IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpHost185.215.113.16
unknown
http://185.215.113.16/Jo89Ku7d/index.phpi
unknown
http://185.215.113.16/Jo89Ku7d/index.php(
unknown
http://185.215.113.16/Jo89Ku7d/index.phpg
unknown
http://185.215.113.16/Jo89Ku7d/index.php&
unknown
http://185.215.113.16/Jo89Ku7d/index.phpd
unknown
http://185.215.113.16/Jo89Ku7d/index.phpc
unknown
http://185.215.113.16/Jo89Ku7d/index.phpU
unknown
http://185.215.113.16/Jo89Ku7d/index.phpT
unknown
http://185.215.113.16/Jo89Ku7d/index.phpS
unknown
http://185.215.113.16/
unknown
http://185.215.113.16/Jo89Ku7d/index.phpJ
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded9
unknown
http://185.215.113.16/Jo89Ku7d/index.phpE
unknown
http://185.215.113.16/Jo89Ku7d/index.phpC
unknown
http://185.215.113.16/Jo89Ku7d/index.phpB
unknown
http://185.215.113.16/Jo89Ku7d/index.phpz
unknown
http://185.215.113.16/Jo89Ku7d/index.php9
unknown
http://185.215.113.16/Jo89Ku7d/index.phpx
unknown
http://185.215.113.16/Jo89Ku7d/index.phpfer-Encoding:
unknown
http://185.215.113.16/Jo89Ku7d/index.phpv
unknown
http://185.215.113.16/Jo89Ku7d/index.phphp
unknown
http://185.215.113.16/Jo89Ku7d/index.phpu
unknown
http://185.215.113.16/Jo89Ku7d/index.phpt
unknown
http://185.215.113.16/Jo89Ku7d/index.php0
unknown
There are 16 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5260000
direct allocation
page read and write
malicious
CE1000
unkown
page execute and read and write
malicious
4DE0000
direct allocation
page read and write
malicious
CE1000
unkown
page execute and read and write
malicious
CE1000
unkown
page execute and read and write
malicious
48E0000
direct allocation
page read and write
malicious
4B80000
direct allocation
page read and write
malicious
CE1000
unkown
page execute and read and write
malicious
49C0000
direct allocation
page read and write
malicious
5350000
direct allocation
page read and write
malicious
CE1000
unkown
page execute and read and write
malicious
CE1000
unkown
page execute and read and write
malicious
5250000
direct allocation
page read and write
malicious
281000
unkown
page execute and read and write
malicious
604000
heap
page read and write
1044000
heap
page read and write
4961000
heap
page read and write
CC0000
direct allocation
page read and write
CE0000
unkown
page read and write
4F60000
direct allocation
page execute and read and write
1743000
heap
page read and write
469E000
stack
page read and write
4B50000
direct allocation
page execute and read and write
5EC000
heap
page read and write
D49000
unkown
page write copy
161E000
stack
page read and write
465E000
stack
page read and write
1044000
heap
page read and write
381E000
stack
page read and write
27E0000
direct allocation
page read and write
3A1E000
stack
page read and write
4DE1000
heap
page read and write
CB7000
heap
page read and write
4961000
heap
page read and write
4E1E000
stack
page read and write
2EEE000
stack
page read and write
4961000
heap
page read and write
4EC1000
heap
page read and write
481F000
stack
page read and write
4961000
heap
page read and write
CC0000
direct allocation
page read and write
1044000
heap
page read and write
1510000
direct allocation
page read and write
4961000
heap
page read and write
375F000
stack
page read and write
14D4000
heap
page read and write
4D00000
direct allocation
page execute and read and write
4961000
heap
page read and write
4961000
heap
page read and write
375E000
stack
page read and write
436E000
stack
page read and write
3DAF000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
D49000
unkown
page read and write
4DE1000
heap
page read and write
2A5E000
stack
page read and write
3BDE000
stack
page read and write
1030000
direct allocation
page read and write
671B000
stack
page read and write
1184000
unkown
page execute and read and write
309E000
stack
page read and write
4941000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
2A1F000
stack
page read and write
363F000
stack
page read and write
4961000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
4961000
heap
page read and write
4DE1000
heap
page read and write
4961000
heap
page read and write
11F0000
direct allocation
page read and write
4961000
heap
page read and write
FEC000
unkown
page execute and read and write
4961000
heap
page read and write
1044000
heap
page read and write
156E000
stack
page read and write
31F0000
heap
page read and write
280000
unkown
page readonly
435E000
stack
page read and write
455E000
stack
page read and write
439F000
stack
page read and write
FAA000
unkown
page execute and read and write
4961000
heap
page read and write
FD6000
unkown
page execute and read and write
4F20000
direct allocation
page execute and read and write
1044000
heap
page read and write
39EF000
stack
page read and write
4B40000
direct allocation
page execute and read and write
633E000
stack
page read and write
54D0000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
6AEC000
stack
page read and write
864000
heap
page read and write
4961000
heap
page read and write
C60000
heap
page read and write
5D9000
heap
page read and write
54C0000
direct allocation
page execute and read and write
D42000
unkown
page execute and read and write
3EBE000
stack
page read and write
16CA000
heap
page read and write
BED000
stack
page read and write
50D4000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
1044000
heap
page read and write
1750000
heap
page read and write
2E9000
unkown
page read and write
421E000
stack
page read and write
604000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
53B0000
direct allocation
page execute and read and write
4961000
heap
page read and write
548F000
stack
page read and write
4B70000
direct allocation
page execute and read and write
EC8000
unkown
page execute and read and write
57D000
unkown
page execute and read and write
4DE1000
heap
page read and write
A4F000
stack
page read and write
16B0000
direct allocation
page read and write
4B40000
direct allocation
page execute and read and write
49FE000
stack
page read and write
44AE000
stack
page read and write
15D5000
heap
page read and write
100D000
stack
page read and write
CB0000
direct allocation
page read and write
415E000
stack
page read and write
8291000
heap
page read and write
4B40000
direct allocation
page execute and read and write
11F2000
heap
page read and write
D4B000
unkown
page execute and read and write
371F000
stack
page read and write
3CDF000
stack
page read and write
3AAE000
stack
page read and write
4531000
heap
page read and write
309E000
stack
page read and write
CB0000
direct allocation
page read and write
3C6E000
stack
page read and write
18BF000
stack
page read and write
CC0000
direct allocation
page read and write
4961000
heap
page read and write
604000
heap
page read and write
2F6E000
stack
page read and write
14D4000
heap
page read and write
4460000
heap
page read and write
4961000
heap
page read and write
369F000
stack
page read and write
425F000
stack
page read and write
4961000
heap
page read and write
32DF000
stack
page read and write
1510000
direct allocation
page read and write
359E000
stack
page read and write
FDD000
unkown
page execute and read and write
2B5F000
stack
page read and write
47F0000
trusted library allocation
page read and write
4961000
heap
page read and write
667000
heap
page read and write
4961000
heap
page read and write
1044000
heap
page read and write
40AF000
stack
page read and write
58C000
unkown
page execute and write copy
1235000
heap
page read and write
14D4000
heap
page read and write
321C000
heap
page read and write
4DE1000
heap
page read and write
FAA000
unkown
page execute and read and write
165B000
stack
page read and write
4961000
heap
page read and write
40EE000
stack
page read and write
685E000
stack
page read and write
C50000
heap
page read and write
43DE000
stack
page read and write
399F000
stack
page read and write
CC0000
direct allocation
page read and write
4961000
heap
page read and write
A1B000
heap
page read and write
3A6F000
stack
page read and write
4961000
heap
page read and write
850000
heap
page read and write
4961000
heap
page read and write
4961000
heap
page read and write
4961000
heap
page read and write
41DE000
stack
page read and write
54E0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
864000
heap
page read and write
45AF000
stack
page read and write
11F0000
direct allocation
page read and write
A00000
direct allocation
page read and write
4A1F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4D00000
direct allocation
page execute and read and write
4F90000
direct allocation
page execute and read and write
D49000
unkown
page read and write
437F000
stack
page read and write
1221000
heap
page read and write
4DE1000
heap
page read and write
27DE000
stack
page read and write
4B10000
direct allocation
page execute and read and write
14D4000
heap
page read and write
2C1E000
stack
page read and write
3337000
heap
page read and write
14D4000
heap
page read and write
4961000
heap
page read and write
4461000
heap
page read and write
EC8000
unkown
page execute and read and write
4B40000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
3E6E000
stack
page read and write
14D4000
heap
page read and write
4B40000
direct allocation
page execute and read and write
11F0000
direct allocation
page read and write
3D9E000
stack
page read and write
14D4000
heap
page read and write
4DE1000
heap
page read and write
34EF000
stack
page read and write
4DC1000
heap
page read and write
4531000
heap
page read and write
4FD000
stack
page read and write
17C000
stack
page read and write
53D0000
direct allocation
page execute and read and write
73D000
stack
page read and write
54D0000
direct allocation
page execute and read and write
A00000
direct allocation
page read and write
5520000
direct allocation
page execute and read and write
46DF000
stack
page read and write
53A0000
direct allocation
page execute and read and write
355F000
stack
page read and write
459F000
stack
page read and write
1044000
heap
page read and write
14D4000
heap
page read and write
42DE000
stack
page read and write
32EF000
stack
page read and write
39BE000
stack
page read and write
4DE1000
heap
page read and write
CC0000
direct allocation
page read and write
53D0000
direct allocation
page execute and read and write
1243000
heap
page read and write
4961000
heap
page read and write
9F0000
heap
page read and write
324F000
stack
page read and write
539F000
stack
page read and write
409F000
stack
page read and write
3D9F000
stack
page read and write
65BE000
stack
page read and write
396E000
stack
page read and write
4F70000
direct allocation
page execute and read and write
4980000
heap
page read and write
1250000
heap
page read and write
4DE1000
heap
page read and write
4961000
heap
page read and write
CE1000
unkown
page execute and write copy
2DAE000
stack
page read and write
C1E000
stack
page read and write
305F000
stack
page read and write
14D4000
heap
page read and write
61F6000
heap
page read and write
3F9D000
stack
page read and write
4961000
heap
page read and write
5400000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
D42000
unkown
page execute and read and write
4961000
heap
page read and write
2F5F000
stack
page read and write
16CE000
heap
page read and write
1242000
heap
page read and write
411F000
stack
page read and write
391F000
stack
page read and write
4BE1000
direct allocation
page read and write
3D2E000
stack
page read and write
3BDE000
stack
page read and write
D4B000
unkown
page execute and read and write
6D00000
heap
page read and write
31DE000
stack
page read and write
BED000
stack
page read and write
125F000
heap
page read and write
4EC0000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
4961000
heap
page read and write
61F0000
heap
page read and write
1044000
heap
page read and write
FEC000
unkown
page execute and write copy
5430000
direct allocation
page execute and read and write
1235000
heap
page read and write
1248000
heap
page read and write
4961000
heap
page read and write
4FC0000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
AEC000
stack
page read and write
FED000
unkown
page execute and write copy
4B80000
direct allocation
page execute and read and write
387E000
stack
page read and write
7CF000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
4F20000
direct allocation
page execute and read and write
1186000
unkown
page execute and write copy
14D4000
heap
page read and write
D49000
unkown
page read and write
4961000
heap
page read and write
11E0000
heap
page read and write
11C000
stack
page read and write
54A0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
4970000
heap
page read and write
3D3F000
stack
page read and write
332E000
stack
page read and write
4B9E000
stack
page read and write
373F000
stack
page read and write
4961000
heap
page read and write
37AE000
stack
page read and write
C80000
heap
page read and write
1044000
heap
page read and write
4BBE000
stack
page read and write
11F0000
direct allocation
page read and write
4961000
heap
page read and write
1044000
heap
page read and write
64E000
stack
page read and write
11F0000
direct allocation
page read and write
42EE000
stack
page read and write
1044000
heap
page read and write
352E000
stack
page read and write
3F9E000
stack
page read and write
5400000
direct allocation
page execute and read and write
FED000
unkown
page execute and write copy
4B60000
direct allocation
page execute and read and write
C50000
heap
page read and write
80D000
stack
page read and write
3EDF000
stack
page read and write
1044000
heap
page read and write
5340000
direct allocation
page read and write
150E000
stack
page read and write
29EE000
stack
page read and write
391F000
stack
page read and write
2CDE000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
3FDF000
stack
page read and write
4961000
heap
page read and write
45FE000
stack
page read and write
429E000
stack
page read and write
5540000
direct allocation
page execute and read and write
FAA000
unkown
page execute and read and write
15C0000
heap
page read and write
4961000
heap
page read and write
471E000
stack
page read and write
2C50000
heap
page read and write
FAA000
unkown
page execute and read and write
53B1000
direct allocation
page read and write
5410000
direct allocation
page execute and read and write
1030000
direct allocation
page read and write
47DE000
stack
page read and write
123C000
heap
page read and write
15DE000
stack
page read and write
CE0000
unkown
page readonly
1510000
direct allocation
page read and write
BEE000
stack
page read and write
445F000
stack
page read and write
165E000
stack
page read and write
169E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
4DE1000
heap
page read and write
33EE000
stack
page read and write
1044000
heap
page read and write
4531000
heap
page read and write
5340000
direct allocation
page read and write
FD6000
unkown
page execute and read and write
1510000
direct allocation
page read and write
1201000
heap
page read and write
4F20000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
17BF000
stack
page read and write
4A5E000
stack
page read and write
316E000
stack
page read and write
365E000
stack
page read and write
D4B000
unkown
page execute and read and write
695E000
stack
page read and write
AEC000
stack
page read and write
1510000
direct allocation
page read and write
2AEF000
stack
page read and write
657F000
stack
page read and write
EC8000
unkown
page execute and read and write
4B1F000
stack
page read and write
14D4000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
4961000
heap
page read and write
4961000
heap
page read and write
52C1000
direct allocation
page read and write
114E000
stack
page read and write
4DE1000
heap
page read and write
1186000
unkown
page execute and write copy
381E000
stack
page read and write
3CDF000
stack
page read and write
EFA000
stack
page read and write
49BF000
stack
page read and write
4CBF000
stack
page read and write
CB0000
heap
page read and write
366E000
stack
page read and write
864000
heap
page read and write
4961000
heap
page read and write
11FC000
heap
page read and write
864000
heap
page read and write
16B7000
heap
page read and write
4DE1000
heap
page read and write
1262000
heap
page read and write
CC0000
heap
page read and write
4D90000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
37DF000
stack
page read and write
3D7E000
stack
page read and write
415F000
stack
page read and write
FDD000
unkown
page execute and read and write
475F000
stack
page read and write
32CE000
stack
page read and write
CC0000
direct allocation
page read and write
3B9F000
stack
page read and write
342F000
stack
page read and write
331F000
stack
page read and write
359E000
stack
page read and write
8290000
heap
page read and write
2DDF000
stack
page read and write
1030000
direct allocation
page read and write
4C9E000
stack
page read and write
5420000
direct allocation
page execute and read and write
4E00000
heap
page read and write
14D4000
heap
page read and write
1180000
heap
page read and write
11CE000
stack
page read and write
66D0000
heap
page read and write
1044000
heap
page read and write
4D7F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
1510000
direct allocation
page read and write
4961000
heap
page read and write
4461000
heap
page read and write
14D4000
heap
page read and write
4B5F000
stack
page read and write
11E0000
heap
page read and write
123F000
heap
page read and write
4961000
heap
page read and write
604000
heap
page read and write
CE0000
unkown
page read and write
31F0000
direct allocation
page execute and read and write
2C30000
direct allocation
page execute and read and write
441D000
stack
page read and write
4DE1000
heap
page read and write
3E9F000
stack
page read and write
CC0000
direct allocation
page read and write
4EBF000
stack
page read and write
4961000
heap
page read and write
FEC000
unkown
page execute and read and write
B0B000
stack
page read and write
C6E000
stack
page read and write
1202000
heap
page read and write
416F000
stack
page read and write
128F000
stack
page read and write
331E000
stack
page read and write
604000
heap
page read and write
3D5F000
stack
page read and write
724000
unkown
page execute and read and write
32AE000
stack
page read and write
CBE000
stack
page read and write
4961000
heap
page read and write
49FE000
stack
page read and write
2FEF000
stack
page read and write
4DE1000
heap
page read and write
1044000
heap
page read and write
CB0000
direct allocation
page read and write
46F1000
heap
page read and write
180000
heap
page read and write
53B0000
direct allocation
page execute and read and write
341F000
stack
page read and write
3D1E000
stack
page read and write
4961000
heap
page read and write
D49000
unkown
page write copy
538E000
stack
page read and write
604000
heap
page read and write
53F0000
direct allocation
page execute and read and write
16B0000
direct allocation
page read and write
63C000
stack
page read and write
4961000
heap
page read and write
D49000
unkown
page read and write
1160000
direct allocation
page read and write
3E5E000
stack
page read and write
4DE1000
heap
page read and write
473F000
stack
page read and write
1044000
heap
page read and write
5410000
direct allocation
page execute and read and write
864000
heap
page read and write
3D1E000
stack
page read and write
EC8000
unkown
page execute and read and write
280000
unkown
page read and write
4961000
heap
page read and write
4961000
heap
page read and write
11F0000
direct allocation
page read and write
2B5E000
stack
page read and write
1044000
heap
page read and write
1242000
heap
page read and write
123D000
heap
page read and write
39DE000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
30AE000
stack
page read and write
4961000
heap
page read and write
4DE1000
heap
page read and write
5530000
direct allocation
page execute and read and write
A00000
direct allocation
page read and write
84E000
stack
page read and write
4D30000
direct allocation
page execute and read and write
395E000
stack
page read and write
1044000
heap
page read and write
452F000
stack
page read and write
419E000
stack
page read and write
1044000
heap
page read and write
331E000
stack
page read and write
4DE1000
heap
page read and write
1184000
unkown
page execute and read and write
11F0000
direct allocation
page read and write
1242000
heap
page read and write
3B6E000
stack
page read and write
319F000
stack
page read and write
1201000
heap
page read and write
726000
unkown
page execute and write copy
1186000
unkown
page execute and write copy
604000
heap
page read and write
4A40000
direct allocation
page execute and read and write
3217000
heap
page read and write
6D00000
heap
page read and write
2C57000
heap
page read and write
11F0000
direct allocation
page read and write
604000
heap
page read and write
4DE1000
heap
page read and write
5440000
direct allocation
page execute and read and write
18AF000
stack
page read and write
491E000
stack
page read and write
864000
heap
page read and write
1030000
direct allocation
page read and write
5460000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
4DE1000
heap
page read and write
CE0000
unkown
page readonly
2810000
heap
page read and write
576000
unkown
page execute and read and write
52B1000
direct allocation
page read and write
3A5F000
stack
page read and write
1F0000
heap
page read and write
315F000
stack
page read and write
4DE1000
heap
page read and write
2E2F000
stack
page read and write
279F000
stack
page read and write
392F000
stack
page read and write
C90000
heap
page read and write
3ABF000
stack
page read and write
FD6000
unkown
page execute and read and write
461F000
stack
page read and write
4961000
heap
page read and write
325F000
stack
page read and write
4F40000
direct allocation
page execute and read and write
14D0000
heap
page read and write
302E000
stack
page read and write
4DE1000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
6CF0000
heap
page read and write
3FFE000
stack
page read and write
487F000
stack
page read and write
385F000
stack
page read and write
1186000
unkown
page execute and write copy
CB0000
direct allocation
page read and write
4DDF000
stack
page read and write
4961000
heap
page read and write
4DE1000
heap
page read and write
A00000
direct allocation
page read and write
1184000
unkown
page execute and read and write
681C000
stack
page read and write
11F0000
direct allocation
page read and write
41EF000
stack
page read and write
38AF000
stack
page read and write
341F000
stack
page read and write
A00000
direct allocation
page read and write
FDD000
unkown
page execute and read and write
4961000
heap
page read and write
38DE000
stack
page read and write
3A5F000
stack
page read and write
40DE000
stack
page read and write
4961000
heap
page read and write
1030000
direct allocation
page read and write
5560000
direct allocation
page execute and read and write
1184000
unkown
page execute and read and write
CAE000
stack
page read and write
1160000
direct allocation
page read and write
54D0000
direct allocation
page execute and read and write
4B5E000
stack
page read and write
3310000
heap
page read and write
1221000
heap
page read and write
495F000
stack
page read and write
4A40000
direct allocation
page execute and read and write
3CAE000
stack
page read and write
CB0000
direct allocation
page read and write
FDD000
unkown
page execute and read and write
C8E000
stack
page read and write
54F0000
direct allocation
page execute and read and write
1242000
heap
page read and write
42AF000
stack
page read and write
383F000
stack
page read and write
4DE1000
heap
page read and write
1510000
direct allocation
page read and write
4961000
heap
page read and write
45DE000
stack
page read and write
4A1F000
stack
page read and write
15CA000
heap
page read and write
4DE1000
heap
page read and write
CB0000
direct allocation
page read and write
4DE1000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
27E0000
direct allocation
page read and write
3E1F000
stack
page read and write
4461000
heap
page read and write
CE1000
unkown
page execute and write copy
312F000
stack
page read and write
1250000
heap
page read and write
11F0000
direct allocation
page read and write
3B5E000
stack
page read and write
4DE1000
heap
page read and write
4EC0000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
643F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
11F0000
direct allocation
page read and write
11F0000
direct allocation
page read and write
1030000
direct allocation
page read and write
306F000
stack
page read and write
4961000
heap
page read and write
44FE000
stack
page read and write
4DC1000
heap
page read and write
11F0000
direct allocation
page read and write
4AE0000
direct allocation
page execute and read and write
11F0000
direct allocation
page read and write
4DE1000
heap
page read and write
7A0000
heap
page read and write
4DE1000
heap
page read and write
3BAF000
stack
page read and write
36AF000
stack
page read and write
41AE000
stack
page read and write
14D4000
heap
page read and write
CCE000
stack
page read and write
14D4000
heap
page read and write
406E000
stack
page read and write
5A8F000
stack
page read and write
94E000
stack
page read and write
CC0000
heap
page read and write
1235000
heap
page read and write
2B2E000
stack
page read and write
4DE1000
heap
page read and write
402F000
stack
page read and write
D42000
unkown
page execute and read and write
449E000
stack
page read and write
14D4000
heap
page read and write
4D60000
direct allocation
page execute and read and write
362F000
stack
page read and write
4AFF000
stack
page read and write
361F000
stack
page read and write
2B9E000
stack
page read and write
4D50000
direct allocation
page execute and read and write
43DF000
stack
page read and write
4961000
heap
page read and write
1044000
heap
page read and write
4DA0000
heap
page read and write
14D4000
heap
page read and write
58C000
unkown
page execute and read and write
2D6F000
stack
page read and write
429F000
stack
page read and write
4F20000
direct allocation
page execute and read and write
14D4000
heap
page read and write
5430000
direct allocation
page execute and read and write
125F000
heap
page read and write
34DE000
stack
page read and write
4DE1000
heap
page read and write
4DE1000
heap
page read and write
4531000
heap
page read and write
650000
heap
page read and write
27E0000
direct allocation
page read and write
4F50000
direct allocation
page execute and read and write
1250000
heap
page read and write
555B000
stack
page read and write
4FD000
stack
page read and write
11F0000
direct allocation
page read and write
339E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
11F0000
direct allocation
page read and write
3CEF000
stack
page read and write
FEC000
unkown
page execute and read and write
CC0000
direct allocation
page read and write
4DE1000
heap
page read and write
CC0000
direct allocation
page read and write
1244000
heap
page read and write
31AF000
stack
page read and write
2B9C000
stack
page read and write
A00000
direct allocation
page read and write
FED000
unkown
page execute and write copy
4960000
heap
page read and write
33AF000
stack
page read and write
4B30000
direct allocation
page execute and read and write
3F5F000
stack
page read and write
11F0000
direct allocation
page read and write
EC8000
unkown
page execute and read and write
5450000
direct allocation
page execute and read and write
445F000
stack
page read and write
2817000
heap
page read and write
4DE1000
heap
page read and write
B80000
heap
page read and write
3C9E000
stack
page read and write
4DE1000
heap
page read and write
FED000
unkown
page execute and write copy
4F20000
direct allocation
page execute and read and write
2800000
direct allocation
page execute and read and write
4961000
heap
page read and write
676000
heap
page read and write
16B0000
direct allocation
page read and write
4961000
heap
page read and write
84F000
stack
page read and write
4DE1000
heap
page read and write
4D80000
direct allocation
page execute and read and write
432F000
stack
page read and write
422E000
stack
page read and write
A00000
direct allocation
page read and write
1510000
direct allocation
page read and write
FEC000
unkown
page execute and read and write
1044000
heap
page read and write
4630000
trusted library allocation
page read and write
1510000
direct allocation
page read and write
CC0000
direct allocation
page read and write
341F000
stack
page read and write
36DE000
stack
page read and write
468000
unkown
page execute and read and write
525C000
stack
page read and write
4961000
heap
page read and write
1510000
direct allocation
page read and write
4961000
heap
page read and write
4DE1000
heap
page read and write
CB0000
direct allocation
page read and write
4A1E000
stack
page read and write
4961000
heap
page read and write
11F0000
direct allocation
page read and write
11CE000
stack
page read and write
4DC1000
heap
page read and write
319E000
stack
page read and write
66C000
heap
page read and write
4F20000
direct allocation
page execute and read and write
FEC000
unkown
page execute and write copy
4D00000
direct allocation
page execute and read and write
351F000
stack
page read and write
123C000
heap
page read and write
291F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
4461000
heap
page read and write
4A40000
direct allocation
page execute and read and write
864000
heap
page read and write
4961000
heap
page read and write
4A40000
direct allocation
page execute and read and write
4961000
heap
page read and write
1044000
heap
page read and write
FED000
unkown
page execute and write copy
14FD000
stack
page read and write
3BEE000
stack
page read and write
4DF0000
heap
page read and write
1160000
direct allocation
page read and write
2C6E000
stack
page read and write
CB0000
direct allocation
page read and write
5450000
direct allocation
page execute and read and write
5240000
direct allocation
page read and write
305F000
stack
page read and write
4961000
heap
page read and write
4531000
heap
page read and write
2F5E000
stack
page read and write
401F000
stack
page read and write
31DE000
stack
page read and write
604000
heap
page read and write
2BDE000
stack
page read and write
4C7E000
stack
page read and write
4961000
heap
page read and write
53B0000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
1520000
heap
page read and write
528E000
stack
page read and write
11F0000
direct allocation
page read and write
4961000
heap
page read and write
2B2F000
stack
page read and write
CE0000
unkown
page readonly
2C20000
direct allocation
page execute and read and write
14D4000
heap
page read and write
D49000
unkown
page write copy
4961000
heap
page read and write
11F0000
direct allocation
page read and write
1044000
heap
page read and write
4B70000
direct allocation
page read and write
3200000
direct allocation
page execute and read and write
3330000
heap
page read and write
137E000
stack
page read and write
477E000
stack
page read and write
1221000
heap
page read and write
D4B000
unkown
page execute and read and write
CC0000
direct allocation
page read and write
1044000
heap
page read and write
1221000
heap
page read and write
11E0000
heap
page read and write
A00000
direct allocation
page read and write
4B20000
direct allocation
page execute and read and write
39DF000
stack
page read and write
538F000
stack
page read and write
54B0000
direct allocation
page execute and read and write
1044000
heap
page read and write
31EE000
stack
page read and write
864000
heap
page read and write
345E000
stack
page read and write
598E000
stack
page read and write
3E5E000
stack
page read and write
4961000
heap
page read and write
169E000
stack
page read and write
5ADD000
stack
page read and write
305F000
stack
page read and write
4DE1000
heap
page read and write
1030000
direct allocation
page read and write
4961000
heap
page read and write
604000
heap
page read and write
3B2F000
stack
page read and write
11C6000
heap
page read and write
CC0000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
5500000
direct allocation
page execute and read and write
335F000
stack
page read and write
A00000
direct allocation
page read and write
FAA000
unkown
page execute and read and write
11F0000
heap
page read and write
2E2000
unkown
page execute and read and write
4961000
heap
page read and write
2EAF000
stack
page read and write
1186000
unkown
page execute and write copy
864000
heap
page read and write
451E000
stack
page read and write
3A9D000
stack
page read and write
4DE1000
heap
page read and write
4F30000
direct allocation
page execute and read and write
421E000
stack
page read and write
4961000
heap
page read and write
15AE000
stack
page read and write
4961000
heap
page read and write
A00000
direct allocation
page read and write
1235000
heap
page read and write
3F1E000
stack
page read and write
5470000
direct allocation
page execute and read and write
D49000
unkown
page read and write
35AE000
stack
page read and write
4C3F000
stack
page read and write
4DE1000
heap
page read and write
11F2000
heap
page read and write
4961000
heap
page read and write
2D2F000
stack
page read and write
4F1F000
stack
page read and write
1F5000
heap
page read and write
53B0000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
2E5F000
stack
page read and write
11F0000
direct allocation
page read and write
14D4000
heap
page read and write
647E000
stack
page read and write
4961000
heap
page read and write
40FF000
stack
page read and write
36EE000
stack
page read and write
4DE1000
heap
page read and write
4C5F000
stack
page read and write
4DE1000
heap
page read and write
5C1D000
stack
page read and write
4D40000
direct allocation
page execute and read and write
1030000
direct allocation
page read and write
3EEF000
stack
page read and write
CB0000
direct allocation
page read and write
4DE1000
heap
page read and write
828C000
stack
page read and write
4DE1000
heap
page read and write
46F1000
heap
page read and write
90F000
stack
page read and write
11F0000
direct allocation
page read and write
11D1000
heap
page read and write
2EB000
unkown
page execute and read and write
D49000
unkown
page write copy
FEC000
unkown
page execute and read and write
49B0000
direct allocation
page read and write
1044000
heap
page read and write
4961000
heap
page read and write
1020000
heap
page read and write
4EC1000
heap
page read and write
53B0000
direct allocation
page execute and read and write
1030000
direct allocation
page read and write
CE0000
unkown
page readonly
CE1000
unkown
page execute and write copy
1044000
heap
page read and write
353F000
stack
page read and write
864000
heap
page read and write
1184000
unkown
page execute and read and write
C50000
heap
page read and write
9DE000
stack
page read and write
CE0000
unkown
page read and write
B70000
heap
page read and write
1044000
heap
page read and write
4961000
heap
page read and write
3C5F000
stack
page read and write
50D0000
heap
page read and write
4DE1000
heap
page read and write
3F6F000
stack
page read and write
4531000
heap
page read and write
3B1E000
stack
page read and write
4DE1000
heap
page read and write
1250000
heap
page read and write
4DE1000
heap
page read and write
2D5F000
stack
page read and write
281000
unkown
page execute and write copy
1044000
heap
page read and write
2E1E000
stack
page read and write
4DE1000
heap
page read and write
1044000
heap
page read and write
CE1000
unkown
page execute and write copy
CE0000
unkown
page read and write
14D4000
heap
page read and write
D4B000
unkown
page execute and read and write
1044000
heap
page read and write
CB0000
direct allocation
page read and write
3DDE000
stack
page read and write
5D0000
heap
page read and write
326F000
stack
page read and write
4DE1000
heap
page read and write
5510000
direct allocation
page execute and read and write
46F1000
heap
page read and write
14D4000
heap
page read and write
1203000
heap
page read and write
3F5F000
stack
page read and write
3E7F000
stack
page read and write
1044000
heap
page read and write
356F000
stack
page read and write
4DE1000
heap
page read and write
4B40000
direct allocation
page execute and read and write
D49000
unkown
page read and write
4DE1000
heap
page read and write
11E0000
heap
page read and write
604000
heap
page read and write
D42000
unkown
page execute and read and write
4A60000
trusted library allocation
page read and write
864000
heap
page read and write
11F0000
direct allocation
page read and write
44DF000
stack
page read and write
489F000
stack
page read and write
5BDD000
stack
page read and write
FED000
unkown
page execute and write copy
379E000
stack
page read and write
CC0000
direct allocation
page read and write
46EF000
stack
page read and write
14D4000
heap
page read and write
4B90000
direct allocation
page execute and read and write
D49000
unkown
page write copy
4A90000
direct allocation
page execute and read and write
46F0000
heap
page read and write
389E000
stack
page read and write
2C2F000
stack
page read and write
4961000
heap
page read and write
4DE1000
heap
page read and write
48DE000
stack
page read and write
61F5000
heap
page read and write
4961000
heap
page read and write
38EE000
stack
page read and write
11FA000
heap
page read and write
361E000
stack
page read and write
4A20000
direct allocation
page execute and read and write
CE0000
unkown
page readonly
3B1F000
stack
page read and write
FDD000
unkown
page execute and read and write
4D00000
direct allocation
page execute and read and write
49B0000
direct allocation
page read and write
4EC1000
heap
page read and write
4DE0000
heap
page read and write
4A80000
direct allocation
page execute and read and write
FD6000
unkown
page execute and read and write
3210000
heap
page read and write
4530000
heap
page read and write
4DE1000
heap
page read and write
5550000
direct allocation
page execute and read and write
1044000
heap
page read and write
14D4000
heap
page read and write
FEC000
unkown
page execute and write copy
CB0000
direct allocation
page read and write
382E000
stack
page read and write
465F000
stack
page read and write
6CFE000
heap
page read and write
442E000
stack
page read and write
4C9F000
stack
page read and write
4961000
heap
page read and write
4A30000
direct allocation
page execute and read and write
4961000
heap
page read and write
41DF000
stack
page read and write
1044000
heap
page read and write
5240000
direct allocation
page read and write
4B70000
direct allocation
page read and write
53B0000
direct allocation
page execute and read and write
124A000
heap
page read and write
1728000
heap
page read and write
11F0000
direct allocation
page read and write
409F000
stack
page read and write
A00000
direct allocation
page read and write
8090000
heap
page read and write
328E000
stack
page read and write
3FBF000
stack
page read and write
15D0000
heap
page read and write
451F000
stack
page read and write
349F000
stack
page read and write
53B0000
direct allocation
page execute and read and write
D49000
unkown
page write copy
14D4000
heap
page read and write
C0F000
stack
page read and write
4961000
heap
page read and write
5340000
direct allocation
page read and write
161E000
stack
page read and write
4DE1000
heap
page read and write
4DC1000
heap
page read and write
4DE1000
heap
page read and write
860000
heap
page read and write
99E000
stack
page read and write
D4B000
unkown
page execute and read and write
286F000
stack
page read and write
389F000
stack
page read and write
4961000
heap
page read and write
1701000
heap
page read and write
4961000
heap
page read and write
4EC1000
heap
page read and write
54D0000
direct allocation
page execute and read and write
1044000
heap
page read and write
FAA000
unkown
page execute and read and write
3FAE000
stack
page read and write
405E000
stack
page read and write
529B000
stack
page read and write
463E000
stack
page read and write
CBE000
stack
page read and write
14D4000
heap
page read and write
54A000
unkown
page execute and read and write
14D4000
heap
page read and write
4961000
heap
page read and write
413E000
stack
page read and write
4961000
heap
page read and write
CE0000
unkown
page read and write
1510000
direct allocation
page read and write
3F2E000
stack
page read and write
1044000
heap
page read and write
D42000
unkown
page execute and read and write
4DE1000
heap
page read and write
4961000
heap
page read and write
16C0000
heap
page read and write
37DF000
stack
page read and write
1030000
direct allocation
page read and write
A10000
heap
page read and write
1044000
heap
page read and write
4961000
heap
page read and write
4DE1000
heap
page read and write
A00000
direct allocation
page read and write
4A21000
direct allocation
page read and write
FEC000
unkown
page execute and read and write
4A60000
direct allocation
page execute and read and write
376F000
stack
page read and write
31DE000
stack
page read and write
1235000
heap
page read and write
3C5E000
stack
page read and write
CCE000
stack
page read and write
864000
heap
page read and write
4961000
heap
page read and write
FDD000
unkown
page execute and read and write
479E000
stack
page read and write
CC0000
heap
page read and write
11CE000
stack
page read and write
58D000
unkown
page execute and write copy
4FC0000
direct allocation
page execute and read and write
11DE000
heap
page read and write
53F0000
direct allocation
page execute and read and write
54D0000
direct allocation
page execute and read and write
4EE0000
trusted library allocation
page read and write
4AFF000
stack
page read and write
4CDE000
stack
page read and write
A00000
direct allocation
page read and write
4961000
heap
page read and write
315F000
stack
page read and write
118A000
heap
page read and write
4DC1000
heap
page read and write
397F000
stack
page read and write
37EF000
stack
page read and write
4E41000
direct allocation
page read and write
1525000
heap
page read and write
9E0000
heap
page read and write
1030000
direct allocation
page read and write
1044000
heap
page read and write
D42000
unkown
page execute and read and write
1044000
heap
page read and write
53D0000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
A50000
heap
page read and write
1030000
direct allocation
page read and write
46F1000
heap
page read and write
FD6000
unkown
page execute and read and write
4EC1000
heap
page read and write
491E000
stack
page read and write
600000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
4961000
heap
page read and write
CE0000
unkown
page readonly
4A40000
direct allocation
page execute and read and write
1184000
unkown
page execute and read and write
4DE1000
heap
page read and write
4961000
heap
page read and write
124A000
heap
page read and write
28AE000
stack
page read and write
3A9E000
stack
page read and write
2C2F000
stack
page read and write
3C1F000
stack
page read and write
53A0000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
A00000
direct allocation
page read and write
FEC000
unkown
page execute and write copy
4DE1000
heap
page read and write
4B3E000
stack
page read and write
4961000
heap
page read and write
1044000
heap
page read and write
4961000
heap
page read and write
4961000
heap
page read and write
4DE2000
heap
page read and write
427E000
stack
page read and write
355F000
stack
page read and write
4DBE000
stack
page read and write
4D20000
direct allocation
page execute and read and write
1510000
direct allocation
page read and write
4A40000
direct allocation
page execute and read and write
2C40000
direct allocation
page execute and read and write
4961000
heap
page read and write
4D9F000
stack
page read and write
2E9000
unkown
page write copy
5E0000
heap
page read and write
40DE000
stack
page read and write
1186000
unkown
page execute and write copy
395E000
stack
page read and write
11F0000
direct allocation
page read and write
4DE1000
heap
page read and write
FD6000
unkown
page execute and read and write
3E2F000
stack
page read and write
3AFE000
stack
page read and write
54D0000
direct allocation
page execute and read and write
CC0000
direct allocation
page read and write
8092000
heap
page read and write
4DE1000
heap
page read and write
4961000
heap
page read and write
479F000
stack
page read and write
15DC000
heap
page read and write
3C3E000
stack
page read and write
3ADF000
stack
page read and write
435E000
stack
page read and write
11E7000
heap
page read and write
C4E000
stack
page read and write
4DE1000
heap
page read and write
1044000
heap
page read and write
3DEE000
stack
page read and write
446F000
stack
page read and write
36DE000
stack
page read and write
48BE000
stack
page read and write
35DF000
stack
page read and write
2C9F000
stack
page read and write
128F000
stack
page read and write
CB0000
direct allocation
page read and write
3BFF000
stack
page read and write
CE1000
unkown
page execute and write copy
3EDE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
66BF000
stack
page read and write
4DE1000
heap
page read and write
BEC000
stack
page read and write
CB0000
direct allocation
page read and write
4DE1000
heap
page read and write
4961000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
CE1000
unkown
page execute and write copy
43BE000
stack
page read and write
49B0000
direct allocation
page read and write
1040000
heap
page read and write
1EE000
stack
page read and write
43EF000
stack
page read and write
CE0000
unkown
page read and write
EC8000
unkown
page execute and read and write
4961000
heap
page read and write
2F2F000
stack
page read and write
FEC000
unkown
page execute and write copy
80E000
stack
page read and write
5420000
direct allocation
page execute and read and write
CB0000
direct allocation
page read and write
330E000
stack
page read and write
5240000
direct allocation
page read and write
1030000
direct allocation
page read and write
6CF1000
heap
page read and write
4961000
heap
page read and write
401E000
stack
page read and write
4961000
heap
page read and write
604000
heap
page read and write
485E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
4D10000
direct allocation
page execute and read and write
343F000
stack
page read and write
592F000
stack
page read and write
5D1C000
stack
page read and write
276E000
stack
page read and write
3A2E000
stack
page read and write
11F0000
direct allocation
page read and write
346E000
stack
page read and write
14D4000
heap
page read and write
11F0000
direct allocation
page read and write
9E7000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
2F1F000
stack
page read and write
4EC1000
heap
page read and write
32DF000
stack
page read and write
4560000
trusted library allocation
page read and write
423F000
stack
page read and write
45EE000
stack
page read and write
1209000
heap
page read and write
431F000
stack
page read and write
1510000
direct allocation
page read and write
11F0000
direct allocation
page read and write
44BF000
stack
page read and write
4DA0000
heap
page read and write
65B000
heap
page read and write
19AF000
stack
page read and write
49DF000
stack
page read and write
582E000
stack
page read and write
345E000
stack
page read and write
1235000
heap
page read and write
3E1F000
stack
page read and write
53E0000
direct allocation
page execute and read and write
4DC0000
heap
page read and write
4DE1000
heap
page read and write
431F000
stack
page read and write
48DF000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4B70000
direct allocation
page read and write
118E000
heap
page read and write
4A70000
direct allocation
page execute and read and write
1E0000
heap
page read and write
4961000
heap
page read and write
369F000
stack
page read and write
4DE1000
heap
page read and write
16FD000
heap
page read and write
4961000
heap
page read and write
53C0000
direct allocation
page execute and read and write
3B9F000
stack
page read and write
4961000
heap
page read and write
FEC000
unkown
page execute and write copy
16B0000
heap
page read and write
29AF000
stack
page read and write
4A50000
direct allocation
page execute and read and write
319F000
stack
page read and write
1510000
direct allocation
page read and write
There are 1251 hidden memdumps, click here to show them.