IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.php.
unknown
http://185.215.113.16/Jo89Ku7d/index.php-
unknown
http://185.215.113.16/Jo89Ku7d/index.phpm
unknown
http://185.215.113.16/Jo89Ku7d/index.phpk
unknown
http://185.215.113.16/Jo89Ku7d/index.phpj
unknown
http://185.215.113.16/Jo89Ku7d/index.php(
unknown
http://185.215.113.16/Jo89Ku7d/index.phpa
unknown
http://185.215.113.16/Jo89Ku7d/index.php_
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded15
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedC5
unknown
http://185.215.113.16/Jo89Ku7d/index.phpO
unknown
http://185.215.113.16/Jo89Ku7d/index.phpN
unknown
http://185.215.113.16/
unknown
http://185.215.113.16/Jo89Ku7d/index.phpM
unknown
http://185.215.113.16/Jo89Ku7d/index.phpL
unknown
http://185.215.113.16/Jo89Ku7d/index.phpI
unknown
http://185.215.113.16/Jo89Ku7d/index.phpE
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedU5
unknown
http://185.215.113.16/Jo89Ku7d/index.phpy1mb3JtLXVybGVuY29kZWQ=V
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpy
unknown
http://185.215.113.16/Jo89Ku7d/index.phpx
unknown
http://185.215.113.16/Jo89Ku7d/index.phpu
unknown
http://185.215.113.16/Jo89Ku7d/index.phpp5
unknown
http://185.215.113.16/Jo89Ku7d/index.php1
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
206.23.85.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F1000
unkown
page execute and read and write
malicious
F1000
unkown
page execute and read and write
malicious
48C0000
direct allocation
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
5090000
direct allocation
page read and write
malicious
FB1000
unkown
page execute and read and write
malicious
48E0000
direct allocation
page read and write
malicious
F1000
unkown
page execute and read and write
malicious
3E8E000
stack
page read and write
4911000
heap
page read and write
3DCF000
stack
page read and write
384E000
stack
page read and write
A30000
heap
page read and write
4A70000
direct allocation
page execute and read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
4A50000
direct allocation
page execute and read and write
11D4000
heap
page read and write
48E0000
direct allocation
page read and write
443F000
stack
page read and write
390E000
stack
page read and write
38FF000
stack
page read and write
4441000
heap
page read and write
443F000
stack
page read and write
F1000
unkown
page execute and write copy
A00000
heap
page read and write
25D0000
direct allocation
page read and write
33FF000
stack
page read and write
25D0000
direct allocation
page read and write
48E0000
direct allocation
page read and write
B44000
heap
page read and write
F1000
unkown
page execute and write copy
4440000
direct allocation
page read and write
4BFB000
stack
page read and write
25C0000
heap
page read and write
F90000
direct allocation
page read and write
4911000
heap
page read and write
A6E000
heap
page read and write
4911000
heap
page read and write
4F20000
direct allocation
page execute and read and write
25D0000
direct allocation
page read and write
3F8F000
stack
page read and write
A4E000
stack
page read and write
4C11000
heap
page read and write
F0E000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
99A000
heap
page read and write
354E000
stack
page read and write
444E000
stack
page read and write
4911000
heap
page read and write
27FF000
stack
page read and write
5220000
direct allocation
page execute and read and write
4911000
heap
page read and write
5250000
direct allocation
page execute and read and write
4911000
heap
page read and write
F90000
direct allocation
page read and write
48E0000
direct allocation
page read and write
A4C000
heap
page read and write
3CBF000
stack
page read and write
F0000
unkown
page read and write
4911000
heap
page read and write
99E000
heap
page read and write
B44000
heap
page read and write
36CF000
stack
page read and write
B44000
heap
page read and write
408E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
37FE000
stack
page read and write
A6E000
heap
page read and write
F90000
direct allocation
page read and write
B44000
heap
page read and write
4441000
heap
page read and write
4451000
heap
page read and write
4441000
heap
page read and write
50DE000
stack
page read and write
4441000
heap
page read and write
357E000
stack
page read and write
B44000
heap
page read and write
4441000
heap
page read and write
25D0000
direct allocation
page read and write
B44000
heap
page read and write
132E000
stack
page read and write
25F7000
heap
page read and write
4441000
heap
page read and write
4A70000
direct allocation
page execute and read and write
32BF000
stack
page read and write
340E000
stack
page read and write
257C000
stack
page read and write
4450000
heap
page read and write
4911000
heap
page read and write
4441000
heap
page read and write
407F000
stack
page read and write
4441000
heap
page read and write
4911000
heap
page read and write
A5E000
heap
page read and write
15B000
unkown
page execute and read and write
320F000
stack
page read and write
334E000
stack
page read and write
4911000
heap
page read and write
2D0F000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
15B000
unkown
page execute and read and write
4911000
heap
page read and write
420F000
stack
page read and write
4441000
heap
page read and write
25D0000
direct allocation
page read and write
3BE000
unkown
page execute and read and write
127E000
unkown
page execute and read and write
2EE0000
direct allocation
page read and write
32FE000
stack
page read and write
348E000
stack
page read and write
4911000
heap
page read and write
B44000
heap
page read and write
4441000
heap
page read and write
B44000
heap
page read and write
434F000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
4C3E000
stack
page read and write
4441000
heap
page read and write
49CE000
stack
page read and write
4911000
heap
page read and write
4441000
heap
page read and write
367F000
stack
page read and write
5220000
direct allocation
page execute and read and write
865C000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
2EFF000
stack
page read and write
4911000
heap
page read and write
B44000
heap
page read and write
2DFE000
stack
page read and write
36BE000
stack
page read and write
4911000
heap
page read and write
31BE000
stack
page read and write
350F000
stack
page read and write
4911000
heap
page read and write
4880000
heap
page read and write
330F000
stack
page read and write
3BBE000
stack
page read and write
B44000
heap
page read and write
4911000
heap
page read and write
3FCE000
stack
page read and write
6300000
heap
page read and write
2EE0000
direct allocation
page read and write
3B7F000
stack
page read and write
2DC000
unkown
page execute and read and write
3A3F000
stack
page read and write
5200000
direct allocation
page execute and read and write
3F3F000
stack
page read and write
4441000
heap
page read and write
5064000
heap
page read and write
83C000
stack
page read and write
317F000
stack
page read and write
93D000
stack
page read and write
318E000
stack
page read and write
4911000
heap
page read and write
8070000
heap
page read and write
4911000
heap
page read and write
B44000
heap
page read and write
277E000
stack
page read and write
344F000
stack
page read and write
4880000
trusted library allocation
page read and write
4441000
heap
page read and write
27D0000
heap
page read and write
11D4000
heap
page read and write
2A3E000
stack
page read and write
4911000
heap
page read and write
398E000
stack
page read and write
4911000
heap
page read and write
9B0000
heap
page read and write
1462000
unkown
page execute and read and write
2DC000
unkown
page execute and read and write
4441000
heap
page read and write
4A40000
direct allocation
page execute and read and write
83C000
stack
page read and write
4440000
direct allocation
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
2EE0000
direct allocation
page read and write
430E000
stack
page read and write
527D000
stack
page read and write
119C000
unkown
page execute and read and write
3F7E000
stack
page read and write
4921000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
A1B000
heap
page read and write
3DFF000
stack
page read and write
4441000
heap
page read and write
4911000
heap
page read and write
3EE000
unkown
page execute and read and write
3ACE000
stack
page read and write
A09000
heap
page read and write
33FF000
stack
page read and write
4A50000
direct allocation
page execute and read and write
4F20000
direct allocation
page execute and read and write
4455000
heap
page read and write
406000
unkown
page execute and write copy
433E000
stack
page read and write
4441000
heap
page read and write
152000
unkown
page execute and read and write
3F4E000
stack
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
B44000
heap
page read and write
3BE000
unkown
page execute and read and write
A30000
heap
page read and write
4911000
heap
page read and write
F90000
direct allocation
page read and write
407000
unkown
page execute and write copy
3E3E000
stack
page read and write
5A2000
unkown
page execute and read and write
490C000
stack
page read and write
2F0F000
stack
page read and write
4911000
heap
page read and write
5220000
direct allocation
page execute and read and write
FB0000
unkown
page read and write
4911000
heap
page read and write
BED000
stack
page read and write
4440000
direct allocation
page read and write
300F000
stack
page read and write
2DBF000
stack
page read and write
11D4000
heap
page read and write
4911000
heap
page read and write
407F000
stack
page read and write
B44000
heap
page read and write
855B000
stack
page read and write
4911000
heap
page read and write
364F000
stack
page read and write
4911000
heap
page read and write
4DF1000
direct allocation
page read and write
4EBE000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
B44000
heap
page read and write
12C6000
unkown
page execute and read and write
4EF0000
direct allocation
page execute and read and write
4441000
heap
page read and write
A12000
heap
page read and write
4441000
heap
page read and write
50F1000
direct allocation
page read and write
393E000
stack
page read and write
4B00000
direct allocation
page execute and read and write
2F00000
heap
page read and write
CEF000
stack
page read and write
4441000
heap
page read and write
A58000
heap
page read and write
4A50000
direct allocation
page execute and read and write
4441000
heap
page read and write
424D000
stack
page read and write
136E000
stack
page read and write
4441000
heap
page read and write
4440000
direct allocation
page read and write
B44000
heap
page read and write
159000
unkown
page read and write
4440000
direct allocation
page read and write
15B000
unkown
page execute and read and write
37BF000
stack
page read and write
353F000
stack
page read and write
15B000
unkown
page execute and read and write
42FF000
stack
page read and write
2ED0000
heap
page read and write
B44000
heap
page read and write
159000
unkown
page read and write
2EE0000
direct allocation
page read and write
28FF000
stack
page read and write
81AC000
stack
page read and write
965000
heap
page read and write
12C7000
unkown
page execute and write copy
4922000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4A90000
direct allocation
page execute and read and write
4911000
heap
page read and write
4911000
heap
page read and write
480E000
stack
page read and write
498F000
stack
page read and write
93C000
stack
page read and write
29FF000
stack
page read and write
4F20000
direct allocation
page execute and read and write
4DDC000
stack
page read and write
4911000
heap
page read and write
353F000
stack
page read and write
4451000
heap
page read and write
3A3F000
stack
page read and write
4911000
heap
page read and write
6CD1000
heap
page read and write
4911000
heap
page read and write
492E000
stack
page read and write
4911000
heap
page read and write
4A60000
direct allocation
page execute and read and write
370E000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
960000
heap
page read and write
634E000
stack
page read and write
4911000
heap
page read and write
A58000
heap
page read and write
4911000
heap
page read and write
440F000
stack
page read and write
A4A000
heap
page read and write
4FBE000
stack
page read and write
4451000
heap
page read and write
38FF000
stack
page read and write
410E000
stack
page read and write
A5E000
heap
page read and write
4911000
heap
page read and write
2F3E000
stack
page read and write
25D0000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
4911000
heap
page read and write
152000
unkown
page execute and read and write
F90000
direct allocation
page read and write
4440000
direct allocation
page read and write
4441000
heap
page read and write
3D4E000
stack
page read and write
4910000
heap
page read and write
159000
unkown
page write copy
25D0000
direct allocation
page read and write
4911000
heap
page read and write
83EE000
stack
page read and write
4C11000
heap
page read and write
4441000
heap
page read and write
F1000
unkown
page execute and write copy
A45000
heap
page read and write
4441000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
28FF000
stack
page read and write
2B3F000
stack
page read and write
D5E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
B44000
heap
page read and write
A17000
heap
page read and write
3F0F000
stack
page read and write
4A60000
direct allocation
page execute and read and write
32CE000
stack
page read and write
11A0000
heap
page read and write
4A2F000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
263E000
stack
page read and write
4911000
heap
page read and write
159000
unkown
page read and write
11D0000
heap
page read and write
9F0000
heap
page read and write
F10000
heap
page read and write
378F000
stack
page read and write
4A5C000
stack
page read and write
4441000
heap
page read and write
2EE0000
direct allocation
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
406000
unkown
page execute and write copy
4911000
heap
page read and write
B44000
heap
page read and write
4911000
heap
page read and write
9DD000
heap
page read and write
5090000
direct allocation
page read and write
A30000
heap
page read and write
307E000
stack
page read and write
4441000
heap
page read and write
B44000
heap
page read and write
3A8F000
stack
page read and write
4911000
heap
page read and write
A2E000
heap
page read and write
4911000
heap
page read and write
6CE0000
heap
page read and write
3E3E000
stack
page read and write
B44000
heap
page read and write
2EE0000
direct allocation
page read and write
152000
unkown
page execute and read and write
3B4F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
4911000
heap
page read and write
273F000
stack
page read and write
AA0000
heap
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
82AC000
stack
page read and write
4441000
heap
page read and write
4D90000
direct allocation
page read and write
66CF000
stack
page read and write
4A50000
direct allocation
page execute and read and write
62E0000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4911000
heap
page read and write
B44000
heap
page read and write
53BD000
stack
page read and write
2DBF000
stack
page read and write
9DB000
heap
page read and write
5090000
direct allocation
page read and write
300F000
stack
page read and write
41BF000
stack
page read and write
3A0F000
stack
page read and write
4911000
heap
page read and write
4441000
heap
page read and write
4A70000
direct allocation
page execute and read and write
13B0000
heap
page read and write
48C0000
direct allocation
page read and write
40CF000
stack
page read and write
4A70000
direct allocation
page execute and read and write
4911000
heap
page read and write
4EDF000
stack
page read and write
B44000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
F90000
direct allocation
page read and write
380F000
stack
page read and write
F90000
direct allocation
page read and write
F0000
unkown
page readonly
4911000
heap
page read and write
4911000
heap
page read and write
4D90000
direct allocation
page read and write
4911000
heap
page read and write
A4C000
heap
page read and write
4F30000
direct allocation
page execute and read and write
5220000
direct allocation
page execute and read and write
4B0E000
stack
page read and write
F8E000
stack
page read and write
B44000
heap
page read and write
2DC000
unkown
page execute and read and write
4911000
heap
page read and write
393E000
stack
page read and write
F90000
direct allocation
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
468F000
stack
page read and write
4441000
heap
page read and write
4F10000
direct allocation
page execute and read and write
25D0000
direct allocation
page read and write
5270000
direct allocation
page execute and read and write
5220000
direct allocation
page execute and read and write
A5A000
heap
page read and write
9F2000
heap
page read and write
4441000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4441000
heap
page read and write
2B7E000
stack
page read and write
3C8F000
stack
page read and write
407000
unkown
page execute and write copy
4911000
heap
page read and write
41FE000
stack
page read and write
4911000
heap
page read and write
F90000
direct allocation
page read and write
4A80000
direct allocation
page execute and read and write
44CE000
stack
page read and write
9A0000
heap
page read and write
2B3F000
stack
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
2EE0000
direct allocation
page read and write
11D4000
heap
page read and write
A50000
heap
page read and write
15B000
unkown
page execute and read and write
5220000
direct allocation
page execute and read and write
4911000
heap
page read and write
394F000
stack
page read and write
27BE000
stack
page read and write
A6B000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4441000
heap
page read and write
358F000
stack
page read and write
4441000
heap
page read and write
48C0000
direct allocation
page read and write
4440000
heap
page read and write
5050000
trusted library allocation
page read and write
4911000
heap
page read and write
4441000
heap
page read and write
4911000
heap
page read and write
5210000
direct allocation
page execute and read and write
4441000
heap
page read and write
B40000
heap
page read and write
4A0F000
stack
page read and write
3B7F000
stack
page read and write
406000
unkown
page execute and read and write
4441000
heap
page read and write
343E000
stack
page read and write
B10000
heap
page read and write
4C0F000
stack
page read and write
4F00000
direct allocation
page execute and read and write
3A7D000
stack
page read and write
990000
heap
page read and write
A5A000
heap
page read and write
4911000
heap
page read and write
B44000
heap
page read and write
52A0000
direct allocation
page execute and read and write
490F000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
4911000
heap
page read and write
15AF000
stack
page read and write
4921000
heap
page read and write
3A7D000
stack
page read and write
6305000
heap
page read and write
4911000
heap
page read and write
11D4000
heap
page read and write
B44000
heap
page read and write
4911000
heap
page read and write
25D0000
direct allocation
page read and write
B44000
heap
page read and write
11D4000
heap
page read and write
658F000
stack
page read and write
E2E000
stack
page read and write
4441000
heap
page read and write
32BF000
stack
page read and write
367F000
stack
page read and write
433E000
stack
page read and write
470F000
stack
page read and write
4440000
direct allocation
page read and write
3A4E000
stack
page read and write
3CCE000
stack
page read and write
484F000
stack
page read and write
B44000
heap
page read and write
A14000
heap
page read and write
406000
unkown
page execute and write copy
303F000
stack
page read and write
27C0000
heap
page read and write
12B8000
unkown
page execute and read and write
2EE0000
direct allocation
page read and write
13BB000
heap
page read and write
406000
unkown
page execute and read and write
4441000
heap
page read and write
A12000
heap
page read and write
4911000
heap
page read and write
A0E000
heap
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
4450000
heap
page read and write
51DF000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
41FE000
stack
page read and write
25D0000
direct allocation
page read and write
2EE0000
direct allocation
page read and write
F90000
direct allocation
page read and write
4D50000
trusted library allocation
page read and write
1012000
unkown
page execute and read and write
B80000
heap
page read and write
4911000
heap
page read and write
2EE0000
direct allocation
page read and write
F90000
direct allocation
page read and write
3CBF000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4441000
heap
page read and write
B44000
heap
page read and write
4D90000
direct allocation
page read and write
4441000
heap
page read and write
4440000
direct allocation
page read and write
4451000
heap
page read and write
460E000
stack
page read and write
2ECE000
stack
page read and write
37CE000
stack
page read and write
4C10000
heap
page read and write
42FF000
stack
page read and write
4911000
heap
page read and write
3E4F000
stack
page read and write
E5F000
stack
page read and write
5240000
direct allocation
page execute and read and write
4F90000
direct allocation
page execute and read and write
4440000
direct allocation
page read and write
5260000
direct allocation
page execute and read and write
4911000
heap
page read and write
4441000
heap
page read and write
4911000
heap
page read and write
4441000
heap
page read and write
307E000
stack
page read and write
4911000
heap
page read and write
12C6000
unkown
page execute and write copy
B44000
heap
page read and write
B44000
heap
page read and write
3DFF000
stack
page read and write
4911000
heap
page read and write
4A90000
direct allocation
page execute and read and write
E8E000
stack
page read and write
4A70000
direct allocation
page execute and read and write
4911000
heap
page read and write
1019000
unkown
page write copy
368E000
stack
page read and write
4441000
heap
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
41CE000
stack
page read and write
ECB000
stack
page read and write
A71000
heap
page read and write
25D0000
direct allocation
page read and write
4911000
heap
page read and write
2E8E000
stack
page read and write
9E3000
heap
page read and write
4911000
heap
page read and write
FB0000
unkown
page readonly
6306000
heap
page read and write
11D4000
heap
page read and write
B44000
heap
page read and write
31BE000
stack
page read and write
314F000
stack
page read and write
502E000
stack
page read and write
25BE000
stack
page read and write
3BCF000
stack
page read and write
B44000
heap
page read and write
4911000
heap
page read and write
4890000
trusted library allocation
page read and write
11D4000
heap
page read and write
52BD000
stack
page read and write
37BF000
stack
page read and write
A6E000
heap
page read and write
4911000
heap
page read and write
F20000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
357E000
stack
page read and write
F90000
direct allocation
page read and write
328F000
stack
page read and write
A0B000
heap
page read and write
458E000
stack
page read and write
4911000
heap
page read and write
A6A000
heap
page read and write
407000
unkown
page execute and write copy
4911000
heap
page read and write
253E000
stack
page read and write
9E5000
heap
page read and write
4A50000
direct allocation
page execute and read and write
2CBE000
stack
page read and write
A6A000
heap
page read and write
4D7E000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4441000
heap
page read and write
4A30000
direct allocation
page execute and read and write
4440000
direct allocation
page read and write
9D8000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
3F7E000
stack
page read and write
4441000
heap
page read and write
4911000
heap
page read and write
5280000
direct allocation
page execute and read and write
4C11000
heap
page read and write
12AE000
unkown
page execute and read and write
3D0F000
stack
page read and write
2C7F000
stack
page read and write
5A2000
unkown
page execute and read and write
B44000
heap
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
2F3E000
stack
page read and write
6CD0000
heap
page read and write
F0000
unkown
page readonly
4911000
heap
page read and write
4F20000
direct allocation
page execute and read and write
36BE000
stack
page read and write
2EE0000
direct allocation
page read and write
B44000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4441000
heap
page read and write
4441000
heap
page read and write
38CF000
stack
page read and write
4441000
heap
page read and write
11D4000
heap
page read and write
304E000
stack
page read and write
A30000
heap
page read and write
8660000
heap
page read and write
A00000
heap
page read and write
4440000
direct allocation
page read and write
2B7E000
stack
page read and write
2F07000
heap
page read and write
25D0000
direct allocation
page read and write
B44000
heap
page read and write
4911000
heap
page read and write
644F000
stack
page read and write
4911000
heap
page read and write
517D000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
4441000
heap
page read and write
406000
unkown
page execute and read and write
A5E000
heap
page read and write
51F0000
direct allocation
page execute and read and write
4441000
heap
page read and write
2CBE000
stack
page read and write
11D4000
heap
page read and write
3CFE000
stack
page read and write
B44000
heap
page read and write
9E6000
heap
page read and write
4441000
heap
page read and write
F40000
heap
page read and write
3EE000
unkown
page execute and read and write
48C0000
direct allocation
page read and write
A30000
heap
page read and write
42CF000
stack
page read and write
27F0000
heap
page read and write
4441000
heap
page read and write
F47000
heap
page read and write
83B000
stack
page read and write
A05000
heap
page read and write
4441000
heap
page read and write
4F40000
direct allocation
page execute and read and write
4F20000
direct allocation
page execute and read and write
5090000
direct allocation
page read and write
4AD0000
direct allocation
page execute and read and write
4A50000
direct allocation
page execute and read and write
343E000
stack
page read and write
5290000
direct allocation
page execute and read and write
404F000
stack
page read and write
11D4000
heap
page read and write
4911000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4440000
direct allocation
page read and write
2EE0000
direct allocation
page read and write
512F000
stack
page read and write
4911000
heap
page read and write
3F8000
unkown
page execute and read and write
3B8E000
stack
page read and write
2EE0000
direct allocation
page read and write
35CE000
stack
page read and write
15B000
unkown
page execute and read and write
65CE000
stack
page read and write
310F000
stack
page read and write
25D0000
direct allocation
page read and write
6CE0000
heap
page read and write
4451000
heap
page read and write
3BBE000
stack
page read and write
4911000
heap
page read and write
F90000
direct allocation
page read and write
303F000
stack
page read and write
A5E000
heap
page read and write
103C000
stack
page read and write
5A2000
unkown
page execute and read and write
25D0000
direct allocation
page read and write
4911000
heap
page read and write
4451000
heap
page read and write
11D4000
heap
page read and write
25F0000
heap
page read and write
4E7F000
stack
page read and write
317F000
stack
page read and write
A57000
heap
page read and write
B44000
heap
page read and write
46CE000
stack
page read and write
F0000
unkown
page read and write
33CF000
stack
page read and write
648E000
stack
page read and write
B44000
heap
page read and write
8683000
heap
page read and write
3BE000
unkown
page execute and read and write
4441000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
37FE000
stack
page read and write
3F3F000
stack
page read and write
4460000
heap
page read and write
4ACF000
stack
page read and write
3F8000
unkown
page execute and read and write
4D3F000
stack
page read and write
2DFE000
stack
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
F0000
unkown
page read and write
A19000
heap
page read and write
4440000
direct allocation
page read and write
A45000
heap
page read and write
4911000
heap
page read and write
6CDE000
heap
page read and write
B44000
heap
page read and write
4911000
heap
page read and write
8681000
heap
page read and write
1170000
heap
page read and write
4A50000
direct allocation
page execute and read and write
3F8000
unkown
page execute and read and write
3E0E000
stack
page read and write
474E000
stack
page read and write
41BF000
stack
page read and write
B44000
heap
page read and write
40BE000
stack
page read and write
47CF000
stack
page read and write
4441000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
4440000
direct allocation
page read and write
3C0E000
stack
page read and write
9A0000
heap
page read and write
FB1000
unkown
page execute and write copy
4A40000
direct allocation
page execute and read and write
82EE000
stack
page read and write
4F20000
direct allocation
page execute and read and write
448F000
stack
page read and write
4A20000
direct allocation
page execute and read and write
4941000
direct allocation
page read and write
4911000
heap
page read and write
F90000
direct allocation
page read and write
2EFF000
stack
page read and write
101B000
unkown
page execute and read and write
40BE000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
3EE000
unkown
page execute and read and write
12EE000
stack
page read and write
2EE0000
direct allocation
page read and write
4911000
heap
page read and write
A4B000
heap
page read and write
488E000
stack
page read and write
32FE000
stack
page read and write
45CF000
stack
page read and write
11D4000
heap
page read and write
B44000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
D2E000
stack
page read and write
4441000
heap
page read and write
29FF000
stack
page read and write
13AE000
stack
page read and write
5230000
direct allocation
page execute and read and write
4441000
heap
page read and write
B44000
heap
page read and write
454F000
stack
page read and write
27F7000
heap
page read and write
B44000
heap
page read and write
F0000
unkown
page readonly
D1F000
stack
page read and write
418F000
stack
page read and write
4441000
heap
page read and write
2E0F000
stack
page read and write
9D0000
heap
page read and write
2E4F000
stack
page read and write
113D000
stack
page read and write
93A000
stack
page read and write
438E000
stack
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
159000
unkown
page write copy
4911000
heap
page read and write
5060000
heap
page read and write
3CFE000
stack
page read and write
2C7F000
stack
page read and write
1019000
unkown
page read and write
B44000
heap
page read and write
25FD000
heap
page read and write
4F80000
direct allocation
page execute and read and write
2A3E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
52B0000
direct allocation
page execute and read and write
9F2000
heap
page read and write
159000
unkown
page write copy
There are 826 hidden memdumps, click here to show them.