IOC Report
setup.exe

loading gif

Files

File Path
Type
Category
Malicious
setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpdedS
unknown
http://185.215.113.16/Jo89Ku7d/index.php)
unknown
http://185.215.113.16/Jo89Ku7d/index.phpi
unknown
http://185.215.113.16/Jo89Ku7d/index.php%
unknown
http://185.215.113.16/Jo89Ku7d/index.phpa
unknown
http://185.215.113.16/Jo89Ku7d/index.phpHja
unknown
http://185.215.113.16/Jo89Ku7d/index.phpY
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedt
unknown
http://185.215.113.16/Jo89Ku7d/index.phpIif
unknown
http://185.215.113.16/Jo89Ku7d/index.phpmkB
unknown
http://185.215.113.16/Jo89Ku7d/index.phpU
unknown
http://185.215.113.16/Jo89Ku7d/index.php&i
unknown
http://185.215.113.16/Jo89Ku7d/index.php1
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
There are 6 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4610000
direct allocation
page read and write
malicious
4900000
direct allocation
page read and write
malicious
C51000
unkown
page execute and read and write
malicious
A71000
unkown
page execute and read and write
malicious
A71000
unkown
page execute and read and write
malicious
4C10000
direct allocation
page read and write
malicious
D4F000
unkown
page execute and read and write
194000
heap
page read and write
2D7F000
stack
page read and write
4600000
direct allocation
page read and write
391F000
stack
page read and write
4461000
heap
page read and write
4760000
direct allocation
page read and write
33FE000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
409F000
stack
page read and write
4181000
heap
page read and write
1D4000
heap
page read and write
516F000
stack
page read and write
4461000
heap
page read and write
474F000
stack
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
4A80000
direct allocation
page execute and read and write
170000
heap
page read and write
3A5F000
stack
page read and write
4181000
heap
page read and write
48A0000
trusted library allocation
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
4181000
heap
page read and write
2FFF000
stack
page read and write
4D70000
direct allocation
page execute and read and write
1D4000
heap
page read and write
4461000
heap
page read and write
5F4F000
stack
page read and write
194000
heap
page read and write
4181000
heap
page read and write
3F3E000
stack
page read and write
4181000
heap
page read and write
28C0000
direct allocation
page read and write
1090000
heap
page read and write
4461000
heap
page read and write
3DBF000
stack
page read and write
4C00000
direct allocation
page read and write
C30000
direct allocation
page read and write
28C0000
direct allocation
page read and write
39CE000
stack
page read and write
4470000
heap
page read and write
338E000
stack
page read and write
3ECE000
stack
page read and write
28C0000
direct allocation
page read and write
4181000
heap
page read and write
194000
heap
page read and write
1D4000
heap
page read and write
4EBF000
stack
page read and write
CBB000
unkown
page execute and read and write
28C0000
direct allocation
page read and write
1B7000
heap
page read and write
194000
heap
page read and write
4461000
heap
page read and write
4771000
heap
page read and write
48F0000
direct allocation
page read and write
7CCA000
heap
page read and write
3E8F000
stack
page read and write
286E000
stack
page read and write
4771000
heap
page read and write
4461000
heap
page read and write
4DBE000
stack
page read and write
3A3E000
stack
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
544000
heap
page read and write
4461000
heap
page read and write
464B000
stack
page read and write
40DE000
stack
page read and write
4790000
direct allocation
page execute and read and write
1D4000
heap
page read and write
4181000
heap
page read and write
4181000
heap
page read and write
2DDF000
stack
page read and write
421E000
stack
page read and write
C30000
direct allocation
page read and write
830000
heap
page read and write
475F000
stack
page read and write
4461000
heap
page read and write
1D4000
heap
page read and write
4FFE000
stack
page read and write
3EFF000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
194000
heap
page read and write
4181000
heap
page read and write
7C4000
heap
page read and write
4A80000
heap
page read and write
64BE000
stack
page read and write
5E45000
heap
page read and write
CB9000
unkown
page read and write
7CDB000
heap
page read and write
834000
heap
page read and write
4181000
heap
page read and write
331E000
stack
page read and write
493C000
stack
page read and write
4461000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
28AE000
stack
page read and write
4181000
heap
page read and write
4760000
direct allocation
page read and write
67D0000
heap
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
600000
heap
page read and write
7A0000
heap
page read and write
180000
heap
page read and write
C50000
unkown
page readonly
834000
heap
page read and write
1C4000
heap
page read and write
334F000
stack
page read and write
4181000
heap
page read and write
F2F000
unkown
page execute and read and write
4AE0000
direct allocation
page execute and read and write
4461000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
353E000
stack
page read and write
4181000
heap
page read and write
C30000
direct allocation
page read and write
4181000
heap
page read and write
65BE000
stack
page read and write
783000
heap
page read and write
4461000
heap
page read and write
C51000
unkown
page execute and write copy
4600000
direct allocation
page read and write
F77000
unkown
page execute and write copy
395E000
stack
page read and write
3E5E000
stack
page read and write
4181000
heap
page read and write
2F1F000
stack
page read and write
313F000
stack
page read and write
F3F000
unkown
page execute and write copy
2F8F000
stack
page read and write
4A3F000
stack
page read and write
493E000
stack
page read and write
1D4000
heap
page read and write
67E0000
heap
page read and write
3CBE000
stack
page read and write
47E0000
direct allocation
page execute and read and write
435E000
stack
page read and write
298E000
stack
page read and write
4181000
heap
page read and write
52AC000
stack
page read and write
4D90000
direct allocation
page execute and read and write
194000
heap
page read and write
1D4000
heap
page read and write
4180000
heap
page read and write
834000
heap
page read and write
7CB0000
heap
page read and write
194000
heap
page read and write
4181000
heap
page read and write
3B3F000
stack
page read and write
4D7F000
stack
page read and write
7B4000
heap
page read and write
7AF000
heap
page read and write
377F000
stack
page read and write
1D4000
heap
page read and write
A6E000
stack
page read and write
4181000
heap
page read and write
1D4000
heap
page read and write
4760000
direct allocation
page read and write
500000
heap
page read and write
83E000
stack
page read and write
1D4000
heap
page read and write
4461000
heap
page read and write
506E000
stack
page read and write
43DE000
stack
page read and write
A71000
unkown
page execute and write copy
4A8C000
stack
page read and write
ADB000
unkown
page execute and read and write
10D1000
heap
page read and write
47D0000
direct allocation
page execute and read and write
3BDE000
stack
page read and write
834000
heap
page read and write
4461000
heap
page read and write
1D4000
heap
page read and write
4181000
heap
page read and write
78B000
heap
page read and write
4461000
heap
page read and write
4C2B000
stack
page read and write
194000
heap
page read and write
359E000
stack
page read and write
4181000
heap
page read and write
1D0000
heap
page read and write
425F000
stack
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
45FE000
stack
page read and write
D97000
unkown
page execute and write copy
800000
heap
page read and write
309E000
stack
page read and write
A71000
unkown
page execute and write copy
4181000
heap
page read and write
28C0000
direct allocation
page read and write
4760000
direct allocation
page read and write
4461000
heap
page read and write
647C000
stack
page read and write
834000
heap
page read and write
1D4000
heap
page read and write
95E000
stack
page read and write
345E000
stack
page read and write
68E000
stack
page read and write
1B0000
heap
page read and write
4461000
heap
page read and write
6240000
heap
page read and write
282E000
stack
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
4760000
direct allocation
page read and write
2EBF000
stack
page read and write
367E000
stack
page read and write
1D4000
heap
page read and write
3CDF000
stack
page read and write
2B3F000
stack
page read and write
305F000
stack
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
4E20000
direct allocation
page execute and read and write
194000
heap
page read and write
7DB0000
trusted library allocation
page read and write
4DF0000
direct allocation
page execute and read and write
47A0000
direct allocation
page execute and read and write
4181000
heap
page read and write
28DD000
heap
page read and write
5DEE000
stack
page read and write
1D4000
heap
page read and write
4181000
heap
page read and write
283F000
stack
page read and write
1D4000
heap
page read and write
4461000
heap
page read and write
D7C000
unkown
page execute and read and write
6CE000
stack
page read and write
4181000
heap
page read and write
D96000
unkown
page execute and read and write
4760000
direct allocation
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
4D80000
direct allocation
page execute and read and write
48F0000
direct allocation
page read and write
4181000
heap
page read and write
497E000
stack
page read and write
834000
heap
page read and write
194000
heap
page read and write
2FCE000
stack
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
79C000
heap
page read and write
1D4000
heap
page read and write
4181000
heap
page read and write
52F000
heap
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
4181000
heap
page read and write
4D2F000
stack
page read and write
4181000
heap
page read and write
369F000
stack
page read and write
108E000
stack
page read and write
C30000
direct allocation
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
52ED000
stack
page read and write
4461000
heap
page read and write
4A50000
direct allocation
page execute and read and write
194000
heap
page read and write
D4F000
unkown
page execute and read and write
61B0000
heap
page read and write
2F5E000
stack
page read and write
7A9000
heap
page read and write
64B000
stack
page read and write
834000
heap
page read and write
411F000
stack
page read and write
4BDB000
stack
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
4181000
heap
page read and write
834000
heap
page read and write
67DE000
heap
page read and write
28C0000
direct allocation
page read and write
1D4000
heap
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
6D0000
heap
page read and write
4461000
heap
page read and write
1D4000
heap
page read and write
293F000
stack
page read and write
3FCF000
stack
page read and write
4461000
heap
page read and write
1097000
heap
page read and write
381E000
stack
page read and write
327F000
stack
page read and write
2C0E000
stack
page read and write
4181000
heap
page read and write
9EE000
stack
page read and write
3D8E000
stack
page read and write
A70000
unkown
page read and write
4461000
heap
page read and write
C30000
direct allocation
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4790000
direct allocation
page execute and read and write
451E000
stack
page read and write
D96000
unkown
page execute and read and write
194000
heap
page read and write
C71000
unkown
page execute and read and write
55F000
heap
page read and write
4181000
heap
page read and write
30CF000
stack
page read and write
4191000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1C0000
heap
page read and write
4461000
heap
page read and write
324E000
stack
page read and write
4790000
direct allocation
page execute and read and write
1D4000
heap
page read and write
C1E000
stack
page read and write
4181000
heap
page read and write
36DE000
stack
page read and write
1D4000
heap
page read and write
403F000
stack
page read and write
35CF000
stack
page read and write
1D4000
heap
page read and write
4461000
heap
page read and write
3C4E000
stack
page read and write
4461000
heap
page read and write
32BE000
stack
page read and write
4461000
heap
page read and write
618F000
stack
page read and write
53EE000
stack
page read and write
7BAC000
stack
page read and write
4181000
heap
page read and write
190000
heap
page read and write
194000
heap
page read and write
465E000
stack
page read and write
273F000
stack
page read and write
C30000
direct allocation
page read and write
D97000
unkown
page execute and write copy
194000
heap
page read and write
4181000
heap
page read and write
28C0000
direct allocation
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
F5C000
unkown
page execute and read and write
3FD0000
heap
page read and write
980000
heap
page read and write
4A80000
direct allocation
page execute and read and write
4671000
direct allocation
page read and write
194000
heap
page read and write
4181000
heap
page read and write
194000
heap
page read and write
F76000
unkown
page execute and write copy
2E4F000
stack
page read and write
431F000
stack
page read and write
1D4000
heap
page read and write
4461000
heap
page read and write
3B7E000
stack
page read and write
374E000
stack
page read and write
1D4000
heap
page read and write
461F000
stack
page read and write
3D4F000
stack
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
7CAC000
stack
page read and write
3C7F000
stack
page read and write
4770000
direct allocation
page execute and read and write
4AD8000
stack
page read and write
4181000
heap
page read and write
1D4000
heap
page read and write
6DA000
heap
page read and write
4A80000
direct allocation
page execute and read and write
317E000
stack
page read and write
417F000
stack
page read and write
C30000
direct allocation
page read and write
4D90000
direct allocation
page execute and read and write
D88000
unkown
page execute and read and write
2EFE000
stack
page read and write
4461000
heap
page read and write
4B10000
direct allocation
page execute and read and write
1D4000
heap
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
CB2000
unkown
page execute and read and write
28C0000
direct allocation
page read and write
4C2C000
stack
page read and write
578000
heap
page read and write
4181000
heap
page read and write
D7C000
unkown
page execute and read and write
C30000
direct allocation
page read and write
7A0000
heap
page read and write
1D4000
heap
page read and write
319F000
stack
page read and write
1D4000
heap
page read and write
4D90000
direct allocation
page execute and read and write
445F000
stack
page read and write
4181000
heap
page read and write
401E000
stack
page read and write
194000
heap
page read and write
47C0000
direct allocation
page execute and read and write
1D4000
heap
page read and write
4D90000
direct allocation
page execute and read and write
4181000
heap
page read and write
4181000
heap
page read and write
194000
heap
page read and write
834000
heap
page read and write
37DF000
stack
page read and write
4B00000
direct allocation
page execute and read and write
4810000
direct allocation
page execute and read and write
1D4000
heap
page read and write
4820000
direct allocation
page execute and read and write
810000
heap
page read and write
47B0000
direct allocation
page execute and read and write
1D4000
heap
page read and write
3ACF000
stack
page read and write
5DAE000
stack
page read and write
A70000
unkown
page readonly
4461000
heap
page read and write
834000
heap
page read and write
47F0000
direct allocation
page execute and read and write
1D4000
heap
page read and write
4A90000
direct allocation
page execute and read and write
7C4000
heap
page read and write
59D000
stack
page read and write
4A80000
direct allocation
page execute and read and write
48A0000
heap
page read and write
320F000
stack
page read and write
33BF000
stack
page read and write
4181000
heap
page read and write
28C0000
direct allocation
page read and write
1D4000
heap
page read and write
194000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
4181000
heap
page read and write
4181000
heap
page read and write
360E000
stack
page read and write
4E00000
direct allocation
page execute and read and write
111F000
unkown
page execute and write copy
4181000
heap
page read and write
34CE000
stack
page read and write
4181000
heap
page read and write
4760000
direct allocation
page read and write
28C0000
direct allocation
page read and write
AD9000
unkown
page write copy
4181000
heap
page read and write
1D4000
heap
page read and write
4181000
heap
page read and write
10A0000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4181000
heap
page read and write
1D4000
heap
page read and write
7A7000
heap
page read and write
4181000
heap
page read and write
439F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
ADB000
unkown
page execute and read and write
4461000
heap
page read and write
4EFE000
stack
page read and write
4D90000
direct allocation
page execute and read and write
31DE000
stack
page read and write
4B20000
direct allocation
page execute and read and write
4181000
heap
page read and write
4181000
heap
page read and write
834000
heap
page read and write
4A60000
direct allocation
page execute and read and write
F68000
unkown
page execute and read and write
AD9000
unkown
page write copy
AD9000
unkown
page read and write
4461000
heap
page read and write
44DF000
stack
page read and write
2D0F000
stack
page read and write
363F000
stack
page read and write
4181000
heap
page read and write
415E000
stack
page read and write
4461000
heap
page read and write
4760000
direct allocation
page read and write
C20000
heap
page read and write
194000
heap
page read and write
4760000
direct allocation
page read and write
194000
heap
page read and write
1D4000
heap
page read and write
4461000
heap
page read and write
4181000
heap
page read and write
38BF000
stack
page read and write
4760000
direct allocation
page execute and read and write
3E1F000
stack
page read and write
4181000
heap
page read and write
4181000
heap
page read and write
4181000
heap
page read and write
4BB0000
trusted library allocation
page read and write
C71000
unkown
page execute and read and write
1D4000
heap
page read and write
4771000
heap
page read and write
194000
heap
page read and write
2ACE000
stack
page read and write
4181000
heap
page read and write
263F000
stack
page read and write
4600000
direct allocation
page read and write
4461000
heap
page read and write
398F000
stack
page read and write
3F9E000
stack
page read and write
3A9D000
stack
page read and write
4C00000
direct allocation
page read and write
4C4E000
stack
page read and write
37BD000
stack
page read and write
D88000
unkown
page execute and read and write
4181000
heap
page read and write
2D4E000
stack
page read and write
726000
heap
page read and write
4461000
heap
page read and write
5E2E000
stack
page read and write
4D4F000
stack
page read and write
194000
heap
page read and write
4C71000
direct allocation
page read and write
194000
heap
page read and write
2E1E000
stack
page read and write
4461000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
CB9000
unkown
page write copy
1D4000
heap
page read and write
28B0000
heap
page read and write
4830000
direct allocation
page execute and read and write
2ADF000
stack
page read and write
7CC9000
heap
page read and write
4461000
heap
page read and write
4760000
direct allocation
page read and write
4790000
direct allocation
page execute and read and write
4461000
heap
page read and write
2A8F000
stack
page read and write
54A000
heap
page read and write
2C7E000
stack
page read and write
4D60000
direct allocation
page execute and read and write
341F000
stack
page read and write
A70000
unkown
page readonly
F3D000
unkown
page execute and read and write
4461000
heap
page read and write
7A7000
heap
page read and write
E51000
unkown
page execute and read and write
4181000
heap
page read and write
4181000
heap
page read and write
4C7E000
stack
page read and write
4461000
heap
page read and write
4760000
direct allocation
page read and write
1D4000
heap
page read and write
51AD000
stack
page read and write
C30000
direct allocation
page read and write
BDE000
stack
page read and write
2CDF000
stack
page read and write
4181000
heap
page read and write
4A80000
direct allocation
page execute and read and write
5E40000
heap
page read and write
194000
heap
page read and write
28C0000
direct allocation
page read and write
A70000
unkown
page read and write
3DFE000
stack
page read and write
4181000
heap
page read and write
3B0E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
3C0F000
stack
page read and write
28C0000
direct allocation
page read and write
45C0000
trusted library allocation
page read and write
732000
heap
page read and write
1D4000
heap
page read and write
4181000
heap
page read and write
49C000
stack
page read and write
F8E000
stack
page read and write
F3D000
unkown
page execute and read and write
4461000
heap
page read and write
C30000
direct allocation
page read and write
4D90000
direct allocation
page execute and read and write
6E9000
heap
page read and write
4790000
direct allocation
page execute and read and write
4760000
direct allocation
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
73D000
stack
page read and write
18C000
stack
page read and write
C30000
direct allocation
page read and write
355F000
stack
page read and write
4FA000
stack
page read and write
4461000
heap
page read and write
4961000
direct allocation
page read and write
4181000
heap
page read and write
608E000
stack
page read and write
C30000
direct allocation
page read and write
2A3F000
stack
page read and write
AD9000
unkown
page read and write
388E000
stack
page read and write
407E000
stack
page read and write
4181000
heap
page read and write
6248000
heap
page read and write
7AF000
heap
page read and write
194000
heap
page read and write
4181000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
4181000
heap
page read and write
2DBE000
stack
page read and write
3D1E000
stack
page read and write
38FE000
stack
page read and write
3F5F000
stack
page read and write
10B000
stack
page read and write
4181000
heap
page read and write
4181000
heap
page read and write
4780000
direct allocation
page execute and read and write
A2C000
stack
page read and write
C30000
direct allocation
page read and write
194000
heap
page read and write
4181000
heap
page read and write
4760000
direct allocation
page read and write
384F000
stack
page read and write
1D4000
heap
page read and write
834000
heap
page read and write
429E000
stack
page read and write
7C6000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
4181000
heap
page read and write
4181000
heap
page read and write
4461000
heap
page read and write
29DF000
stack
page read and write
1D4000
heap
page read and write
4461000
heap
page read and write
50B000
heap
page read and write
28D7000
heap
page read and write
41DF000
stack
page read and write
310E000
stack
page read and write
10AE000
heap
page read and write
194000
heap
page read and write
32DF000
stack
page read and write
B9E000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
4181000
heap
page read and write
60E000
stack
page read and write
28D0000
heap
page read and write
1D4000
heap
page read and write
4461000
heap
page read and write
C50000
unkown
page read and write
4461000
heap
page read and write
111D000
unkown
page execute and read and write
194000
heap
page read and write
28C0000
direct allocation
page read and write
348F000
stack
page read and write
2E8E000
stack
page read and write
194000
heap
page read and write
4181000
heap
page read and write
AD2000
unkown
page execute and read and write
4A7E000
stack
page read and write
F3F000
unkown
page execute and write copy
194000
heap
page read and write
2BCF000
stack
page read and write
7B4000
heap
page read and write
1D4000
heap
page read and write
AD2000
unkown
page execute and read and write
1D4000
heap
page read and write
27EF000
stack
page read and write
604F000
stack
page read and write
D96000
unkown
page execute and write copy
637B000
stack
page read and write
834000
heap
page read and write
D96000
unkown
page execute and write copy
5CAB000
stack
page read and write
4461000
heap
page read and write
F76000
unkown
page execute and read and write
4181000
heap
page read and write
4181000
heap
page read and write
303E000
stack
page read and write
4181000
heap
page read and write
834000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4790000
direct allocation
page execute and read and write
48F0000
direct allocation
page read and write
34FF000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
4461000
heap
page read and write
2C3F000
stack
page read and write
6245000
heap
page read and write
4461000
heap
page read and write
834000
heap
page read and write
4FC000
stack
page read and write
4770000
heap
page read and write
4460000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
10AA000
heap
page read and write
4181000
heap
page read and write
4C00000
direct allocation
page read and write
370F000
stack
page read and write
39FF000
stack
page read and write
4181000
heap
page read and write
79C000
heap
page read and write
2BDF000
stack
page read and write
194000
heap
page read and write
3B9F000
stack
page read and write
4181000
heap
page read and write
79D000
heap
page read and write
787000
heap
page read and write
4800000
direct allocation
page execute and read and write
4461000
heap
page read and write
A5F000
stack
page read and write
C30000
direct allocation
page read and write
4760000
direct allocation
page read and write
28C0000
direct allocation
page read and write
4461000
heap
page read and write
There are 704 hidden memdumps, click here to show them.