IOC Report
f3wrBtIYXx.exe

loading gif

Files

File Path
Type
Category
Malicious
f3wrBtIYXx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\explorti.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\f3wrBtIYXx.exe
"C:\Users\user\Desktop\f3wrBtIYXx.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://185.215.113.19/Vi9leo/index.phpyM
unknown
http://185.215.113.19/Vi9leo/index.phpC:
unknown
http://185.215.113.19/Vi9leo/index.phpuM
unknown
http://185.215.113.19/Vi9leo/index.phpeb8a7
unknown
http://185.215.113.19/Vi9leo/index.phpWindows
unknown
http://185.215.113.19/Vi9leo/index.phpx
unknown
http://185.215.113.19/Vi9leo/index.phpm32
unknown
http://185.215.113.19/Vi9leo/index.php3M
unknown
http://185.215.113.19/Vi9leo/index.phpon
unknown
http://185.215.113.19/Vi9leo/index.phpmM
unknown
http://185.215.113.19/Vi9leo/index.php#f
unknown
http://185.215.113.19/Vi9leo/index.php#
unknown
http://185.215.113.19/Vi9leo/index.php0x
unknown
http://185.215.113.19/Vi9leo/index.phpPy;
unknown
http://185.215.113.19/Vi9leo/index.phpoft
unknown
http://185.215.113.19/Vi9leo/index.phpk
unknown
There are 7 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.19
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
6D1000
unkown
page execute and read and write
malicious
4B60000
direct allocation
page read and write
malicious
4EF0000
direct allocation
page read and write
malicious
711000
unkown
page execute and read and write
malicious
4EF0000
direct allocation
page read and write
malicious
4E60000
direct allocation
page read and write
malicious
711000
unkown
page execute and read and write
malicious
711000
unkown
page execute and read and write
malicious
579E000
stack
page read and write
4B50000
direct allocation
page read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
4A71000
heap
page read and write
5110000
direct allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
11D1000
heap
page read and write
4D30000
direct allocation
page execute and read and write
455F000
stack
page read and write
1120000
direct allocation
page read and write
4A5F000
stack
page read and write
772000
unkown
page execute and read and write
4A71000
heap
page read and write
408E000
stack
page read and write
FD0000
heap
page read and write
492F000
stack
page read and write
2CEB000
heap
page read and write
49D1000
heap
page read and write
31EF000
stack
page read and write
446E000
stack
page read and write
5070000
direct allocation
page execute and read and write
3FEE000
stack
page read and write
9E2000
unkown
page execute and read and write
6770000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
46B0000
direct allocation
page read and write
BC0000
unkown
page execute and read and write
FA0000
heap
page read and write
11FA000
heap
page read and write
710000
unkown
page readonly
49D1000
heap
page read and write
10DE000
stack
page read and write
49D1000
heap
page read and write
2C9E000
stack
page read and write
391E000
stack
page read and write
A24000
unkown
page execute and read and write
FD4000
heap
page read and write
F5D000
stack
page read and write
772000
unkown
page execute and read and write
5100000
direct allocation
page execute and read and write
390E000
stack
page read and write
5050000
direct allocation
page execute and read and write
4A71000
heap
page read and write
11F8000
heap
page read and write
120E000
heap
page read and write
4B00000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
2F0E000
stack
page read and write
FD4000
heap
page read and write
507C000
stack
page read and write
41AF000
stack
page read and write
1206000
heap
page read and write
46B0000
direct allocation
page read and write
D9E000
stack
page read and write
FD4000
heap
page read and write
4A80000
heap
page read and write
315F000
stack
page read and write
49D1000
heap
page read and write
2CE7000
heap
page read and write
A17000
unkown
page execute and read and write
49D1000
heap
page read and write
6D91000
heap
page read and write
1206000
heap
page read and write
589D000
stack
page read and write
4A71000
heap
page read and write
A24000
unkown
page execute and write copy
49D1000
heap
page read and write
11D1000
heap
page read and write
5050000
direct allocation
page execute and read and write
3AAF000
stack
page read and write
5070000
direct allocation
page execute and read and write
4A71000
heap
page read and write
426E000
stack
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
49D1000
heap
page read and write
49AF000
stack
page read and write
502F000
stack
page read and write
110E000
stack
page read and write
1174000
heap
page read and write
46B0000
direct allocation
page read and write
11BA000
heap
page read and write
ECF000
stack
page read and write
382F000
stack
page read and write
469F000
stack
page read and write
FD4000
heap
page read and write
FA4000
heap
page read and write
4A71000
heap
page read and write
121D000
heap
page read and write
779000
unkown
page write copy
710000
unkown
page readonly
1140000
heap
page read and write
A24000
unkown
page execute and read and write
EFA000
stack
page read and write
436F000
stack
page read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
4E50000
direct allocation
page read and write
4A71000
heap
page read and write
13AF000
stack
page read and write
3F4E000
stack
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
351F000
stack
page read and write
2C8E000
stack
page read and write
346F000
stack
page read and write
11B0000
heap
page read and write
A24000
unkown
page execute and write copy
2C4F000
stack
page read and write
5060000
direct allocation
page execute and read and write
4A71000
heap
page read and write
50A0000
direct allocation
page execute and read and write
46C1000
heap
page read and write
5070000
direct allocation
page execute and read and write
110E000
stack
page read and write
11E7000
heap
page read and write
42CF000
stack
page read and write
54DD000
stack
page read and write
539E000
stack
page read and write
4A71000
heap
page read and write
77B000
unkown
page execute and read and write
11E7000
heap
page read and write
FD4000
heap
page read and write
2ECF000
stack
page read and write
4F9F000
stack
page read and write
49D1000
heap
page read and write
710000
unkown
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
A25000
unkown
page execute and write copy
732000
unkown
page execute and read and write
120E000
heap
page read and write
FD4000
heap
page read and write
9E2000
unkown
page execute and read and write
46EE000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4C9F000
stack
page read and write
FA4000
heap
page read and write
491F000
stack
page read and write
318E000
stack
page read and write
49D1000
heap
page read and write
304E000
stack
page read and write
142E000
stack
page read and write
445E000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
43AE000
stack
page read and write
A17000
unkown
page execute and read and write
5080000
direct allocation
page execute and read and write
5070000
direct allocation
page execute and read and write
49D1000
heap
page read and write
468F000
stack
page read and write
3E1E000
stack
page read and write
49D1000
heap
page read and write
34AE000
stack
page read and write
FD4000
heap
page read and write
2B0F000
stack
page read and write
3A6E000
stack
page read and write
342E000
stack
page read and write
369E000
stack
page read and write
29C7000
heap
page read and write
779000
unkown
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
739000
unkown
page write copy
444E000
stack
page read and write
5260000
heap
page read and write
55DF000
stack
page read and write
5040000
direct allocation
page execute and read and write
314F000
stack
page read and write
46AF000
stack
page read and write
3BAE000
stack
page read and write
46DE000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
FD4000
heap
page read and write
502F000
stack
page read and write
6366000
heap
page read and write
49D1000
heap
page read and write
3F5E000
stack
page read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
4A71000
heap
page read and write
356E000
stack
page read and write
1206000
heap
page read and write
1120000
direct allocation
page read and write
4EE0000
direct allocation
page read and write
49D1000
heap
page read and write
1120000
direct allocation
page read and write
3D2F000
stack
page read and write
A0E000
unkown
page execute and read and write
49D1000
heap
page read and write
33DF000
stack
page read and write
49D1000
heap
page read and write
50D0000
direct allocation
page execute and read and write
47EF000
stack
page read and write
49D1000
heap
page read and write
2CE0000
heap
page read and write
1166000
heap
page read and write
2C8E000
stack
page read and write
630E000
stack
page read and write
3F1F000
stack
page read and write
49D1000
heap
page read and write
418F000
stack
page read and write
3DEF000
stack
page read and write
3CAF000
stack
page read and write
32CE000
stack
page read and write
711000
unkown
page execute and write copy
9E2000
unkown
page execute and read and write
11F6000
heap
page read and write
9A2000
unkown
page execute and read and write
4CE0000
direct allocation
page execute and read and write
46B0000
direct allocation
page read and write
1190000
direct allocation
page read and write
1190000
direct allocation
page read and write
779000
unkown
page write copy
5090000
direct allocation
page execute and read and write
4A71000
heap
page read and write
110E000
stack
page read and write
354E000
stack
page read and write
710000
unkown
page read and write
6B8B000
stack
page read and write
1120000
direct allocation
page read and write
49D1000
heap
page read and write
69FF000
stack
page read and write
42DF000
stack
page read and write
1190000
direct allocation
page read and write
11E7000
heap
page read and write
2C30000
direct allocation
page read and write
4BC1000
direct allocation
page read and write
328F000
stack
page read and write
49D1000
heap
page read and write
456F000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
118A000
heap
page read and write
634E000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4FB0000
direct allocation
page execute and read and write
D5E000
stack
page read and write
ED0000
heap
page read and write
5070000
direct allocation
page execute and read and write
FD4000
heap
page read and write
372E000
stack
page read and write
FD4000
heap
page read and write
46B0000
direct allocation
page read and write
4A71000
heap
page read and write
FD4000
heap
page read and write
40EE000
stack
page read and write
4D40000
direct allocation
page execute and read and write
49D1000
heap
page read and write
5070000
direct allocation
page execute and read and write
4FD0000
direct allocation
page execute and read and write
3B6F000
stack
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
3B9E000
stack
page read and write
2E2F000
stack
page read and write
11EF000
heap
page read and write
3F2F000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
4A61000
heap
page read and write
FC0000
heap
page read and write
49D1000
heap
page read and write
11E5000
heap
page read and write
5090000
direct allocation
page execute and read and write
F10000
heap
page read and write
4A71000
heap
page read and write
46B0000
direct allocation
page read and write
419F000
stack
page read and write
11E7000
heap
page read and write
77B000
unkown
page execute and read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
3C2E000
stack
page read and write
5264000
heap
page read and write
49D1000
heap
page read and write
29BF000
stack
page read and write
31AE000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
68FD000
stack
page read and write
549F000
stack
page read and write
6D1000
unkown
page execute and write copy
4A71000
heap
page read and write
8130000
heap
page read and write
1120000
direct allocation
page read and write
FD4000
heap
page read and write
355E000
stack
page read and write
4A71000
heap
page read and write
392E000
stack
page read and write
5070000
direct allocation
page execute and read and write
302F000
stack
page read and write
118D000
heap
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
710000
unkown
page readonly
1190000
direct allocation
page read and write
73B000
unkown
page execute and read and write
41CE000
stack
page read and write
2B4E000
stack
page read and write
118F000
heap
page read and write
30EE000
stack
page read and write
1120000
direct allocation
page read and write
2C30000
direct allocation
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
4F2E000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
49D1000
heap
page read and write
6D9E000
heap
page read and write
5040000
direct allocation
page execute and read and write
319E000
stack
page read and write
564E000
stack
page read and write
4A71000
heap
page read and write
FA4000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
5030000
direct allocation
page execute and read and write
46C0000
heap
page read and write
11E7000
heap
page read and write
49D1000
heap
page read and write
8330000
heap
page read and write
2C30000
direct allocation
page read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
1180000
heap
page read and write
901000
unkown
page execute and read and write
1190000
direct allocation
page read and write
535F000
stack
page read and write
FD4000
heap
page read and write
901000
unkown
page execute and read and write
2FAE000
stack
page read and write
5070000
direct allocation
page execute and read and write
521B000
stack
page read and write
305E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
3E0E000
stack
page read and write
666F000
stack
page read and write
430E000
stack
page read and write
11D1000
heap
page read and write
4D60000
direct allocation
page execute and read and write
35EE000
stack
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
116D000
heap
page read and write
3A1F000
stack
page read and write
4A71000
heap
page read and write
472F000
stack
page read and write
FA4000
heap
page read and write
5020000
direct allocation
page execute and read and write
6D90000
heap
page read and write
4A71000
heap
page read and write
FA4000
heap
page read and write
316F000
stack
page read and write
6FD000
stack
page read and write
4A71000
heap
page read and write
496E000
stack
page read and write
2C30000
direct allocation
page read and write
37DE000
stack
page read and write
1206000
heap
page read and write
3E2E000
stack
page read and write
6365000
heap
page read and write
46B0000
direct allocation
page read and write
4B50000
direct allocation
page read and write
350F000
stack
page read and write
1190000
direct allocation
page read and write
329F000
stack
page read and write
365F000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
FD4000
heap
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
4A71000
heap
page read and write
3AEE000
stack
page read and write
4A71000
heap
page read and write
FD4000
heap
page read and write
4A71000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
FA4000
heap
page read and write
FA4000
heap
page read and write
462E000
stack
page read and write
59DC000
stack
page read and write
11F6000
heap
page read and write
3EAE000
stack
page read and write
2D2C000
stack
page read and write
4F2B000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
1060000
heap
page read and write
1120000
direct allocation
page read and write
2C30000
direct allocation
page read and write
711000
unkown
page execute and write copy
4EB0000
trusted library allocation
page read and write
2CE0000
heap
page read and write
49D1000
heap
page read and write
62CE000
stack
page read and write
49D1000
heap
page read and write
3E6F000
stack
page read and write
49D1000
heap
page read and write
481E000
stack
page read and write
5110000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
2B2E000
stack
page read and write
BC0000
unkown
page execute and read and write
FD4000
heap
page read and write
4B50000
direct allocation
page read and write
300F000
stack
page read and write
3C9F000
stack
page read and write
11BB000
heap
page read and write
4A71000
heap
page read and write
42EF000
stack
page read and write
39AE000
stack
page read and write
5070000
direct allocation
page execute and read and write
41EE000
stack
page read and write
49D1000
heap
page read and write
EE0000
heap
page read and write
431E000
stack
page read and write
1190000
direct allocation
page read and write
306E000
stack
page read and write
2DEF000
stack
page read and write
9E5000
unkown
page execute and write copy
FD4000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
5000000
direct allocation
page execute and read and write
49D1000
heap
page read and write
14AF000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
2DCE000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
FD4000
heap
page read and write
11EE000
heap
page read and write
2C30000
direct allocation
page read and write
340E000
stack
page read and write
4A71000
heap
page read and write
33CF000
stack
page read and write
A0E000
unkown
page execute and read and write
C10000
heap
page read and write
1176000
heap
page read and write
1190000
direct allocation
page read and write
FD4000
heap
page read and write
1120000
direct allocation
page read and write
E5C000
stack
page read and write
2C30000
direct allocation
page read and write
134F000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
11F9000
heap
page read and write
4A78000
heap
page read and write
4A71000
heap
page read and write
432E000
stack
page read and write
2C2E000
stack
page read and write
404F000
stack
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
2CE7000
heap
page read and write
2F2E000
stack
page read and write
336E000
stack
page read and write
114E000
stack
page read and write
4A71000
heap
page read and write
1190000
direct allocation
page read and write
2C30000
direct allocation
page read and write
574F000
stack
page read and write
396F000
stack
page read and write
38DF000
stack
page read and write
11E8000
heap
page read and write
1190000
direct allocation
page read and write
11B8000
heap
page read and write
50C0000
direct allocation
page execute and read and write
2C30000
direct allocation
page read and write
FD4000
heap
page read and write
3C8F000
stack
page read and write
44AF000
stack
page read and write
3B8E000
stack
page read and write
1130000
heap
page read and write
4E50000
direct allocation
page read and write
49D1000
heap
page read and write
11FA000
heap
page read and write
FD4000
heap
page read and write
36EF000
stack
page read and write
3B4F000
stack
page read and write
49D1000
heap
page read and write
710000
unkown
page read and write
3F0F000
stack
page read and write
44EE000
stack
page read and write
49D1000
heap
page read and write
4EE0000
direct allocation
page read and write
30AF000
stack
page read and write
11F6000
heap
page read and write
49D1000
heap
page read and write
A24000
unkown
page execute and write copy
3A4E000
stack
page read and write
711000
unkown
page execute and write copy
4A71000
heap
page read and write
FD4000
heap
page read and write
FA4000
heap
page read and write
1190000
direct allocation
page read and write
4A70000
heap
page read and write
1150000
heap
page read and write
67BB000
stack
page read and write
1190000
direct allocation
page read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
49D1000
heap
page read and write
8C1000
unkown
page execute and read and write
49D1000
heap
page read and write
105E000
stack
page read and write
379F000
stack
page read and write
49B0000
heap
page read and write
2CED000
heap
page read and write
458E000
stack
page read and write
3A5E000
stack
page read and write
2CD0000
direct allocation
page read and write
50B0000
direct allocation
page execute and read and write
FD4000
heap
page read and write
2C30000
direct allocation
page read and write
49D1000
heap
page read and write
11EF000
heap
page read and write
5060000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
422F000
stack
page read and write
525E000
stack
page read and write
9E4000
unkown
page execute and write copy
656F000
stack
page read and write
49D1000
heap
page read and write
4D10000
direct allocation
page execute and read and write
48AE000
stack
page read and write
11B0000
heap
page read and write
4EE0000
direct allocation
page read and write
FF0000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
3A0F000
stack
page read and write
FD4000
heap
page read and write
47DF000
stack
page read and write
3DCF000
stack
page read and write
49D1000
heap
page read and write
1120000
direct allocation
page read and write
11D1000
heap
page read and write
11F6000
heap
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
45AE000
stack
page read and write
FD4000
heap
page read and write
EEE000
heap
page read and write
11D1000
heap
page read and write
779000
unkown
page read and write
28BE000
stack
page read and write
2CD0000
direct allocation
page read and write
11F8000
heap
page read and write
2CD0000
direct allocation
page read and write
5040000
direct allocation
page execute and read and write
11EF000
heap
page read and write
5100000
direct allocation
page execute and read and write
2DDE000
stack
page read and write
120E000
heap
page read and write
50C0000
direct allocation
page execute and read and write
2D9F000
stack
page read and write
405F000
stack
page read and write
49D1000
heap
page read and write
11F3000
heap
page read and write
4A60000
heap
page read and write
4E9E000
stack
page read and write
49D1000
heap
page read and write
A25000
unkown
page execute and write copy
5070000
direct allocation
page execute and read and write
441F000
stack
page read and write
77B000
unkown
page execute and read and write
2EEF000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
459E000
stack
page read and write
5070000
direct allocation
page execute and read and write
454F000
stack
page read and write
2CCC000
stack
page read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
46B0000
direct allocation
page read and write
11AD000
heap
page read and write
440F000
stack
page read and write
2F1E000
stack
page read and write
1065000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
FA4000
heap
page read and write
2C30000
direct allocation
page read and write
4EB0000
heap
page read and write
4A71000
heap
page read and write
46B0000
direct allocation
page read and write
341E000
stack
page read and write
46C1000
heap
page read and write
4A71000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
49D1000
heap
page read and write
2C57000
heap
page read and write
9D7000
unkown
page execute and read and write
4A71000
heap
page read and write
F5D000
stack
page read and write
486F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
1150000
heap
page read and write
37AF000
stack
page read and write
5060000
direct allocation
page execute and read and write
11F9000
heap
page read and write
2EDF000
stack
page read and write
11F9000
heap
page read and write
FD4000
heap
page read and write
4EA0000
trusted library allocation
page read and write
DC5000
heap
page read and write
3CDE000
stack
page read and write
50B0000
direct allocation
page execute and read and write
3FAF000
stack
page read and write
FA4000
heap
page read and write
46B0000
direct allocation
page read and write
A17000
unkown
page execute and read and write
49D1000
heap
page read and write
6DA0000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
5070000
direct allocation
page execute and read and write
4D00000
direct allocation
page execute and read and write
3CEE000
stack
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
1120000
direct allocation
page read and write
6DA0000
heap
page read and write
1210000
heap
page read and write
4F51000
direct allocation
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
1180000
heap
page read and write
49E1000
heap
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
41DE000
stack
page read and write
A0E000
unkown
page execute and read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
FD0000
heap
page read and write
49D1000
heap
page read and write
5010000
direct allocation
page execute and read and write
2E6E000
stack
page read and write
495E000
stack
page read and write
482E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
2D8F000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
4A71000
heap
page read and write
3EC000
stack
page read and write
49D1000
heap
page read and write
3BEF000
stack
page read and write
49D1000
heap
page read and write
1210000
heap
page read and write
739000
unkown
page read and write
49D1000
heap
page read and write
6360000
heap
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
46C1000
heap
page read and write
49D1000
heap
page read and write
33EF000
stack
page read and write
2CCF000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4A71000
heap
page read and write
32EE000
stack
page read and write
332F000
stack
page read and write
50E0000
direct allocation
page execute and read and write
322E000
stack
page read and write
46C1000
heap
page read and write
CF0000
heap
page read and write
113A000
heap
page read and write
32DE000
stack
page read and write
49D0000
heap
page read and write
4D50000
direct allocation
page execute and read and write
49D1000
heap
page read and write
FD4000
heap
page read and write
4EC1000
direct allocation
page read and write
1110000
heap
page read and write
49D1000
heap
page read and write
2C30000
direct allocation
page read and write
40AE000
stack
page read and write
10AE000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
301F000
stack
page read and write
3DDF000
stack
page read and write
409E000
stack
page read and write
115A000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
11E7000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
3CCE000
stack
page read and write
4A90000
heap
page read and write
4E50000
direct allocation
page read and write
38CF000
stack
page read and write
46B0000
direct allocation
page read and write
4A61000
heap
page read and write
3B5F000
stack
page read and write
1206000
heap
page read and write
378F000
stack
page read and write
FD4000
heap
page read and write
E5C000
stack
page read and write
32AF000
stack
page read and write
4A71000
heap
page read and write
412E000
stack
page read and write
5070000
direct allocation
page execute and read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
4D80000
direct allocation
page execute and read and write
FD4000
heap
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
4F51000
direct allocation
page read and write
B80000
unkown
page execute and read and write
113E000
heap
page read and write
2C50000
heap
page read and write
50E0000
direct allocation
page execute and read and write
4A71000
heap
page read and write
1190000
direct allocation
page read and write
A25000
unkown
page execute and write copy
364F000
stack
page read and write
49D1000
heap
page read and write
772000
unkown
page execute and read and write
1224000
heap
page read and write
4A71000
heap
page read and write
1110000
heap
page read and write
49D1000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
49D1000
heap
page read and write
BC0000
unkown
page execute and read and write
DC0000
heap
page read and write
46C1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
4A6F000
stack
page read and write
352F000
stack
page read and write
5080000
direct allocation
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
386E000
stack
page read and write
366F000
stack
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
3D6E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
3A2F000
stack
page read and write
58DD000
stack
page read and write
779000
unkown
page write copy
4A71000
heap
page read and write
11FA000
heap
page read and write
37EE000
stack
page read and write
3F6E000
stack
page read and write
A24000
unkown
page execute and read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
29C0000
heap
page read and write
49D1000
heap
page read and write
1120000
direct allocation
page read and write
901000
unkown
page execute and read and write
132E000
stack
page read and write
FD4000
heap
page read and write
1245000
heap
page read and write
4D20000
direct allocation
page execute and read and write
FD4000
heap
page read and write
4A71000
heap
page read and write
4B9E000
stack
page read and write
4A71000
heap
page read and write
49D1000
heap
page read and write
9E4000
unkown
page execute and read and write
36AE000
stack
page read and write
5080000
direct allocation
page execute and read and write
4690000
heap
page read and write
BCB000
stack
page read and write
9CE000
unkown
page execute and read and write
6D0000
unkown
page read and write
49D1000
heap
page read and write
2F6F000
stack
page read and write
1190000
direct allocation
page read and write
1120000
direct allocation
page read and write
2A0E000
stack
page read and write
368E000
stack
page read and write
442F000
stack
page read and write
832C000
stack
page read and write
11E7000
heap
page read and write
EEA000
heap
page read and write
4A71000
heap
page read and write
476E000
stack
page read and write
834D000
heap
page read and write
676F000
stack
page read and write
FA4000
heap
page read and write
45EF000
stack
page read and write
FA4000
heap
page read and write
46B0000
direct allocation
page read and write
38EF000
stack
page read and write
11F9000
heap
page read and write
117B000
heap
page read and write
2C30000
direct allocation
page read and write
6D0000
unkown
page readonly
11F6000
heap
page read and write
35AF000
stack
page read and write
406F000
stack
page read and write
11E7000
heap
page read and write
1120000
direct allocation
page read and write
49D1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
50D0000
direct allocation
page execute and read and write
1211000
heap
page read and write
2C30000
direct allocation
page read and write
122A000
heap
page read and write
1238000
heap
page read and write
49D1000
heap
page read and write
37CE000
stack
page read and write
1120000
direct allocation
page read and write
4A71000
heap
page read and write
4A61000
heap
page read and write
779000
unkown
page read and write
68BC000
stack
page read and write
FD4000
heap
page read and write
49D1000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
46B0000
direct allocation
page read and write
There are 840 hidden memdumps, click here to show them.