IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpD#
unknown
http://185.215.113.16/
unknown
http://185.215.113.16/Jo89Ku7d/index.phpL
unknown
http://185.215.113.16/Jo89Ku7d/index.phpK
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded3
unknown
http://185.215.113.16/Jo89Ku7d/index.phpg#
unknown
http://185.215.113.16/Jo89Ku7d/index.phph
unknown
http://185.215.113.16/Jo89Ku7d/index.phpdedG
unknown
http://185.215.113.16/Jo89Ku7d/index.phpf
unknown
http://185.215.113.16/Jo89Ku7d/index.phpD
unknown
http://185.215.113.16/Jo89Ku7d/index.phpy1mb3JtLXVybGVuY29kZWQ=
unknown
http://185.215.113.16/Jo89Ku7d/index.phpZ
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded4
unknown
http://185.215.113.16/Jo89Ku7d/index.php8
unknown
http://185.215.113.16/Jo89Ku7d/index.phpX
unknown
http://185.215.113.16/X(6I
unknown
http://185.215.113.16/Jo89Ku7d/index.phpt
unknown
http://185.215.113.16/Jo89Ku7d/index.php1
unknown
http://185.215.113.16/Jo89Ku7d/index.php0
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
There are 12 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
731000
unkown
page execute and read and write
malicious
D71000
unkown
page execute and read and write
malicious
4C80000
direct allocation
page read and write
malicious
4F40000
direct allocation
page read and write
malicious
4A00000
direct allocation
page read and write
malicious
731000
unkown
page execute and read and write
malicious
4AB1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
124F000
unkown
page execute and write copy
342E000
stack
page read and write
286F000
stack
page read and write
B64000
heap
page read and write
D80000
direct allocation
page read and write
6140000
heap
page read and write
442F000
stack
page read and write
41EE000
stack
page read and write
36EE000
stack
page read and write
D5E000
stack
page read and write
3CEE000
stack
page read and write
47F1000
heap
page read and write
3F2F000
stack
page read and write
47F1000
heap
page read and write
BC0000
heap
page read and write
49AE000
stack
page read and write
52AE000
stack
page read and write
BA6000
heap
page read and write
AEE000
heap
page read and write
47F1000
heap
page read and write
12D6000
heap
page read and write
A47000
unkown
page execute and read and write
818C000
stack
page read and write
B84000
heap
page read and write
10A4000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
5100000
direct allocation
page execute and read and write
2DEF000
stack
page read and write
432E000
stack
page read and write
2D80000
direct allocation
page read and write
10A4000
heap
page read and write
C0F000
unkown
page execute and write copy
4AB1000
heap
page read and write
47F1000
heap
page read and write
352E000
stack
page read and write
12D9000
heap
page read and write
3AAE000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
47F1000
heap
page read and write
5C0000
heap
page read and write
D80000
direct allocation
page read and write
4E50000
direct allocation
page execute and read and write
3A2F000
stack
page read and write
47F1000
heap
page read and write
AD0000
direct allocation
page read and write
932000
unkown
page execute and read and write
406F000
stack
page read and write
4AD0000
heap
page read and write
47F1000
heap
page read and write
4AB0000
heap
page read and write
4AB1000
heap
page read and write
2D70000
heap
page read and write
422E000
stack
page read and write
4DB000
stack
page read and write
47F1000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
6146000
heap
page read and write
730000
unkown
page read and write
648E000
stack
page read and write
5150000
direct allocation
page execute and read and write
72E000
stack
page read and write
79B000
unkown
page execute and read and write
47F1000
heap
page read and write
1250000
heap
page read and write
47F1000
heap
page read and write
12C9000
heap
page read and write
4571000
heap
page read and write
C0D000
unkown
page execute and write copy
D80000
direct allocation
page read and write
47F1000
heap
page read and write
31AE000
stack
page read and write
562F000
stack
page read and write
A47000
unkown
page execute and read and write
53AF000
stack
page read and write
47F1000
heap
page read and write
2D80000
direct allocation
page read and write
843C000
stack
page read and write
42EF000
stack
page read and write
346E000
stack
page read and write
47F1000
heap
page read and write
4C44000
heap
page read and write
A51000
unkown
page execute and read and write
47F1000
heap
page read and write
4AC0000
heap
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
507F000
stack
page read and write
B96000
heap
page read and write
38EF000
stack
page read and write
44AE000
stack
page read and write
2D2E000
stack
page read and write
47F1000
heap
page read and write
46AF000
stack
page read and write
47F1000
heap
page read and write
4B80000
direct allocation
page execute and read and write
40ED000
stack
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
C0E000
unkown
page execute and read and write
4AB1000
heap
page read and write
853C000
stack
page read and write
932000
unkown
page execute and read and write
AD0000
direct allocation
page read and write
31EE000
stack
page read and write
D9E000
heap
page read and write
2D6E000
stack
page read and write
496F000
stack
page read and write
47F1000
heap
page read and write
8E5000
heap
page read and write
10A4000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
C1E000
stack
page read and write
10A4000
heap
page read and write
2DAF000
stack
page read and write
10A4000
heap
page read and write
33EF000
stack
page read and write
109F000
unkown
page execute and read and write
2870000
heap
page read and write
5A2E000
stack
page read and write
4801000
heap
page read and write
4FAB000
stack
page read and write
432E000
stack
page read and write
10A4000
heap
page read and write
109F000
unkown
page execute and write copy
4AB1000
heap
page read and write
D80000
direct allocation
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
396E000
stack
page read and write
32EE000
stack
page read and write
47F0000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
37EE000
stack
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
41EE000
stack
page read and write
C0D000
unkown
page execute and write copy
47F1000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
33EF000
stack
page read and write
2B7E000
stack
page read and write
A51000
unkown
page execute and read and write
3F6E000
stack
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
50C0000
direct allocation
page execute and read and write
6E0000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
50C0000
direct allocation
page execute and read and write
B62000
heap
page read and write
5090000
direct allocation
page execute and read and write
4E40000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
B84000
heap
page read and write
2EEF000
stack
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
47F1000
heap
page read and write
10A4000
heap
page read and write
4E10000
direct allocation
page execute and read and write
2B6E000
stack
page read and write
47F1000
heap
page read and write
5110000
direct allocation
page execute and read and write
10A4000
heap
page read and write
D80000
direct allocation
page read and write
AD0000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
60CE000
stack
page read and write
3A6F000
stack
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
2D80000
direct allocation
page read and write
10A4000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
366F000
stack
page read and write
2A2E000
stack
page read and write
3F6F000
stack
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
D70000
unkown
page read and write
D70000
heap
page read and write
BB3000
heap
page read and write
352F000
stack
page read and write
B5F000
heap
page read and write
552D000
stack
page read and write
3F2E000
stack
page read and write
47F1000
heap
page read and write
342E000
stack
page read and write
47F1000
heap
page read and write
AD0000
direct allocation
page read and write
30AF000
stack
page read and write
AD0000
direct allocation
page read and write
4C70000
direct allocation
page read and write
10A4000
heap
page read and write
4571000
heap
page read and write
4B80000
direct allocation
page execute and read and write
D5E000
stack
page read and write
10A4000
heap
page read and write
3E2F000
stack
page read and write
2FAF000
stack
page read and write
B96000
heap
page read and write
4570000
heap
page read and write
306E000
stack
page read and write
5120000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
47F1000
heap
page read and write
792000
unkown
page execute and read and write
456F000
stack
page read and write
356F000
stack
page read and write
28A0000
heap
page read and write
366F000
stack
page read and write
610E000
stack
page read and write
45AE000
stack
page read and write
D71000
unkown
page execute and write copy
332E000
stack
page read and write
49F0000
direct allocation
page read and write
D80000
direct allocation
page read and write
47F1000
heap
page read and write
BB3000
heap
page read and write
306E000
stack
page read and write
4A3E000
stack
page read and write
4AB1000
heap
page read and write
46EE000
stack
page read and write
2EAF000
stack
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
1080000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
4B80000
direct allocation
page execute and read and write
AD0000
direct allocation
page read and write
3A2F000
stack
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
AD0000
direct allocation
page read and write
5DA000
stack
page read and write
47F1000
heap
page read and write
4571000
heap
page read and write
432F000
stack
page read and write
356E000
stack
page read and write
47F1000
heap
page read and write
2D80000
direct allocation
page read and write
4AB1000
heap
page read and write
1295000
heap
page read and write
47F1000
heap
page read and write
2D80000
direct allocation
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
57ED000
stack
page read and write
10A4000
heap
page read and write
DD2000
unkown
page execute and read and write
50A0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
2D80000
direct allocation
page read and write
D80000
direct allocation
page read and write
BB3000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
D80000
direct allocation
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
6BB1000
heap
page read and write
4AB1000
heap
page read and write
35AE000
stack
page read and write
BAA000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
3BAE000
stack
page read and write
B9F000
heap
page read and write
47F1000
heap
page read and write
31AE000
stack
page read and write
47F1000
heap
page read and write
49F0000
direct allocation
page read and write
29EF000
stack
page read and write
4F30000
direct allocation
page read and write
129A000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
2AFF000
stack
page read and write
F8F000
stack
page read and write
4B60000
direct allocation
page execute and read and write
2BBE000
stack
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
AC0000
heap
page read and write
82CF000
stack
page read and write
58EC000
stack
page read and write
730000
unkown
page readonly
3BEE000
stack
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
AD0000
direct allocation
page read and write
2F2E000
stack
page read and write
4802000
heap
page read and write
D1F000
stack
page read and write
47F1000
heap
page read and write
569E000
stack
page read and write
446E000
stack
page read and write
2D80000
direct allocation
page read and write
4C70000
direct allocation
page read and write
47F1000
heap
page read and write
456F000
stack
page read and write
4A61000
direct allocation
page read and write
731000
unkown
page execute and write copy
808B000
stack
page read and write
C0E000
unkown
page execute and read and write
32EF000
stack
page read and write
850000
heap
page read and write
2D80000
direct allocation
page read and write
6BC0000
heap
page read and write
47F1000
heap
page read and write
392F000
stack
page read and write
482F000
stack
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
2EEF000
stack
page read and write
B96000
heap
page read and write
526B000
stack
page read and write
6145000
heap
page read and write
D1E000
stack
page read and write
D80000
direct allocation
page read and write
3B6F000
stack
page read and write
47F1000
heap
page read and write
4EF0000
heap
page read and write
4AB1000
heap
page read and write
D70000
unkown
page readonly
442F000
stack
page read and write
10A0000
unkown
page execute and write copy
4AB1000
heap
page read and write
37EF000
stack
page read and write
4AB1000
heap
page read and write
382E000
stack
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
AD0000
direct allocation
page read and write
342F000
stack
page read and write
47F1000
heap
page read and write
A1B000
unkown
page execute and read and write
AD0000
direct allocation
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
47F1000
heap
page read and write
AD0000
direct allocation
page read and write
316F000
stack
page read and write
5140000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
32EE000
stack
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
4C70000
direct allocation
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
8BE000
stack
page read and write
4AB1000
heap
page read and write
40AF000
stack
page read and write
47F1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
37AF000
stack
page read and write
799000
unkown
page write copy
B84000
heap
page read and write
47F1000
heap
page read and write
731000
unkown
page execute and write copy
8E0000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
4AB1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
7F50000
heap
page read and write
BA3000
heap
page read and write
28A7000
heap
page read and write
4670000
trusted library allocation
page read and write
10A4000
heap
page read and write
32AF000
stack
page read and write
A60000
unkown
page execute and write copy
4E30000
direct allocation
page execute and read and write
3F6E000
stack
page read and write
392E000
stack
page read and write
10A4000
heap
page read and write
4AB1000
heap
page read and write
2DAD000
heap
page read and write
50C0000
direct allocation
page execute and read and write
392E000
stack
page read and write
D80000
direct allocation
page read and write
40AE000
stack
page read and write
4AB1000
heap
page read and write
4E09000
stack
page read and write
BC0000
heap
page read and write
B84000
heap
page read and write
2B3B000
stack
page read and write
B3F000
heap
page read and write
4571000
heap
page read and write
47F1000
heap
page read and write
10A4000
heap
page read and write
2BE0000
heap
page read and write
47F1000
heap
page read and write
472E000
stack
page read and write
54EF000
stack
page read and write
4AB1000
heap
page read and write
2D80000
direct allocation
page read and write
2CAE000
stack
page read and write
3E2E000
stack
page read and write
316F000
stack
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
3D2E000
stack
page read and write
3BAE000
stack
page read and write
406F000
stack
page read and write
B26000
heap
page read and write
AD0000
direct allocation
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
10A0000
heap
page read and write
37AF000
stack
page read and write
3BAF000
stack
page read and write
436E000
stack
page read and write
1010000
heap
page read and write
6BBE000
heap
page read and write
53EE000
stack
page read and write
47F1000
heap
page read and write
1091000
unkown
page execute and read and write
47F1000
heap
page read and write
10A4000
heap
page read and write
6E5000
heap
page read and write
10A4000
heap
page read and write
47F1000
heap
page read and write
BC2000
heap
page read and write
10A4000
heap
page read and write
4AB1000
heap
page read and write
799000
unkown
page read and write
55D000
stack
page read and write
4AB1000
heap
page read and write
4B3F000
stack
page read and write
124D000
unkown
page execute and write copy
4AB1000
heap
page read and write
10A4000
heap
page read and write
4E00000
direct allocation
page execute and read and write
10A4000
heap
page read and write
D9A000
heap
page read and write
C0C000
unkown
page execute and read and write
47F1000
heap
page read and write
3A6E000
stack
page read and write
47F1000
heap
page read and write
4571000
heap
page read and write
2D80000
direct allocation
page read and write
644F000
stack
page read and write
47F1000
heap
page read and write
3E2E000
stack
page read and write
41EE000
stack
page read and write
45C000
stack
page read and write
50B0000
direct allocation
page execute and read and write
47F1000
heap
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
799000
unkown
page read and write
4AB1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
10A4000
heap
page read and write
4E70000
direct allocation
page execute and read and write
A60000
unkown
page execute and write copy
2BE7000
heap
page read and write
2BC0000
heap
page read and write
2B2F000
stack
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
799000
unkown
page write copy
3CAF000
stack
page read and write
4AB1000
heap
page read and write
B9B000
heap
page read and write
12AF000
heap
page read and write
BA7000
heap
page read and write
47F1000
heap
page read and write
C0C000
unkown
page execute and read and write
4B80000
direct allocation
page execute and read and write
D90000
heap
page read and write
3CEE000
stack
page read and write
4FA1000
direct allocation
page read and write
2D80000
direct allocation
page read and write
47F1000
heap
page read and write
276E000
stack
page read and write
4AB1000
heap
page read and write
A5F000
unkown
page execute and read and write
C0F000
unkown
page execute and write copy
47F1000
heap
page read and write
2DAB000
heap
page read and write
4CE1000
direct allocation
page read and write
BA6000
heap
page read and write
634F000
stack
page read and write
4B50000
direct allocation
page execute and read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
D80000
direct allocation
page read and write
47F1000
heap
page read and write
50C0000
direct allocation
page execute and read and write
B3F000
heap
page read and write
10A4000
heap
page read and write
BA0000
heap
page read and write
81CE000
stack
page read and write
3CEF000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
6BC0000
heap
page read and write
47F1000
heap
page read and write
124E000
unkown
page execute and read and write
3A6E000
stack
page read and write
DD9000
unkown
page write copy
356E000
stack
page read and write
4AB1000
heap
page read and write
120E000
stack
page read and write
5A8D000
stack
page read and write
BA8000
heap
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
B62000
heap
page read and write
4CBE000
stack
page read and write
47F1000
heap
page read and write
40AE000
stack
page read and write
8560000
heap
page read and write
124C000
unkown
page execute and read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
49F0000
direct allocation
page read and write
41AF000
stack
page read and write
38EF000
stack
page read and write
41AF000
stack
page read and write
4AB1000
heap
page read and write
5130000
direct allocation
page execute and read and write
7F53000
heap
page read and write
B5D000
heap
page read and write
4E80000
direct allocation
page execute and read and write
50C0000
direct allocation
page execute and read and write
5B8E000
stack
page read and write
4DBF000
stack
page read and write
3FAE000
stack
page read and write
A5F000
unkown
page execute and write copy
36AE000
stack
page read and write
D80000
direct allocation
page read and write
4B90000
direct allocation
page execute and read and write
3B6F000
stack
page read and write
4C40000
heap
page read and write
32AF000
stack
page read and write
4AB1000
heap
page read and write
AD0000
direct allocation
page read and write
3CAF000
stack
page read and write
B97000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
47F1000
heap
page read and write
4F7C000
stack
page read and write
658F000
stack
page read and write
579F000
stack
page read and write
2CEF000
stack
page read and write
47F1000
heap
page read and write
302F000
stack
page read and write
840000
heap
page read and write
3DEF000
stack
page read and write
3DEF000
stack
page read and write
125B000
heap
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
47F1000
heap
page read and write
10A4000
heap
page read and write
4AB1000
heap
page read and write
2D80000
direct allocation
page read and write
47F1000
heap
page read and write
2DA0000
heap
page read and write
4AB5000
heap
page read and write
10A4000
heap
page read and write
4AB1000
heap
page read and write
AD0000
direct allocation
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
F72000
unkown
page execute and read and write
4AB1000
heap
page read and write
45EE000
stack
page read and write
6BB0000
heap
page read and write
37EE000
stack
page read and write
2DA7000
heap
page read and write
D80000
direct allocation
page read and write
B33000
heap
page read and write
446F000
stack
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
6A0000
heap
page read and write
4BB0000
trusted library allocation
page read and write
31AF000
stack
page read and write
47F1000
heap
page read and write
2DEE000
stack
page read and write
A1B000
unkown
page execute and read and write
B96000
heap
page read and write
446E000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
6590000
heap
page read and write
BA6000
heap
page read and write
4AAF000
stack
page read and write
124C000
stack
page read and write
BAA000
heap
page read and write
4B80000
direct allocation
page execute and read and write
10A4000
heap
page read and write
A5F000
unkown
page execute and read and write
48F0000
trusted library allocation
page read and write
3E6E000
stack
page read and write
4C20000
direct allocation
page execute and read and write
50E0000
direct allocation
page execute and read and write
12DB000
heap
page read and write
47F1000
heap
page read and write
2C6F000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
42EF000
stack
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
8540000
heap
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
2F2E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
B63000
heap
page read and write
10A4000
heap
page read and write
50D0000
direct allocation
page execute and read and write
47F1000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
10A4000
heap
page read and write
A5F000
unkown
page execute and write copy
486E000
stack
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4B70000
direct allocation
page execute and read and write
CAC000
stack
page read and write
1087000
unkown
page execute and read and write
47F1000
heap
page read and write
AEA000
heap
page read and write
4AB1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
730000
unkown
page readonly
36AE000
stack
page read and write
D80000
direct allocation
page read and write
ABF000
stack
page read and write
28EE000
stack
page read and write
B6C000
heap
page read and write
4F30000
direct allocation
page read and write
47F1000
heap
page read and write
730000
unkown
page read and write
592D000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
4F30000
direct allocation
page read and write
4AB1000
heap
page read and write
45AF000
stack
page read and write
4571000
heap
page read and write
10A4000
heap
page read and write
79B000
unkown
page execute and read and write
47F1000
heap
page read and write
4E20000
direct allocation
page execute and read and write
DD9000
unkown
page read and write
46EF000
stack
page read and write
5160000
direct allocation
page execute and read and write
DDB000
unkown
page execute and read and write
B96000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
47F1000
heap
page read and write
4AB1000
heap
page read and write
10A4000
heap
page read and write
2D80000
direct allocation
page read and write
302F000
stack
page read and write
105B000
unkown
page execute and read and write
50CC000
stack
page read and write
47EF000
stack
page read and write
792000
unkown
page execute and read and write
DAD000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
AE0000
heap
page read and write
36AF000
stack
page read and write
2D80000
direct allocation
page read and write
There are 703 hidden memdumps, click here to show them.