IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpN
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodeda
unknown
http://185.215.113.16/Jo89Ku7d/index.phpl
unknown
http://185.215.113.16/Jo89Ku7d/index.phpk
unknown
http://185.215.113.16/Jo89Ku7d/index.phpdeds
unknown
http://185.215.113.16/Jo89Ku7d/index.phpj
unknown
http://185.215.113.16/Jo89Ku7d/index.phpG
unknown
http://185.215.113.16/Jo89Ku7d/index.php7
unknown
http://185.215.113.16/Jo89Ku7d/index.phpcoded9
unknown
http://185.215.113.16/Jo89Ku7d/index.phpw
unknown
http://185.215.113.16/Jo89Ku7d/index.phpS
unknown
http://185.215.113.16/Jo89Ku7d/index.phps
unknown
http://185.215.113.16/Jo89Ku7d/index.php0
unknown
http://185.215.113.16/Jo89Ku7d/index.phpBg1&cm
unknown
http://185.215.113.16/Jo89Ku7d/index.phpO
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
There are 7 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D11000
unkown
page execute and read and write
malicious
4F60000
direct allocation
page read and write
malicious
3C1000
unkown
page execute and read and write
malicious
5310000
direct allocation
page read and write
malicious
4EE0000
direct allocation
page read and write
malicious
4D10000
direct allocation
page read and write
malicious
D11000
unkown
page execute and read and write
malicious
D11000
unkown
page execute and read and write
malicious
4A51000
heap
page read and write
328E000
stack
page read and write
FE6000
unkown
page execute and read and write
434E000
stack
page read and write
179E000
stack
page read and write
5B0000
unkown
page execute and read and write
4ACF000
stack
page read and write
4A51000
heap
page read and write
460F000
stack
page read and write
4891000
heap
page read and write
81C9000
heap
page read and write
14E0000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
CAE000
stack
page read and write
5160000
direct allocation
page execute and read and write
AD0000
heap
page read and write
1540000
heap
page read and write
429000
unkown
page write copy
4891000
heap
page read and write
4A40000
direct allocation
page read and write
4650000
heap
page read and write
470E000
stack
page read and write
50F0000
direct allocation
page execute and read and write
CF0000
direct allocation
page read and write
CF0000
direct allocation
page read and write
4A51000
heap
page read and write
430F000
stack
page read and write
4E81000
heap
page read and write
424F000
stack
page read and write
4F00000
direct allocation
page execute and read and write
62E0000
heap
page read and write
10AD000
heap
page read and write
4A51000
heap
page read and write
D10000
unkown
page readonly
4A51000
heap
page read and write
4A51000
heap
page read and write
545F000
stack
page read and write
4A51000
heap
page read and write
1031000
heap
page read and write
414F000
stack
page read and write
4891000
heap
page read and write
3A4F000
stack
page read and write
4891000
heap
page read and write
66EE000
stack
page read and write
13D4000
heap
page read and write
4E70000
direct allocation
page read and write
4A51000
heap
page read and write
4E70000
direct allocation
page read and write
546E000
stack
page read and write
4891000
heap
page read and write
D10000
unkown
page read and write
3B0F000
stack
page read and write
4A8F000
stack
page read and write
641F000
stack
page read and write
D79000
unkown
page write copy
CF0000
direct allocation
page read and write
10AF000
heap
page read and write
54A0000
direct allocation
page execute and read and write
50C0000
direct allocation
page execute and read and write
2B8D000
heap
page read and write
4891000
heap
page read and write
A7D000
stack
page read and write
101D000
unkown
page execute and read and write
50AF000
stack
page read and write
4A51000
heap
page read and write
62E6000
heap
page read and write
4891000
heap
page read and write
10A1000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
307E000
stack
page read and write
5130000
direct allocation
page execute and read and write
11D2000
unkown
page execute and write copy
81C1000
heap
page read and write
434F000
stack
page read and write
3CCF000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
330F000
stack
page read and write
3C8E000
stack
page read and write
CF0000
direct allocation
page read and write
3100000
heap
page read and write
54A0000
direct allocation
page execute and read and write
3C4F000
stack
page read and write
4891000
heap
page read and write
3C0000
unkown
page readonly
34CF000
stack
page read and write
30CF000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4A51000
heap
page read and write
FC0000
heap
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
4891000
heap
page read and write
4891000
heap
page read and write
320F000
stack
page read and write
464E000
stack
page read and write
4A51000
heap
page read and write
696000
unkown
page execute and read and write
50F0000
direct allocation
page execute and read and write
4EE0000
direct allocation
page read and write
4F60000
direct allocation
page read and write
88AC000
stack
page read and write
50E0000
direct allocation
page execute and read and write
4891000
heap
page read and write
4A51000
heap
page read and write
530E000
stack
page read and write
13C0000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
D10000
unkown
page readonly
4A51000
heap
page read and write
A30000
heap
page read and write
5100000
direct allocation
page execute and read and write
4891000
heap
page read and write
440E000
stack
page read and write
4D10000
direct allocation
page read and write
4891000
heap
page read and write
4E70000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
1015000
unkown
page execute and read and write
B3D000
stack
page read and write
474E000
stack
page read and write
4891000
heap
page read and write
464F000
stack
page read and write
4A40000
direct allocation
page read and write
404D000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4891000
heap
page read and write
4891000
heap
page read and write
102C000
unkown
page execute and write copy
2C7E000
stack
page read and write
50A0000
direct allocation
page execute and read and write
3A8F000
stack
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
491E000
stack
page read and write
3C0000
unkown
page read and write
334F000
stack
page read and write
3E0F000
stack
page read and write
4A51000
heap
page read and write
5110000
direct allocation
page execute and read and write
4A51000
heap
page read and write
2D00000
heap
page read and write
D10000
unkown
page read and write
4E70000
direct allocation
page read and write
428F000
stack
page read and write
388F000
stack
page read and write
340F000
stack
page read and write
FA5000
heap
page read and write
450E000
stack
page read and write
5120000
direct allocation
page execute and read and write
13D4000
heap
page read and write
6E2E000
heap
page read and write
5190000
direct allocation
page execute and read and write
133E000
stack
page read and write
CEE000
stack
page read and write
4891000
heap
page read and write
109A000
heap
page read and write
3F4F000
stack
page read and write
6DC000
unkown
page execute and write copy
1081000
heap
page read and write
324E000
stack
page read and write
880000
unkown
page execute and read and write
10B0000
heap
page read and write
FA0000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
4A51000
heap
page read and write
2B7E000
stack
page read and write
5110000
direct allocation
page execute and read and write
4A51000
heap
page read and write
39CF000
stack
page read and write
338F000
stack
page read and write
14E0000
direct allocation
page read and write
478E000
stack
page read and write
54C0000
direct allocation
page execute and read and write
1022000
heap
page read and write
4EE0000
direct allocation
page read and write
4E70000
direct allocation
page read and write
420E000
stack
page read and write
14E0000
direct allocation
page read and write
2ABE000
stack
page read and write
10A6000
heap
page read and write
540F000
stack
page read and write
388E000
stack
page read and write
3F8E000
stack
page read and write
384F000
stack
page read and write
2D07000
heap
page read and write
CF0000
direct allocation
page read and write
4891000
heap
page read and write
10AF000
heap
page read and write
14F0000
heap
page read and write
1015000
unkown
page execute and read and write
4AD0000
heap
page read and write
14FB000
heap
page read and write
2AFB000
stack
page read and write
A35000
heap
page read and write
4A51000
heap
page read and write
429000
unkown
page read and write
4F10000
direct allocation
page execute and read and write
344E000
stack
page read and write
4A51000
heap
page read and write
10A1000
heap
page read and write
5480000
direct allocation
page execute and read and write
4A51000
heap
page read and write
3BCE000
stack
page read and write
398F000
stack
page read and write
5070000
direct allocation
page execute and read and write
4A51000
heap
page read and write
4A40000
direct allocation
page read and write
62E5000
heap
page read and write
4A51000
heap
page read and write
5170000
direct allocation
page execute and read and write
4891000
heap
page read and write
13D4000
heap
page read and write
D7B000
unkown
page execute and read and write
354F000
stack
page read and write
4F60000
direct allocation
page read and write
11D2000
unkown
page execute and write copy
4891000
heap
page read and write
4890000
heap
page read and write
4FAE000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
10A6000
heap
page read and write
65AE000
stack
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
50F0000
direct allocation
page execute and read and write
1015000
unkown
page execute and read and write
4E80000
direct allocation
page execute and read and write
5310000
direct allocation
page read and write
4891000
heap
page read and write
50B0000
direct allocation
page execute and read and write
508E000
stack
page read and write
4891000
heap
page read and write
360E000
stack
page read and write
656F000
stack
page read and write
3E8F000
stack
page read and write
4A51000
heap
page read and write
4891000
heap
page read and write
3E8E000
stack
page read and write
4A51000
heap
page read and write
B9C000
stack
page read and write
B50000
heap
page read and write
4E70000
direct allocation
page read and write
4891000
heap
page read and write
13D4000
heap
page read and write
4F30000
direct allocation
page execute and read and write
3D8E000
stack
page read and write
54A0000
direct allocation
page execute and read and write
CF0000
direct allocation
page read and write
4EA0000
direct allocation
page execute and read and write
4A51000
heap
page read and write
484E000
stack
page read and write
410E000
stack
page read and write
1660000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
10A6000
heap
page read and write
4A51000
heap
page read and write
11D0000
unkown
page execute and read and write
4E70000
direct allocation
page read and write
10C6000
heap
page read and write
410F000
stack
page read and write
4891000
heap
page read and write
4891000
heap
page read and write
51CE000
stack
page read and write
488E000
stack
page read and write
4A51000
heap
page read and write
470F000
stack
page read and write
3F0E000
stack
page read and write
10B0000
heap
page read and write
5100000
direct allocation
page execute and read and write
48DF000
stack
page read and write
4E90000
direct allocation
page execute and read and write
454E000
stack
page read and write
3B4E000
stack
page read and write
308F000
stack
page read and write
D79000
unkown
page write copy
494F000
stack
page read and write
358E000
stack
page read and write
3E4F000
stack
page read and write
4A51000
heap
page read and write
13D4000
heap
page read and write
30FE000
stack
page read and write
4A51000
heap
page read and write
10A1000
heap
page read and write
4891000
heap
page read and write
54F0000
direct allocation
page execute and read and write
102B000
unkown
page execute and write copy
10AF000
heap
page read and write
66AF000
stack
page read and write
87AC000
stack
page read and write
314E000
stack
page read and write
E3B000
stack
page read and write
2E8F000
stack
page read and write
102F000
heap
page read and write
10A6000
heap
page read and write
4891000
heap
page read and write
4A40000
direct allocation
page read and write
CF0000
direct allocation
page read and write
4A40000
direct allocation
page read and write
368F000
stack
page read and write
2E8F000
stack
page read and write
4891000
heap
page read and write
FDE000
heap
page read and write
4F60000
direct allocation
page read and write
4D10000
direct allocation
page read and write
4A51000
heap
page read and write
52C0000
trusted library allocation
page read and write
4AD1000
heap
page read and write
FB0000
heap
page read and write
5520000
direct allocation
page execute and read and write
4A51000
heap
page read and write
40CF000
stack
page read and write
450F000
stack
page read and write
310E000
stack
page read and write
5140000
direct allocation
page execute and read and write
50F0000
direct allocation
page execute and read and write
151E000
stack
page read and write
14E0000
direct allocation
page read and write
189F000
stack
page read and write
54A0000
direct allocation
page execute and read and write
143F000
stack
page read and write
101D000
unkown
page execute and read and write
4EA0000
direct allocation
page execute and read and write
50C0000
direct allocation
page execute and read and write
4A51000
heap
page read and write
4EE0000
direct allocation
page read and write
166A000
heap
page read and write
4A51000
heap
page read and write
2F8F000
stack
page read and write
2B87000
heap
page read and write
44CE000
stack
page read and write
3D4E000
stack
page read and write
6800000
heap
page read and write
4891000
heap
page read and write
6DB000
unkown
page execute and read and write
1053000
heap
page read and write
374E000
stack
page read and write
14E0000
direct allocation
page read and write
102B000
unkown
page execute and read and write
5080000
direct allocation
page execute and read and write
469E000
stack
page read and write
428E000
stack
page read and write
5070000
direct allocation
page execute and read and write
646E000
stack
page read and write
4F10000
trusted library allocation
page read and write
CF0000
direct allocation
page read and write
474F000
stack
page read and write
4A51000
heap
page read and write
4A50000
heap
page read and write
4891000
heap
page read and write
4F41000
direct allocation
page read and write
4E81000
heap
page read and write
6E30000
heap
page read and write
6CD000
unkown
page execute and read and write
4A51000
heap
page read and write
4D4E000
stack
page read and write
1017000
heap
page read and write
394F000
stack
page read and write
400E000
stack
page read and write
3ECD000
stack
page read and write
4891000
heap
page read and write
FE6000
unkown
page execute and read and write
5050000
direct allocation
page execute and read and write
4891000
heap
page read and write
2F0F000
stack
page read and write
460E000
stack
page read and write
4A51000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
4891000
heap
page read and write
FD0000
heap
page read and write
D72000
unkown
page execute and read and write
4A51000
heap
page read and write
F00000
unkown
page execute and read and write
484F000
stack
page read and write
11D2000
unkown
page execute and write copy
CF0000
direct allocation
page read and write
2B80000
heap
page read and write
320E000
stack
page read and write
4A51000
heap
page read and write
4E70000
direct allocation
page read and write
B77000
heap
page read and write
4A51000
heap
page read and write
4891000
heap
page read and write
4A40000
direct allocation
page read and write
4A20000
heap
page read and write
4E70000
direct allocation
page read and write
4A1F000
stack
page read and write
45CE000
stack
page read and write
380F000
stack
page read and write
A3C000
stack
page read and write
11D0000
unkown
page execute and read and write
10A1000
heap
page read and write
137E000
stack
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
350E000
stack
page read and write
4891000
heap
page read and write
50E0000
direct allocation
page execute and read and write
CF0000
direct allocation
page read and write
4A51000
heap
page read and write
380E000
stack
page read and write
4A51000
heap
page read and write
14E0000
direct allocation
page read and write
4E80000
heap
page read and write
14E0000
direct allocation
page read and write
4AD1000
heap
page read and write
4891000
heap
page read and write
4891000
heap
page read and write
14E0000
direct allocation
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
13BE000
stack
page read and write
54B0000
direct allocation
page execute and read and write
5530000
direct allocation
page execute and read and write
414E000
stack
page read and write
300F000
stack
page read and write
4F40000
direct allocation
page execute and read and write
13D4000
heap
page read and write
12DF000
stack
page read and write
12F0000
heap
page read and write
4A51000
heap
page read and write
6E30000
heap
page read and write
4A51000
heap
page read and write
48A0000
heap
page read and write
40CE000
stack
page read and write
5070000
direct allocation
page execute and read and write
4891000
heap
page read and write
631E000
stack
page read and write
2CFE000
stack
page read and write
47DE000
stack
page read and write
4E50000
heap
page read and write
4A51000
heap
page read and write
4E90000
trusted library allocation
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
104B000
heap
page read and write
4F2E000
stack
page read and write
4A51000
heap
page read and write
14E0000
direct allocation
page read and write
4A51000
heap
page read and write
330F000
stack
page read and write
4891000
heap
page read and write
3A8E000
stack
page read and write
D11000
unkown
page execute and write copy
4E70000
direct allocation
page read and write
46CF000
stack
page read and write
4A40000
direct allocation
page read and write
D79000
unkown
page read and write
4EC0000
direct allocation
page execute and read and write
2CBE000
stack
page read and write
2E0F000
stack
page read and write
AF0000
heap
page read and write
13D4000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
438F000
stack
page read and write
12FE000
stack
page read and write
4A51000
heap
page read and write
13D0000
heap
page read and write
4E81000
heap
page read and write
4A51000
heap
page read and write
5310000
direct allocation
page read and write
4A51000
heap
page read and write
3C4E000
stack
page read and write
6E21000
heap
page read and write
102B000
unkown
page execute and read and write
1081000
heap
page read and write
1031000
heap
page read and write
556F000
stack
page read and write
5510000
direct allocation
page execute and read and write
4A51000
heap
page read and write
348E000
stack
page read and write
4E70000
direct allocation
page read and write
D79000
unkown
page read and write
448E000
stack
page read and write
AF8000
heap
page read and write
14E0000
direct allocation
page read and write
4D0F000
stack
page read and write
102B000
unkown
page execute and write copy
4A51000
heap
page read and write
310F000
stack
page read and write
4A51000
heap
page read and write
33CE000
stack
page read and write
10A6000
heap
page read and write
4ACE000
stack
page read and write
370E000
stack
page read and write
4E81000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
CF0000
direct allocation
page read and write
54E0000
direct allocation
page execute and read and write
3D4F000
stack
page read and write
400F000
stack
page read and write
4891000
heap
page read and write
338E000
stack
page read and write
2FCE000
stack
page read and write
4F20000
direct allocation
page execute and read and write
3D0E000
stack
page read and write
4E70000
direct allocation
page read and write
FDA000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
4891000
heap
page read and write
4A51000
heap
page read and write
CEE000
stack
page read and write
52CE000
stack
page read and write
42CE000
stack
page read and write
13D4000
heap
page read and write
D79000
unkown
page write copy
5540000
direct allocation
page execute and read and write
320F000
stack
page read and write
4891000
heap
page read and write
F00000
unkown
page execute and read and write
5180000
direct allocation
page execute and read and write
378E000
stack
page read and write
358F000
stack
page read and write
B70000
heap
page read and write
56ED000
stack
page read and write
384E000
stack
page read and write
2C8F000
stack
page read and write
324F000
stack
page read and write
5070000
direct allocation
page execute and read and write
4A40000
direct allocation
page read and write
408F000
stack
page read and write
3ECF000
stack
page read and write
438E000
stack
page read and write
3BCF000
stack
page read and write
422000
unkown
page execute and read and write
4A51000
heap
page read and write
13D4000
heap
page read and write
4E81000
heap
page read and write
3C1000
unkown
page execute and write copy
344F000
stack
page read and write
4A51000
heap
page read and write
4891000
heap
page read and write
5070000
direct allocation
page execute and read and write
3E4E000
stack
page read and write
5060000
direct allocation
page execute and read and write
43CF000
stack
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
4E70000
direct allocation
page read and write
10AF000
heap
page read and write
448F000
stack
page read and write
4891000
heap
page read and write
3C0E000
stack
page read and write
5070000
direct allocation
page execute and read and write
348F000
stack
page read and write
3107000
heap
page read and write
4A40000
direct allocation
page read and write
4891000
heap
page read and write
11FE000
stack
page read and write
4891000
heap
page read and write
31CF000
stack
page read and write
458F000
stack
page read and write
4CD0000
trusted library allocation
page read and write
3F8F000
stack
page read and write
4A51000
heap
page read and write
4A40000
direct allocation
page read and write
B69000
heap
page read and write
49CE000
stack
page read and write
F3A000
stack
page read and write
4891000
heap
page read and write
D79000
unkown
page read and write
4891000
heap
page read and write
4891000
heap
page read and write
50D0000
direct allocation
page execute and read and write
882000
unkown
page execute and write copy
4891000
heap
page read and write
164F000
stack
page read and write
334E000
stack
page read and write
D72000
unkown
page execute and read and write
4A51000
heap
page read and write
502F000
stack
page read and write
101D000
heap
page read and write
42B000
unkown
page execute and read and write
36CE000
stack
page read and write
133E000
stack
page read and write
4891000
heap
page read and write
D11000
unkown
page execute and write copy
5470000
direct allocation
page execute and read and write
4891000
heap
page read and write
4891000
heap
page read and write
F00000
unkown
page execute and read and write
4891000
heap
page read and write
12F7000
heap
page read and write
504B000
stack
page read and write
4E70000
direct allocation
page read and write
101D000
unkown
page execute and read and write
102B000
unkown
page execute and write copy
30BE000
stack
page read and write
4A51000
heap
page read and write
D72000
unkown
page execute and read and write
54D0000
direct allocation
page execute and read and write
55AE000
stack
page read and write
102C000
unkown
page execute and write copy
166E000
heap
page read and write
1081000
heap
page read and write
420E000
stack
page read and write
14E0000
direct allocation
page read and write
488F000
stack
page read and write
3ACF000
stack
page read and write
4A51000
heap
page read and write
5300000
heap
page read and write
11D0000
unkown
page execute and read and write
13D4000
heap
page read and write
45CF000
stack
page read and write
6E20000
heap
page read and write
8FC000
stack
page read and write
4A40000
direct allocation
page read and write
4A51000
heap
page read and write
10AF000
heap
page read and write
479F000
stack
page read and write
4891000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4891000
heap
page read and write
394E000
stack
page read and write
4891000
heap
page read and write
67EF000
stack
page read and write
D10000
unkown
page read and write
14DF000
stack
page read and write
480F000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
11E0000
heap
page read and write
A00000
heap
page read and write
2B3E000
stack
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
48B0000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
35CE000
stack
page read and write
10AF000
heap
page read and write
13D4000
heap
page read and write
1081000
heap
page read and write
10C6000
heap
page read and write
6DB000
unkown
page execute and write copy
4A51000
heap
page read and write
1098000
heap
page read and write
4891000
heap
page read and write
CF0000
direct allocation
page read and write
14E0000
direct allocation
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
3B8F000
stack
page read and write
398E000
stack
page read and write
4A51000
heap
page read and write
2F8F000
stack
page read and write
57EE000
stack
page read and write
2D8F000
stack
page read and write
4A51000
heap
page read and write
1545000
heap
page read and write
4A51000
heap
page read and write
4FC1000
direct allocation
page read and write
34CE000
stack
page read and write
390F000
stack
page read and write
4BCF000
stack
page read and write
1052000
heap
page read and write
1650000
heap
page read and write
4891000
heap
page read and write
13D4000
heap
page read and write
3ACE000
stack
page read and write
444F000
stack
page read and write
370F000
stack
page read and write
13D4000
heap
page read and write
3B0E000
stack
page read and write
4A51000
heap
page read and write
C9D000
stack
page read and write
360F000
stack
page read and write
4D5B000
stack
page read and write
43CE000
stack
page read and write
50D0000
direct allocation
page execute and read and write
5371000
direct allocation
page read and write
4A40000
direct allocation
page read and write
FE6000
unkown
page execute and read and write
418E000
stack
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
38CE000
stack
page read and write
4AD1000
heap
page read and write
4A51000
heap
page read and write
14E0000
direct allocation
page read and write
498F000
stack
page read and write
498E000
stack
page read and write
5500000
direct allocation
page execute and read and write
B24000
heap
page read and write
4A51000
heap
page read and write
83FB000
stack
page read and write
2C3E000
stack
page read and write
39CE000
stack
page read and write
4E81000
heap
page read and write
10A1000
heap
page read and write
5310000
direct allocation
page read and write
10A6000
heap
page read and write
4A51000
heap
page read and write
4A40000
direct allocation
page read and write
4A51000
heap
page read and write
4C0E000
stack
page read and write
D00000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
102C000
unkown
page execute and write copy
4A51000
heap
page read and write
4E4F000
stack
page read and write
84FC000
stack
page read and write
518F000
stack
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
59C000
stack
page read and write
4891000
heap
page read and write
853E000
stack
page read and write
5490000
direct allocation
page execute and read and write
5304000
heap
page read and write
81C0000
heap
page read and write
13D4000
heap
page read and write
82C0000
heap
page read and write
4A51000
heap
page read and write
54A0000
direct allocation
page execute and read and write
900000
heap
page read and write
4A51000
heap
page read and write
14E0000
direct allocation
page read and write
10A6000
heap
page read and write
102B000
unkown
page execute and read and write
D10000
unkown
page readonly
4A51000
heap
page read and write
D7B000
unkown
page execute and read and write
863E000
stack
page read and write
3C0F000
stack
page read and write
4A40000
direct allocation
page read and write
4891000
heap
page read and write
4D71000
direct allocation
page read and write
4A51000
heap
page read and write
4A61000
heap
page read and write
37CF000
stack
page read and write
41CF000
stack
page read and write
6C5000
unkown
page execute and read and write
4891000
heap
page read and write
4D0C000
stack
page read and write
5040000
direct allocation
page execute and read and write
3A0E000
stack
page read and write
56AC000
stack
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
13D4000
heap
page read and write
10A1000
heap
page read and write
10A6000
heap
page read and write
424E000
stack
page read and write
4A51000
heap
page read and write
5090000
direct allocation
page execute and read and write
4A51000
heap
page read and write
D7B000
unkown
page execute and read and write
3D0F000
stack
page read and write
CF0000
heap
page read and write
3FCE000
stack
page read and write
3FCE000
stack
page read and write
3DCE000
stack
page read and write
535E000
stack
page read and write
4E70000
direct allocation
page execute and read and write
CF0000
direct allocation
page read and write
4891000
heap
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
B27000
heap
page read and write
4A51000
heap
page read and write
44CF000
stack
page read and write
364E000
stack
page read and write
4891000
heap
page read and write
10A0000
heap
page read and write
105A000
heap
page read and write
4891000
heap
page read and write
4D10000
direct allocation
page read and write
36CF000
stack
page read and write
35CF000
stack
page read and write
374E000
stack
page read and write
3D8F000
stack
page read and write
4891000
heap
page read and write
81DE000
heap
page read and write
AC0000
heap
page read and write
10A3000
heap
page read and write
4891000
heap
page read and write
D11000
unkown
page execute and write copy
30CE000
stack
page read and write
4E5F000
stack
page read and write
CF0000
direct allocation
page read and write
4891000
heap
page read and write
4A51000
heap
page read and write
There are 791 hidden memdumps, click here to show them.