IOC Report
9ICG2PuZbG.exe

loading gif

Files

File Path
Type
Category
Malicious
9ICG2PuZbG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9ICG2PuZbG.exe
"C:\Users\user\Desktop\9ICG2PuZbG.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpb1a30a186ec2d30be6db0b5
unknown
http://185.215.113.16/Jo89Ku7d/index.phpcoded
unknown
http://185.215.113.16/Jo89Ku7d/index.php)
unknown
http://185.215.113.16/Jo89Ku7d/index.phpi/;
unknown
http://185.215.113.16/Jo89Ku7d/index.phpd
unknown
http://185.215.113.16/Jo89Ku7d/index.phpC
unknown
http://185.215.113.16/Jo89Ku7d/index.phpB
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedq
unknown
http://185.215.113.16/Jo89Ku7d/index.php9
unknown
http://185.215.113.16/Jo89Ku7d/index.phpv
unknown
http://185.215.113.16/Jo89Ku7d/index.php3;
unknown
http://185.215.113.16/Jo89Ku7d/index.phpu
unknown
http://185.215.113.16/Jo89Ku7d/index.phpt
unknown
http://185.215.113.16/Jo89Ku7d/index.phpS
unknown
http://185.215.113.16/Jo89Ku7d/index.phpR
unknown
http://185.215.113.16/Jo89Ku7d/index.phpP
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
There are 8 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
161000
unkown
page execute and read and write
malicious
49E0000
direct allocation
page read and write
malicious
BE1000
unkown
page execute and read and write
malicious
4D60000
direct allocation
page read and write
malicious
BE1000
unkown
page execute and read and write
malicious
4EA0000
direct allocation
page read and write
malicious
53B0000
direct allocation
page read and write
malicious
BE1000
unkown
page execute and read and write
malicious
DCE000
unkown
page execute and read and write
50C0000
direct allocation
page execute and read and write
4561000
heap
page read and write
C04000
heap
page read and write
EFA000
unkown
page execute and read and write
37AE000
stack
page read and write
48F0000
heap
page read and write
47CE000
stack
page read and write
C04000
heap
page read and write
48E1000
heap
page read and write
C74000
heap
page read and write
469E000
stack
page read and write
C2C000
heap
page read and write
5530000
direct allocation
page execute and read and write
4B40000
direct allocation
page execute and read and write
1210000
direct allocation
page read and write
7D4000
heap
page read and write
82C8000
heap
page read and write
38DE000
stack
page read and write
2C5F000
stack
page read and write
48CF000
stack
page read and write
54FF000
stack
page read and write
47A000
unkown
page execute and write copy
4A11000
heap
page read and write
C1A000
heap
page read and write
1210000
direct allocation
page read and write
48E1000
heap
page read and write
C74000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
5030000
trusted library allocation
page read and write
C74000
heap
page read and write
1640000
heap
page read and write
7D4000
heap
page read and write
48E1000
heap
page read and write
1210000
direct allocation
page read and write
4561000
heap
page read and write
50A0000
direct allocation
page execute and read and write
802F000
stack
page read and write
F8E000
stack
page read and write
51DF000
stack
page read and write
4EAF000
stack
page read and write
14FD000
stack
page read and write
4561000
heap
page read and write
2757000
heap
page read and write
1709000
heap
page read and write
1654000
heap
page read and write
C74000
heap
page read and write
5550000
direct allocation
page execute and read and write
C74000
heap
page read and write
4561000
heap
page read and write
32DE000
stack
page read and write
BE1000
unkown
page execute and write copy
A04000
heap
page read and write
47A000
unkown
page execute and read and write
1654000
heap
page read and write
38EE000
stack
page read and write
360F000
stack
page read and write
C49000
unkown
page read and write
379E000
stack
page read and write
16E0000
direct allocation
page read and write
2C70000
direct allocation
page read and write
33DE000
stack
page read and write
535E000
stack
page read and write
34DF000
stack
page read and write
BE0000
unkown
page readonly
C15000
heap
page read and write
1099000
unkown
page execute and write copy
A04000
heap
page read and write
310F000
stack
page read and write
314E000
stack
page read and write
4EA0000
direct allocation
page read and write
C74000
heap
page read and write
C74000
heap
page read and write
BC2000
heap
page read and write
38AF000
stack
page read and write
391E000
stack
page read and write
82A0000
heap
page read and write
4F00000
direct allocation
page execute and read and write
B40000
direct allocation
page read and write
2F1E000
stack
page read and write
C74000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
B40000
direct allocation
page read and write
34EF000
stack
page read and write
3A2E000
stack
page read and write
48E1000
heap
page read and write
11EE000
heap
page read and write
2C70000
direct allocation
page read and write
B40000
direct allocation
page read and write
A04000
heap
page read and write
AFD000
stack
page read and write
454E000
stack
page read and write
428F000
stack
page read and write
7D4000
heap
page read and write
7D4000
heap
page read and write
415F000
stack
page read and write
2B7E000
stack
page read and write
7D4000
heap
page read and write
3CDE000
stack
page read and write
2DDF000
stack
page read and write
5030000
direct allocation
page execute and read and write
C74000
heap
page read and write
A04000
heap
page read and write
4DEF000
stack
page read and write
4561000
heap
page read and write
9F0000
heap
page read and write
29DF000
stack
page read and write
C74000
heap
page read and write
440E000
stack
page read and write
BE1000
unkown
page execute and write copy
C74000
heap
page read and write
16FB000
heap
page read and write
4561000
heap
page read and write
C00000
heap
page read and write
3A1F000
stack
page read and write
62BF000
stack
page read and write
4561000
heap
page read and write
400F000
stack
page read and write
BC0000
heap
page read and write
441F000
stack
page read and write
1654000
heap
page read and write
1210000
direct allocation
page read and write
48E1000
heap
page read and write
479F000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
A04000
heap
page read and write
7D4000
heap
page read and write
4F30000
direct allocation
page execute and read and write
4561000
heap
page read and write
16E0000
direct allocation
page read and write
4561000
heap
page read and write
48E1000
heap
page read and write
C00000
heap
page read and write
A04000
heap
page read and write
4A6E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
1654000
heap
page read and write
1210000
direct allocation
page read and write
1210000
direct allocation
page read and write
311F000
stack
page read and write
7D0000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4D30000
heap
page read and write
C2C000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
48E1000
heap
page read and write
4A11000
heap
page read and write
16E0000
direct allocation
page read and write
31E7000
heap
page read and write
7C0000
heap
page read and write
48E1000
heap
page read and write
41DE000
stack
page read and write
619000
unkown
page execute and write copy
4561000
heap
page read and write
819B000
stack
page read and write
A04000
heap
page read and write
48E1000
heap
page read and write
93C000
stack
page read and write
4561000
heap
page read and write
4A0F000
stack
page read and write
4A1E000
stack
page read and write
B40000
direct allocation
page read and write
16E0000
direct allocation
page read and write
329E000
stack
page read and write
A04000
heap
page read and write
16E0000
direct allocation
page read and write
A04000
heap
page read and write
C00000
heap
page read and write
1C9000
unkown
page read and write
5F3E000
stack
page read and write
1210000
direct allocation
page read and write
48E1000
heap
page read and write
4D60000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
55C0000
direct allocation
page execute and read and write
2BDC000
heap
page read and write
2C9E000
stack
page read and write
5090000
direct allocation
page execute and read and write
1097000
unkown
page execute and read and write
A04000
heap
page read and write
4561000
heap
page read and write
18EF000
stack
page read and write
416F000
stack
page read and write
451F000
stack
page read and write
31E0000
heap
page read and write
1210000
direct allocation
page read and write
37DE000
stack
page read and write
C2C000
heap
page read and write
2C70000
direct allocation
page read and write
16E0000
direct allocation
page read and write
4561000
heap
page read and write
2FCF000
stack
page read and write
450F000
stack
page read and write
1210000
direct allocation
page read and write
28DE000
stack
page read and write
1220000
heap
page read and write
4A2F000
stack
page read and write
BDB000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
48DF000
stack
page read and write
442E000
stack
page read and write
4561000
heap
page read and write
48E1000
heap
page read and write
389F000
stack
page read and write
C74000
heap
page read and write
BDD000
heap
page read and write
7CB4000
heap
page read and write
1654000
heap
page read and write
16E0000
direct allocation
page read and write
38DF000
stack
page read and write
4561000
heap
page read and write
1650000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
465F000
stack
page read and write
4561000
heap
page read and write
4A11000
heap
page read and write
C74000
heap
page read and write
48E1000
heap
page read and write
C74000
heap
page read and write
4F80000
direct allocation
page execute and read and write
4561000
heap
page read and write
4DAC000
stack
page read and write
4F90000
direct allocation
page execute and read and write
4DC1000
direct allocation
page read and write
EEB000
unkown
page execute and read and write
829C000
stack
page read and write
3EEF000
stack
page read and write
42AF000
stack
page read and write
4561000
heap
page read and write
48E1000
heap
page read and write
3E1E000
stack
page read and write
4F30000
heap
page read and write
4561000
heap
page read and write
464F000
stack
page read and write
C74000
heap
page read and write
2C87000
heap
page read and write
48E1000
heap
page read and write
7D4000
heap
page read and write
62F0000
heap
page read and write
319E000
stack
page read and write
362F000
stack
page read and write
55A0000
direct allocation
page execute and read and write
BE1000
unkown
page execute and write copy
4561000
heap
page read and write
5030000
direct allocation
page execute and read and write
4F2F000
stack
page read and write
561D000
stack
page read and write
7CB0000
heap
page read and write
5520000
direct allocation
page execute and read and write
53B0000
direct allocation
page read and write
C70000
heap
page read and write
545F000
stack
page read and write
A04000
heap
page read and write
162E000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
376F000
stack
page read and write
B40000
direct allocation
page read and write
4561000
heap
page read and write
4B50000
direct allocation
page execute and read and write
4BE0000
direct allocation
page execute and read and write
15D0000
heap
page read and write
1099000
unkown
page execute and write copy
1654000
heap
page read and write
A04000
heap
page read and write
4B40000
direct allocation
page execute and read and write
169E000
stack
page read and write
160000
unkown
page read and write
129B000
heap
page read and write
1654000
heap
page read and write
4561000
heap
page read and write
2C70000
direct allocation
page read and write
521E000
stack
page read and write
6920000
heap
page read and write
EFA000
unkown
page execute and write copy
388F000
stack
page read and write
EFA000
unkown
page execute and write copy
464000
unkown
page execute and read and write
366E000
stack
page read and write
3F1F000
stack
page read and write
2D8F000
stack
page read and write
C1D000
heap
page read and write
C30000
heap
page read and write
A04000
heap
page read and write
C74000
heap
page read and write
12A8000
heap
page read and write
4561000
heap
page read and write
3F1E000
stack
page read and write
BC2000
heap
page read and write
49E0000
trusted library allocation
page read and write
2C70000
direct allocation
page read and write
11DF000
stack
page read and write
4561000
heap
page read and write
48E1000
heap
page read and write
C74000
heap
page read and write
325F000
stack
page read and write
42DF000
stack
page read and write
C49000
unkown
page write copy
4A41000
direct allocation
page read and write
2B3C000
stack
page read and write
315E000
stack
page read and write
4F20000
direct allocation
page execute and read and write
405E000
stack
page read and write
4A11000
heap
page read and write
4561000
heap
page read and write
C2C000
heap
page read and write
A04000
heap
page read and write
BE0000
unkown
page readonly
365E000
stack
page read and write
A04000
heap
page read and write
A04000
heap
page read and write
BDC000
heap
page read and write
C49000
unkown
page read and write
48E6000
heap
page read and write
39CF000
stack
page read and write
48E1000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
4D60000
direct allocation
page read and write
A04000
heap
page read and write
4F31000
heap
page read and write
160000
unkown
page readonly
BE0000
unkown
page read and write
3C9E000
stack
page read and write
4B10000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
6920000
heap
page read and write
5060000
direct allocation
page execute and read and write
48E1000
heap
page read and write
A04000
heap
page read and write
16E0000
direct allocation
page read and write
329F000
stack
page read and write
C74000
heap
page read and write
4D34000
heap
page read and write
B3E000
stack
page read and write
C4B000
unkown
page execute and read and write
452F000
stack
page read and write
A04000
heap
page read and write
1190000
heap
page read and write
2C70000
direct allocation
page read and write
48E1000
heap
page read and write
E8E000
stack
page read and write
5411000
direct allocation
page read and write
C2C000
heap
page read and write
48EF000
stack
page read and write
C74000
heap
page read and write
A04000
heap
page read and write
16F0000
heap
page read and write
83C000
stack
page read and write
429F000
stack
page read and write
4561000
heap
page read and write
A04000
heap
page read and write
4561000
heap
page read and write
A04000
heap
page read and write
456E000
stack
page read and write
5540000
direct allocation
page execute and read and write
603F000
stack
page read and write
4561000
heap
page read and write
C43000
heap
page read and write
C74000
heap
page read and write
4561000
heap
page read and write
7D4000
heap
page read and write
A04000
heap
page read and write
2B1F000
stack
page read and write
C1D000
heap
page read and write
EFA000
unkown
page execute and write copy
3C9E000
stack
page read and write
3F5E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
509B000
stack
page read and write
5040000
direct allocation
page execute and read and write
50D0000
direct allocation
page execute and read and write
2C70000
direct allocation
page read and write
419F000
stack
page read and write
3B5E000
stack
page read and write
1654000
heap
page read and write
42CE000
stack
page read and write
4561000
heap
page read and write
468E000
stack
page read and write
48E1000
heap
page read and write
A04000
heap
page read and write
EEB000
unkown
page execute and read and write
4561000
heap
page read and write
4561000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
112C000
stack
page read and write
2BCF000
stack
page read and write
C49000
unkown
page write copy
47B000
unkown
page execute and write copy
C74000
heap
page read and write
BB1000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
EFA000
unkown
page execute and read and write
379F000
stack
page read and write
48E1000
heap
page read and write
16E0000
direct allocation
page read and write
2D9F000
stack
page read and write
C74000
heap
page read and write
C2C000
heap
page read and write
BA7000
heap
page read and write
B40000
direct allocation
page read and write
BE6000
heap
page read and write
7E0000
heap
page read and write
5080000
direct allocation
page execute and read and write
1097000
unkown
page execute and read and write
48E1000
heap
page read and write
B40000
direct allocation
page read and write
47DE000
stack
page read and write
46AE000
stack
page read and write
3D9F000
stack
page read and write
405F000
stack
page read and write
4F31000
heap
page read and write
1210000
direct allocation
page read and write
2C80000
heap
page read and write
2E8F000
stack
page read and write
C74000
heap
page read and write
4561000
heap
page read and write
48E1000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
2740000
direct allocation
page execute and read and write
4561000
heap
page read and write
C30000
heap
page read and write
53B0000
direct allocation
page read and write
C42000
heap
page read and write
C74000
heap
page read and write
4D20000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
61BE000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
A04000
heap
page read and write
48E1000
heap
page read and write
2FDF000
stack
page read and write
B60000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
BE0000
unkown
page read and write
5030000
direct allocation
page execute and read and write
C74000
heap
page read and write
48E1000
heap
page read and write
3A5E000
stack
page read and write
3C5F000
stack
page read and write
C74000
heap
page read and write
A04000
heap
page read and write
EB1000
unkown
page execute and read and write
5030000
direct allocation
page execute and read and write
B40000
direct allocation
page read and write
4F10000
direct allocation
page execute and read and write
3DDF000
stack
page read and write
4D60000
direct allocation
page read and write
5570000
direct allocation
page execute and read and write
1654000
heap
page read and write
2ACE000
stack
page read and write
3F2E000
stack
page read and write
4561000
heap
page read and write
3F0E000
stack
page read and write
6910000
heap
page read and write
C60000
direct allocation
page read and write
364E000
stack
page read and write
B40000
direct allocation
page read and write
47AF000
stack
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
127E000
heap
page read and write
7F2E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
1654000
heap
page read and write
4B40000
direct allocation
page execute and read and write
4560000
heap
page read and write
C42000
heap
page read and write
3C6F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
55CF000
stack
page read and write
2AFE000
stack
page read and write
33EF000
stack
page read and write
48E1000
heap
page read and write
4CEE000
stack
page read and write
4561000
heap
page read and write
375F000
stack
page read and write
531F000
stack
page read and write
2C1E000
stack
page read and write
48E1000
heap
page read and write
C2B000
heap
page read and write
4F40000
direct allocation
page execute and read and write
7D4000
heap
page read and write
DCE000
unkown
page execute and read and write
351E000
stack
page read and write
4561000
heap
page read and write
C74000
heap
page read and write
2C70000
direct allocation
page read and write
4EF0000
direct allocation
page execute and read and write
318F000
stack
page read and write
4561000
heap
page read and write
C74000
heap
page read and write
352E000
stack
page read and write
378E000
stack
page read and write
48E1000
heap
page read and write
4561000
heap
page read and write
3C8E000
stack
page read and write
C4B000
unkown
page execute and read and write
4561000
heap
page read and write
48E1000
heap
page read and write
1CB000
unkown
page execute and read and write
4B6F000
stack
page read and write
C42000
heap
page read and write
4B40000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
4EFC000
stack
page read and write
7D4000
heap
page read and write
C74000
heap
page read and write
490E000
stack
page read and write
355E000
stack
page read and write
2BD7000
heap
page read and write
1654000
heap
page read and write
161000
unkown
page execute and write copy
55B0000
direct allocation
page execute and read and write
48E1000
heap
page read and write
341E000
stack
page read and write
2EDF000
stack
page read and write
4561000
heap
page read and write
2CDF000
stack
page read and write
72B000
stack
page read and write
5540000
direct allocation
page execute and read and write
2DDE000
stack
page read and write
7D4000
heap
page read and write
441E000
stack
page read and write
33CE000
stack
page read and write
4561000
heap
page read and write
B6A000
heap
page read and write
48E1000
heap
page read and write
1200000
heap
page read and write
48E1000
heap
page read and write
C74000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
1210000
direct allocation
page read and write
1210000
direct allocation
page read and write
A04000
heap
page read and write
2BD0000
heap
page read and write
5050000
direct allocation
page execute and read and write
4EEE000
stack
page read and write
C29000
heap
page read and write
A04000
heap
page read and write
374F000
stack
page read and write
EFA000
unkown
page execute and read and write
C42000
unkown
page execute and read and write
B87000
heap
page read and write
7D4000
heap
page read and write
4561000
heap
page read and write
3DDE000
stack
page read and write
4561000
heap
page read and write
5030000
direct allocation
page execute and read and write
43CF000
stack
page read and write
419E000
stack
page read and write
C2E000
heap
page read and write
4561000
heap
page read and write
48E1000
heap
page read and write
C74000
heap
page read and write
16DE000
stack
page read and write
11E0000
heap
page read and write
BDC000
heap
page read and write
55D0000
direct allocation
page execute and read and write
455F000
stack
page read and write
A04000
heap
page read and write
1210000
direct allocation
page read and write
7F0000
heap
page read and write
1654000
heap
page read and write
48E1000
heap
page read and write
4561000
heap
page read and write
4CAF000
stack
page read and write
4561000
heap
page read and write
EFB000
unkown
page execute and write copy
4561000
heap
page read and write
2ECE000
stack
page read and write
365F000
stack
page read and write
5020000
direct allocation
page execute and read and write
A00000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
4B40000
direct allocation
page execute and read and write
BC2000
heap
page read and write
4561000
heap
page read and write
A04000
heap
page read and write
BE0000
unkown
page read and write
B89000
heap
page read and write
EFB000
unkown
page execute and write copy
BAD000
heap
page read and write
351F000
stack
page read and write
3B6E000
stack
page read and write
4A10000
heap
page read and write
48E1000
heap
page read and write
5070000
direct allocation
page execute and read and write
4B70000
direct allocation
page execute and read and write
5540000
direct allocation
page execute and read and write
4561000
heap
page read and write
6911000
heap
page read and write
289F000
stack
page read and write
585C000
stack
page read and write
48E1000
heap
page read and write
43DF000
stack
page read and write
33DF000
stack
page read and write
328E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
A04000
heap
page read and write
790000
heap
page read and write
431000
unkown
page execute and read and write
48E1000
heap
page read and write
50DE000
stack
page read and write
EE4000
unkown
page execute and read and write
11FE000
stack
page read and write
409E000
stack
page read and write
4561000
heap
page read and write
1210000
direct allocation
page read and write
4BD0000
direct allocation
page execute and read and write
C04000
heap
page read and write
338F000
stack
page read and write
4561000
heap
page read and write
48E0000
heap
page read and write
A04000
heap
page read and write
48E1000
heap
page read and write
2C70000
direct allocation
page read and write
48E1000
heap
page read and write
5580000
direct allocation
page execute and read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
C74000
heap
page read and write
7D4000
heap
page read and write
C42000
unkown
page execute and read and write
55E0000
direct allocation
page execute and read and write
A04000
heap
page read and write
A04000
heap
page read and write
DCE000
unkown
page execute and read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
C49000
unkown
page read and write
4ED0000
direct allocation
page execute and read and write
4561000
heap
page read and write
48E1000
heap
page read and write
4BAE000
stack
page read and write
4561000
heap
page read and write
C30000
heap
page read and write
401F000
stack
page read and write
300E000
stack
page read and write
C4B000
unkown
page execute and read and write
C74000
heap
page read and write
4561000
heap
page read and write
3A0E000
stack
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
301F000
stack
page read and write
1C2000
unkown
page execute and read and write
BE0000
unkown
page readonly
C74000
heap
page read and write
38CE000
stack
page read and write
7A0000
heap
page read and write
7D4000
heap
page read and write
48E1000
heap
page read and write
41AE000
stack
page read and write
1099000
unkown
page execute and write copy
A04000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
3CAE000
stack
page read and write
3B4E000
stack
page read and write
4561000
heap
page read and write
31CE000
stack
page read and write
5030000
direct allocation
page execute and read and write
2A1E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
A04000
heap
page read and write
10DE000
stack
page read and write
4561000
heap
page read and write
617F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
3DAF000
stack
page read and write
431E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
5560000
direct allocation
page execute and read and write
4B20000
direct allocation
page execute and read and write
A04000
heap
page read and write
C74000
heap
page read and write
4561000
heap
page read and write
571D000
stack
page read and write
5510000
direct allocation
page execute and read and write
C74000
heap
page read and write
361F000
stack
page read and write
301E000
stack
page read and write
EEB000
unkown
page execute and read and write
1C9000
unkown
page write copy
1654000
heap
page read and write
4561000
heap
page read and write
4FEF000
stack
page read and write
4561000
heap
page read and write
2EDF000
stack
page read and write
16E0000
direct allocation
page read and write
B6E000
heap
page read and write
C74000
heap
page read and write
7D4000
heap
page read and write
980000
heap
page read and write
48E1000
heap
page read and write
C74000
heap
page read and write
48E1000
heap
page read and write
B40000
direct allocation
page read and write
53FE000
stack
page read and write
48E1000
heap
page read and write
75C000
stack
page read and write
466E000
stack
page read and write
A04000
heap
page read and write
A04000
heap
page read and write
34CF000
stack
page read and write
3B2F000
stack
page read and write
3DCE000
stack
page read and write
492E000
stack
page read and write
2C5E000
stack
page read and write
122B000
heap
page read and write
A04000
heap
page read and write
4F50000
direct allocation
page execute and read and write
C49000
unkown
page write copy
4561000
heap
page read and write
2B5E000
stack
page read and write
3A1E000
stack
page read and write
48E1000
heap
page read and write
5DB6000
heap
page read and write
4561000
heap
page read and write
A04000
heap
page read and write
4561000
heap
page read and write
EB1000
unkown
page execute and read and write
455E000
stack
page read and write
3B1F000
stack
page read and write
4B60000
direct allocation
page execute and read and write
A04000
heap
page read and write
E4F000
stack
page read and write
16E0000
direct allocation
page read and write
2C70000
direct allocation
page read and write
C74000
heap
page read and write
4561000
heap
page read and write
5DB0000
heap
page read and write
C60000
direct allocation
page read and write
53B0000
direct allocation
page read and write
11EA000
heap
page read and write
42EE000
stack
page read and write
4561000
heap
page read and write
339F000
stack
page read and write
48E1000
heap
page read and write
404E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
4561000
heap
page read and write
4E2E000
stack
page read and write
7EEC000
stack
page read and write
5DB5000
heap
page read and write
3B9D000
stack
page read and write
4561000
heap
page read and write
EFB000
unkown
page execute and write copy
48E1000
heap
page read and write
369E000
stack
page read and write
305E000
stack
page read and write
3DEE000
stack
page read and write
48E1000
heap
page read and write
42DE000
stack
page read and write
A04000
heap
page read and write
C74000
heap
page read and write
B40000
direct allocation
page read and write
2C70000
direct allocation
page read and write
2750000
heap
page read and write
16E0000
direct allocation
page read and write
1654000
heap
page read and write
C2C000
heap
page read and write
48E1000
heap
page read and write
16E0000
direct allocation
page read and write
324F000
stack
page read and write
C1D000
heap
page read and write
406E000
stack
page read and write
C74000
heap
page read and write
48E1000
heap
page read and write
C1D000
heap
page read and write
5540000
direct allocation
page execute and read and write
BDC000
heap
page read and write
350E000
stack
page read and write
48E1000
heap
page read and write
575D000
stack
page read and write
478F000
stack
page read and write
5540000
direct allocation
page execute and read and write
A04000
heap
page read and write
1654000
heap
page read and write
2C60000
heap
page read and write
5540000
direct allocation
page execute and read and write
315F000
stack
page read and write
48E1000
heap
page read and write
279E000
stack
page read and write
C30000
heap
page read and write
607E000
stack
page read and write
34E000
unkown
page execute and read and write
4561000
heap
page read and write
4571000
heap
page read and write
1268000
heap
page read and write
39EF000
stack
page read and write
445E000
stack
page read and write
A04000
heap
page read and write
16E0000
direct allocation
page read and write
4561000
heap
page read and write
7DEB000
stack
page read and write
4F31000
heap
page read and write
3C4F000
stack
page read and write
4F01000
direct allocation
page read and write
414F000
stack
page read and write
4B1F000
stack
page read and write
3B5F000
stack
page read and write
32EF000
stack
page read and write
B40000
direct allocation
page read and write
4EA0000
direct allocation
page read and write
C74000
heap
page read and write
EE4000
unkown
page execute and read and write
4561000
heap
page read and write
4561000
heap
page read and write
402F000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
C74000
heap
page read and write
48E1000
heap
page read and write
AFA000
stack
page read and write
418E000
stack
page read and write
54CE000
stack
page read and write
C74000
heap
page read and write
2C70000
direct allocation
page read and write
A04000
heap
page read and write
C74000
heap
page read and write
4EA0000
direct allocation
page read and write
C30000
heap
page read and write
1097000
unkown
page execute and read and write
47EE000
stack
page read and write
4561000
heap
page read and write
4F70000
direct allocation
page execute and read and write
B40000
direct allocation
page read and write
C60000
direct allocation
page read and write
C42000
unkown
page execute and read and write
691E000
heap
page read and write
3D8F000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
A04000
heap
page read and write
B40000
direct allocation
page read and write
617000
unkown
page execute and read and write
39DF000
stack
page read and write
48E1000
heap
page read and write
2C70000
direct allocation
page read and write
43EF000
stack
page read and write
3B0F000
stack
page read and write
2BBE000
stack
page read and write
4B90000
direct allocation
page execute and read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
5590000
direct allocation
page execute and read and write
48E1000
heap
page read and write
EE4000
unkown
page execute and read and write
EB1000
unkown
page execute and read and write
46B000
unkown
page execute and read and write
A04000
heap
page read and write
48E1000
heap
page read and write
49C0000
heap
page read and write
3EDF000
stack
page read and write
3ECF000
stack
page read and write
2C70000
direct allocation
page read and write
4900000
heap
page read and write
4B30000
direct allocation
page execute and read and write
There are 869 hidden memdumps, click here to show them.