IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.phpom
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpm
unknown
http://185.215.113.16/Jo89Ku7d/index.phpi
unknown
http://185.215.113.16/Jo89Ku7d/index.phpSSv
unknown
http://185.215.113.16/Jo89Ku7d/index.php&
unknown
http://185.215.113.16/Jo89Ku7d/index.phpCHIz
unknown
http://185.215.113.16/Jo89Ku7d/index.phpMicR
unknown
http://185.215.113.16/Jo89Ku7d/index.php_RE&R
unknown
http://185.215.113.16/Jo89Ku7d/index.phpb
unknown
http://185.215.113.16/Jo89Ku7d/index.phpinb
unknown
http://185.215.113.16/Jo89Ku7d/index.phptem
unknown
http://185.215.113.16/Jo89Ku7d/index.phpY
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded)
unknown
http://185.215.113.16/Jo89Ku7d/index.phpO
unknown
http://185.215.113.16/Jo89Ku7d/index.phpN
unknown
http://185.215.113.16/Jo89Ku7d/index.phpb1a30a186ec2d30be6db0b5
unknown
http://185.215.113.16/Jo89Ku7d/index.phpL
unknown
http://185.215.113.16/Jo89Ku7d/index.phpIVE
unknown
http://185.215.113.16/Jo89Ku7d/index.phpE
unknown
http://185.215.113.16/Jo89Ku7d/index.phpxSu
unknown
http://185.215.113.16/Jo89Ku7d/index.phpD;.N
unknown
http://185.215.113.16/Jo89Ku7d/index.phpPC
unknown
http://185.215.113.16/Jo89Ku7d/index.phpDri
unknown
http://185.215.113.16/Jo89Ku7d/index.php?
unknown
http://185.215.113.16/Jo89Ku7d/index.phpw
unknown
http://185.215.113.16/Jo89Ku7d/index.phpa=C
unknown
http://185.215.113.16/Jo89Ku7d/index.phpndows
unknown
http://185.215.113.16/Jo89Ku7d/index.phpSy
unknown
http://185.215.113.16/Jo89Ku7d/index.php1
unknown
http://185.215.113.16/Jo89Ku7d/index.phprs
unknown
There are 21 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F21000
unkown
page execute and read and write
malicious
F21000
unkown
page execute and read and write
malicious
EE1000
unkown
page execute and read and write
malicious
4AD0000
direct allocation
page read and write
malicious
4FE0000
direct allocation
page read and write
malicious
F21000
unkown
page execute and read and write
malicious
4B80000
direct allocation
page read and write
malicious
4C80000
direct allocation
page read and write
malicious
4631000
heap
page read and write
4B51000
heap
page read and write
4A4E000
stack
page read and write
31FE000
stack
page read and write
47FF000
stack
page read and write
780000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
EFE000
stack
page read and write
4FD0000
direct allocation
page read and write
4801000
heap
page read and write
4631000
heap
page read and write
452E000
stack
page read and write
2E7F000
stack
page read and write
1240000
unkown
page execute and read and write
2A90000
direct allocation
page read and write
EF0000
direct allocation
page read and write
9B4000
heap
page read and write
3D6F000
stack
page read and write
3DFF000
stack
page read and write
402E000
stack
page read and write
9DE000
heap
page read and write
BE4000
heap
page read and write
9B4000
heap
page read and write
9D9000
heap
page read and write
534E000
stack
page read and write
4631000
heap
page read and write
13E7000
unkown
page execute and write copy
28FF000
stack
page read and write
4B51000
heap
page read and write
F20000
unkown
page read and write
4B51000
heap
page read and write
2A90000
direct allocation
page read and write
4F90000
heap
page read and write
3ECF000
stack
page read and write
39EE000
stack
page read and write
45BE000
stack
page read and write
BE4000
heap
page read and write
1200000
unkown
page execute and write copy
D2B000
heap
page read and write
F00000
direct allocation
page read and write
4DF0000
direct allocation
page execute and read and write
4631000
heap
page read and write
4631000
heap
page read and write
4B51000
heap
page read and write
9C3000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
300E000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
40FE000
stack
page read and write
4B4F000
stack
page read and write
EF0000
direct allocation
page read and write
F00000
direct allocation
page read and write
951000
heap
page read and write
4B51000
heap
page read and write
4C50000
direct allocation
page execute and read and write
41FF000
stack
page read and write
360F000
stack
page read and write
30EF000
stack
page read and write
5ACE000
stack
page read and write
4631000
heap
page read and write
9E0000
heap
page read and write
F82000
unkown
page execute and read and write
3BBE000
stack
page read and write
548E000
stack
page read and write
4631000
heap
page read and write
5160000
direct allocation
page execute and read and write
BFF000
stack
page read and write
4B51000
heap
page read and write
3B4E000
stack
page read and write
4631000
heap
page read and write
2D7F000
stack
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
F00000
direct allocation
page read and write
3A7E000
stack
page read and write
4B51000
heap
page read and write
4B0E000
stack
page read and write
4701000
heap
page read and write
65C0000
heap
page read and write
4800000
trusted library allocation
page read and write
13E5000
unkown
page execute and read and write
EF0000
direct allocation
page read and write
A80000
heap
page read and write
2ECB000
stack
page read and write
40BE000
stack
page read and write
F20000
unkown
page read and write
F89000
unkown
page read and write
4631000
heap
page read and write
29BE000
stack
page read and write
3AEF000
stack
page read and write
4631000
heap
page read and write
3C8E000
stack
page read and write
367F000
stack
page read and write
4A0F000
stack
page read and write
4631000
heap
page read and write
C60000
heap
page read and write
2A90000
direct allocation
page read and write
2A0E000
stack
page read and write
4B51000
heap
page read and write
3FEF000
stack
page read and write
13E7000
unkown
page execute and write copy
F00000
direct allocation
page read and write
1232000
unkown
page execute and read and write
4B51000
heap
page read and write
4D00000
direct allocation
page execute and read and write
4631000
heap
page read and write
4631000
heap
page read and write
4B51000
heap
page read and write
4631000
heap
page read and write
3A7F000
stack
page read and write
CE0000
heap
page read and write
4631000
heap
page read and write
A1E000
stack
page read and write
63AF000
stack
page read and write
44BE000
stack
page read and write
F00000
direct allocation
page read and write
4DE0000
direct allocation
page execute and read and write
8A5000
heap
page read and write
9CE000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4631000
heap
page read and write
29D0000
direct allocation
page execute and read and write
BE4000
heap
page read and write
6066000
heap
page read and write
9CE000
heap
page read and write
F21000
unkown
page execute and write copy
4B51000
heap
page read and write
4D40000
direct allocation
page execute and read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
4631000
heap
page read and write
4C40000
direct allocation
page execute and read and write
583F000
stack
page read and write
4B51000
heap
page read and write
4631000
heap
page read and write
F89000
unkown
page read and write
648E000
heap
page read and write
4631000
heap
page read and write
1228000
unkown
page execute and read and write
9B5000
heap
page read and write
EE1000
unkown
page execute and write copy
605E000
stack
page read and write
4631000
heap
page read and write
3BFE000
stack
page read and write
4631000
heap
page read and write
3B2E000
stack
page read and write
2F7E000
stack
page read and write
5B2E000
stack
page read and write
29CE000
stack
page read and write
1228000
unkown
page execute and read and write
11E8000
unkown
page execute and read and write
A6E000
stack
page read and write
2AA0000
heap
page read and write
4B51000
heap
page read and write
1232000
unkown
page execute and read and write
683E000
stack
page read and write
BE4000
heap
page read and write
29E0000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
333E000
stack
page read and write
36BE000
stack
page read and write
4631000
heap
page read and write
45FE000
stack
page read and write
9C3000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
1240000
unkown
page execute and write copy
5190000
direct allocation
page execute and read and write
94E000
heap
page read and write
51D0000
direct allocation
page execute and read and write
F00000
direct allocation
page read and write
307F000
stack
page read and write
426F000
stack
page read and write
573E000
stack
page read and write
343E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
443F000
stack
page read and write
4631000
heap
page read and write
4B51000
heap
page read and write
2A90000
direct allocation
page read and write
4631000
heap
page read and write
4B51000
heap
page read and write
4631000
heap
page read and write
BE4000
heap
page read and write
E7E000
stack
page read and write
1241000
unkown
page execute and write copy
4631000
heap
page read and write
F82000
unkown
page execute and read and write
32FF000
stack
page read and write
F00000
direct allocation
page read and write
BE4000
heap
page read and write
4631000
heap
page read and write
BE4000
heap
page read and write
8F0000
heap
page read and write
BE4000
heap
page read and write
33AE000
stack
page read and write
4631000
heap
page read and write
9C3000
heap
page read and write
F00000
direct allocation
page read and write
388F000
stack
page read and write
4B51000
heap
page read and write
4C0F000
stack
page read and write
3F7F000
stack
page read and write
EF0000
direct allocation
page read and write
6C70000
heap
page read and write
5F4000
heap
page read and write
9CE000
heap
page read and write
EFE000
stack
page read and write
2FCF000
stack
page read and write
1232000
unkown
page execute and read and write
4631000
heap
page read and write
4B51000
heap
page read and write
38AE000
stack
page read and write
1240000
unkown
page execute and read and write
F21000
unkown
page execute and write copy
F00000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
97F000
heap
page read and write
44EF000
stack
page read and write
63E0000
heap
page read and write
372F000
stack
page read and write
987000
heap
page read and write
9C5000
heap
page read and write
4631000
heap
page read and write
CAD000
heap
page read and write
4B51000
heap
page read and write
97F000
heap
page read and write
4FD0000
direct allocation
page read and write
9BB000
heap
page read and write
347E000
stack
page read and write
34CF000
stack
page read and write
616F000
stack
page read and write
9BC000
heap
page read and write
5160000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4631000
heap
page read and write
3F3E000
stack
page read and write
544F000
stack
page read and write
4B51000
heap
page read and write
980000
heap
page read and write
59CE000
stack
page read and write
11F2000
unkown
page execute and read and write
BE4000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
4D50000
direct allocation
page execute and read and write
29F0000
heap
page read and write
407F000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
EF0000
direct allocation
page read and write
3B7F000
stack
page read and write
2A90000
direct allocation
page read and write
10D7000
unkown
page execute and read and write
3E3F000
stack
page read and write
F10000
direct allocation
page read and write
4B51000
heap
page read and write
BE4000
heap
page read and write
4B51000
heap
page read and write
5170000
direct allocation
page execute and read and write
462F000
stack
page read and write
4B51000
heap
page read and write
2A50000
direct allocation
page read and write
2A8E000
stack
page read and write
F10000
direct allocation
page read and write
55CE000
stack
page read and write
3CC000
stack
page read and write
50C000
stack
page read and write
A7C000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4631000
heap
page read and write
4631000
heap
page read and write
4B51000
heap
page read and write
2A90000
direct allocation
page read and write
9CE000
heap
page read and write
9B4000
heap
page read and write
9A1000
heap
page read and write
4631000
heap
page read and write
BE4000
heap
page read and write
4631000
heap
page read and write
870000
heap
page read and write
4B51000
heap
page read and write
5160000
direct allocation
page execute and read and write
6FD000
stack
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
3CFE000
stack
page read and write
4631000
heap
page read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
4631000
heap
page read and write
BE4000
heap
page read and write
EF0000
direct allocation
page read and write
4CBF000
stack
page read and write
4631000
heap
page read and write
4900000
trusted library allocation
page read and write
32FE000
stack
page read and write
314E000
stack
page read and write
4B51000
heap
page read and write
2A50000
direct allocation
page read and write
5F4000
heap
page read and write
5160000
direct allocation
page execute and read and write
BE4000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
983000
heap
page read and write
2DFF000
stack
page read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
4631000
heap
page read and write
6490000
heap
page read and write
1117000
unkown
page execute and read and write
4631000
heap
page read and write
4701000
heap
page read and write
EF0000
direct allocation
page read and write
4B51000
heap
page read and write
4E60000
direct allocation
page execute and read and write
2A90000
direct allocation
page read and write
A70000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4631000
heap
page read and write
F00000
direct allocation
page read and write
BE4000
heap
page read and write
CBA000
heap
page read and write
297E000
stack
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
2A90000
direct allocation
page read and write
4B51000
heap
page read and write
4631000
heap
page read and write
F00000
direct allocation
page read and write
457F000
stack
page read and write
4B50000
heap
page read and write
F00000
direct allocation
page read and write
F00000
direct allocation
page read and write
468E000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
F10000
direct allocation
page read and write
5F0000
heap
page read and write
317F000
stack
page read and write
4631000
heap
page read and write
1117000
unkown
page execute and read and write
4B51000
heap
page read and write
F00000
direct allocation
page read and write
9DA000
heap
page read and write
4801000
heap
page read and write
324F000
stack
page read and write
5041000
direct allocation
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
F00000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
51C0000
direct allocation
page execute and read and write
4801000
heap
page read and write
4631000
heap
page read and write
1117000
unkown
page execute and read and write
67FC000
stack
page read and write
F20000
unkown
page readonly
1228000
unkown
page execute and read and write
9B4000
heap
page read and write
4C60000
direct allocation
page execute and read and write
2E8F000
stack
page read and write
447E000
stack
page read and write
2B7F000
stack
page read and write
416E000
stack
page read and write
437E000
stack
page read and write
13A5000
unkown
page execute and read and write
5150000
direct allocation
page execute and read and write
4E70000
direct allocation
page execute and read and write
8EC000
stack
page read and write
EAE000
stack
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
4730000
trusted library allocation
page read and write
1241000
unkown
page execute and write copy
BE4000
heap
page read and write
90A000
heap
page read and write
36FE000
stack
page read and write
F89000
unkown
page write copy
6A6E000
stack
page read and write
4631000
heap
page read and write
BE4000
heap
page read and write
626F000
stack
page read and write
4631000
heap
page read and write
2A50000
direct allocation
page read and write
3D8F000
stack
page read and write
785000
heap
page read and write
4B51000
heap
page read and write
AFE000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
4631000
heap
page read and write
464F000
stack
page read and write
41BF000
stack
page read and write
4AC0000
direct allocation
page read and write
34AF000
stack
page read and write
2CFF000
stack
page read and write
F00000
direct allocation
page read and write
CB0000
heap
page read and write
4631000
heap
page read and write
6C4C000
stack
page read and write
357F000
stack
page read and write
4B51000
heap
page read and write
440E000
stack
page read and write
307F000
stack
page read and write
4B51000
heap
page read and write
4AC0000
direct allocation
page read and write
F00000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
6065000
heap
page read and write
F42000
unkown
page execute and read and write
35EF000
stack
page read and write
4631000
heap
page read and write
EF0000
direct allocation
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
9DE000
heap
page read and write
4631000
heap
page read and write
41FE000
stack
page read and write
4B51000
heap
page read and write
CF9000
heap
page read and write
3A0E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
EEE000
stack
page read and write
4BE1000
direct allocation
page read and write
4B51000
heap
page read and write
4631000
heap
page read and write
F8B000
unkown
page execute and read and write
4631000
heap
page read and write
4631000
heap
page read and write
F89000
unkown
page write copy
4E40000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
F00000
direct allocation
page read and write
39CF000
stack
page read and write
BE0000
heap
page read and write
4C30000
direct allocation
page execute and read and write
38FF000
stack
page read and write
F21000
unkown
page execute and write copy
42CE000
stack
page read and write
5EE000
stack
page read and write
4FD0000
direct allocation
page read and write
3B0000
heap
page read and write
900000
heap
page read and write
40BF000
stack
page read and write
580000
heap
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
31BF000
stack
page read and write
F00000
direct allocation
page read and write
9C9000
heap
page read and write
570000
heap
page read and write
9A1000
heap
page read and write
13A7000
unkown
page execute and write copy
BE4000
heap
page read and write
9C3000
heap
page read and write
3DCE000
stack
page read and write
9B4000
heap
page read and write
46FF000
stack
page read and write
4631000
heap
page read and write
8A0000
heap
page read and write
4631000
heap
page read and write
30BE000
stack
page read and write
9C0000
heap
page read and write
F00000
direct allocation
page read and write
13E5000
unkown
page execute and read and write
65C4000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4BBE000
stack
page read and write
4701000
heap
page read and write
4800000
heap
page read and write
5C2F000
stack
page read and write
4631000
heap
page read and write
3EEE000
stack
page read and write
4B51000
heap
page read and write
5200000
direct allocation
page execute and read and write
4B51000
heap
page read and write
F00000
direct allocation
page read and write
EE0000
unkown
page readonly
4631000
heap
page read and write
9B0000
heap
page read and write
450F000
stack
page read and write
BE4000
heap
page read and write
400F000
stack
page read and write
336F000
stack
page read and write
11FC000
unkown
page execute and read and write
9B8000
heap
page read and write
598C000
stack
page read and write
1240000
unkown
page execute and write copy
34B000
stack
page read and write
51A0000
direct allocation
page execute and read and write
EF0000
direct allocation
page read and write
364E000
stack
page read and write
328E000
stack
page read and write
5140000
direct allocation
page execute and read and write
5F4000
heap
page read and write
4B51000
heap
page read and write
5F4000
heap
page read and write
F00000
direct allocation
page read and write
4B51000
heap
page read and write
2A90000
direct allocation
page read and write
86E000
stack
page read and write
8AE000
stack
page read and write
530B000
stack
page read and write
BE4000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4631000
heap
page read and write
F82000
unkown
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
F00000
direct allocation
page read and write
374F000
stack
page read and write
77E000
stack
page read and write
4631000
heap
page read and write
CA7000
heap
page read and write
393F000
stack
page read and write
4631000
heap
page read and write
90E000
heap
page read and write
BE4000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
4D60000
direct allocation
page execute and read and write
9BB000
heap
page read and write
3F7E000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
4B51000
heap
page read and write
322F000
stack
page read and write
2E3E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
3CFF000
stack
page read and write
BE4000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
EBE000
stack
page read and write
4631000
heap
page read and write
5180000
direct allocation
page execute and read and write
47CE000
stack
page read and write
EC0000
heap
page read and write
13E7000
unkown
page execute and write copy
4E30000
direct allocation
page execute and read and write
4631000
heap
page read and write
4C70000
direct allocation
page execute and read and write
BE4000
heap
page read and write
11FC000
unkown
page execute and read and write
3C6E000
stack
page read and write
423E000
stack
page read and write
4B51000
heap
page read and write
3D3E000
stack
page read and write
EF0000
direct allocation
page read and write
BE4000
heap
page read and write
F20000
unkown
page readonly
4631000
heap
page read and write
9BC000
heap
page read and write
6B4B000
stack
page read and write
6480000
heap
page read and write
9CE000
heap
page read and write
2A90000
direct allocation
page read and write
51F0000
direct allocation
page execute and read and write
BF0000
heap
page read and write
4631000
heap
page read and write
3E3E000
stack
page read and write
66FB000
stack
page read and write
2A90000
direct allocation
page read and write
6060000
heap
page read and write
2F7F000
stack
page read and write
9BC000
heap
page read and write
353F000
stack
page read and write
95F000
heap
page read and write
11FC000
unkown
page execute and read and write
3C0000
heap
page read and write
4B51000
heap
page read and write
4E90000
direct allocation
page execute and read and write
418E000
stack
page read and write
EF0000
direct allocation
page read and write
4CD0000
direct allocation
page execute and read and write
326E000
stack
page read and write
56CF000
stack
page read and write
EF0000
direct allocation
page read and write
404E000
stack
page read and write
433F000
stack
page read and write
BE4000
heap
page read and write
B7D000
stack
page read and write
42FF000
stack
page read and write
9AF000
stack
page read and write
1240000
unkown
page execute and write copy
5F4000
heap
page read and write
F00000
direct allocation
page read and write
4631000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
F20000
unkown
page read and write
4631000
heap
page read and write
433E000
stack
page read and write
4631000
heap
page read and write
A8E000
heap
page read and write
414F000
stack
page read and write
39AF000
stack
page read and write
9C3000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4B51000
heap
page read and write
3B0F000
stack
page read and write
C7F000
stack
page read and write
38CE000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
5F4000
heap
page read and write
2AA7000
heap
page read and write
3DAE000
stack
page read and write
343F000
stack
page read and write
383E000
stack
page read and write
F00000
direct allocation
page read and write
9CE000
heap
page read and write
4B51000
heap
page read and write
4631000
heap
page read and write
2A4E000
stack
page read and write
310F000
stack
page read and write
EF0000
direct allocation
page read and write
9C3000
heap
page read and write
4631000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
9A1000
heap
page read and write
9E1000
heap
page read and write
37BF000
stack
page read and write
5160000
direct allocation
page execute and read and write
4631000
heap
page read and write
43CF000
stack
page read and write
4B51000
heap
page read and write
5160000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
BE4000
heap
page read and write
397E000
stack
page read and write
428E000
stack
page read and write
393E000
stack
page read and write
BE4000
heap
page read and write
2BAF000
stack
page read and write
31BE000
stack
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
9BB000
heap
page read and write
CFD000
heap
page read and write
4CBE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
4701000
heap
page read and write
97A000
heap
page read and write
CF4000
heap
page read and write
362E000
stack
page read and write
4631000
heap
page read and write
4B51000
heap
page read and write
2FEE000
stack
page read and write
730000
heap
page read and write
6FA000
stack
page read and write
F8B000
unkown
page execute and read and write
8FD000
stack
page read and write
4700000
heap
page read and write
4650000
heap
page read and write
6481000
heap
page read and write
BE4000
heap
page read and write
4B51000
heap
page read and write
97C000
heap
page read and write
960000
heap
page read and write
29F7000
heap
page read and write
EBE000
stack
page read and write
4B51000
heap
page read and write
1241000
unkown
page execute and write copy
4B51000
heap
page read and write
338F000
stack
page read and write
2BFF000
stack
page read and write
4E50000
direct allocation
page execute and read and write
4CC0000
direct allocation
page execute and read and write
E3E000
stack
page read and write
588D000
stack
page read and write
13E5000
unkown
page execute and read and write
48CF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
F49000
unkown
page write copy
45BF000
stack
page read and write
9C9000
heap
page read and write
601E000
stack
page read and write
F20000
unkown
page readonly
34EE000
stack
page read and write
5F4000
heap
page read and write
2A90000
direct allocation
page read and write
51E0000
direct allocation
page execute and read and write
2C7F000
stack
page read and write
36BF000
stack
page read and write
2A90000
direct allocation
page read and write
490E000
stack
page read and write
42AE000
stack
page read and write
32BF000
stack
page read and write
293E000
stack
page read and write
4631000
heap
page read and write
4640000
heap
page read and write
3ABE000
stack
page read and write
558E000
stack
page read and write
4B51000
heap
page read and write
4701000
heap
page read and write
4C50000
trusted library allocation
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
412F000
stack
page read and write
4630000
heap
page read and write
4C50000
direct allocation
page execute and read and write
2FAF000
stack
page read and write
4B51000
heap
page read and write
4631000
heap
page read and write
4801000
heap
page read and write
9C7000
heap
page read and write
CA0000
heap
page read and write
454E000
stack
page read and write
BE4000
heap
page read and write
43EE000
stack
page read and write
37FF000
stack
page read and write
BE4000
heap
page read and write
4631000
heap
page read and write
F4B000
unkown
page execute and read and write
4B51000
heap
page read and write
9A1000
heap
page read and write
35BE000
stack
page read and write
4B51000
heap
page read and write
5F4000
heap
page read and write
312E000
stack
page read and write
F00000
direct allocation
page read and write
4B51000
heap
page read and write
4D10000
direct allocation
page execute and read and write
33FF000
stack
page read and write
4B51000
heap
page read and write
A8A000
heap
page read and write
2A90000
direct allocation
page read and write
478F000
stack
page read and write
4631000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
3CBF000
stack
page read and write
9A1000
heap
page read and write
3BBF000
stack
page read and write
5F4000
heap
page read and write
4631000
heap
page read and write
BE4000
heap
page read and write
2DAF000
stack
page read and write
1240000
unkown
page execute and read and write
F00000
direct allocation
page read and write
4631000
heap
page read and write
4E20000
direct allocation
page execute and read and write
2EAF000
stack
page read and write
43AF000
stack
page read and write
4631000
heap
page read and write
9EB000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4631000
heap
page read and write
376E000
stack
page read and write
4E74000
heap
page read and write
9FD000
heap
page read and write
6490000
heap
page read and write
4B51000
heap
page read and write
4631000
heap
page read and write
357E000
stack
page read and write
1201000
unkown
page execute and write copy
511F000
stack
page read and write
4D30000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
3FBE000
stack
page read and write
F89000
unkown
page write copy
447F000
stack
page read and write
4B31000
direct allocation
page read and write
2CAF000
stack
page read and write
F49000
unkown
page read and write
4B51000
heap
page read and write
46BF000
stack
page read and write
4631000
heap
page read and write
350E000
stack
page read and write
378E000
stack
page read and write
4B51000
heap
page read and write
946000
heap
page read and write
4631000
heap
page read and write
33CE000
stack
page read and write
5130000
direct allocation
page execute and read and write
11BC000
unkown
page execute and read and write
4E70000
heap
page read and write
4631000
heap
page read and write
516C000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
4C80000
direct allocation
page execute and read and write
BE4000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
2A70000
heap
page read and write
3F0E000
stack
page read and write
4631000
heap
page read and write
73E000
stack
page read and write
EE0000
unkown
page read and write
4701000
heap
page read and write
F89000
unkown
page read and write
4631000
heap
page read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
3EAF000
stack
page read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
501C000
stack
page read and write
4E10000
direct allocation
page execute and read and write
2A4F000
stack
page read and write
3C2F000
stack
page read and write
D12000
heap
page read and write
C90000
heap
page read and write
4E80000
direct allocation
page execute and read and write
37FE000
stack
page read and write
5F4000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
4DBF000
stack
page read and write
2F3F000
stack
page read and write
F00000
direct allocation
page read and write
3A3F000
stack
page read and write
F8B000
unkown
page execute and read and write
3C4F000
stack
page read and write
2A77000
heap
page read and write
62AE000
stack
page read and write
46FE000
stack
page read and write
4631000
heap
page read and write
4B60000
heap
page read and write
BE4000
heap
page read and write
4CE1000
direct allocation
page read and write
4642000
heap
page read and write
2AFF000
stack
page read and write
6C50000
heap
page read and write
386F000
stack
page read and write
EF0000
direct allocation
page read and write
1200000
unkown
page execute and read and write
3E7E000
stack
page read and write
There are 839 hidden memdumps, click here to show them.