IOC Report
setup.exe

loading gif

Files

File Path
Type
Category
Malicious
setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\explorti.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://185.215.113.19/Vi9leo/index.phpo
unknown
http://185.215.113.19/Vi9leo/index.phpr
unknown
http://185.215.113.19/Vi9leo/index.phpa
unknown
http://185.215.113.19/Vi9leo/index.phpt
unknown
http://185.215.113.19/Vi9leo/index.phpC
unknown
http://185.215.113.19/Vi9leo/index.php8
unknown
http://185.215.113.19/Vi9leo/index.phpm32
unknown
http://185.215.113.19/Vi9leo/index.phpN
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.19
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2B1000
unkown
page execute and read and write
malicious
5300000
direct allocation
page read and write
malicious
2B1000
unkown
page execute and read and write
malicious
50B0000
direct allocation
page read and write
malicious
4AA0000
direct allocation
page read and write
malicious
C21000
unkown
page execute and read and write
malicious
4BD0000
direct allocation
page read and write
malicious
2B1000
unkown
page execute and read and write
malicious
69EE000
stack
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
3BBF000
stack
page read and write
B90000
heap
page read and write
1220000
heap
page read and write
1393000
heap
page read and write
1332000
heap
page read and write
5260000
direct allocation
page execute and read and write
3BFE000
stack
page read and write
13AA000
heap
page read and write
1393000
heap
page read and write
44AE000
stack
page read and write
1594000
heap
page read and write
1594000
heap
page read and write
1316000
heap
page read and write
40BF000
stack
page read and write
3ABE000
stack
page read and write
D4E000
stack
page read and write
372E000
stack
page read and write
2EF0000
direct allocation
page read and write
64FE000
stack
page read and write
473E000
stack
page read and write
C34000
heap
page read and write
27AE000
stack
page read and write
1200000
heap
page read and write
2B0000
unkown
page readonly
48AE000
stack
page read and write
4E81000
heap
page read and write
3D2F000
stack
page read and write
27D7000
heap
page read and write
13D7000
heap
page read and write
4741000
heap
page read and write
16B0000
direct allocation
page read and write
1594000
heap
page read and write
45FF000
stack
page read and write
335F000
stack
page read and write
4741000
heap
page read and write
433F000
stack
page read and write
339E000
stack
page read and write
349F000
stack
page read and write
2B1000
unkown
page execute and write copy
1594000
heap
page read and write
BFE000
stack
page read and write
1594000
heap
page read and write
832D000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
45BF000
stack
page read and write
139F000
heap
page read and write
170D000
heap
page read and write
1594000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
13E0000
heap
page read and write
412E000
stack
page read and write
4741000
heap
page read and write
35DF000
stack
page read and write
F45000
unkown
page execute and write copy
1719000
heap
page read and write
486F000
stack
page read and write
4741000
heap
page read and write
4BFF000
stack
page read and write
27B0000
direct allocation
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
5D5000
unkown
page execute and write copy
4741000
heap
page read and write
1210000
direct allocation
page read and write
333E000
stack
page read and write
4E81000
heap
page read and write
4C20000
direct allocation
page execute and read and write
12F4000
heap
page read and write
65FF000
stack
page read and write
5A6E000
stack
page read and write
D5E000
heap
page read and write
4741000
heap
page read and write
563B000
stack
page read and write
52C0000
direct allocation
page execute and read and write
4C30000
direct allocation
page execute and read and write
16B0000
direct allocation
page read and write
4E81000
heap
page read and write
437E000
stack
page read and write
1594000
heap
page read and write
2FAE000
stack
page read and write
58BE000
stack
page read and write
5490000
direct allocation
page execute and read and write
5220000
direct allocation
page execute and read and write
139B000
heap
page read and write
12F4000
heap
page read and write
4EA0000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
2C4F000
stack
page read and write
4741000
heap
page read and write
4C1E000
stack
page read and write
6236000
heap
page read and write
4741000
heap
page read and write
4BD0000
direct allocation
page read and write
4AEE000
stack
page read and write
4C31000
direct allocation
page read and write
27B0000
direct allocation
page read and write
12F4000
heap
page read and write
2E6F000
stack
page read and write
A20000
heap
page read and write
437F000
stack
page read and write
4AA0000
direct allocation
page read and write
4741000
heap
page read and write
4B80000
trusted library allocation
page read and write
B10000
heap
page read and write
C20000
heap
page read and write
413E000
stack
page read and write
44EE000
stack
page read and write
5D5000
unkown
page execute and read and write
5C6000
unkown
page execute and read and write
1594000
heap
page read and write
4D1F000
stack
page read and write
4741000
heap
page read and write
786000
unkown
page execute and write copy
2D10000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
B05000
heap
page read and write
5361000
direct allocation
page read and write
35FE000
stack
page read and write
487E000
stack
page read and write
4740000
heap
page read and write
1227000
heap
page read and write
1594000
heap
page read and write
5B6F000
stack
page read and write
1210000
direct allocation
page read and write
4C3E000
stack
page read and write
439F000
stack
page read and write
174B000
heap
page read and write
B3D000
stack
page read and write
4741000
heap
page read and write
272E000
stack
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
C34000
heap
page read and write
462E000
stack
page read and write
34BE000
stack
page read and write
51EF000
stack
page read and write
12F4000
heap
page read and write
16B0000
direct allocation
page read and write
4AFE000
stack
page read and write
4A1000
unkown
page execute and read and write
3D7D000
stack
page read and write
27B0000
direct allocation
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
3BFF000
stack
page read and write
16B0000
direct allocation
page read and write
16B0000
direct allocation
page read and write
4741000
heap
page read and write
F45000
unkown
page execute and read and write
12C9000
heap
page read and write
4BD0000
direct allocation
page read and write
13A4000
heap
page read and write
4741000
heap
page read and write
5BC000
unkown
page execute and read and write
429E000
stack
page read and write
36FF000
stack
page read and write
2EEE000
stack
page read and write
4E81000
heap
page read and write
C34000
heap
page read and write
4741000
heap
page read and write
5490000
direct allocation
page execute and read and write
4741000
heap
page read and write
4E81000
heap
page read and write
58F000
unkown
page execute and read and write
A3C000
stack
page read and write
1393000
heap
page read and write
1594000
heap
page read and write
2D34000
heap
page read and write
4E81000
heap
page read and write
137E000
stack
page read and write
12C0000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
4B2E000
stack
page read and write
1594000
heap
page read and write
4F4D000
stack
page read and write
139B000
heap
page read and write
13A4000
heap
page read and write
4E81000
heap
page read and write
27B0000
direct allocation
page read and write
5C6000
unkown
page execute and read and write
4741000
heap
page read and write
31FF000
stack
page read and write
1594000
heap
page read and write
58FE000
stack
page read and write
4C30000
heap
page read and write
1594000
heap
page read and write
40FE000
stack
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
4D7E000
stack
page read and write
12F4000
heap
page read and write
5D6000
unkown
page execute and write copy
1594000
heap
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
12F4000
heap
page read and write
52C0000
trusted library allocation
page read and write
4741000
heap
page read and write
54D0000
direct allocation
page execute and read and write
2D30000
heap
page read and write
16B0000
direct allocation
page read and write
137D000
heap
page read and write
4D80000
direct allocation
page execute and read and write
3E9F000
stack
page read and write
52B0000
direct allocation
page execute and read and write
C34000
heap
page read and write
303F000
stack
page read and write
4C31000
heap
page read and write
1594000
heap
page read and write
4C00000
direct allocation
page execute and read and write
34AE000
stack
page read and write
371F000
stack
page read and write
BDE000
stack
page read and write
54A0000
direct allocation
page execute and read and write
1210000
direct allocation
page read and write
4741000
heap
page read and write
13D0000
heap
page read and write
1594000
heap
page read and write
C34000
heap
page read and write
139F000
heap
page read and write
4E81000
heap
page read and write
4C70000
direct allocation
page execute and read and write
1594000
heap
page read and write
139B000
heap
page read and write
4741000
heap
page read and write
1594000
heap
page read and write
C20000
unkown
page readonly
6D8E000
heap
page read and write
139F000
heap
page read and write
1394000
heap
page read and write
5CBE000
stack
page read and write
1594000
heap
page read and write
12F4000
heap
page read and write
312000
unkown
page execute and read and write
2E9E000
stack
page read and write
1594000
heap
page read and write
2F10000
direct allocation
page read and write
8123000
heap
page read and write
3FDF000
stack
page read and write
4741000
heap
page read and write
2F10000
direct allocation
page read and write
44BE000
stack
page read and write
2B0000
unkown
page read and write
4E91000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
1393000
heap
page read and write
16D0000
heap
page read and write
4E81000
heap
page read and write
3BEF000
stack
page read and write
312000
unkown
page execute and read and write
4BEF000
stack
page read and write
4E00000
direct allocation
page execute and read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
5490000
direct allocation
page execute and read and write
1389000
heap
page read and write
C34000
heap
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
3E6F000
stack
page read and write
4741000
heap
page read and write
321F000
stack
page read and write
13A4000
heap
page read and write
577F000
stack
page read and write
518B000
stack
page read and write
31B000
unkown
page execute and read and write
58F000
unkown
page execute and read and write
16B0000
direct allocation
page read and write
4C30000
direct allocation
page execute and read and write
319000
unkown
page write copy
12F4000
heap
page read and write
16B0000
direct allocation
page read and write
4741000
heap
page read and write
C1E000
stack
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
5230000
direct allocation
page execute and read and write
4741000
heap
page read and write
C34000
heap
page read and write
567E000
stack
page read and write
4E81000
heap
page read and write
2ADF000
stack
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
C34000
heap
page read and write
2EF0000
direct allocation
page read and write
786000
unkown
page execute and write copy
5D5000
unkown
page execute and write copy
1756000
heap
page read and write
B9E000
stack
page read and write
4AA0000
direct allocation
page read and write
426E000
stack
page read and write
1594000
heap
page read and write
16B0000
direct allocation
page read and write
13AA000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
63BE000
stack
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
6BB000
stack
page read and write
663E000
stack
page read and write
323F000
stack
page read and write
31B000
unkown
page execute and read and write
E11000
unkown
page execute and read and write
302F000
stack
page read and write
52C0000
heap
page read and write
54E0000
direct allocation
page execute and read and write
4A60000
trusted library allocation
page read and write
4E81000
heap
page read and write
312F000
stack
page read and write
6230000
heap
page read and write
4741000
heap
page read and write
534B000
stack
page read and write
16DB000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
2C8E000
stack
page read and write
4AEF000
stack
page read and write
4D60000
direct allocation
page execute and read and write
425F000
stack
page read and write
1594000
heap
page read and write
12F4000
heap
page read and write
27B0000
direct allocation
page read and write
4741000
heap
page read and write
473F000
stack
page read and write
127C000
stack
page read and write
4A1000
unkown
page execute and read and write
13BE000
stack
page read and write
4D40000
direct allocation
page execute and read and write
4E81000
heap
page read and write
29DF000
stack
page read and write
5470000
direct allocation
page execute and read and write
497F000
stack
page read and write
3F7F000
stack
page read and write
1594000
heap
page read and write
3CFF000
stack
page read and write
1594000
heap
page read and write
5240000
direct allocation
page execute and read and write
1590000
heap
page read and write
4D50000
direct allocation
page execute and read and write
126E000
stack
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
C21000
unkown
page execute and write copy
1594000
heap
page read and write
4E81000
heap
page read and write
3A7F000
stack
page read and write
4741000
heap
page read and write
4ABF000
stack
page read and write
4E7F000
stack
page read and write
43DE000
stack
page read and write
4741000
heap
page read and write
3B1E000
stack
page read and write
16A0000
heap
page read and write
3AAF000
stack
page read and write
EFF000
unkown
page execute and read and write
5D5000
unkown
page execute and write copy
343F000
stack
page read and write
4620000
heap
page read and write
463E000
stack
page read and write
3E7E000
stack
page read and write
139B000
heap
page read and write
4741000
heap
page read and write
57BE000
stack
page read and write
4E81000
heap
page read and write
4D60000
direct allocation
page execute and read and write
476E000
stack
page read and write
4741000
heap
page read and write
16B0000
direct allocation
page read and write
5250000
direct allocation
page execute and read and write
3EBE000
stack
page read and write
40EF000
stack
page read and write
5230000
direct allocation
page execute and read and write
319000
unkown
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
1210000
direct allocation
page read and write
2EF0000
direct allocation
page read and write
12F4000
heap
page read and write
4741000
heap
page read and write
27B0000
direct allocation
page read and write
45FE000
stack
page read and write
396F000
stack
page read and write
5500000
direct allocation
page execute and read and write
68AC000
stack
page read and write
12BA000
heap
page read and write
1393000
heap
page read and write
319000
unkown
page read and write
1210000
direct allocation
page read and write
1715000
heap
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
1594000
heap
page read and write
4E81000
heap
page read and write
3FAF000
stack
page read and write
5270000
direct allocation
page execute and read and write
4CC0000
direct allocation
page execute and read and write
27B0000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
27B0000
direct allocation
page read and write
1210000
direct allocation
page read and write
C89000
unkown
page write copy
5D5000
unkown
page execute and read and write
27B0000
direct allocation
page read and write
346F000
stack
page read and write
4741000
heap
page read and write
3C2E000
stack
page read and write
2EF0000
direct allocation
page read and write
13A4000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
4741000
heap
page read and write
2EF0000
direct allocation
page read and write
C34000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
383E000
stack
page read and write
4B01000
direct allocation
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
132E000
heap
page read and write
4741000
heap
page read and write
276E000
stack
page read and write
3EAE000
stack
page read and write
4E81000
heap
page read and write
1594000
heap
page read and write
16B0000
direct allocation
page read and write
2EF0000
direct allocation
page read and write
10F4000
unkown
page execute and read and write
1369000
heap
page read and write
F4F000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
2B0000
unkown
page read and write
36BF000
stack
page read and write
4741000
heap
page read and write
5200000
direct allocation
page execute and read and write
4E81000
heap
page read and write
35BE000
stack
page read and write
36EF000
stack
page read and write
4D60000
direct allocation
page execute and read and write
4E81000
heap
page read and write
28DF000
stack
page read and write
4741000
heap
page read and write
447F000
stack
page read and write
12F4000
heap
page read and write
2CCE000
stack
page read and write
1520000
heap
page read and write
357F000
stack
page read and write
3C5D000
stack
page read and write
4E81000
heap
page read and write
397E000
stack
page read and write
4E81000
heap
page read and write
451E000
stack
page read and write
3C1F000
stack
page read and write
6D80000
heap
page read and write
2F9F000
stack
page read and write
54B0000
direct allocation
page execute and read and write
12F4000
heap
page read and write
5C6000
unkown
page execute and read and write
4741000
heap
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
1594000
heap
page read and write
4741000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4741000
heap
page read and write
4741000
heap
page read and write
6D90000
heap
page read and write
544F000
stack
page read and write
5490000
direct allocation
page execute and read and write
1337000
heap
page read and write
2EF0000
direct allocation
page read and write
4741000
heap
page read and write
389E000
stack
page read and write
322F000
stack
page read and write
67AC000
stack
page read and write
4BD0000
direct allocation
page read and write
3C3E000
stack
page read and write
4741000
heap
page read and write
1393000
heap
page read and write
C34000
heap
page read and write
4E81000
heap
page read and write
13AA000
heap
page read and write
C34000
heap
page read and write
16B0000
direct allocation
page read and write
59FF000
stack
page read and write
35EE000
stack
page read and write
1594000
heap
page read and write
1594000
heap
page read and write
4741000
heap
page read and write
13C0000
heap
page read and write
2EF0000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
4E81000
heap
page read and write
786000
unkown
page execute and write copy
44BF000
stack
page read and write
337E000
stack
page read and write
12F3000
heap
page read and write
1594000
heap
page read and write
11FF000
stack
page read and write
12F4000
heap
page read and write
4741000
heap
page read and write
383F000
stack
page read and write
784000
unkown
page execute and read and write
36FE000
stack
page read and write
12BE000
stack
page read and write
5230000
direct allocation
page execute and read and write
319000
unkown
page write copy
386E000
stack
page read and write
423F000
stack
page read and write
4C31000
heap
page read and write
2D5E000
stack
page read and write
1732000
heap
page read and write
423E000
stack
page read and write
311E000
stack
page read and write
5230000
direct allocation
page execute and read and write
1369000
heap
page read and write
5460000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
41FF000
stack
page read and write
1594000
heap
page read and write
1314000
heap
page read and write
1594000
heap
page read and write
49EE000
stack
page read and write
31B000
unkown
page execute and read and write
1594000
heap
page read and write
3FBF000
stack
page read and write
1383000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4D3F000
stack
page read and write
12F4000
heap
page read and write
4E81000
heap
page read and write
4750000
heap
page read and write
2EF0000
direct allocation
page read and write
6D90000
heap
page read and write
27B0000
direct allocation
page read and write
4C80000
direct allocation
page execute and read and write
8120000
heap
page read and write
385F000
stack
page read and write
4741000
heap
page read and write
1594000
heap
page read and write
313F000
stack
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
3AFE000
stack
page read and write
4F0E000
stack
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
5510000
direct allocation
page execute and read and write
3ABF000
stack
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
4C40000
direct allocation
page execute and read and write
10F6000
unkown
page execute and write copy
436F000
stack
page read and write
B00000
heap
page read and write
C82000
unkown
page execute and read and write
4A1000
unkown
page execute and read and write
4E81000
heap
page read and write
1594000
heap
page read and write
15CF000
stack
page read and write
2B1000
unkown
page execute and write copy
4621000
heap
page read and write
4E81000
heap
page read and write
49AF000
stack
page read and write
5480000
direct allocation
page execute and read and write
4E81000
heap
page read and write
4D30000
direct allocation
page execute and read and write
3AEE000
stack
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
1210000
direct allocation
page read and write
35AF000
stack
page read and write
27B0000
direct allocation
page read and write
4741000
heap
page read and write
4C31000
heap
page read and write
133F000
heap
page read and write
2F10000
direct allocation
page read and write
4741000
heap
page read and write
2EF0000
direct allocation
page read and write
4E81000
heap
page read and write
12AE000
stack
page read and write
399F000
stack
page read and write
393F000
stack
page read and write
5111000
direct allocation
page read and write
4741000
heap
page read and write
1210000
direct allocation
page read and write
4DD0000
direct allocation
page execute and read and write
3FBE000
stack
page read and write
46FF000
stack
page read and write
319000
unkown
page read and write
4741000
heap
page read and write
5D5000
unkown
page execute and read and write
4741000
heap
page read and write
3D5E000
stack
page read and write
103C000
stack
page read and write
139B000
heap
page read and write
4E81000
heap
page read and write
347F000
stack
page read and write
415E000
stack
page read and write
1594000
heap
page read and write
F46000
unkown
page execute and write copy
32FF000
stack
page read and write
2BDF000
stack
page read and write
68EE000
stack
page read and write
3FEE000
stack
page read and write
27B0000
direct allocation
page read and write
4741000
heap
page read and write
3FFE000
stack
page read and write
52A0000
direct allocation
page execute and read and write
B80000
heap
page read and write
30DF000
stack
page read and write
1594000
heap
page read and write
2D1F000
stack
page read and write
4741000
heap
page read and write
1594000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
472F000
stack
page read and write
4E81000
heap
page read and write
4C50000
direct allocation
page execute and read and write
C34000
heap
page read and write
4741000
heap
page read and write
6B7B000
stack
page read and write
4E81000
heap
page read and write
12F0000
heap
page read and write
1594000
heap
page read and write
16B0000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
397F000
stack
page read and write
6235000
heap
page read and write
4C30000
direct allocation
page execute and read and write
3E3F000
stack
page read and write
2EF0000
direct allocation
page read and write
1393000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
1309000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
3D3F000
stack
page read and write
312000
unkown
page execute and read and write
1594000
heap
page read and write
C30000
heap
page read and write
2FDE000
stack
page read and write
336E000
stack
page read and write
4741000
heap
page read and write
1394000
heap
page read and write
3D9E000
stack
page read and write
4E81000
heap
page read and write
2E3F000
stack
page read and write
2D0E000
stack
page read and write
4E81000
heap
page read and write
F2C000
unkown
page execute and read and write
2C1E000
stack
page read and write
332F000
stack
page read and write
13A4000
heap
page read and write
4741000
heap
page read and write
44FE000
stack
page read and write
2B0000
unkown
page readonly
7BA000
stack
page read and write
1594000
heap
page read and write
27B0000
direct allocation
page read and write
4C60000
direct allocation
page execute and read and write
4E81000
heap
page read and write
3EDE000
stack
page read and write
4741000
heap
page read and write
4C2F000
stack
page read and write
1594000
heap
page read and write
2E5F000
stack
page read and write
5300000
direct allocation
page read and write
5530000
direct allocation
page execute and read and write
5230000
direct allocation
page execute and read and write
4741000
heap
page read and write
133E000
stack
page read and write
C34000
heap
page read and write
F36000
unkown
page execute and read and write
4741000
heap
page read and write
5210000
direct allocation
page execute and read and write
C34000
heap
page read and write
2B0000
unkown
page read and write
4D60000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
4BBE000
stack
page read and write
64BF000
stack
page read and write
5280000
direct allocation
page execute and read and write
39AE000
stack
page read and write
3D3E000
stack
page read and write
4E81000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
4E81000
heap
page read and write
1180000
heap
page read and write
4E81000
heap
page read and write
52D0000
direct allocation
page execute and read and write
4741000
heap
page read and write
3ADF000
stack
page read and write
3E7E000
stack
page read and write
5DFD000
stack
page read and write
1210000
direct allocation
page read and write
4741000
heap
page read and write
325E000
stack
page read and write
4C90000
direct allocation
page execute and read and write
4E81000
heap
page read and write
1369000
heap
page read and write
54F0000
direct allocation
page execute and read and write
1311000
heap
page read and write
1210000
direct allocation
page read and write
C34000
heap
page read and write
137C000
stack
page read and write
4D60000
direct allocation
page execute and read and write
5D6000
unkown
page execute and write copy
40FF000
stack
page read and write
5CFD000
stack
page read and write
4E81000
heap
page read and write
5BC000
unkown
page execute and read and write
3D6E000
stack
page read and write
5520000
direct allocation
page execute and read and write
483F000
stack
page read and write
319000
unkown
page write copy
D50000
heap
page read and write
4D90000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
50EE000
stack
page read and write
5300000
direct allocation
page read and write
12B0000
heap
page read and write
4741000
heap
page read and write
2EF0000
direct allocation
page read and write
5070000
trusted library allocation
page read and write
361E000
stack
page read and write
2EF0000
direct allocation
page read and write
2B0000
unkown
page readonly
43BE000
stack
page read and write
1210000
direct allocation
page read and write
2F27000
heap
page read and write
8320000
heap
page read and write
4741000
heap
page read and write
49BE000
stack
page read and write
1210000
direct allocation
page read and write
12F4000
heap
page read and write
333F000
stack
page read and write
2EF0000
direct allocation
page read and write
39DE000
stack
page read and write
6D81000
heap
page read and write
4D70000
direct allocation
page execute and read and write
4D60000
direct allocation
page execute and read and write
4741000
heap
page read and write
1594000
heap
page read and write
43AE000
stack
page read and write
16B0000
direct allocation
page read and write
113D000
stack
page read and write
4E80000
heap
page read and write
4E81000
heap
page read and write
58F000
unkown
page execute and read and write
C8B000
unkown
page execute and read and write
375E000
stack
page read and write
2FF7000
heap
page read and write
37FF000
stack
page read and write
139F000
heap
page read and write
784000
unkown
page execute and read and write
4741000
heap
page read and write
1394000
heap
page read and write
1594000
heap
page read and write
1594000
heap
page read and write
784000
unkown
page execute and read and write
5490000
direct allocation
page execute and read and write
139F000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
D5A000
heap
page read and write
6760000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
4741000
heap
page read and write
831C000
stack
page read and write
4C10000
direct allocation
page execute and read and write
45EF000
stack
page read and write
27D0000
heap
page read and write
2EAE000
stack
page read and write
1210000
direct allocation
page read and write
427E000
stack
page read and write
504E000
stack
page read and write
673F000
stack
page read and write
2FFD000
heap
page read and write
4E81000
heap
page read and write
2F3F000
stack
page read and write
5BBE000
stack
page read and write
4741000
heap
page read and write
387E000
stack
page read and write
1594000
heap
page read and write
4AA0000
direct allocation
page read and write
1594000
heap
page read and write
4621000
heap
page read and write
422F000
stack
page read and write
4C30000
direct allocation
page execute and read and write
373E000
stack
page read and write
5300000
direct allocation
page read and write
2FEC000
stack
page read and write
4741000
heap
page read and write
44DF000
stack
page read and write
1210000
direct allocation
page read and write
411F000
stack
page read and write
347E000
stack
page read and write
549C000
stack
page read and write
4741000
heap
page read and write
4621000
heap
page read and write
2F20000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
34DE000
stack
page read and write
39BE000
stack
page read and write
4E81000
heap
page read and write
C20000
unkown
page read and write
27B0000
direct allocation
page read and write
1594000
heap
page read and write
4741000
heap
page read and write
4E81000
heap
page read and write
2B1000
unkown
page execute and write copy
382F000
stack
page read and write
4E81000
heap
page read and write
1594000
heap
page read and write
401E000
stack
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
4741000
heap
page read and write
35BF000
stack
page read and write
5D6000
unkown
page execute and write copy
5BC000
unkown
page execute and read and write
5089000
stack
page read and write
4C30000
direct allocation
page execute and read and write
2FF0000
heap
page read and write
461F000
stack
page read and write
C89000
unkown
page read and write
There are 848 hidden memdumps, click here to show them.