IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/
unknown
http://185.215.113.16/Jo89Ku7d/index.php-k
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedb
unknown
http://185.215.113.16/Jo89Ku7d/index.phpoM
unknown
http://185.215.113.16/Jo89Ku7d/index.php)
unknown
http://185.215.113.16/Jo89Ku7d/index.phpi
unknown
http://185.215.113.16/Jo89Ku7d/index.php2l
unknown
http://185.215.113.16/Jo89Ku7d/index.phpE
unknown
http://185.215.113.16/Jo89Ku7d/index.phpYlu
unknown
http://185.215.113.16/Jo89Ku7d/index.php~k
unknown
http://185.215.113.16/Jo89Ku7d/index.phpXkt
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpike
unknown
http://185.215.113.16/Jo89Ku7d/index.php5
unknown
http://185.215.113.16/Jo89Ku7d/index.phpiQ
unknown
http://185.215.113.16/Jo89Ku7d/index.phpu
unknown
http://185.215.113.16/Jo89Ku7d/index.phpnlf
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
171.39.242.20.in-addr.arpa
unknown
86.23.85.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
261000
unkown
page execute and read and write
malicious
261000
unkown
page execute and read and write
malicious
A41000
unkown
page execute and read and write
malicious
51C0000
direct allocation
page read and write
malicious
4A80000
direct allocation
page read and write
malicious
4EB0000
direct allocation
page read and write
malicious
5330000
direct allocation
page read and write
malicious
261000
unkown
page execute and read and write
malicious
16BD000
heap
page read and write
4D10000
direct allocation
page read and write
402E000
stack
page read and write
319E000
stack
page read and write
4E91000
heap
page read and write
31FE000
stack
page read and write
45E1000
heap
page read and write
4C60000
direct allocation
page execute and read and write
A40000
unkown
page readonly
4A5C000
stack
page read and write
326E000
stack
page read and write
72FF000
stack
page read and write
260000
unkown
page read and write
4E91000
heap
page read and write
167D000
heap
page read and write
4E91000
heap
page read and write
4C00000
direct allocation
page execute and read and write
1631000
heap
page read and write
5390000
direct allocation
page execute and read and write
4E91000
heap
page read and write
3110000
direct allocation
page read and write
322F000
stack
page read and write
4FEF000
stack
page read and write
5330000
direct allocation
page execute and read and write
8AAF000
stack
page read and write
72D000
unkown
page execute and read and write
3100000
heap
page read and write
3127000
heap
page read and write
5030000
direct allocation
page execute and read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
4D6E000
stack
page read and write
2D90000
direct allocation
page read and write
393F000
stack
page read and write
56F000
unkown
page execute and read and write
41DE000
stack
page read and write
45E1000
heap
page read and write
14CF000
stack
page read and write
4D10000
direct allocation
page read and write
4E91000
heap
page read and write
AA9000
unkown
page read and write
45E1000
heap
page read and write
C5B000
heap
page read and write
D65000
unkown
page execute and read and write
45E1000
heap
page read and write
5310000
direct allocation
page execute and read and write
D65000
unkown
page execute and write copy
3110000
direct allocation
page read and write
3110000
direct allocation
page read and write
3BBF000
stack
page read and write
C50000
heap
page read and write
4E91000
heap
page read and write
576000
unkown
page execute and read and write
BCD000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
3EEE000
stack
page read and write
6705000
heap
page read and write
3FBE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
5221000
direct allocation
page read and write
AA9000
unkown
page write copy
4E91000
heap
page read and write
45E1000
heap
page read and write
546F000
stack
page read and write
3E7E000
stack
page read and write
47AE000
stack
page read and write
2D90000
direct allocation
page read and write
3BEE000
stack
page read and write
52FF000
stack
page read and write
2FAF000
stack
page read and write
5010000
direct allocation
page execute and read and write
362E000
stack
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
39EE000
stack
page read and write
4E91000
heap
page read and write
FEE000
stack
page read and write
6C7B000
stack
page read and write
586000
unkown
page execute and write copy
35BE000
stack
page read and write
15EE000
heap
page read and write
1691000
heap
page read and write
4E91000
heap
page read and write
13E0000
heap
page read and write
4C00000
direct allocation
page execute and read and write
169B000
heap
page read and write
419F000
stack
page read and write
4E91000
heap
page read and write
45BF000
stack
page read and write
8734000
heap
page read and write
45E1000
heap
page read and write
72F000
unkown
page execute and write copy
4E91000
heap
page read and write
431E000
stack
page read and write
14B0000
heap
page read and write
C40000
direct allocation
page read and write
F0F000
unkown
page execute and write copy
5370000
direct allocation
page execute and read and write
16AD000
heap
page read and write
382E000
stack
page read and write
2CBF000
stack
page read and write
496E000
stack
page read and write
137A000
stack
page read and write
1664000
heap
page read and write
45E1000
heap
page read and write
CDD000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
2D90000
direct allocation
page read and write
4D21000
heap
page read and write
A40000
unkown
page read and write
6C30000
heap
page read and write
3E3F000
stack
page read and write
52D0000
trusted library allocation
page read and write
3F5E000
stack
page read and write
30BB000
stack
page read and write
5090000
direct allocation
page execute and read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
1611000
heap
page read and write
4E91000
heap
page read and write
301F000
stack
page read and write
351F000
stack
page read and write
44BE000
stack
page read and write
3110000
direct allocation
page read and write
17DE000
stack
page read and write
2CFE000
stack
page read and write
3B2E000
stack
page read and write
2D90000
direct allocation
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
71FE000
stack
page read and write
4E91000
heap
page read and write
54B0000
direct allocation
page execute and read and write
BD0000
heap
page read and write
51BE000
stack
page read and write
4E91000
heap
page read and write
1691000
heap
page read and write
4D10000
direct allocation
page read and write
45EE000
stack
page read and write
45E1000
heap
page read and write
53B0000
direct allocation
page execute and read and write
542000
unkown
page execute and read and write
4E6F000
stack
page read and write
47DF000
stack
page read and write
53C0000
direct allocation
page execute and read and write
2E3E000
stack
page read and write
4AAF000
stack
page read and write
4E91000
heap
page read and write
5350000
direct allocation
page execute and read and write
2D90000
direct allocation
page read and write
4A70000
direct allocation
page read and write
BFC000
stack
page read and write
4C00000
direct allocation
page execute and read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
54A0000
direct allocation
page execute and read and write
4E91000
heap
page read and write
4D21000
heap
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
43EE000
stack
page read and write
4D10000
direct allocation
page read and write
4E91000
heap
page read and write
4A11000
heap
page read and write
4E91000
heap
page read and write
4EA0000
direct allocation
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
336F000
stack
page read and write
542000
unkown
page execute and read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
34AF000
stack
page read and write
CAD000
heap
page read and write
45E1000
heap
page read and write
4ABB000
stack
page read and write
CC6000
heap
page read and write
329F000
stack
page read and write
30EF000
stack
page read and write
688E000
stack
page read and write
4D21000
heap
page read and write
450000
unkown
page execute and read and write
35EF000
stack
page read and write
2C9000
unkown
page write copy
5000000
direct allocation
page execute and read and write
5060000
direct allocation
page execute and read and write
EFD000
stack
page read and write
2C2000
unkown
page execute and read and write
3FEF000
stack
page read and write
4CF0000
heap
page read and write
3DAE000
stack
page read and write
530D000
stack
page read and write
4AEE000
stack
page read and write
45F0000
heap
page read and write
3110000
direct allocation
page read and write
B30000
heap
page read and write
FEE000
stack
page read and write
466E000
stack
page read and write
D66000
unkown
page execute and write copy
162A000
heap
page read and write
C40000
direct allocation
page read and write
45E1000
heap
page read and write
40FE000
stack
page read and write
4A20000
trusted library allocation
page read and write
2D90000
direct allocation
page read and write
6ACF000
stack
page read and write
5340000
direct allocation
page execute and read and write
37DE000
stack
page read and write
5670000
heap
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
16A7000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
54B0000
direct allocation
page execute and read and write
45E1000
heap
page read and write
18DF000
stack
page read and write
2DA0000
heap
page read and write
3BFE000
stack
page read and write
4E91000
heap
page read and write
516E000
stack
page read and write
3D6F000
stack
page read and write
5340000
direct allocation
page execute and read and write
54F0000
direct allocation
page execute and read and write
3A1F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
423E000
stack
page read and write
16A7000
heap
page read and write
12FD000
stack
page read and write
8730000
heap
page read and write
5020000
direct allocation
page execute and read and write
2A7E000
stack
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
3C2F000
stack
page read and write
38DF000
stack
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
4A11000
heap
page read and write
40EE000
stack
page read and write
140F000
stack
page read and write
3B9E000
stack
page read and write
45E1000
heap
page read and write
2F7E000
stack
page read and write
1632000
heap
page read and write
45E1000
heap
page read and write
69CE000
stack
page read and write
169A000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
3F1F000
stack
page read and write
4E91000
heap
page read and write
4C70000
direct allocation
page execute and read and write
45E1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4920000
heap
page read and write
3110000
direct allocation
page read and write
412F000
stack
page read and write
4E91000
heap
page read and write
5391000
direct allocation
page read and write
14B5000
heap
page read and write
73A0000
heap
page read and write
167D000
heap
page read and write
C40000
direct allocation
page read and write
45E1000
heap
page read and write
162F000
heap
page read and write
4BEE000
stack
page read and write
426F000
stack
page read and write
51FE000
stack
page read and write
2B7F000
stack
page read and write
386F000
stack
page read and write
4F2E000
stack
page read and write
F0D000
unkown
page execute and read and write
45E1000
heap
page read and write
476F000
stack
page read and write
433F000
stack
page read and write
536B000
stack
page read and write
446F000
stack
page read and write
45E1000
heap
page read and write
260000
unkown
page readonly
36FE000
stack
page read and write
45E1000
heap
page read and write
4D10000
direct allocation
page read and write
BA0000
heap
page read and write
376E000
stack
page read and write
3D2E000
stack
page read and write
502F000
stack
page read and write
3A7F000
stack
page read and write
392F000
stack
page read and write
56F000
unkown
page execute and read and write
542000
unkown
page execute and read and write
54B0000
direct allocation
page execute and read and write
333E000
stack
page read and write
1691000
heap
page read and write
35AE000
stack
page read and write
4E91000
heap
page read and write
50A0000
direct allocation
page execute and read and write
5380000
direct allocation
page execute and read and write
4D10000
direct allocation
page read and write
260000
unkown
page read and write
496F000
stack
page read and write
51B0000
direct allocation
page read and write
54E0000
direct allocation
page execute and read and write
6C0F000
stack
page read and write
586000
unkown
page execute and write copy
48EE000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
3BAF000
stack
page read and write
3C6E000
stack
page read and write
4EA0000
heap
page read and write
C40000
direct allocation
page read and write
100A000
heap
page read and write
1691000
heap
page read and write
43AF000
stack
page read and write
2D90000
direct allocation
page read and write
7391000
heap
page read and write
72D000
unkown
page execute and read and write
50D0000
direct allocation
page execute and read and write
4AAE000
stack
page read and write
346E000
stack
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
1659000
heap
page read and write
585000
unkown
page execute and read and write
2CB000
unkown
page execute and read and write
49F0000
heap
page read and write
2C9000
unkown
page read and write
45E1000
heap
page read and write
5510000
direct allocation
page execute and read and write
1693000
heap
page read and write
3110000
direct allocation
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
3CEF000
stack
page read and write
356F000
stack
page read and write
307F000
stack
page read and write
32DE000
stack
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
3F7F000
stack
page read and write
4E91000
heap
page read and write
4D10000
direct allocation
page read and write
42AE000
stack
page read and write
4EEF000
stack
page read and write
F40000
heap
page read and write
2DFF000
stack
page read and write
45E1000
heap
page read and write
437E000
stack
page read and write
AAB000
unkown
page execute and read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
585000
unkown
page execute and write copy
42DF000
stack
page read and write
365F000
stack
page read and write
586000
unkown
page execute and write copy
1030000
heap
page read and write
261000
unkown
page execute and write copy
45E1000
heap
page read and write
341E000
stack
page read and write
4D21000
heap
page read and write
165D000
heap
page read and write
4C80000
direct allocation
page execute and read and write
5320000
direct allocation
page read and write
409E000
stack
page read and write
506E000
stack
page read and write
16BE000
heap
page read and write
441E000
stack
page read and write
6D7C000
stack
page read and write
2D90000
direct allocation
page read and write
4DAB000
stack
page read and write
149E000
stack
page read and write
5080000
direct allocation
page execute and read and write
4A70000
direct allocation
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
D56000
unkown
page execute and read and write
C99000
heap
page read and write
4E70000
heap
page read and write
4C00000
direct allocation
page execute and read and write
6B0E000
stack
page read and write
4A6F000
stack
page read and write
432F000
stack
page read and write
4E91000
heap
page read and write
100E000
heap
page read and write
38AE000
stack
page read and write
4C30000
direct allocation
page execute and read and write
5340000
direct allocation
page execute and read and write
4E91000
heap
page read and write
2CB000
unkown
page execute and read and write
4C50000
direct allocation
page execute and read and write
396E000
stack
page read and write
2D90000
direct allocation
page read and write
15E0000
heap
page read and write
4D21000
heap
page read and write
51B0000
direct allocation
page read and write
4EEE000
stack
page read and write
54D0000
direct allocation
page execute and read and write
5160000
trusted library allocation
page read and write
B9E000
stack
page read and write
3D3E000
stack
page read and write
7CC000
stack
page read and write
462F000
stack
page read and write
4E91000
heap
page read and write
2F1E000
stack
page read and write
5360000
direct allocation
page execute and read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
45AE000
stack
page read and write
422E000
stack
page read and write
33DF000
stack
page read and write
2FEE000
stack
page read and write
486E000
stack
page read and write
2ED7000
heap
page read and write
45E1000
heap
page read and write
5070000
direct allocation
page execute and read and write
3110000
direct allocation
page read and write
342F000
stack
page read and write
39AF000
stack
page read and write
4E91000
heap
page read and write
4D10000
direct allocation
page read and write
4E91000
heap
page read and write
4D20000
heap
page read and write
27FE000
stack
page read and write
C40000
direct allocation
page read and write
3A6F000
stack
page read and write
48AF000
stack
page read and write
4D10000
direct allocation
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
33AE000
stack
page read and write
2C9000
unkown
page write copy
2C2000
unkown
page execute and read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
5030000
direct allocation
page execute and read and write
C40000
direct allocation
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
3E2F000
stack
page read and write
357F000
stack
page read and write
AA2000
unkown
page execute and read and write
C40000
direct allocation
page read and write
293C000
stack
page read and write
45E1000
heap
page read and write
4D10000
direct allocation
page read and write
4E91000
heap
page read and write
165C000
heap
page read and write
2D90000
direct allocation
page read and write
3AEF000
stack
page read and write
45E1000
heap
page read and write
2D90000
direct allocation
page read and write
2CB000
unkown
page execute and read and write
4E91000
heap
page read and write
2C2000
unkown
page execute and read and write
49EF000
stack
page read and write
5490000
direct allocation
page execute and read and write
72F000
unkown
page execute and write copy
C40000
direct allocation
page read and write
C40000
direct allocation
page read and write
30FE000
stack
page read and write
F1F000
stack
page read and write
45E1000
heap
page read and write
145E000
stack
page read and write
45E1000
heap
page read and write
F65000
heap
page read and write
45E1000
heap
page read and write
261000
unkown
page execute and write copy
4A11000
heap
page read and write
4E91000
heap
page read and write
4E90000
heap
page read and write
5530000
direct allocation
page execute and read and write
3110000
direct allocation
page read and write
72F000
unkown
page execute and write copy
4E91000
heap
page read and write
3CFF000
stack
page read and write
2D7E000
stack
page read and write
4E91000
heap
page read and write
5320000
direct allocation
page read and write
5520000
direct allocation
page execute and read and write
2A3F000
stack
page read and write
4E91000
heap
page read and write
2BFE000
stack
page read and write
481E000
stack
page read and write
14F0000
heap
page read and write
7390000
heap
page read and write
AFD000
stack
page read and write
44AD000
stack
page read and write
4E91000
heap
page read and write
36AF000
stack
page read and write
4E91000
heap
page read and write
379F000
stack
page read and write
4BBF000
stack
page read and write
4E91000
heap
page read and write
C80000
heap
page read and write
540C000
stack
page read and write
54C0000
direct allocation
page execute and read and write
554E000
stack
page read and write
45E1000
heap
page read and write
6700000
heap
page read and write
455F000
stack
page read and write
14FB000
heap
page read and write
BD5000
heap
page read and write
50C0000
direct allocation
page execute and read and write
56F000
unkown
page execute and read and write
45E0000
heap
page read and write
5030000
direct allocation
page execute and read and write
16AD000
heap
page read and write
4E91000
heap
page read and write
163D000
heap
page read and write
4E91000
heap
page read and write
F0C000
stack
page read and write
4E91000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4A11000
heap
page read and write
46DE000
stack
page read and write
391E000
stack
page read and write
4E91000
heap
page read and write
16BD000
heap
page read and write
5050000
direct allocation
page execute and read and write
2F3F000
stack
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
2ECF000
stack
page read and write
45E1000
heap
page read and write
45C0000
heap
page read and write
452E000
stack
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
5320000
direct allocation
page execute and read and write
3C9F000
stack
page read and write
4BAF000
stack
page read and write
4A70000
direct allocation
page read and write
45E1000
heap
page read and write
322F000
stack
page read and write
416E000
stack
page read and write
4E91000
heap
page read and write
886B000
stack
page read and write
3B5F000
stack
page read and write
F60000
heap
page read and write
4E91000
heap
page read and write
347E000
stack
page read and write
260000
unkown
page readonly
45E1000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
4EA0000
direct allocation
page read and write
2D90000
direct allocation
page read and write
4E91000
heap
page read and write
C30000
unkown
page execute and read and write
397E000
stack
page read and write
576000
unkown
page execute and read and write
4D2F000
stack
page read and write
698F000
stack
page read and write
3E1E000
stack
page read and write
459E000
stack
page read and write
127B000
stack
page read and write
4E91000
heap
page read and write
41FF000
stack
page read and write
332F000
stack
page read and write
3F6F000
stack
page read and write
34EE000
stack
page read and write
261000
unkown
page execute and write copy
4E91000
heap
page read and write
2CFF000
stack
page read and write
45E1000
heap
page read and write
585000
unkown
page execute and write copy
6D80000
heap
page read and write
45E1000
heap
page read and write
C94000
heap
page read and write
2C9000
unkown
page read and write
54B0000
direct allocation
page execute and read and write
C30000
heap
page read and write
49AE000
stack
page read and write
15DE000
stack
page read and write
167D000
heap
page read and write
739E000
heap
page read and write
31BF000
stack
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
2D3E000
stack
page read and write
4D10000
direct allocation
page read and write
436E000
stack
page read and write
163D000
heap
page read and write
40BF000
stack
page read and write
3AAE000
stack
page read and write
44EF000
stack
page read and write
4E91000
heap
page read and write
2BBE000
stack
page read and write
3EAF000
stack
page read and write
3110000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
F45000
heap
page read and write
3A5E000
stack
page read and write
73A0000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
167D000
heap
page read and write
16A3000
heap
page read and write
4D10000
direct allocation
page read and write
45E1000
heap
page read and write
585000
unkown
page execute and read and write
FF0000
heap
page read and write
45E1000
heap
page read and write
36BF000
stack
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
2D80000
heap
page read and write
4E91000
heap
page read and write
C40000
direct allocation
page read and write
445E000
stack
page read and write
4E91000
heap
page read and write
2C9000
unkown
page write copy
130E000
stack
page read and write
28FF000
stack
page read and write
355E000
stack
page read and write
5030000
direct allocation
page execute and read and write
5340000
direct allocation
page execute and read and write
4CEF000
stack
page read and write
3DDF000
stack
page read and write
45E1000
heap
page read and write
41EF000
stack
page read and write
4E91000
heap
page read and write
315F000
stack
page read and write
C40000
direct allocation
page read and write
37FF000
stack
page read and write
450000
unkown
page execute and read and write
45E1000
heap
page read and write
BC7000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
2ED0000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
544D000
stack
page read and write
4E91000
heap
page read and write
4C2E000
stack
page read and write
4E91000
heap
page read and write
576000
unkown
page execute and read and write
383E000
stack
page read and write
5500000
direct allocation
page execute and read and write
3120000
heap
page read and write
4E91000
heap
page read and write
2D90000
direct allocation
page read and write
36EE000
stack
page read and write
4DEE000
stack
page read and write
369E000
stack
page read and write
15EA000
heap
page read and write
450000
unkown
page execute and read and write
5030000
direct allocation
page execute and read and write
54B0000
direct allocation
page execute and read and write
4D10000
direct allocation
page read and write
89AE000
stack
page read and write
3110000
direct allocation
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
72D000
unkown
page execute and read and write
4E91000
heap
page read and write
46EF000
stack
page read and write
4E91000
heap
page read and write
482F000
stack
page read and write
2C9000
unkown
page read and write
45E1000
heap
page read and write
3E6E000
stack
page read and write
372F000
stack
page read and write
30BE000
stack
page read and write
C40000
direct allocation
page read and write
260000
unkown
page readonly
305E000
stack
page read and write
4E91000
heap
page read and write
50B0000
direct allocation
page execute and read and write
C40000
direct allocation
page read and write
37EF000
stack
page read and write
4E91000
heap
page read and write
5030000
direct allocation
page execute and read and write
F80000
heap
page read and write
585000
unkown
page execute and read and write
CCB000
heap
page read and write
3110000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
F80000
heap
page read and write
3ABE000
stack
page read and write
BC0000
heap
page read and write
4E91000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
40AF000
stack
page read and write
45E1000
heap
page read and write
491F000
stack
page read and write
4A10000
heap
page read and write
2EAF000
stack
page read and write
12CF000
stack
page read and write
D4F000
unkown
page execute and read and write
45E1000
heap
page read and write
469F000
stack
page read and write
1691000
heap
page read and write
4E91000
heap
page read and write
54B0000
direct allocation
page execute and read and write
52BF000
stack
page read and write
2DCE000
stack
page read and write
447F000
stack
page read and write
312E000
stack
page read and write
5540000
direct allocation
page execute and read and write
45E1000
heap
page read and write
405F000
stack
page read and write
4AE1000
direct allocation
page read and write
4E91000
heap
page read and write
5674000
heap
page read and write
A41000
unkown
page execute and write copy
585000
unkown
page execute and write copy
C40000
direct allocation
page read and write
4E91000
heap
page read and write
5480000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
4D21000
heap
page read and write
4E91000
heap
page read and write
6706000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
2D90000
direct allocation
page read and write
4BE0000
direct allocation
page execute and read and write
4600000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
896C000
stack
page read and write
2DA7000
heap
page read and write
51B0000
direct allocation
page read and write
3110000
direct allocation
page read and write
4D10000
direct allocation
page read and write
F70000
heap
page read and write
343F000
stack
page read and write
3CDE000
stack
page read and write
4E91000
heap
page read and write
4EA0000
direct allocation
page read and write
4F11000
direct allocation
page read and write
4BEF000
stack
page read and write
45E1000
heap
page read and write
1509000
heap
page read and write
45E1000
heap
page read and write
3110000
direct allocation
page read and write
1000000
heap
page read and write
4C40000
direct allocation
page execute and read and write
6D81000
heap
page read and write
D22000
unkown
page execute and read and write
472E000
stack
page read and write
3FAE000
stack
page read and write
32FF000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4E91000
heap
page read and write
4E50000
trusted library allocation
page read and write
5320000
direct allocation
page read and write
260000
unkown
page read and write
13F0000
heap
page read and write
5040000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
There are 771 hidden memdumps, click here to show them.