IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.php.
unknown
http://185.215.113.16/Jo89Ku7d/index.php)G
unknown
http://185.215.113.16/Jo89Ku7d/index.php:V
unknown
http://185.215.113.16/Jo89Ku7d/index.phpg
unknown
http://185.215.113.16/Jo89Ku7d/index.phpf
unknown
http://185.215.113.16/Jo89Ku7d/index.php$
unknown
http://185.215.113.16/Jo89Ku7d/index.phpB
unknown
http://185.215.113.16/Jo89Ku7d/index.php;
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpzRm4SJjISZA3JNjZ64n0LR=
unknown
http://185.215.113.16/Jo89Ku7d/index.phpw
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedh
unknown
http://185.215.113.16/Jo89Ku7d/index.phpq
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F81000
unkown
page execute and read and write
malicious
EB1000
unkown
page execute and read and write
malicious
F81000
unkown
page execute and read and write
malicious
5280000
direct allocation
page read and write
malicious
5460000
direct allocation
page read and write
malicious
4930000
direct allocation
page read and write
malicious
F81000
unkown
page execute and read and write
malicious
4B00000
direct allocation
page read and write
malicious
367E000
stack
page read and write
4E01000
heap
page read and write
FE9000
unkown
page read and write
53F0000
direct allocation
page execute and read and write
E77000
heap
page read and write
153E000
stack
page read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
6A1000
heap
page read and write
422F000
stack
page read and write
44B1000
heap
page read and write
AAF000
stack
page read and write
F70000
direct allocation
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
363F000
stack
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
81F1000
heap
page read and write
F70000
direct allocation
page read and write
383E000
stack
page read and write
39FF000
stack
page read and write
3BFE000
stack
page read and write
1175000
unkown
page execute and read and write
156F000
stack
page read and write
4E01000
heap
page read and write
3CBE000
stack
page read and write
4E01000
heap
page read and write
36BF000
stack
page read and write
BEF000
stack
page read and write
5670000
direct allocation
page execute and read and write
15F0000
direct allocation
page read and write
3EFF000
stack
page read and write
E80000
direct allocation
page read and write
5680000
direct allocation
page execute and read and write
473E000
stack
page read and write
4E01000
heap
page read and write
7EA000
heap
page read and write
1575000
heap
page read and write
15F0000
direct allocation
page read and write
4E01000
heap
page read and write
5400000
direct allocation
page execute and read and write
336E000
stack
page read and write
4E01000
heap
page read and write
3AAF000
stack
page read and write
54AE000
stack
page read and write
28A0000
direct allocation
page read and write
48FF000
stack
page read and write
6FD000
heap
page read and write
55C0000
direct allocation
page execute and read and write
436F000
stack
page read and write
F70000
direct allocation
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
6FD000
stack
page read and write
7E0000
heap
page read and write
EA0000
direct allocation
page read and write
3DBF000
stack
page read and write
4E01000
heap
page read and write
FE2000
unkown
page execute and read and write
4991000
direct allocation
page read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
E80000
direct allocation
page read and write
403F000
stack
page read and write
44B1000
heap
page read and write
EFC000
stack
page read and write
88E000
stack
page read and write
38BF000
stack
page read and write
467F000
stack
page read and write
60CF000
stack
page read and write
620F000
stack
page read and write
F70000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
4E01000
heap
page read and write
E70000
heap
page read and write
443E000
stack
page read and write
2880000
direct allocation
page read and write
44B1000
heap
page read and write
5610000
direct allocation
page execute and read and write
585E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
760000
heap
page read and write
44B0000
heap
page read and write
35EE000
stack
page read and write
DBE000
stack
page read and write
709000
heap
page read and write
F80000
unkown
page read and write
3D6E000
stack
page read and write
F70000
direct allocation
page read and write
1426000
unkown
page execute and write copy
4A3F000
stack
page read and write
457E000
stack
page read and write
5410000
direct allocation
page execute and read and write
3A3E000
stack
page read and write
2F6F000
stack
page read and write
45FE000
stack
page read and write
6BF000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
15E0000
heap
page read and write
417F000
stack
page read and write
6F6000
heap
page read and write
4B20000
direct allocation
page execute and read and write
5460000
direct allocation
page execute and read and write
5690000
direct allocation
page execute and read and write
3EFF000
stack
page read and write
4C80000
direct allocation
page execute and read and write
36FE000
stack
page read and write
F70000
direct allocation
page read and write
530000
heap
page read and write
29FE000
stack
page read and write
5450000
direct allocation
page execute and read and write
2880000
direct allocation
page read and write
31EF000
stack
page read and write
7E7E000
stack
page read and write
F80000
unkown
page read and write
44B1000
heap
page read and write
296F000
stack
page read and write
44B1000
heap
page read and write
332F000
stack
page read and write
4E01000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
38FE000
stack
page read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
443E000
stack
page read and write
710000
heap
page read and write
55F0000
direct allocation
page execute and read and write
4D20000
direct allocation
page execute and read and write
EA0000
direct allocation
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
53F0000
direct allocation
page execute and read and write
4AC0000
direct allocation
page execute and read and write
E80000
direct allocation
page read and write
E80000
direct allocation
page read and write
3B3F000
stack
page read and write
33FE000
stack
page read and write
128C000
unkown
page execute and write copy
E80000
direct allocation
page read and write
4914000
heap
page read and write
4E01000
heap
page read and write
6860000
heap
page read and write
68F000
heap
page read and write
313F000
stack
page read and write
53F0000
direct allocation
page execute and read and write
38FE000
stack
page read and write
43FF000
stack
page read and write
4681000
heap
page read and write
35BF000
stack
page read and write
4E01000
heap
page read and write
7E3C000
stack
page read and write
183E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
386E000
stack
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
116B000
unkown
page execute and read and write
4B50000
direct allocation
page execute and read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
317D000
heap
page read and write
55F0000
direct allocation
page execute and read and write
40FE000
stack
page read and write
581E000
stack
page read and write
4E01000
heap
page read and write
4C80000
direct allocation
page execute and read and write
363F000
stack
page read and write
5C3D000
stack
page read and write
30AF000
stack
page read and write
700000
heap
page read and write
393F000
stack
page read and write
44B1000
heap
page read and write
4B10000
direct allocation
page execute and read and write
F70000
heap
page read and write
417F000
stack
page read and write
15F0000
direct allocation
page read and write
128B000
unkown
page execute and read and write
F70000
direct allocation
page read and write
44B1000
heap
page read and write
1617000
heap
page read and write
535000
heap
page read and write
37BE000
stack
page read and write
44B1000
heap
page read and write
2AAE000
stack
page read and write
1426000
unkown
page execute and write copy
4E01000
heap
page read and write
70E000
heap
page read and write
3FEE000
stack
page read and write
453E000
stack
page read and write
E80000
direct allocation
page read and write
F70000
direct allocation
page read and write
44B1000
heap
page read and write
2880000
direct allocation
page read and write
81EC000
stack
page read and write
6E5000
heap
page read and write
706000
heap
page read and write
2B3E000
stack
page read and write
3DFE000
stack
page read and write
4680000
heap
page read and write
F70000
direct allocation
page read and write
4FE1000
heap
page read and write
4681000
heap
page read and write
3D3E000
stack
page read and write
4E01000
heap
page read and write
2C3F000
stack
page read and write
FE9000
unkown
page write copy
493E000
stack
page read and write
37FF000
stack
page read and write
33B0000
heap
page read and write
53D0000
direct allocation
page execute and read and write
39AE000
stack
page read and write
4E01000
heap
page read and write
1A7F000
stack
page read and write
3DBF000
stack
page read and write
4B7F000
stack
page read and write
45BF000
stack
page read and write
E40000
heap
page read and write
6E1000
heap
page read and write
40BF000
stack
page read and write
1629000
heap
page read and write
1880000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
28A0000
direct allocation
page read and write
7C0000
heap
page read and write
128B000
unkown
page execute and write copy
44BE000
stack
page read and write
44B1000
heap
page read and write
3FBE000
stack
page read and write
FE9000
unkown
page write copy
53F0000
direct allocation
page execute and read and write
4B30000
direct allocation
page execute and read and write
70C000
heap
page read and write
3150000
direct allocation
page read and write
372E000
stack
page read and write
2880000
direct allocation
page read and write
15F0000
direct allocation
page read and write
44B1000
heap
page read and write
6E1000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4E01000
heap
page read and write
4B40000
direct allocation
page execute and read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
5600000
direct allocation
page execute and read and write
4910000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
3EAE000
stack
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
46BE000
stack
page read and write
5480000
direct allocation
page execute and read and write
F19000
unkown
page read and write
317E000
stack
page read and write
55E0000
direct allocation
page execute and read and write
4E01000
heap
page read and write
3CBE000
stack
page read and write
620000
heap
page read and write
48F0000
trusted library allocation
page read and write
44B1000
heap
page read and write
5AFE000
stack
page read and write
5F8F000
stack
page read and write
5650000
direct allocation
page execute and read and write
44B1000
heap
page read and write
2FAE000
stack
page read and write
4E01000
heap
page read and write
4DFF000
stack
page read and write
2880000
direct allocation
page read and write
4AB0000
direct allocation
page execute and read and write
4AB0000
direct allocation
page execute and read and write
4681000
heap
page read and write
F70000
direct allocation
page read and write
4AB0000
direct allocation
page execute and read and write
5E7E000
stack
page read and write
33BF000
stack
page read and write
FE9000
unkown
page read and write
11BC000
unkown
page execute and write copy
2D2E000
stack
page read and write
44B1000
heap
page read and write
4C70000
direct allocation
page execute and read and write
4CFE000
stack
page read and write
2880000
direct allocation
page read and write
44B1000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
46FF000
stack
page read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
2880000
direct allocation
page read and write
44B1000
heap
page read and write
47FE000
stack
page read and write
E80000
direct allocation
page read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
E80000
direct allocation
page read and write
6DD000
heap
page read and write
34FF000
stack
page read and write
6F6000
heap
page read and write
ADE000
stack
page read and write
5620000
direct allocation
page execute and read and write
5460000
direct allocation
page read and write
F81000
unkown
page execute and write copy
4E10000
heap
page read and write
127C000
unkown
page execute and read and write
44B1000
heap
page read and write
E50000
heap
page read and write
71D000
heap
page read and write
44B1000
heap
page read and write
E80000
direct allocation
page read and write
52BC000
stack
page read and write
6A0000
heap
page read and write
B50000
heap
page read and write
2EBF000
stack
page read and write
3C2E000
stack
page read and write
E3E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
44B1000
heap
page read and write
377F000
stack
page read and write
5D3C000
stack
page read and write
44B1000
heap
page read and write
3A7F000
stack
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
55D0000
direct allocation
page execute and read and write
322E000
stack
page read and write
55AF000
stack
page read and write
4D7E000
stack
page read and write
4E01000
heap
page read and write
11AC000
unkown
page execute and read and write
42BF000
stack
page read and write
38BF000
stack
page read and write
3CFF000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
F80000
unkown
page read and write
41BE000
stack
page read and write
426E000
stack
page read and write
4BBE000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
E80000
direct allocation
page read and write
5420000
direct allocation
page execute and read and write
44B1000
heap
page read and write
3C7F000
stack
page read and write
2EFE000
stack
page read and write
36EF000
stack
page read and write
15F0000
direct allocation
page read and write
3150000
direct allocation
page read and write
44B1000
heap
page read and write
403F000
stack
page read and write
4C60000
direct allocation
page execute and read and write
1426000
unkown
page execute and write copy
4E01000
heap
page read and write
2D7F000
stack
page read and write
4E01000
heap
page read and write
3BBF000
stack
page read and write
4AC0000
trusted library allocation
page read and write
44B1000
heap
page read and write
1273000
unkown
page execute and read and write
32BE000
stack
page read and write
44B1000
heap
page read and write
4ABF000
stack
page read and write
E0D000
stack
page read and write
15F0000
direct allocation
page read and write
4681000
heap
page read and write
127C000
unkown
page execute and read and write
4E01000
heap
page read and write
1356000
unkown
page execute and write copy
4C50000
direct allocation
page execute and read and write
11BB000
unkown
page execute and write copy
4E01000
heap
page read and write
44B1000
heap
page read and write
1354000
unkown
page execute and read and write
4E01000
heap
page read and write
4E20000
heap
page read and write
4C90000
direct allocation
page execute and read and write
1CB000
stack
page read and write
3E7E000
stack
page read and write
1245000
unkown
page execute and read and write
4CD0000
direct allocation
page execute and read and write
3F3E000
stack
page read and write
109B000
unkown
page execute and read and write
2DBE000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
15F0000
direct allocation
page read and write
3DFE000
stack
page read and write
81F0000
heap
page read and write
2880000
direct allocation
page read and write
2880000
direct allocation
page read and write
128B000
unkown
page execute and write copy
4E01000
heap
page read and write
5240000
trusted library allocation
page read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
E80000
direct allocation
page read and write
397E000
stack
page read and write
FE2000
unkown
page execute and read and write
4FE1000
heap
page read and write
FE9000
unkown
page read and write
44B1000
heap
page read and write
3170000
heap
page read and write
313F000
stack
page read and write
3FAF000
stack
page read and write
4B00000
direct allocation
page execute and read and write
44B1000
heap
page read and write
53F0000
direct allocation
page execute and read and write
640000
heap
page read and write
44C1000
heap
page read and write
E80000
direct allocation
page read and write
44B1000
heap
page read and write
BF0000
heap
page read and write
47BF000
stack
page read and write
353E000
stack
page read and write
15BE000
stack
page read and write
4E01000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
55F0000
direct allocation
page execute and read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
43FF000
stack
page read and write
4FE1000
heap
page read and write
4E01000
heap
page read and write
3E3F000
stack
page read and write
4C80000
direct allocation
page execute and read and write
4AB0000
direct allocation
page execute and read and write
497F000
stack
page read and write
44B1000
heap
page read and write
4FA000
stack
page read and write
55F0000
direct allocation
page execute and read and write
692000
heap
page read and write
40EF000
stack
page read and write
3D2F000
stack
page read and write
128B000
unkown
page execute and write copy
64E000
heap
page read and write
423E000
stack
page read and write
4E00000
heap
page read and write
4A7E000
stack
page read and write
B0C000
stack
page read and write
6861000
heap
page read and write
44B1000
heap
page read and write
540000
heap
page read and write
496E000
stack
page read and write
3A3E000
stack
page read and write
5420000
trusted library allocation
page read and write
610E000
stack
page read and write
335E000
stack
page read and write
6F6000
heap
page read and write
E80000
direct allocation
page read and write
E70000
heap
page read and write
4FC0000
heap
page read and write
1424000
unkown
page execute and read and write
44B1000
heap
page read and write
7D3B000
stack
page read and write
F70000
direct allocation
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
7BE000
stack
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
3AEE000
stack
page read and write
44AF000
stack
page read and write
44B1000
heap
page read and write
43AE000
stack
page read and write
F81000
unkown
page execute and write copy
28A0000
direct allocation
page read and write
128B000
unkown
page execute and read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
1245000
unkown
page execute and read and write
4E01000
heap
page read and write
B55000
heap
page read and write
4E01000
heap
page read and write
437E000
stack
page read and write
44B1000
heap
page read and write
4CBF000
stack
page read and write
44B1000
heap
page read and write
5E85000
heap
page read and write
382F000
stack
page read and write
483F000
stack
page read and write
FE9000
unkown
page write copy
80EC000
stack
page read and write
4A6F000
stack
page read and write
37BE000
stack
page read and write
5640000
direct allocation
page execute and read and write
FEB000
unkown
page execute and read and write
44B1000
heap
page read and write
4A80000
direct allocation
page execute and read and write
44B1000
heap
page read and write
128C000
unkown
page execute and write copy
FEB000
unkown
page execute and read and write
5630000
direct allocation
page execute and read and write
2880000
direct allocation
page read and write
53C0000
direct allocation
page execute and read and write
FEB000
unkown
page execute and read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
339E000
stack
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
595F000
stack
page read and write
44B1000
heap
page read and write
15A0000
heap
page read and write
4E01000
heap
page read and write
5E80000
heap
page read and write
721000
heap
page read and write
55F0000
direct allocation
page execute and read and write
39FF000
stack
page read and write
327F000
stack
page read and write
770000
heap
page read and write
34FF000
stack
page read and write
2BAF000
stack
page read and write
457E000
stack
page read and write
487E000
stack
page read and write
44B1000
heap
page read and write
F80000
unkown
page readonly
44B1000
heap
page read and write
44B1000
heap
page read and write
F70000
direct allocation
page read and write
5FCE000
stack
page read and write
EB0000
unkown
page read and write
5AAF000
stack
page read and write
44B1000
heap
page read and write
688000
heap
page read and write
7F7E000
stack
page read and write
53F0000
direct allocation
page execute and read and write
4EBE000
stack
page read and write
4AFE000
stack
page read and write
44B1000
heap
page read and write
4681000
heap
page read and write
527C000
stack
page read and write
44B1000
heap
page read and write
EA0000
direct allocation
page read and write
39C000
stack
page read and write
3150000
direct allocation
page read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
2E2F000
stack
page read and write
2C7E000
stack
page read and write
52E1000
direct allocation
page read and write
453F000
stack
page read and write
70E000
heap
page read and write
44B1000
heap
page read and write
FE2000
unkown
page execute and read and write
3BEE000
stack
page read and write
4E01000
heap
page read and write
33B7000
heap
page read and write
4FBF000
stack
page read and write
6240000
heap
page read and write
55F0000
direct allocation
page execute and read and write
3C7F000
stack
page read and write
2880000
direct allocation
page read and write
4C80000
direct allocation
page execute and read and write
53BF000
stack
page read and write
F12000
unkown
page execute and read and write
1570000
heap
page read and write
4E7F000
stack
page read and write
F19000
unkown
page write copy
1245000
unkown
page execute and read and write
70E000
heap
page read and write
187E000
stack
page read and write
44B1000
heap
page read and write
3B3F000
stack
page read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
33FE000
stack
page read and write
55DE000
stack
page read and write
4681000
heap
page read and write
44B1000
heap
page read and write
41FF000
stack
page read and write
32BE000
stack
page read and write
4E01000
heap
page read and write
BDE000
stack
page read and write
4E01000
heap
page read and write
30EE000
stack
page read and write
695000
heap
page read and write
44B1000
heap
page read and write
2BEE000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
15F0000
direct allocation
page read and write
15E8000
heap
page read and write
6C0000
heap
page read and write
15AA000
heap
page read and write
1580000
heap
page read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
6870000
heap
page read and write
44B1000
heap
page read and write
29BF000
stack
page read and write
4E01000
heap
page read and write
705000
heap
page read and write
4FE1000
heap
page read and write
6F6000
heap
page read and write
4E01000
heap
page read and write
775000
heap
page read and write
3B7E000
stack
page read and write
696000
heap
page read and write
11A3000
unkown
page execute and read and write
F80000
unkown
page readonly
303E000
stack
page read and write
157C000
stack
page read and write
4D10000
direct allocation
page execute and read and write
44B1000
heap
page read and write
4E01000
heap
page read and write
686E000
heap
page read and write
44B1000
heap
page read and write
F1B000
unkown
page execute and read and write
4FE1000
heap
page read and write
4B3E000
stack
page read and write
4BFF000
stack
page read and write
396F000
stack
page read and write
6BC000
heap
page read and write
5BFD000
stack
page read and write
44B1000
heap
page read and write
6F6000
heap
page read and write
5490000
direct allocation
page execute and read and write
71D000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
6FE000
heap
page read and write
6870000
heap
page read and write
4E01000
heap
page read and write
71F000
heap
page read and write
146E000
stack
page read and write
44B1000
heap
page read and write
F80000
unkown
page readonly
4E01000
heap
page read and write
1424000
unkown
page execute and read and write
4B61000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
42BF000
stack
page read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
F70000
direct allocation
page read and write
49BE000
stack
page read and write
54C1000
direct allocation
page read and write
E80000
direct allocation
page read and write
71F000
heap
page read and write
15F0000
direct allocation
page read and write
2880000
direct allocation
page read and write
56DF000
stack
page read and write
44B1000
heap
page read and write
331F000
stack
page read and write
5460000
direct allocation
page read and write
59AE000
stack
page read and write
34BF000
stack
page read and write
F60000
heap
page read and write
EB0000
unkown
page readonly
407E000
stack
page read and write
44B1000
heap
page read and write
467F000
stack
page read and write
44B1000
heap
page read and write
407E000
stack
page read and write
116B000
unkown
page execute and read and write
5E86000
heap
page read and write
4D3F000
stack
page read and write
44B1000
heap
page read and write
28B0000
heap
page read and write
2FFF000
stack
page read and write
709000
heap
page read and write
128C000
unkown
page execute and write copy
44B1000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4E01000
heap
page read and write
286F000
stack
page read and write
2AFF000
stack
page read and write
346F000
stack
page read and write
116B000
unkown
page execute and read and write
42FE000
stack
page read and write
7C03000
heap
page read and write
44B1000
heap
page read and write
1424000
unkown
page execute and read and write
4E01000
heap
page read and write
6C9000
heap
page read and write
B80000
heap
page read and write
3ABE000
stack
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
127C000
unkown
page execute and read and write
44B1000
heap
page read and write
188B000
heap
page read and write
78E000
stack
page read and write
4FE1000
heap
page read and write
4E01000
heap
page read and write
2E6E000
stack
page read and write
367E000
stack
page read and write
44B1000
heap
page read and write
2CEF000
stack
page read and write
128B000
unkown
page execute and read and write
4C3E000
stack
page read and write
1273000
unkown
page execute and read and write
189B000
heap
page read and write
DFB000
stack
page read and write
412E000
stack
page read and write
42FE000
stack
page read and write
71D000
heap
page read and write
34AE000
stack
page read and write
5470000
direct allocation
page execute and read and write
15F0000
direct allocation
page read and write
2A6F000
stack
page read and write
433F000
stack
page read and write
705000
heap
page read and write
35AF000
stack
page read and write
F70000
direct allocation
page read and write
D0C000
stack
page read and write
559B000
stack
page read and write
71F000
heap
page read and write
5460000
direct allocation
page read and write
4C3F000
stack
page read and write
4E01000
heap
page read and write
3F3E000
stack
page read and write
15F0000
direct allocation
page read and write
7C00000
heap
page read and write
71C000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
1273000
unkown
page execute and read and write
15F0000
direct allocation
page read and write
64A000
heap
page read and write
11BB000
unkown
page execute and read and write
44B1000
heap
page read and write
15F0000
direct allocation
page read and write
44B1000
heap
page read and write
2880000
direct allocation
page read and write
571E000
stack
page read and write
44B1000
heap
page read and write
7EE000
heap
page read and write
6E1000
heap
page read and write
5430000
direct allocation
page execute and read and write
3E6F000
stack
page read and write
15F0000
direct allocation
page read and write
327F000
stack
page read and write
3B7E000
stack
page read and write
3177000
heap
page read and write
EB1000
unkown
page execute and write copy
28B7000
heap
page read and write
F81000
unkown
page execute and write copy
44B1000
heap
page read and write
4E01000
heap
page read and write
15FE000
heap
page read and write
353E000
stack
page read and write
3F7F000
stack
page read and write
287E000
stack
page read and write
33BF000
stack
page read and write
4E01000
heap
page read and write
44B1000
heap
page read and write
447F000
stack
page read and write
5660000
direct allocation
page execute and read and write
44B1000
heap
page read and write
6F4000
heap
page read and write
377F000
stack
page read and write
4FE0000
heap
page read and write
41BE000
stack
page read and write
AEE000
stack
page read and write
44B1000
heap
page read and write
2880000
direct allocation
page read and write
There are 773 hidden memdumps, click here to show them.