IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpJ
unknown
http://185.215.113.16/Jo89Ku7d/index.phpI
unknown
http://185.215.113.16/Jo89Ku7d/index.phpi
unknown
http://185.215.113.16/Jo89Ku7d/index.phpE
unknown
http://185.215.113.16/Jo89Ku7d/index.phpD
unknown
http://185.215.113.16/Jo89Ku7d/index.phpy1mb3JtLXVybGVuY29kZWQ=
unknown
http://185.215.113.16/Jo89Ku7d/index.php=
unknown
http://185.215.113.16/Jo89Ku7d/index.phpz
unknown
http://185.215.113.16/Jo89Ku7d/index.phpY
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpy
unknown
http://185.215.113.16/Jo89Ku7d/index.phpX
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedV
unknown
http://185.215.113.16/Jo89Ku7d/index.phpq
unknown
http://185.215.113.16/Jo89Ku7d/index.php/
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedn
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4A80000
direct allocation
page read and write
malicious
4A80000
direct allocation
page read and write
malicious
4980000
direct allocation
page read and write
malicious
2B1000
unkown
page execute and read and write
malicious
2B1000
unkown
page execute and read and write
malicious
4A80000
direct allocation
page read and write
malicious
501000
unkown
page execute and read and write
malicious
2B1000
unkown
page execute and read and write
malicious
45F1000
heap
page read and write
B50000
heap
page read and write
34AE000
stack
page read and write
44F1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
344F000
stack
page read and write
4C1C000
stack
page read and write
4C20000
direct allocation
page execute and read and write
319000
unkown
page read and write
28BE000
stack
page read and write
49D000
unkown
page execute and read and write
B9B000
heap
page read and write
C34000
heap
page read and write
E1E000
stack
page read and write
4D64000
heap
page read and write
4C90000
direct allocation
page execute and read and write
45F1000
heap
page read and write
45E0000
direct allocation
page read and write
45E0000
direct allocation
page read and write
44F1000
heap
page read and write
C34000
heap
page read and write
76B000
unkown
page execute and write copy
346F000
stack
page read and write
5B9000
unkown
page execute and read and write
B9A000
heap
page read and write
2B1000
unkown
page execute and write copy
769000
unkown
page execute and read and write
28D0000
direct allocation
page read and write
2BFE000
stack
page read and write
44F1000
heap
page read and write
31FF000
stack
page read and write
44F0000
heap
page read and write
2A4F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
B9B000
heap
page read and write
52EF000
stack
page read and write
C34000
heap
page read and write
44AF000
stack
page read and write
B8D000
heap
page read and write
346F000
stack
page read and write
B70000
heap
page read and write
569000
unkown
page read and write
EAA000
heap
page read and write
45F1000
heap
page read and write
C40000
heap
page read and write
500000
unkown
page read and write
BB2000
heap
page read and write
44F1000
heap
page read and write
3FBF000
stack
page read and write
373E000
stack
page read and write
C34000
heap
page read and write
44E0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
4A80000
direct allocation
page read and write
337E000
stack
page read and write
4500000
heap
page read and write
2BEE000
stack
page read and write
27EF000
stack
page read and write
45EF000
stack
page read and write
44F1000
heap
page read and write
EEF000
stack
page read and write
4ACE000
stack
page read and write
3AFE000
stack
page read and write
CAE000
stack
page read and write
B9B000
heap
page read and write
44F1000
heap
page read and write
4ACF000
stack
page read and write
2B0000
unkown
page read and write
C34000
heap
page read and write
819000
unkown
page execute and write copy
44E0000
direct allocation
page read and write
5C9000
unkown
page execute and write copy
45E0000
direct allocation
page read and write
3AEE000
stack
page read and write
44F1000
heap
page read and write
4B10000
direct allocation
page execute and read and write
501000
unkown
page execute and write copy
31EF000
stack
page read and write
4C40000
direct allocation
page execute and read and write
4C40000
direct allocation
page execute and read and write
423F000
stack
page read and write
45F1000
heap
page read and write
2CCF000
stack
page read and write
26D0000
direct allocation
page read and write
45F1000
heap
page read and write
B8D000
heap
page read and write
45F1000
heap
page read and write
C34000
heap
page read and write
800000
unkown
page execute and read and write
28D0000
direct allocation
page read and write
4CB0000
direct allocation
page execute and read and write
CC0000
heap
page read and write
44AF000
stack
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
31B000
unkown
page execute and read and write
4B10000
direct allocation
page execute and read and write
D14000
heap
page read and write
2FBE000
stack
page read and write
45F1000
heap
page read and write
4C70000
direct allocation
page execute and read and write
413E000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
3AAF000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
282E000
stack
page read and write
44F1000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
26D0000
direct allocation
page read and write
44F1000
heap
page read and write
4F7000
heap
page read and write
294C000
stack
page read and write
44F1000
heap
page read and write
7C50000
heap
page read and write
45F1000
heap
page read and write
35CE000
stack
page read and write
28D0000
direct allocation
page read and write
30CE000
stack
page read and write
3EAE000
stack
page read and write
3D6E000
stack
page read and write
4A80000
direct allocation
page read and write
44F1000
heap
page read and write
312000
unkown
page execute and read and write
45F1000
heap
page read and write
3FEE000
stack
page read and write
44F1000
heap
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
D14000
heap
page read and write
44F1000
heap
page read and write
818000
unkown
page execute and read and write
39BE000
stack
page read and write
44F1000
heap
page read and write
398E000
stack
page read and write
36EF000
stack
page read and write
CC4000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
D14000
heap
page read and write
49D000
unkown
page execute and read and write
45E0000
direct allocation
page read and write
2D2E000
stack
page read and write
4BCF000
stack
page read and write
E17000
heap
page read and write
45E0000
direct allocation
page read and write
7FC000
stack
page read and write
B4C000
heap
page read and write
44F1000
heap
page read and write
332F000
stack
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
2E4E000
stack
page read and write
5C8000
unkown
page execute and read and write
382F000
stack
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
28D0000
direct allocation
page read and write
44E0000
direct allocation
page read and write
584000
unkown
page execute and read and write
4BF0000
direct allocation
page execute and read and write
4A80000
direct allocation
page read and write
D14000
heap
page read and write
DCF000
stack
page read and write
2E6E000
stack
page read and write
44F1000
heap
page read and write
EAE000
heap
page read and write
27FF000
stack
page read and write
4F0000
heap
page read and write
3E7F000
stack
page read and write
76B000
unkown
page execute and write copy
30FE000
stack
page read and write
44F1000
heap
page read and write
AD0000
heap
page read and write
4B10000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
3E6F000
stack
page read and write
2B1000
unkown
page execute and write copy
C34000
heap
page read and write
C34000
heap
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
4980000
direct allocation
page read and write
C34000
heap
page read and write
2B8F000
stack
page read and write
44E0000
direct allocation
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
4C60000
direct allocation
page execute and read and write
44F1000
heap
page read and write
B86000
heap
page read and write
2D0E000
stack
page read and write
3AEE000
stack
page read and write
4C30000
direct allocation
page execute and read and write
C34000
heap
page read and write
BAF000
heap
page read and write
45F1000
heap
page read and write
C30000
heap
page read and write
319000
unkown
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
F1F000
stack
page read and write
334E000
stack
page read and write
26D0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
45F1000
heap
page read and write
4B70000
direct allocation
page execute and read and write
769000
unkown
page execute and read and write
3BCF000
stack
page read and write
26D0000
direct allocation
page read and write
809000
unkown
page execute and read and write
45F0000
heap
page read and write
28D0000
direct allocation
page read and write
8263000
heap
page read and write
3FAF000
stack
page read and write
B21000
heap
page read and write
45F1000
heap
page read and write
3A8F000
stack
page read and write
2F6F000
stack
page read and write
4C40000
direct allocation
page execute and read and write
DDF000
stack
page read and write
500000
unkown
page readonly
35BF000
stack
page read and write
45E0000
direct allocation
page read and write
319000
unkown
page read and write
D14000
heap
page read and write
29EF000
stack
page read and write
44F1000
heap
page read and write
427E000
stack
page read and write
44F1000
heap
page read and write
4980000
direct allocation
page read and write
D14000
heap
page read and write
44F1000
heap
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
562000
unkown
page execute and read and write
44F1000
heap
page read and write
4C50000
direct allocation
page execute and read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
BAB000
heap
page read and write
B70000
heap
page read and write
C34000
heap
page read and write
44F1000
heap
page read and write
3C3E000
stack
page read and write
44F1000
heap
page read and write
394F000
stack
page read and write
31B000
unkown
page execute and read and write
4C10000
direct allocation
page execute and read and write
28D0000
direct allocation
page read and write
44F1000
heap
page read and write
CC4000
heap
page read and write
386E000
stack
page read and write
3C2E000
stack
page read and write
45F1000
heap
page read and write
45E0000
direct allocation
page read and write
C34000
heap
page read and write
44F1000
heap
page read and write
45F1000
heap
page read and write
ADA000
heap
page read and write
44E0000
direct allocation
page read and write
818000
unkown
page execute and write copy
45F1000
heap
page read and write
44F1000
heap
page read and write
3E4F000
stack
page read and write
CCE000
stack
page read and write
422F000
stack
page read and write
503F000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
6290000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
49CE000
stack
page read and write
4B30000
direct allocation
page execute and read and write
D14000
heap
page read and write
44F1000
heap
page read and write
D10000
heap
page read and write
44F1000
heap
page read and write
2A8E000
stack
page read and write
AFD000
stack
page read and write
44F1000
heap
page read and write
280E000
stack
page read and write
56B000
unkown
page execute and read and write
C34000
heap
page read and write
44F1000
heap
page read and write
B85000
heap
page read and write
4DBB000
stack
page read and write
426E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
5F0E000
stack
page read and write
44F1000
heap
page read and write
44CE000
stack
page read and write
2D3E000
stack
page read and write
46F0000
trusted library allocation
page read and write
45F1000
heap
page read and write
3BEF000
stack
page read and write
28D0000
direct allocation
page read and write
2E0F000
stack
page read and write
2F7F000
stack
page read and write
2B0000
unkown
page readonly
B86000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
5C8000
unkown
page execute and read and write
7D8B000
stack
page read and write
3FAF000
stack
page read and write
44F1000
heap
page read and write
547D000
stack
page read and write
370E000
stack
page read and write
320E000
stack
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
CC4000
heap
page read and write
45F1000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
26E0000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
28D0000
direct allocation
page read and write
26CE000
stack
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
44F1000
heap
page read and write
45F1000
heap
page read and write
28D0000
direct allocation
page read and write
5F25000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
30AF000
stack
page read and write
4BCF000
stack
page read and write
35FE000
stack
page read and write
CDE000
stack
page read and write
EA0000
heap
page read and write
4D60000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
4A80000
direct allocation
page read and write
4AF0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
5F20000
heap
page read and write
28D0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
D00000
heap
page read and write
43AE000
stack
page read and write
C34000
heap
page read and write
319000
unkown
page write copy
44F1000
heap
page read and write
44F1000
heap
page read and write
448F000
stack
page read and write
B8C000
heap
page read and write
26D0000
direct allocation
page read and write
E9E000
stack
page read and write
2FAE000
stack
page read and write
28C0000
heap
page read and write
CC4000
heap
page read and write
5F26000
heap
page read and write
296E000
stack
page read and write
7D4000
unkown
page execute and read and write
44F1000
heap
page read and write
616E000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
4C80000
direct allocation
page execute and read and write
44F1000
heap
page read and write
3EBE000
stack
page read and write
5B9000
unkown
page execute and read and write
45F0000
trusted library allocation
page read and write
438E000
stack
page read and write
44F1000
heap
page read and write
4EFF000
stack
page read and write
C34000
heap
page read and write
44F1000
heap
page read and write
44E0000
direct allocation
page read and write
B30000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
4AE1000
direct allocation
page read and write
D14000
heap
page read and write
44F1000
heap
page read and write
2E2F000
stack
page read and write
ABA000
stack
page read and write
507E000
stack
page read and write
45E0000
direct allocation
page read and write
5C8000
unkown
page execute and write copy
40EF000
stack
page read and write
C34000
heap
page read and write
372E000
stack
page read and write
C34000
heap
page read and write
333F000
stack
page read and write
626F000
stack
page read and write
4B10000
direct allocation
page execute and read and write
45F1000
heap
page read and write
C34000
heap
page read and write
44F1000
heap
page read and write
4A0000
heap
page read and write
B9B000
heap
page read and write
44F1000
heap
page read and write
109F000
stack
page read and write
7FCF000
stack
page read and write
26D0000
direct allocation
page read and write
44E0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
35EE000
stack
page read and write
2E7E000
stack
page read and write
2AEF000
stack
page read and write
44F1000
heap
page read and write
36CF000
stack
page read and write
44E0000
direct allocation
page read and write
2CFF000
stack
page read and write
40CF000
stack
page read and write
B90000
heap
page read and write
B60000
heap
page read and write
B9A000
heap
page read and write
45E0000
direct allocation
page read and write
584000
unkown
page execute and read and write
45F1000
heap
page read and write
5B0000
unkown
page execute and read and write
336E000
stack
page read and write
45D0000
heap
page read and write
358F000
stack
page read and write
45E0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
B17000
heap
page read and write
3D0E000
stack
page read and write
3E6F000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
44F1000
heap
page read and write
347F000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
28E0000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4C10000
direct allocation
page execute and read and write
45F1000
heap
page read and write
AC0000
heap
page read and write
44F1000
heap
page read and write
4C70000
direct allocation
page execute and read and write
332F000
stack
page read and write
C34000
heap
page read and write
44F1000
heap
page read and write
5C8000
unkown
page execute and write copy
CC4000
heap
page read and write
44F1000
heap
page read and write
3BEF000
stack
page read and write
26D0000
direct allocation
page read and write
76B000
unkown
page execute and write copy
2F4F000
stack
page read and write
44F1000
heap
page read and write
ADE000
heap
page read and write
44F1000
heap
page read and write
B94000
heap
page read and write
4A80000
direct allocation
page read and write
4A80000
direct allocation
page read and write
40FF000
stack
page read and write
46F0000
trusted library allocation
page read and write
5C8000
unkown
page execute and read and write
533D000
stack
page read and write
5C9000
unkown
page execute and write copy
35AF000
stack
page read and write
5C9000
unkown
page execute and write copy
45CF000
stack
page read and write
44F1000
heap
page read and write
B92000
heap
page read and write
2A6F000
stack
page read and write
426E000
stack
page read and write
3C2D000
stack
page read and write
30BF000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
4AE1000
direct allocation
page read and write
49D000
unkown
page execute and read and write
2E3F000
stack
page read and write
612F000
stack
page read and write
45F1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
45F1000
heap
page read and write
C34000
heap
page read and write
382F000
stack
page read and write
5C8000
unkown
page execute and write copy
2FAE000
stack
page read and write
68BE000
heap
page read and write
8240000
heap
page read and write
C34000
heap
page read and write
44F1000
heap
page read and write
2AAE000
stack
page read and write
44F1000
heap
page read and write
CC4000
heap
page read and write
C34000
heap
page read and write
44F1000
heap
page read and write
C34000
heap
page read and write
4C90000
direct allocation
page execute and read and write
44F1000
heap
page read and write
26D0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
4C00000
direct allocation
page execute and read and write
322E000
stack
page read and write
CD0000
heap
page read and write
26D0000
direct allocation
page read and write
3D2F000
stack
page read and write
B70000
heap
page read and write
4C10000
direct allocation
page execute and read and write
8253000
heap
page read and write
44F1000
heap
page read and write
E30000
heap
page read and write
E38000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4DFE000
stack
page read and write
9B9000
unkown
page execute and read and write
C34000
heap
page read and write
26E7000
heap
page read and write
44F1000
heap
page read and write
C34000
heap
page read and write
CC4000
heap
page read and write
769000
unkown
page execute and read and write
44E0000
direct allocation
page read and write
4BCF000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
330F000
stack
page read and write
4ACC000
stack
page read and write
CC4000
heap
page read and write
44BF000
stack
page read and write
517F000
stack
page read and write
E0E000
stack
page read and write
B9B000
heap
page read and write
44EE000
stack
page read and write
44F1000
heap
page read and write
348E000
stack
page read and write
C34000
heap
page read and write
4AE1000
direct allocation
page read and write
3BFF000
stack
page read and write
9BB000
unkown
page execute and write copy
44F1000
heap
page read and write
3F8F000
stack
page read and write
45F0000
heap
page read and write
2A7F000
stack
page read and write
319000
unkown
page write copy
386E000
stack
page read and write
45F1000
heap
page read and write
E1D000
heap
page read and write
AFD000
stack
page read and write
2D2E000
stack
page read and write
B9A000
heap
page read and write
44F1000
heap
page read and write
B51000
heap
page read and write
30EE000
stack
page read and write
5B0000
unkown
page execute and read and write
383F000
stack
page read and write
557E000
stack
page read and write
26FE000
stack
page read and write
44F1000
heap
page read and write
387E000
stack
page read and write
68C0000
heap
page read and write
39AE000
stack
page read and write
44EE000
stack
page read and write
5B0000
unkown
page execute and read and write
C34000
heap
page read and write
C34000
heap
page read and write
51EE000
stack
page read and write
CC4000
heap
page read and write
297E000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
28D0000
direct allocation
page read and write
4A80000
direct allocation
page read and write
3D7E000
stack
page read and write
26D0000
direct allocation
page read and write
B2E000
heap
page read and write
34AE000
stack
page read and write
28D0000
direct allocation
page read and write
B70000
heap
page read and write
26D0000
direct allocation
page read and write
813C000
stack
page read and write
44F1000
heap
page read and write
43AE000
stack
page read and write
3FEE000
stack
page read and write
43BE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
35AF000
stack
page read and write
436F000
stack
page read and write
45E0000
direct allocation
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
3C0E000
stack
page read and write
372E000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
397F000
stack
page read and write
5B9000
unkown
page execute and read and write
D14000
heap
page read and write
2BEF000
stack
page read and write
C34000
heap
page read and write
45F1000
heap
page read and write
B30000
heap
page read and write
B1D000
heap
page read and write
B98000
heap
page read and write
26D0000
direct allocation
page read and write
4ACE000
stack
page read and write
31EF000
stack
page read and write
AFD000
stack
page read and write
45F1000
heap
page read and write
4C70000
direct allocation
page execute and read and write
4B20000
direct allocation
page execute and read and write
287E000
stack
page read and write
424E000
stack
page read and write
2BAF000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
C34000
heap
page read and write
4C60000
direct allocation
page execute and read and write
E10000
heap
page read and write
4980000
direct allocation
page read and write
4B00000
direct allocation
page execute and read and write
8241000
heap
page read and write
44F1000
heap
page read and write
B85000
heap
page read and write
3AAF000
stack
page read and write
322E000
stack
page read and write
44F1000
heap
page read and write
4B10000
direct allocation
page execute and read and write
B8D000
heap
page read and write
28E7000
heap
page read and write
4A80000
direct allocation
page read and write
C34000
heap
page read and write
2B0000
unkown
page readonly
4F3E000
stack
page read and write
4602000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
4C30000
direct allocation
page execute and read and write
45F1000
heap
page read and write
3FCE000
stack
page read and write
2CEF000
stack
page read and write
3D2F000
stack
page read and write
437F000
stack
page read and write
CC4000
heap
page read and write
312000
unkown
page execute and read and write
39AE000
stack
page read and write
36FF000
stack
page read and write
4A30000
heap
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45E0000
direct allocation
page read and write
3ABF000
stack
page read and write
308F000
stack
page read and write
45F1000
heap
page read and write
26D0000
direct allocation
page read and write
384E000
stack
page read and write
2B0000
unkown
page read and write
C34000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
4C10000
direct allocation
page execute and read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
30AF000
stack
page read and write
7E8C000
stack
page read and write
68B0000
heap
page read and write
B92000
heap
page read and write
B85000
heap
page read and write
4A80000
direct allocation
page read and write
319000
unkown
page write copy
44F1000
heap
page read and write
44F1000
heap
page read and write
2B0000
unkown
page readonly
68B1000
heap
page read and write
2E2F000
stack
page read and write
4600000
heap
page read and write
45F1000
heap
page read and write
5ECE000
stack
page read and write
434F000
stack
page read and write
44F1000
heap
page read and write
B58000
heap
page read and write
E90000
heap
page read and write
44F1000
heap
page read and write
44C0000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
BAF000
heap
page read and write
4C50000
direct allocation
page execute and read and write
290F000
stack
page read and write
44F1000
heap
page read and write
B4B000
heap
page read and write
293F000
stack
page read and write
4B80000
direct allocation
page execute and read and write
7C52000
heap
page read and write
7ECE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
44F1000
heap
page read and write
4C90000
direct allocation
page execute and read and write
2CEF000
stack
page read and write
D14000
heap
page read and write
B60000
heap
page read and write
569000
unkown
page write copy
2BBF000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
3E8E000
stack
page read and write
45F1000
heap
page read and write
45F0000
heap
page read and write
30EE000
stack
page read and write
35EE000
stack
page read and write
C34000
heap
page read and write
68C0000
heap
page read and write
E68000
heap
page read and write
26D0000
direct allocation
page read and write
4BA0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
E5E000
stack
page read and write
B60000
heap
page read and write
396F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
44F1000
heap
page read and write
292F000
stack
page read and write
45F1000
heap
page read and write
45E0000
direct allocation
page read and write
44E0000
direct allocation
page read and write
336E000
stack
page read and write
31B000
unkown
page execute and read and write
D14000
heap
page read and write
3D6E000
stack
page read and write
44F1000
heap
page read and write
45F1000
heap
page read and write
C34000
heap
page read and write
283B000
stack
page read and write
45F1000
heap
page read and write
602F000
stack
page read and write
C34000
heap
page read and write
4C10000
direct allocation
page execute and read and write
45F1000
heap
page read and write
46F0000
trusted library allocation
page read and write
49E1000
direct allocation
page read and write
4C80000
direct allocation
page execute and read and write
323E000
stack
page read and write
422F000
stack
page read and write
44E0000
direct allocation
page read and write
34BE000
stack
page read and write
4C60000
direct allocation
page execute and read and write
C34000
heap
page read and write
45F1000
heap
page read and write
44F1000
heap
page read and write
410E000
stack
page read and write
C10000
heap
page read and write
B8D000
heap
page read and write
43B000
stack
page read and write
396F000
stack
page read and write
823C000
stack
page read and write
44F1000
heap
page read and write
45F1000
heap
page read and write
4C20000
direct allocation
page execute and read and write
45F1000
heap
page read and write
4B60000
direct allocation
page execute and read and write
543C000
stack
page read and write
436F000
stack
page read and write
3D3F000
stack
page read and write
31CF000
stack
page read and write
CC4000
heap
page read and write
584000
unkown
page execute and read and write
3D4E000
stack
page read and write
2B1000
unkown
page execute and write copy
2E6E000
stack
page read and write
C34000
heap
page read and write
3ACE000
stack
page read and write
2F6F000
stack
page read and write
36EF000
stack
page read and write
45F1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
45F1000
heap
page read and write
2BCE000
stack
page read and write
45EF000
stack
page read and write
44F1000
heap
page read and write
6ED000
unkown
page execute and read and write
45F1000
heap
page read and write
412E000
stack
page read and write
3FFE000
stack
page read and write
412E000
stack
page read and write
4610000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
CC4000
heap
page read and write
45E0000
direct allocation
page read and write
312000
unkown
page execute and read and write
455000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
CC4000
heap
page read and write
28D0000
direct allocation
page read and write
4C20000
direct allocation
page execute and read and write
EA9000
heap
page read and write
380F000
stack
page read and write
44F1000
heap
page read and write
450000
heap
page read and write
420F000
stack
page read and write
2ABE000
stack
page read and write
44F1000
heap
page read and write
7FC000
stack
page read and write
2F8E000
stack
page read and write
44E0000
direct allocation
page read and write
7FC000
stack
page read and write
44F1000
heap
page read and write
45F1000
heap
page read and write
2B0000
unkown
page read and write
C34000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
4C10000
direct allocation
page execute and read and write
40EF000
stack
page read and write
28D0000
direct allocation
page read and write
4B50000
direct allocation
page execute and read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
490000
heap
page read and write
44F1000
heap
page read and write
D14000
heap
page read and write
3EAE000
stack
page read and write
44F1000
heap
page read and write
There are 833 hidden memdumps, click here to show them.