IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5080000
direct allocation
page read and write
malicious
49D0000
direct allocation
page read and write
malicious
21000
unkown
page execute and read and write
malicious
4E40000
direct allocation
page read and write
malicious
4800000
direct allocation
page read and write
malicious
BF1000
unkown
page execute and read and write
malicious
BF1000
unkown
page execute and read and write
malicious
4B60000
direct allocation
page execute and read and write
DEA000
unkown
page execute and read and write
49D0000
direct allocation
page execute and read and write
4381000
heap
page read and write
B81000
heap
page read and write
487F000
stack
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
383F000
stack
page read and write
4BF1000
heap
page read and write
B5A000
heap
page read and write
2750000
direct allocation
page read and write
4970000
direct allocation
page execute and read and write
9E4000
heap
page read and write
F01000
unkown
page execute and read and write
4BA0000
direct allocation
page execute and read and write
7FEC000
stack
page read and write
4960000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
5D9E000
stack
page read and write
BA3000
heap
page read and write
429F000
stack
page read and write
BB2000
heap
page read and write
4BF1000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
3E7F000
stack
page read and write
4381000
heap
page read and write
5200000
direct allocation
page execute and read and write
10FE000
stack
page read and write
9E4000
heap
page read and write
4381000
heap
page read and write
44BF000
stack
page read and write
4381000
heap
page read and write
47C0000
trusted library allocation
page read and write
BA3000
heap
page read and write
2750000
direct allocation
page read and write
B50000
heap
page read and write
40FF000
stack
page read and write
660000
heap
page read and write
F10000
unkown
page execute and write copy
A10000
heap
page read and write
4381000
heap
page read and write
B58000
heap
page read and write
427E000
stack
page read and write
B67000
heap
page read and write
6140000
heap
page read and write
B50000
heap
page read and write
4BF1000
heap
page read and write
4F90000
direct allocation
page execute and read and write
139F000
stack
page read and write
80F1000
heap
page read and write
2E3F000
stack
page read and write
51E0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
3AFE000
stack
page read and write
B94000
heap
page read and write
4381000
heap
page read and write
2E9F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
311F000
stack
page read and write
423F000
stack
page read and write
4990000
direct allocation
page execute and read and write
4990000
direct allocation
page execute and read and write
333F000
stack
page read and write
4381000
heap
page read and write
B94000
heap
page read and write
80EC000
stack
page read and write
6AC000
stack
page read and write
477E000
stack
page read and write
287F000
stack
page read and write
494F000
stack
page read and write
383F000
stack
page read and write
51F0000
direct allocation
page execute and read and write
387E000
stack
page read and write
9E4000
heap
page read and write
4BF1000
heap
page read and write
4E7E000
stack
page read and write
4BF1000
heap
page read and write
8FA000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
2750000
direct allocation
page read and write
4FA0000
direct allocation
page execute and read and write
7B00000
heap
page read and write
9E4000
heap
page read and write
4391000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
463E000
stack
page read and write
B61000
heap
page read and write
2D3F000
stack
page read and write
B28000
heap
page read and write
2750000
direct allocation
page read and write
C5B000
unkown
page execute and read and write
B9C000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
9E4000
heap
page read and write
4381000
heap
page read and write
5010000
direct allocation
page execute and read and write
B35000
heap
page read and write
2E7E000
stack
page read and write
B62000
heap
page read and write
9E4000
heap
page read and write
437F000
stack
page read and write
4B60000
direct allocation
page execute and read and write
10B7000
unkown
page execute and read and write
2750000
direct allocation
page read and write
1110000
direct allocation
page read and write
35BF000
stack
page read and write
B5F000
heap
page read and write
5D5000
heap
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
4B60000
direct allocation
page execute and read and write
B40000
heap
page read and write
33DE000
stack
page read and write
5210000
direct allocation
page execute and read and write
39BE000
stack
page read and write
9E4000
heap
page read and write
B3E000
stack
page read and write
B61000
heap
page read and write
2750000
direct allocation
page read and write
4381000
heap
page read and write
B81000
heap
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
A7E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
323E000
stack
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
BF1000
unkown
page execute and write copy
4381000
heap
page read and write
C59000
unkown
page write copy
5EEF000
stack
page read and write
3FBF000
stack
page read and write
30BF000
stack
page read and write
3F1E000
stack
page read and write
4381000
heap
page read and write
4B60000
direct allocation
page execute and read and write
4B60000
direct allocation
page execute and read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
BE0000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
4381000
heap
page read and write
B94000
heap
page read and write
F11000
unkown
page execute and write copy
9E4000
heap
page read and write
4381000
heap
page read and write
9E4000
heap
page read and write
34BE000
stack
page read and write
4381000
heap
page read and write
3C3E000
stack
page read and write
21000
unkown
page execute and write copy
CDE000
stack
page read and write
AEE000
heap
page read and write
3EBE000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
2C5F000
stack
page read and write
15E0000
direct allocation
page read and write
484E000
stack
page read and write
4BF1000
heap
page read and write
4A00000
direct allocation
page execute and read and write
C59000
unkown
page read and write
2E7E000
stack
page read and write
4BF1000
heap
page read and write
AE0000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
347F000
stack
page read and write
43DF000
stack
page read and write
49BF000
stack
page read and write
4BF1000
heap
page read and write
4B60000
direct allocation
page execute and read and write
340000
unkown
page execute and read and write
423F000
stack
page read and write
BE0000
direct allocation
page read and write
9E4000
heap
page read and write
4A20000
direct allocation
page execute and read and write
B30000
heap
page read and write
4381000
heap
page read and write
4380000
heap
page read and write
BE0000
direct allocation
page read and write
4BF1000
heap
page read and write
15E0000
direct allocation
page read and write
9E4000
heap
page read and write
B9D000
heap
page read and write
365E000
stack
page read and write
B94000
heap
page read and write
BE0000
direct allocation
page read and write
B9E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
BF0000
unkown
page readonly
49C1000
heap
page read and write
4381000
heap
page read and write
10B7000
unkown
page execute and read and write
B95000
heap
page read and write
2B5F000
stack
page read and write
4BF1000
heap
page read and write
48BE000
stack
page read and write
4381000
heap
page read and write
BE0000
direct allocation
page read and write
34BE000
stack
page read and write
A3E000
stack
page read and write
2FBE000
stack
page read and write
401F000
stack
page read and write
BA9000
heap
page read and write
373E000
stack
page read and write
2C3F000
stack
page read and write
4990000
direct allocation
page execute and read and write
DDE000
stack
page read and write
ABE000
stack
page read and write
BE0000
direct allocation
page read and write
89000
unkown
page write copy
F10000
unkown
page execute and read and write
3EDF000
stack
page read and write
BE0000
direct allocation
page read and write
4BF1000
heap
page read and write
3D9F000
stack
page read and write
2750000
direct allocation
page read and write
B42000
heap
page read and write
6761000
heap
page read and write
B5C000
heap
page read and write
4F7F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
7D7E000
stack
page read and write
4381000
heap
page read and write
4800000
direct allocation
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
3D7E000
stack
page read and write
15E0000
direct allocation
page read and write
BE0000
direct allocation
page read and write
1130000
heap
page read and write
4B40000
direct allocation
page execute and read and write
9E4000
heap
page read and write
5E0000
heap
page read and write
3B1F000
stack
page read and write
B94000
heap
page read and write
9E4000
heap
page read and write
3FFE000
stack
page read and write
413E000
stack
page read and write
15E0000
direct allocation
page read and write
3E7F000
stack
page read and write
4B1F000
stack
page read and write
3EBE000
stack
page read and write
451F000
stack
page read and write
3ABF000
stack
page read and write
B36000
heap
page read and write
323E000
stack
page read and write
15E0000
direct allocation
page read and write
EFA000
unkown
page execute and read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
B80000
heap
page read and write
117E000
stack
page read and write
4BF1000
heap
page read and write
5FEF000
stack
page read and write
5020000
direct allocation
page execute and read and write
9E4000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
9E4000
heap
page read and write
DEA000
unkown
page execute and read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
397F000
stack
page read and write
BF0000
unkown
page readonly
4BF1000
heap
page read and write
BE0000
direct allocation
page read and write
BE0000
direct allocation
page read and write
49F0000
direct allocation
page execute and read and write
5C0000
heap
page read and write
B94000
heap
page read and write
3AFE000
stack
page read and write
BE0000
direct allocation
page read and write
4381000
heap
page read and write
9E4000
heap
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
50E1000
direct allocation
page read and write
15E0000
direct allocation
page read and write
BE0000
direct allocation
page read and write
49C0000
direct allocation
page execute and read and write
315E000
stack
page read and write
30BF000
stack
page read and write
4541000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
6770000
heap
page read and write
419E000
stack
page read and write
7AD000
stack
page read and write
45FF000
stack
page read and write
15E0000
direct allocation
page read and write
9E4000
heap
page read and write
4BF1000
heap
page read and write
437F000
stack
page read and write
34DF000
stack
page read and write
C5B000
unkown
page execute and read and write
49C1000
heap
page read and write
49D0000
direct allocation
page read and write
80F0000
heap
page read and write
4381000
heap
page read and write
92F000
stack
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
BE0000
direct allocation
page read and write
35FE000
stack
page read and write
B81000
heap
page read and write
5E0000
heap
page read and write
4381000
heap
page read and write
340000
unkown
page execute and write copy
4BF1000
heap
page read and write
4381000
heap
page read and write
337E000
stack
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
42DE000
stack
page read and write
329E000
stack
page read and write
82000
unkown
page execute and read and write
4381000
heap
page read and write
219000
unkown
page execute and read and write
337E000
stack
page read and write
5D0000
heap
page read and write
15E0000
direct allocation
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
9E4000
heap
page read and write
2750000
direct allocation
page read and write
B94000
heap
page read and write
BE0000
direct allocation
page read and write
31FF000
stack
page read and write
9E4000
heap
page read and write
4E7000
unkown
page execute and read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
2EDE000
stack
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
BDE000
stack
page read and write
4F90000
direct allocation
page execute and read and write
612F000
stack
page read and write
4861000
direct allocation
page read and write
3BFF000
stack
page read and write
4541000
heap
page read and write
BA9000
heap
page read and write
4BF1000
heap
page read and write
2750000
direct allocation
page read and write
AFE000
stack
page read and write
9E4000
heap
page read and write
9E0000
heap
page read and write
9E4000
heap
page read and write
2770000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
415F000
stack
page read and write
1180000
direct allocation
page execute and read and write
347F000
stack
page read and write
A6F000
stack
page read and write
8B000
unkown
page execute and read and write
4BF1000
heap
page read and write
4960000
direct allocation
page execute and read and write
5F0000
heap
page read and write
BF1000
unkown
page execute and write copy
4BF1000
heap
page read and write
BE0000
direct allocation
page read and write
2E3F000
stack
page read and write
F10000
unkown
page execute and write copy
BA0000
heap
page read and write
45C000
stack
page read and write
BC1000
heap
page read and write
4BF1000
heap
page read and write
4F90000
direct allocation
page execute and read and write
4381000
heap
page read and write
4540000
heap
page read and write
30FE000
stack
page read and write
9E4000
heap
page read and write
676E000
heap
page read and write
66A000
heap
page read and write
379E000
stack
page read and write
BA8000
heap
page read and write
4541000
heap
page read and write
9E4000
heap
page read and write
4BF1000
heap
page read and write
2777000
heap
page read and write
B94000
heap
page read and write
4BF1000
heap
page read and write
397F000
stack
page read and write
2D9E000
stack
page read and write
BA3000
heap
page read and write
9E4000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
49E0000
direct allocation
page execute and read and write
F10000
unkown
page execute and read and write
4A1E000
stack
page read and write
4EA1000
direct allocation
page read and write
361F000
stack
page read and write
BBE000
heap
page read and write
15E0000
direct allocation
page read and write
15E0000
direct allocation
page read and write
BE0000
direct allocation
page read and write
ECB000
unkown
page execute and read and write
4381000
heap
page read and write
4800000
direct allocation
page read and write
473F000
stack
page read and write
89000
unkown
page read and write
427E000
stack
page read and write
3C3E000
stack
page read and write
5210000
direct allocation
page execute and read and write
1137000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
341000
unkown
page execute and write copy
3D7E000
stack
page read and write
9E4000
heap
page read and write
4BF1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
B57000
heap
page read and write
4392000
heap
page read and write
4381000
heap
page read and write
C59000
unkown
page read and write
297F000
stack
page read and write
4E00000
trusted library allocation
page read and write
B9D000
heap
page read and write
49C0000
heap
page read and write
4381000
heap
page read and write
11BA000
heap
page read and write
2750000
direct allocation
page read and write
4381000
heap
page read and write
5DDE000
stack
page read and write
55D000
stack
page read and write
4B50000
direct allocation
page execute and read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
C52000
unkown
page execute and read and write
4BF1000
heap
page read and write
31FF000
stack
page read and write
301E000
stack
page read and write
39BE000
stack
page read and write
BE0000
direct allocation
page read and write
351E000
stack
page read and write
B32000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
BE0000
direct allocation
page read and write
4BF1000
heap
page read and write
2CFF000
stack
page read and write
602E000
stack
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
4E9000
unkown
page execute and write copy
4BF1000
heap
page read and write
7E7F000
stack
page read and write
B4E000
stack
page read and write
4381000
heap
page read and write
B58000
heap
page read and write
2ABE000
stack
page read and write
2FDF000
stack
page read and write
441E000
stack
page read and write
4800000
direct allocation
page read and write
39DF000
stack
page read and write
325F000
stack
page read and write
4381000
heap
page read and write
BE0000
direct allocation
page read and write
BF1000
unkown
page execute and write copy
9E4000
heap
page read and write
9E4000
heap
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
2FB000
unkown
page execute and read and write
5DE5000
heap
page read and write
15E0000
direct allocation
page read and write
49D0000
direct allocation
page read and write
4381000
heap
page read and write
4B70000
direct allocation
page execute and read and write
4381000
heap
page read and write
15E0000
direct allocation
page read and write
4381000
heap
page read and write
5210000
direct allocation
page execute and read and write
9E4000
heap
page read and write
BA3000
heap
page read and write
57B000
stack
page read and write
4BF1000
heap
page read and write
BE0000
direct allocation
page read and write
4BF1000
heap
page read and write
6760000
heap
page read and write
49A0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
10B9000
unkown
page execute and write copy
64E000
stack
page read and write
35FE000
stack
page read and write
3D3F000
stack
page read and write
BE0000
direct allocation
page read and write
2A5F000
stack
page read and write
4980000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
32A000
unkown
page execute and read and write
4BF1000
heap
page read and write
F11000
unkown
page execute and write copy
BE0000
direct allocation
page read and write
4381000
heap
page read and write
413E000
stack
page read and write
BE0000
direct allocation
page read and write
4BB0000
heap
page read and write
4BF1000
heap
page read and write
2740000
heap
page read and write
4381000
heap
page read and write
49D0000
direct allocation
page read and write
331000
unkown
page execute and read and write
3FBF000
stack
page read and write
4A31000
direct allocation
page read and write
2F7F000
stack
page read and write
4BF1000
heap
page read and write
15E0000
direct allocation
page read and write
4520000
heap
page read and write
B94000
heap
page read and write
5210000
direct allocation
page execute and read and write
5080000
direct allocation
page read and write
4381000
heap
page read and write
BE0000
direct allocation
page read and write
1110000
direct allocation
page read and write
F01000
unkown
page execute and read and write
5080000
direct allocation
page read and write
ADE000
stack
page read and write
4BF1000
heap
page read and write
2750000
direct allocation
page read and write
BF0000
unkown
page readonly
38DE000
stack
page read and write
43BE000
stack
page read and write
4381000
heap
page read and write
267F000
stack
page read and write
4990000
direct allocation
page execute and read and write
3D3F000
stack
page read and write
2D3E000
stack
page read and write
9E4000
heap
page read and write
B94000
heap
page read and write
4381000
heap
page read and write
2750000
direct allocation
page read and write
B81000
heap
page read and write
4BF1000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
4381000
heap
page read and write
BE0000
direct allocation
page read and write
B94000
heap
page read and write
2BFE000
stack
page read and write
5210000
direct allocation
page execute and read and write
EFA000
unkown
page execute and read and write
30FE000
stack
page read and write
4A10000
direct allocation
page execute and read and write
35BF000
stack
page read and write
BE0000
direct allocation
page read and write
4381000
heap
page read and write
373E000
stack
page read and write
B90000
heap
page read and write
4990000
direct allocation
page execute and read and write
66E000
heap
page read and write
4381000
heap
page read and write
2750000
direct allocation
page read and write
3FFE000
stack
page read and write
3ABF000
stack
page read and write
4381000
heap
page read and write
26FE000
stack
page read and write
B42000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
2D5F000
stack
page read and write
4381000
heap
page read and write
9E4000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
405E000
stack
page read and write
5DE6000
heap
page read and write
4541000
heap
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
BDE000
stack
page read and write
3B5E000
stack
page read and write
6770000
heap
page read and write
20000
unkown
page read and write
3C5F000
stack
page read and write
B94000
heap
page read and write
9E4000
heap
page read and write
BE0000
direct allocation
page read and write
9E4000
heap
page read and write
BF0000
unkown
page read and write
2BBF000
stack
page read and write
4BF1000
heap
page read and write
1190000
direct allocation
page execute and read and write
BB2000
heap
page read and write
4381000
heap
page read and write
B94000
heap
page read and write
4BF1000
heap
page read and write
389F000
stack
page read and write
4BF1000
heap
page read and write
4B30000
direct allocation
page execute and read and write
9E4000
heap
page read and write
15E0000
direct allocation
page read and write
7D3C000
stack
page read and write
7C3B000
stack
page read and write
4BF1000
heap
page read and write
C59000
unkown
page write copy
3DDE000
stack
page read and write
5000000
direct allocation
page execute and read and write
4381000
heap
page read and write
4541000
heap
page read and write
4BF1000
heap
page read and write
C52000
unkown
page execute and read and write
5210000
direct allocation
page execute and read and write
20000
unkown
page readonly
4381000
heap
page read and write
333F000
stack
page read and write
9E4000
heap
page read and write
9E4000
heap
page read and write
ECB000
unkown
page execute and read and write
4381000
heap
page read and write
3C9E000
stack
page read and write
9E4000
heap
page read and write
49C1000
heap
page read and write
9E4000
heap
page read and write
4541000
heap
page read and write
10B9000
unkown
page execute and write copy
273E000
stack
page read and write
4A30000
direct allocation
page execute and read and write
4381000
heap
page read and write
36FF000
stack
page read and write
9E4000
heap
page read and write
26BE000
stack
page read and write
36FF000
stack
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
11A0000
heap
page read and write
2A7F000
stack
page read and write
2F7F000
stack
page read and write
4BF1000
heap
page read and write
4381000
heap
page read and write
295F000
stack
page read and write
BB2000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4980000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
11AB000
heap
page read and write
375F000
stack
page read and write
B81000
heap
page read and write
4381000
heap
page read and write
339F000
stack
page read and write
2750000
direct allocation
page read and write
8B000
unkown
page execute and read and write
21000
unkown
page execute and write copy
5030000
trusted library allocation
page read and write
21A000
unkown
page execute and read and write
C59000
unkown
page write copy
B94000
heap
page read and write
4F90000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
96E000
stack
page read and write
AEA000
heap
page read and write
9E4000
heap
page read and write
49B0000
direct allocation
page execute and read and write
44FE000
stack
page read and write
4990000
direct allocation
page execute and read and write
3BFF000
stack
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
387E000
stack
page read and write
5DE0000
heap
page read and write
2FBE000
stack
page read and write
4B80000
direct allocation
page execute and read and write
9E4000
heap
page read and write
9E4000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
1110000
direct allocation
page read and write
9E4000
heap
page read and write
4381000
heap
page read and write
B94000
heap
page read and write
BF0000
unkown
page read and write
B40000
heap
page read and write
40FF000
stack
page read and write
3A1E000
stack
page read and write
4BB4000
heap
page read and write
F10000
unkown
page execute and write copy
4381000
heap
page read and write
4BF1000
heap
page read and write
There are 697 hidden memdumps, click here to show them.