IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpm
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpvQ
unknown
malicious
http://185.215.113.16/-dt
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php)
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncodedfA
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php%
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncodedhA1
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpA
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpded?
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php=
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpY
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php8
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpHQ
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpiP
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpU
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpKP
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpded4
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php-PP
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
malicious
There are 12 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5090000
direct allocation
page read and write
malicious
8A1000
unkown
page execute and read and write
malicious
5090000
direct allocation
page read and write
malicious
4BE0000
direct allocation
page read and write
malicious
4B90000
direct allocation
page read and write
malicious
661000
unkown
page execute and read and write
malicious
8A1000
unkown
page execute and read and write
malicious
8A1000
unkown
page execute and read and write
malicious
2D30000
direct allocation
page read and write
58DF000
stack
page read and write
691E000
stack
page read and write
2E2F000
stack
page read and write
8A0000
unkown
page readonly
92C000
unkown
page execute and read and write
358E000
stack
page read and write
96F000
unkown
page execute and read and write
2A90000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
3ABE000
stack
page read and write
2A90000
direct allocation
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
902000
unkown
page execute and read and write
37FF000
stack
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
4BD0000
direct allocation
page read and write
2A90000
direct allocation
page read and write
484E000
stack
page read and write
481F000
stack
page read and write
51E0000
direct allocation
page execute and read and write
7FA6000
heap
page read and write
354F000
stack
page read and write
68DC000
stack
page read and write
4701000
heap
page read and write
44EE000
stack
page read and write
462E000
stack
page read and write
52B0000
direct allocation
page execute and read and write
3FBE000
stack
page read and write
E70000
heap
page read and write
32CF000
stack
page read and write
D48000
unkown
page execute and read and write
4BF0000
heap
page read and write
106E000
stack
page read and write
3A7F000
stack
page read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
30AF000
stack
page read and write
1319000
heap
page read and write
6560000
heap
page read and write
10FC000
stack
page read and write
66A0000
heap
page read and write
12AB000
heap
page read and write
36FE000
stack
page read and write
2E1E000
stack
page read and write
DAA000
heap
page read and write
2967000
heap
page read and write
3E3E000
stack
page read and write
4BF1000
heap
page read and write
DA0000
heap
page read and write
4BF1000
heap
page read and write
319F000
stack
page read and write
4BF1000
heap
page read and write
45BF000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
380E000
stack
page read and write
4BF1000
heap
page read and write
43AE000
stack
page read and write
1300000
heap
page read and write
330E000
stack
page read and write
5240000
direct allocation
page execute and read and write
B07000
unkown
page execute and write copy
5220000
direct allocation
page execute and read and write
309E000
stack
page read and write
4710000
heap
page read and write
341F000
stack
page read and write
90B000
unkown
page execute and read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
CD4000
heap
page read and write
2A90000
direct allocation
page read and write
4B80000
direct allocation
page read and write
4701000
heap
page read and write
5080000
direct allocation
page read and write
4BF1000
heap
page read and write
4A9F000
stack
page read and write
4BF1000
heap
page read and write
604E000
stack
page read and write
66A8000
heap
page read and write
4ED4000
heap
page read and write
CD4000
heap
page read and write
E79000
heap
page read and write
4BF1000
heap
page read and write
382F000
stack
page read and write
4BE0000
direct allocation
page read and write
1135000
heap
page read and write
45FE000
stack
page read and write
4B40000
trusted library allocation
page read and write
4701000
heap
page read and write
5210000
direct allocation
page execute and read and write
E66000
heap
page read and write
51CF000
stack
page read and write
2CDE000
stack
page read and write
4BE0000
direct allocation
page read and write
52A0000
direct allocation
page execute and read and write
D46000
unkown
page execute and read and write
5210000
direct allocation
page execute and read and write
4701000
heap
page read and write
4751000
heap
page read and write
4BF1000
heap
page read and write
E6B000
heap
page read and write
639F000
stack
page read and write
4B90000
trusted library allocation
page read and write
B6C000
unkown
page execute and read and write
3F8E000
stack
page read and write
553E000
stack
page read and write
6C9000
unkown
page write copy
45CE000
stack
page read and write
445F000
stack
page read and write
2CBF000
stack
page read and write
4701000
heap
page read and write
51F0000
direct allocation
page execute and read and write
3BFE000
stack
page read and write
577F000
stack
page read and write
4D10000
direct allocation
page execute and read and write
E00000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
5210000
direct allocation
page execute and read and write
470E000
stack
page read and write
4701000
heap
page read and write
433F000
stack
page read and write
346F000
stack
page read and write
890000
direct allocation
page read and write
2F4F000
stack
page read and write
12B5000
heap
page read and write
4701000
heap
page read and write
3E7E000
stack
page read and write
4BF1000
heap
page read and write
4ED0000
heap
page read and write
4701000
heap
page read and write
485E000
stack
page read and write
4ADE000
stack
page read and write
41DF000
stack
page read and write
4CE0000
heap
page read and write
4CCF000
stack
page read and write
D5E000
stack
page read and write
E8F000
heap
page read and write
2960000
heap
page read and write
CD4000
heap
page read and write
8590000
trusted library allocation
page read and write
2A8E000
stack
page read and write
CD4000
heap
page read and write
890000
direct allocation
page read and write
4751000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
CD4000
heap
page read and write
3D1E000
stack
page read and write
4D60000
direct allocation
page execute and read and write
C60000
heap
page read and write
3A9E000
stack
page read and write
4751000
heap
page read and write
41FF000
stack
page read and write
DDC000
stack
page read and write
2BBF000
stack
page read and write
4701000
heap
page read and write
46DF000
stack
page read and write
4D90000
direct allocation
page execute and read and write
D48000
unkown
page execute and read and write
4D80000
direct allocation
page execute and read and write
1150000
heap
page read and write
5210000
direct allocation
page execute and read and write
5B5E000
stack
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
331E000
stack
page read and write
B09000
unkown
page execute and write copy
394E000
stack
page read and write
B6C000
unkown
page execute and read and write
3F5F000
stack
page read and write
4D10000
direct allocation
page execute and read and write
4D60000
direct allocation
page execute and read and write
4701000
heap
page read and write
4701000
heap
page read and write
318F000
stack
page read and write
4BF1000
heap
page read and write
4D50000
direct allocation
page execute and read and write
CD4000
heap
page read and write
D46000
unkown
page execute and read and write
471E000
stack
page read and write
3E1F000
stack
page read and write
345E000
stack
page read and write
890000
direct allocation
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
5290000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
2D30000
direct allocation
page read and write
4701000
heap
page read and write
32DF000
stack
page read and write
8A1000
unkown
page execute and write copy
36EF000
stack
page read and write
37CF000
stack
page read and write
890000
direct allocation
page read and write
961000
unkown
page execute and read and write
2DFF000
stack
page read and write
4B80000
direct allocation
page read and write
4BF1000
heap
page read and write
5200000
direct allocation
page execute and read and write
4701000
heap
page read and write
3E4E000
stack
page read and write
4D10000
direct allocation
page execute and read and write
4701000
heap
page read and write
5200000
direct allocation
page execute and read and write
5210000
direct allocation
page execute and read and write
4701000
heap
page read and write
2A90000
direct allocation
page read and write
4751000
heap
page read and write
2A90000
direct allocation
page read and write
448E000
stack
page read and write
E7C000
heap
page read and write
4BF1000
heap
page read and write
890000
direct allocation
page read and write
4BDF000
stack
page read and write
4BF1000
heap
page read and write
340F000
stack
page read and write
4701000
heap
page read and write
2D30000
direct allocation
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
DFE000
heap
page read and write
4701000
heap
page read and write
6C9000
unkown
page read and write
3F4F000
stack
page read and write
4701000
heap
page read and write
4BD0000
direct allocation
page read and write
2D30000
direct allocation
page read and write
39AE000
stack
page read and write
4D1F000
stack
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
4730000
heap
page read and write
397E000
stack
page read and write
4BF1000
heap
page read and write
CD4000
heap
page read and write
4D80000
direct allocation
page execute and read and write
5280000
direct allocation
page execute and read and write
4701000
heap
page read and write
4701000
heap
page read and write
909000
unkown
page write copy
CD0000
heap
page read and write
4BF1000
heap
page read and write
BAF000
unkown
page execute and read and write
4701000
heap
page read and write
4701000
heap
page read and write
5210000
direct allocation
page execute and read and write
4701000
heap
page read and write
4701000
heap
page read and write
2F5E000
stack
page read and write
52B0000
direct allocation
page execute and read and write
359E000
stack
page read and write
4BF1000
heap
page read and write
305F000
stack
page read and write
2FAE000
stack
page read and write
DF1000
heap
page read and write
BAF000
unkown
page execute and read and write
4E3C000
stack
page read and write
5080000
direct allocation
page read and write
890000
direct allocation
page read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
850000
heap
page read and write
1140000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
2AB7000
heap
page read and write
656E000
heap
page read and write
4701000
heap
page read and write
CD4000
heap
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
CD4000
heap
page read and write
5240000
direct allocation
page execute and read and write
E73000
heap
page read and write
2AB0000
heap
page read and write
4701000
heap
page read and write
D9E000
stack
page read and write
CD4000
heap
page read and write
C70000
heap
page read and write
2F3F000
stack
page read and write
4701000
heap
page read and write
391F000
stack
page read and write
10FD000
stack
page read and write
4701000
heap
page read and write
35AF000
stack
page read and write
420E000
stack
page read and write
506C000
stack
page read and write
4BF1000
heap
page read and write
343E000
stack
page read and write
31CE000
stack
page read and write
4701000
heap
page read and write
291F000
stack
page read and write
4701000
heap
page read and write
BB0000
unkown
page execute and write copy
4FDB000
stack
page read and write
3BCE000
stack
page read and write
4BE0000
direct allocation
page read and write
5A5D000
stack
page read and write
909000
unkown
page write copy
40FE000
stack
page read and write
3A4F000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
4701000
heap
page read and write
BA1000
unkown
page execute and read and write
CD4000
heap
page read and write
322E000
stack
page read and write
CC0000
heap
page read and write
4D60000
direct allocation
page execute and read and write
F80000
heap
page read and write
2A90000
direct allocation
page read and write
4BE0000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
2CEF000
stack
page read and write
4D00000
direct allocation
page execute and read and write
D49000
unkown
page execute and write copy
66A5000
heap
page read and write
4A8F000
stack
page read and write
46CF000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
3BDE000
stack
page read and write
4701000
heap
page read and write
347E000
stack
page read and write
4701000
heap
page read and write
52A0000
direct allocation
page execute and read and write
CD4000
heap
page read and write
3F7F000
stack
page read and write
3CDF000
stack
page read and write
13CE000
stack
page read and write
4B80000
direct allocation
page read and write
4BE0000
direct allocation
page read and write
2CD0000
heap
page read and write
4BCF000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
5210000
direct allocation
page execute and read and write
4701000
heap
page read and write
444F000
stack
page read and write
393F000
stack
page read and write
4BF1000
heap
page read and write
4D40000
direct allocation
page execute and read and write
CD4000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
5A1D000
stack
page read and write
12E8000
heap
page read and write
80CE000
stack
page read and write
2F6F000
stack
page read and write
D49000
unkown
page execute and write copy
F8B000
heap
page read and write
CD4000
heap
page read and write
2D30000
direct allocation
page read and write
5250000
direct allocation
page execute and read and write
E73000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
890000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
4BE0000
direct allocation
page read and write
A92000
unkown
page execute and read and write
2AAE000
stack
page read and write
8A0000
unkown
page readonly
5080000
direct allocation
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
619D000
stack
page read and write
333E000
stack
page read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
436F000
stack
page read and write
7F90000
heap
page read and write
4BF1000
heap
page read and write
2D47000
heap
page read and write
959000
unkown
page execute and read and write
4BF1000
heap
page read and write
3D6E000
stack
page read and write
4701000
heap
page read and write
423E000
stack
page read and write
4BE0000
direct allocation
page read and write
909000
unkown
page read and write
4701000
heap
page read and write
CD4000
heap
page read and write
1290000
heap
page read and write
D1E000
stack
page read and write
4701000
heap
page read and write
1322000
heap
page read and write
B08000
unkown
page execute and read and write
2D20000
heap
page read and write
5260000
direct allocation
page execute and read and write
12B0000
heap
page read and write
40CE000
stack
page read and write
421E000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
4BF1000
direct allocation
page read and write
4DF9000
stack
page read and write
37DF000
stack
page read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
447F000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
CD4000
heap
page read and write
D47000
unkown
page execute and write copy
4BF1000
heap
page read and write
4BF1000
heap
page read and write
CD4000
heap
page read and write
890000
direct allocation
page read and write
4701000
heap
page read and write
494F000
stack
page read and write
2D30000
direct allocation
page read and write
2BAF000
stack
page read and write
D48000
unkown
page execute and read and write
431F000
stack
page read and write
4BF4000
heap
page read and write
4701000
heap
page read and write
12A0000
heap
page read and write
4BD0000
direct allocation
page read and write
2CB0000
heap
page read and write
4701000
heap
page read and write
57DE000
stack
page read and write
4BF1000
heap
page read and write
14CF000
stack
page read and write
115E000
heap
page read and write
4D40000
direct allocation
page execute and read and write
567E000
stack
page read and write
3FAF000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
115A000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4751000
heap
page read and write
381E000
stack
page read and write
F6F000
stack
page read and write
1150000
heap
page read and write
2A90000
direct allocation
page read and write
5FCB000
stack
page read and write
437E000
stack
page read and write
4BF1000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
4701000
heap
page read and write
408F000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4C41000
direct allocation
page read and write
4BF1000
heap
page read and write
430F000
stack
page read and write
2D4D000
heap
page read and write
459F000
stack
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
8A1000
unkown
page execute and write copy
4BF1000
heap
page read and write
2F1F000
stack
page read and write
2A6F000
stack
page read and write
4701000
heap
page read and write
5270000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
CD4000
heap
page read and write
30BE000
stack
page read and write
5280000
direct allocation
page execute and read and write
CD4000
heap
page read and write
30EE000
stack
page read and write
DAE000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
31EF000
stack
page read and write
495F000
stack
page read and write
CD4000
heap
page read and write
2A90000
direct allocation
page read and write
8A1000
unkown
page execute and write copy
40DE000
stack
page read and write
3FEE000
stack
page read and write
909000
unkown
page read and write
5080000
direct allocation
page read and write
649F000
stack
page read and write
5080000
direct allocation
page read and write
5030000
trusted library allocation
page read and write
2D30000
direct allocation
page read and write
44AF000
stack
page read and write
4BF1000
heap
page read and write
E50000
heap
page read and write
D47000
unkown
page execute and write copy
4701000
heap
page read and write
CD4000
heap
page read and write
2D2E000
stack
page read and write
3B9F000
stack
page read and write
4BF1000
heap
page read and write
1130000
heap
page read and write
368F000
stack
page read and write
CD4000
heap
page read and write
660000
unkown
page read and write
116E000
stack
page read and write
8A0000
unkown
page read and write
970000
unkown
page execute and write copy
8A0000
unkown
page readonly
4BF1000
heap
page read and write
2BEE000
stack
page read and write
5250000
direct allocation
page execute and read and write
480F000
stack
page read and write
3EAE000
stack
page read and write
D47000
unkown
page execute and write copy
383E000
stack
page read and write
4BE0000
direct allocation
page read and write
1250000
heap
page read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
369F000
stack
page read and write
4BF1000
heap
page read and write
5210000
direct allocation
page execute and read and write
2A90000
direct allocation
page read and write
4701000
heap
page read and write
852000
unkown
page execute and read and write
4701000
heap
page read and write
CD4000
heap
page read and write
2D40000
heap
page read and write
36BF000
stack
page read and write
50CE000
stack
page read and write
4BF1000
heap
page read and write
2F7E000
stack
page read and write
E5E000
stack
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
395E000
stack
page read and write
4BF1000
heap
page read and write
3D3E000
stack
page read and write
3E6E000
stack
page read and write
3AEE000
stack
page read and write
4701000
heap
page read and write
3F9E000
stack
page read and write
3A5F000
stack
page read and write
591E000
stack
page read and write
4ACE000
stack
page read and write
4D10000
direct allocation
page execute and read and write
4701000
heap
page read and write
608E000
stack
page read and write
D49000
unkown
page execute and write copy
4BF1000
heap
page read and write
4750000
heap
page read and write
4701000
heap
page read and write
51CF000
stack
page read and write
3CCF000
stack
page read and write
426E000
stack
page read and write
64C0000
heap
page read and write
4BF1000
heap
page read and write
5080000
direct allocation
page read and write
BB0000
unkown
page execute and write copy
2D30000
direct allocation
page read and write
4C10000
heap
page read and write
4BF1000
heap
page read and write
2CAE000
stack
page read and write
B6C000
unkown
page execute and read and write
435E000
stack
page read and write
344E000
stack
page read and write
4BF1000
heap
page read and write
4D60000
direct allocation
page execute and read and write
46FF000
stack
page read and write
BA1000
unkown
page execute and read and write
4BE0000
direct allocation
page read and write
E65000
heap
page read and write
4701000
heap
page read and write
CD4000
heap
page read and write
2D30000
direct allocation
page read and write
4BF1000
heap
page read and write
7E0000
heap
page read and write
E8F000
heap
page read and write
2DDF000
stack
page read and write
355F000
stack
page read and write
34AE000
stack
page read and write
4701000
heap
page read and write
458F000
stack
page read and write
44BE000
stack
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
67DB000
stack
page read and write
2D1C000
stack
page read and write
35BE000
stack
page read and write
2A4B000
stack
page read and write
51F0000
direct allocation
page execute and read and write
357F000
stack
page read and write
909000
unkown
page read and write
4D10000
direct allocation
page execute and read and write
4BE0000
direct allocation
page read and write
50DF000
stack
page read and write
149E000
stack
page read and write
308E000
stack
page read and write
332F000
stack
page read and write
CD4000
heap
page read and write
890000
direct allocation
page read and write
35EE000
stack
page read and write
5210000
direct allocation
page execute and read and write
E65000
heap
page read and write
4BF1000
heap
page read and write
661000
unkown
page execute and write copy
4BF1000
heap
page read and write
4BF1000
heap
page read and write
53FE000
stack
page read and write
2D30000
direct allocation
page read and write
4BF0000
heap
page read and write
4701000
heap
page read and write
498E000
stack
page read and write
45DE000
stack
page read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
36DE000
stack
page read and write
4701000
heap
page read and write
3A8E000
stack
page read and write
449E000
stack
page read and write
8A0000
unkown
page read and write
E8F000
heap
page read and write
40EF000
stack
page read and write
4701000
heap
page read and write
5230000
direct allocation
page execute and read and write
4701000
heap
page read and write
53BB000
stack
page read and write
E79000
heap
page read and write
4BF1000
heap
page read and write
3D2F000
stack
page read and write
7F8C000
stack
page read and write
BAF000
unkown
page execute and write copy
6C2000
unkown
page execute and read and write
372E000
stack
page read and write
336E000
stack
page read and write
4D90000
direct allocation
page execute and read and write
2CFE000
stack
page read and write
8A0000
unkown
page read and write
4BCE000
stack
page read and write
A92000
unkown
page execute and read and write
3E0F000
stack
page read and write
2D30000
direct allocation
page read and write
4C1E000
stack
page read and write
CD4000
heap
page read and write
5210000
direct allocation
page execute and read and write
4701000
heap
page read and write
65B000
stack
page read and write
4701000
heap
page read and write
96F000
unkown
page execute and write copy
4BD0000
heap
page read and write
128D000
stack
page read and write
909000
unkown
page write copy
4BF1000
heap
page read and write
32FF000
stack
page read and write
4D60000
direct allocation
page execute and read and write
472F000
stack
page read and write
50CB000
stack
page read and write
DDC000
stack
page read and write
50F1000
direct allocation
page read and write
2CD7000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
5220000
direct allocation
page execute and read and write
3C2E000
stack
page read and write
31DE000
stack
page read and write
BAF000
unkown
page execute and read and write
4701000
heap
page read and write
84E000
stack
page read and write
2D30000
direct allocation
page read and write
4BF1000
heap
page read and write
4701000
heap
page read and write
600E000
stack
page read and write
4701000
heap
page read and write
422F000
stack
page read and write
CD4000
heap
page read and write
412E000
stack
page read and write
2D30000
direct allocation
page read and write
6095000
heap
page read and write
880000
heap
page read and write
A92000
unkown
page execute and read and write
386E000
stack
page read and write
B99000
unkown
page execute and read and write
CD4000
heap
page read and write
4BE0000
direct allocation
page read and write
304F000
stack
page read and write
90B000
unkown
page execute and read and write
4D30000
direct allocation
page execute and read and write
E92000
heap
page read and write
5260000
direct allocation
page execute and read and write
4701000
heap
page read and write
396F000
stack
page read and write
2A90000
direct allocation
page read and write
31BF000
stack
page read and write
CD4000
heap
page read and write
4BF1000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4701000
heap
page read and write
4C00000
heap
page read and write
3BEF000
stack
page read and write
7DAE000
stack
page read and write
BAF000
unkown
page execute and write copy
3CFF000
stack
page read and write
CD4000
heap
page read and write
40BF000
stack
page read and write
4701000
heap
page read and write
BAF000
unkown
page execute and write copy
DE6000
heap
page read and write
4701000
heap
page read and write
3E5E000
stack
page read and write
890000
direct allocation
page read and write
4751000
heap
page read and write
3AAF000
stack
page read and write
67C000
stack
page read and write
81CF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
890000
direct allocation
page read and write
499E000
stack
page read and write
4BF1000
heap
page read and write
434E000
stack
page read and write
4BF1000
heap
page read and write
CD4000
heap
page read and write
C0A000
stack
page read and write
4701000
heap
page read and write
CD4000
heap
page read and write
B06000
unkown
page execute and read and write
CD4000
heap
page read and write
77D000
stack
page read and write
6090000
heap
page read and write
5210000
direct allocation
page execute and read and write
BA1000
unkown
page execute and read and write
4701000
heap
page read and write
5230000
direct allocation
page execute and read and write
31FE000
stack
page read and write
4D60000
direct allocation
page execute and read and write
2E6E000
stack
page read and write
3B8F000
stack
page read and write
54FF000
stack
page read and write
295E000
stack
page read and write
4BF1000
heap
page read and write
3D0E000
stack
page read and write
629F000
stack
page read and write
4BE0000
direct allocation
page read and write
2A90000
direct allocation
page read and write
2A90000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
902000
unkown
page execute and read and write
4701000
heap
page read and write
4701000
heap
page read and write
90B000
unkown
page execute and read and write
4BE0000
direct allocation
page read and write
390F000
stack
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
5030000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
CD4000
heap
page read and write
2A90000
direct allocation
page read and write
5270000
direct allocation
page execute and read and write
6CB000
unkown
page execute and read and write
2E3E000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
41CF000
stack
page read and write
4D50000
direct allocation
page execute and read and write
7E8C000
stack
page read and write
7F93000
heap
page read and write
890000
direct allocation
page read and write
409F000
stack
page read and write
12A0000
heap
page read and write
50F1000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
890000
direct allocation
page read and write
660000
unkown
page readonly
4701000
heap
page read and write
36CE000
stack
page read and write
D46000
unkown
page execute and read and write
CD4000
heap
page read and write
563F000
stack
page read and write
4D10000
direct allocation
page execute and read and write
902000
unkown
page execute and read and write
4701000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
CD4000
heap
page read and write
E78000
heap
page read and write
B99000
unkown
page execute and read and write
2A0F000
stack
page read and write
307F000
stack
page read and write
3BBF000
stack
page read and write
12DE000
heap
page read and write
6570000
heap
page read and write
E60000
heap
page read and write
4BF1000
heap
page read and write
890000
direct allocation
page read and write
4700000
heap
page read and write
45EF000
stack
page read and write
4701000
heap
page read and write
66A3000
heap
page read and write
B99000
unkown
page execute and read and write
BB0000
unkown
page execute and write copy
CD4000
heap
page read and write
2D30000
direct allocation
page read and write
4701000
heap
page read and write
4BF1000
heap
page read and write
4BE0000
direct allocation
page read and write
CD4000
heap
page read and write
There are 802 hidden memdumps, click here to show them.