocation
page execute and read and write
57DE000
stack
page read and write
475E000
stack
page read and write
4851000
heap
page read and write
10AF000
heap
page read and write
11F9000
heap
page read and write
E94000
heap
page read and write
9E0000
direct allocation
page read and write
368E000
stack
page read and write
36DF000
stack
page read and write
4911000
heap
page read and write
823000
unkown
page execute and read and write
2AEF000
stack
page read and write
EA4000
heap
page read and write
828A000
heap
page read and write
452E000
stack
page read and write
448F000
stack
page read and write
46CE000
stack
page read and write
E94000
heap
page read and write
2A70000
direct allocation
page read and write
4911000
heap
page read and write
2A30000
direct allocation
page read and write
11A1000
heap
page read and write
4910000
heap
page read and write
4F20000
direct allocation
page execute and read and write
1159000
heap
page read and write
4B3000
unkown
page execute and read and write
886B000
stack
page read and write
814000
unkown
page execute and read and write
562000
unkown
page execute and read and write
4911000
heap
page read and write
2A70000
direct allocation
page read and write
6F9000
unkown
page execute and read and write
2D70000
direct allocation
page execute and read and write
9E0000
direct allocation
page read and write
D0B000
stack
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
2A20000
heap
page read and write
38CF000
stack
page read and write
4851000
heap
page read and write
4F00000
direct allocation
page execute and read and write
4B4000
unkown
page execute and write copy
E94000
heap
page read and write
501000
unkown
page execute and write copy
3F9F000
stack
page read and write
52AF000
stack
page read and write
E94000
heap
page read and write
404F000
stack
page read and write
3ADE000
stack
page read and write
4E2F000
stack
page read and write
63E5000
heap
page read and write
4851000
heap
page read and write
4CE0000
direct allocation
page read and write
408E000
stack
page read and write
4911000
heap
page read and write
31CF000
stack
page read and write
420F000
stack
page read and write
4851000
heap
page read and write
2D80000
heap
page read and write
395F000
stack
page read and write
652E000
stack
page read and write
458E000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
4851000
heap
page read and write
4F10000
direct allocation
page execute and read and write
471F000
stack
page read and write
439E000
stack
page read and write
38AE000
stack
page read and write
500000
unkown
page readonly
44CE000
stack
page read and write
EA4000
heap
page read and write
3E4F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
4E70000
direct allocation
page execute and read and write
120B000
heap
page read and write
4911000
heap
page read and write
33CF000
stack
page read and write
E94000
heap
page read and write
4862000
heap
page read and write
4851000
heap
page read and write
1240000
direct allocation
page read and write
108B000
heap
page read and write
1240000
direct allocation
page read and write
3BDF000
stack
page read and write
E94000
heap
page read and write
1196000
heap
page read and write
4851000
heap
page read and write
53EE000
stack
page read and write
3D0F000
stack
page read and write
E94000
heap
page read and write
2B9F000
stack
page read and write
2A70000
direct allocation
page read and write
35EF000
stack
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
E94000
heap
page read and write
E94000
heap
page read and write
4911000
heap
page read and write
6EE0000
heap
page read and write
378F000
stack
page read and write
3D5E000
stack
page read and write
2D1E000
stack
page read and write
4851000
heap
page read and write
4ECF000
stack
page read and write
381F000
stack
page read and write
896C000
stack
page read and write
E94000
heap
page read and write
36CF000
stack
page read and write
120B000
heap
page read and write
7E1000
unkown
page execute and read and write
4E50000
direct allocation
page execute and read and write
2A30000
direct allocation
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
9C9000
unkown
page execute and read and write
29E7000
heap
page read and write
2A5E000
stack
page read and write
2A60000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4851000
heap
page read and write
4911000
heap
page read and write
C5C000
stack
page read and write
1240000
direct allocation
page read and write
2ECF000
stack
page read and write
2A8E000
stack
page read and write
4E70000
direct allocation
page execute and read and write
4911000
heap
page read and write
4851000
heap
page read and write
191000
unkown
page execute and write copy
4A4000
heap
page read and write
65B000
unkown
page execute and write copy
C40000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
4911000
heap
page read and write
D70000
heap
page read and write
501000
unkown
page execute and write copy
4911000
heap
page read and write
390E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
4A4000
heap
page read and write
11F9000
heap
page read and write
1265000
heap
page read and write
676F000
stack
page read and write
9E0000
direct allocation
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
470F000
stack
page read and write
506F000
stack
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
52EE000
stack
page read and write
4851000
heap
page read and write
2F4F000
stack
page read and write
298E000
stack
page read and write
40CF000
stack
page read and write
4851000
heap
page read and write
2A70000
direct allocation
page read and write
2A30000
direct allocation
page read and write
1440000
direct allocation
page read and write
4911000
heap
page read and write
4CA0000
trusted library allocation
page read and write
11A4000
heap
page read and write
562000
unkown
page execute and read and write
824000
unkown
page execute and write copy
4C10000
direct allocation
page execute and read and write
330F000
stack
page read and write
4A4000
heap
page read and write
380F000
stack
page read and write
824000
unkown
page execute and write copy
39AF000
stack
page read and write
4E70000
direct allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
435F000
stack
page read and write
9CB000
unkown
page execute and write copy
E94000
heap
page read and write
516F000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
E94000
heap
page read and write
2BDE000
stack
page read and write
4E90000
direct allocation
page execute and read and write
3D6E000
stack
page read and write
2A70000
direct allocation
page read and write
4D51000
direct allocation
page read and write
4851000
heap
page read and write
4861000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
30EF000
stack
page read and write
1440000
direct allocation
page read and write
4911000
heap
page read and write
484F000
stack
page read and write
80D000
unkown
page execute and read and write
4E2F000
stack
page read and write
4911000
heap
page read and write
E94000
heap
page read and write
1260000
heap
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
29E0000
heap
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
9E0000
direct allocation
page read and write
4911000
heap
page read and write
398E000
stack
page read and write
349E000
stack
page read and write
3E9E000
stack
page read and write
3C1E000
stack
page read and write
EB0000
heap
page read and write
4D0000
heap
page read and write
2A70000
direct allocation
page read and write
1240000
direct allocation
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4861000
heap
page read and write
3EAE000
stack
page read and write
29D0000
direct allocation
page execute and read and write
480E000
stack
page read and write
4A4000
heap
page read and write
4870000
heap
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
4631000
heap
page read and write
666E000
stack
page read and write
340E000
stack
page read and write
1216000
heap
page read and write
32C000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
1236000
heap
page read and write
4861000
heap
page read and write
4F00000
direct allocation
page execute and read and write
4911000
heap
page read and write
4851000
heap
page read and write
4CE0000
direct allocation
page read and write
4631000
heap
page read and write
2BCB000
stack
page read and write
4B11000
direct allocation
page read and write
F1E000
stack
page read and write
4865000
heap
page read and write
334E000
stack
page read and write
4911000
heap
page read and write
43EE000
stack
page read and write
4911000
heap
page read and write
2A30000
direct allocation
page read and write
4A4000
heap
page read and write
1FB000
unkown
page execute and read and write
320E000
stack
page read and write
506E000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
4911000
heap
page read and write
4911000
heap
page read and write
D5D000
stack
page read and write
F2F000
stack
page read and write
4C90000
trusted library allocation
page read and write
4851000
heap
page read and write
4911000
heap
page read and write
385E000
stack
page read and write
2A70000
direct allocation
page read and write
1216000
heap
page read and write
2A30000
direct allocation
page read and write
284E000
stack
page read and write
1240000
direct allocation
page read and write
4A4000
heap
page read and write
120C000
heap
page read and write
C60000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4851000
heap
page read and write
3ACE000
stack
page read and write
3FEF000
stack
page read and write
364F000
stack
page read and write
3B8E000
stack
page read and write
4860000
heap
page read and write
F6A000
heap
page read and write
4911000
heap
page read and write
1111000
heap
page read and write
4911000
heap
page read and write
2A90000
heap
page read and write
3A8F000
stack
page read and write
4F40000
direct allocation
page execute and read and write
11F9000
heap
page read and write
2A70000
direct allocation
page read and write
F6E000
heap
page read and write
4911000
heap
page read and write
D80000
heap
page read and write
4A4000
heap
page read and write
50AE000
stack
page read and write
4C70000
direct allocation
page execute and read and write
E94000
heap
page read and write
4911000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
4851000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
345F000
stack
page read and write
4911000
heap
page read and write
4A4000
heap
page read and write
6F9000
unkown
page execute and read and write
120B000
heap
page read and write
EA4000
heap
page read and write
80D000
unkown
page execute and read and write
2A30000
direct allocation
page read and write
9E0000
direct allocation
page read and write
4851000
heap
page read and write
190000
unkown
page readonly
426F000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
2A70000
direct allocation
page read and write
336F000
stack
page read and write
4911000
heap
page read and write
4A4000
heap
page read and write
4851000
heap
page read and write
2A30000
direct allocation
page read and write
DC0000
heap
page read and write
4911000
heap
page read and write
430E000
stack
page read and write
E94000
heap
page read and write
4A4000
heap
page read and write
E94000
heap
page read and write
2E5E000
stack
page read and write
4F10000
direct allocation
page execute and read and write
2A30000
direct allocation
page read and write
EA4000
heap
page read and write
326E000
stack
page read and write
4631000
heap
page read and write
562000
unkown
page execute and read and write
4911000
heap
page read and write
4911000
heap
page read and write
E90000
heap
page read and write
44EF000
stack
page read and write
328F000
stack
page read and write
1240000
direct allocation
page read and write
4851000
heap
page read and write
EA4000
heap
page read and write
4D51000
direct allocation
page read and write
120F000
heap
page read and write
4911000
heap
page read and write
3E0E000
stack
page read and write
E94000
heap
page read and write
4851000
heap
page read and write
34EE000
stack
page read and write
294F000
stack
page read and write
84BB000
stack
page read and write
2A70000
direct allocation
page read and write
4D8E000
stack
page read and write
1080000
heap
page read and write
4911000
heap
page read and write
500000
unkown
page read and write
E94000
heap
page read and write
2A70000
direct allocation
page read and write
4851000
heap
page read and write
1240000
direct allocation
page read and write
3C8F000
stack
page read and write
34AF000
stack
page read and write
4851000
heap
page read and write
569C000
stack
page read and write
120B000
heap
page read and write
E94000
heap
page read and write
4E7C000
stack
page read and write
300F000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
4911000
heap
page read and write
2A30000
direct allocation
page read and write
E94000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
4D2B000
stack
page read and write
2D60000
direct allocation
page execute and read and write
9E0000
direct allocation
page read and write
E94000
heap
page read and write
4C90000
heap
page read and write
4E80000
direct allocation
page execute and read and write
E94000
heap
page read and write
1F2000
unkown
page execute and read and write
3BCF000
stack
page read and write
10C6000
heap
page read and write
D5D000
stack
page read and write
4851000
heap
page read and write
9D0000
heap
page read and write
6F9000
unkown
page execute and read and write
3CCE000
stack
page read and write
10FA000
stack
page read and write
4860000
heap
page read and write
86FE000
stack
page read and write
449F000
stack
page read and write
461E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
4911000
heap
page read and write
C7A000
heap
page read and write
121F000
heap
page read and write
1236000
heap
page read and write
462F000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
4EE0000
direct allocation
page execute and read and write
4911000
heap
page read and write
4E90000
direct allocation
page execute and read and write
F5E000
stack
page read and write
63E0000
heap
page read and write
E94000
heap
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
4E60000
direct allocation
page execute and read and write
823000
unkown
page execute and write copy
3A9F000
stack
page read and write
4850000
heap
page read and write
4C10000
direct allocation
page execute and read and write
376E000
stack
page read and write
1F9000
unkown
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
9E0000
direct allocation
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
45CF000
stack
page read and write
2E6F000
stack
page read and write
4851000
heap
page read and write
110D000
heap
page read and write
E94000
heap
page read and write
120E000
heap
page read and write
3DCF000
stack
page read and write
E94000
heap
page read and write
2C4B000
stack
page read and write
358F000
stack
page read and write
3C0E000
stack
page read and write
4911000
heap
page read and write
E94000
heap
page read and write
312E000
stack
page read and write
410E000
stack
page read and write
454F000
stack
page read and write
2A30000
direct allocation
page read and write
E94000
heap
page read and write
823000
unkown
page execute and write copy
E94000
heap
page read and write
E94000
heap
page read and write
9CB000
unkown
page execute and write copy
E94000
heap
page read and write
4A4000
heap
page read and write
823000
unkown
page execute and read and write
4911000
heap
page read and write
402E000
stack
page read and write
4911000
heap
page read and write
EA0000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
2C2E000
stack
page read and write
4911000
heap
page read and write
4851000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
2A30000
direct allocation
page read and write
4DCE000
stack
page read and write
E94000
heap
page read and write
3EEE000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
3AEF000
stack
page read and write
120B000
heap
page read and write
4911000
heap
page read and write
4F00000
direct allocation
page execute and read and write
E94000
heap
page read and write
362E000
stack
page read and write
4851000
heap
page read and write
E94000
heap
page read and write
115E000
stack
page read and write
11CE000
heap
page read and write
33AE000
stack
page read and write
354E000
stack
page read and write
2D4F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
412F000
stack
page read and write
500000
unkown
page read and write
2BEF000
stack
page read and write
444E000
stack
page read and write
438E000
stack
page read and write
4911000
heap
page read and write
31DF000
stack
page read and write
9E0000
direct allocation
page read and write
68C0000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
1184000
heap
page read and write
39EE000
stack
page read and write
2A70000
direct allocation
page read and write
569000
unkown
page read and write
4A4000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
3F4D000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
434F000
stack
page read and write
EA4000
heap
page read and write
9E0000
direct allocation
page read and write
11BF000
heap
page read and write
122D000
heap
page read and write
35CE000
stack
page read and write
2A97000
heap
page read and write
4851000
heap
page read and write
E94000
heap
page read and write
321E000
stack
page read and write
4911000
heap
page read and write
45DF000
stack
page read and write
There are 831 hidden memdumps, click here to show them.