IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpM
unknown
http://185.215.113.16/Jo89Ku7d/index.phpOF_i
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded6
unknown
http://185.215.113.16/Jo89Ku7d/index.phpE
unknown
http://185.215.113.16/Jo89Ku7d/index.phpD
unknown
http://185.215.113.16/Jo89Ku7d/index.phpQ
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedn
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4A60000
direct allocation
page read and write
malicious
5200000
direct allocation
page read and write
malicious
4910000
direct allocation
page read and write
malicious
401000
unkown
page execute and read and write
malicious
11000
unkown
page execute and read and write
malicious
401000
unkown
page execute and read and write
malicious
9E0000
heap
page read and write
2F3F000
stack
page read and write
338000
unkown
page execute and write copy
4D61000
heap
page read and write
BDE000
stack
page read and write
4471000
heap
page read and write
4D61000
heap
page read and write
36FE000
stack
page read and write
4A70000
direct allocation
page execute and read and write
51F0000
direct allocation
page read and write
357F000
stack
page read and write
2EF000
unkown
page execute and read and write
4D61000
heap
page read and write
4471000
heap
page read and write
A64000
heap
page read and write
4C3B000
stack
page read and write
37FF000
stack
page read and write
4471000
heap
page read and write
4D50000
direct allocation
page read and write
4D61000
heap
page read and write
A64000
heap
page read and write
FB0000
heap
page read and write
4D61000
heap
page read and write
DF4000
heap
page read and write
4900000
direct allocation
page read and write
4471000
heap
page read and write
141C000
heap
page read and write
36BF000
stack
page read and write
A64000
heap
page read and write
306F000
stack
page read and write
4471000
heap
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
447F000
stack
page read and write
333E000
stack
page read and write
A64000
heap
page read and write
4471000
heap
page read and write
3FAE000
stack
page read and write
2B7F000
stack
page read and write
32EF000
stack
page read and write
4476000
heap
page read and write
4B20000
direct allocation
page execute and read and write
79000
unkown
page read and write
4471000
heap
page read and write
35BE000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
6620000
heap
page read and write
DF4000
heap
page read and write
4D61000
heap
page read and write
FD0000
direct allocation
page read and write
4D61000
heap
page read and write
7160000
heap
page read and write
FE0000
heap
page read and write
FB4000
heap
page read and write
FD0000
direct allocation
page read and write
3E7E000
stack
page read and write
A64000
heap
page read and write
A64000
heap
page read and write
46C0000
trusted library allocation
page read and write
4471000
heap
page read and write
328000
unkown
page execute and read and write
4D4F000
stack
page read and write
727000
unkown
page execute and write copy
4D61000
heap
page read and write
143E000
heap
page read and write
FB4000
heap
page read and write
46B000
unkown
page execute and read and write
48B0000
heap
page read and write
1425000
heap
page read and write
383E000
stack
page read and write
727000
unkown
page execute and write copy
4D61000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
5410000
direct allocation
page execute and read and write
4D61000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
347E000
stack
page read and write
4D61000
heap
page read and write
4B10000
direct allocation
page execute and read and write
4A60000
direct allocation
page execute and read and write
603000
unkown
page execute and read and write
53FC000
stack
page read and write
4471000
heap
page read and write
FB4000
heap
page read and write
400000
unkown
page read and write
A64000
heap
page read and write
483F000
stack
page read and write
506E000
stack
page read and write
433F000
stack
page read and write
2850000
direct allocation
page read and write
CA8000
heap
page read and write
4471000
heap
page read and write
3FBE000
stack
page read and write
F3E000
stack
page read and write
69EF000
stack
page read and write
45FE000
stack
page read and write
4D50000
direct allocation
page read and write
14A6000
heap
page read and write
4D61000
heap
page read and write
4C80000
direct allocation
page execute and read and write
36EE000
stack
page read and write
70E000
unkown
page execute and read and write
143E000
heap
page read and write
8CF000
unkown
page execute and read and write
4D50000
direct allocation
page read and write
52FD000
stack
page read and write
FB4000
heap
page read and write
40FE000
stack
page read and write
5350000
direct allocation
page execute and read and write
DF4000
heap
page read and write
35AE000
stack
page read and write
51E4000
heap
page read and write
DF0000
heap
page read and write
462000
unkown
page execute and read and write
36FE000
stack
page read and write
FB4000
heap
page read and write
4A50000
direct allocation
page read and write
4D61000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
6B7B000
stack
page read and write
332E000
stack
page read and write
1493000
heap
page read and write
4D61000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
1433000
heap
page read and write
2F6E000
stack
page read and write
41FF000
stack
page read and write
13EE000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D50000
direct allocation
page read and write
4D61000
heap
page read and write
149D000
heap
page read and write
68AF000
stack
page read and write
3CFF000
stack
page read and write
A64000
heap
page read and write
930000
heap
page read and write
3BBF000
stack
page read and write
1495000
heap
page read and write
8D1000
unkown
page execute and write copy
4D61000
heap
page read and write
3ED000
stack
page read and write
3BFD000
stack
page read and write
4470000
heap
page read and write
45BF000
stack
page read and write
4A90000
direct allocation
page execute and read and write
DF4000
heap
page read and write
4A4F000
stack
page read and write
4A90000
direct allocation
page execute and read and write
343F000
stack
page read and write
2850000
direct allocation
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
4D61000
heap
page read and write
3CFF000
stack
page read and write
4471000
heap
page read and write
C30000
heap
page read and write
4471000
heap
page read and write
1494000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
1493000
heap
page read and write
6A2E000
stack
page read and write
4D61000
heap
page read and write
FD0000
direct allocation
page read and write
4B0E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
FB4000
heap
page read and write
286D000
heap
page read and write
DF4000
heap
page read and write
4D61000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
51BE000
stack
page read and write
4D61000
heap
page read and write
149D000
heap
page read and write
A64000
heap
page read and write
4D61000
heap
page read and write
32FF000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
337000
unkown
page execute and write copy
2E2E000
stack
page read and write
1432000
heap
page read and write
4E60000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
469000
unkown
page write copy
A64000
heap
page read and write
4471000
heap
page read and write
EFF000
stack
page read and write
4471000
heap
page read and write
FB4000
heap
page read and write
70E000
unkown
page execute and read and write
A64000
heap
page read and write
3F7F000
stack
page read and write
FD0000
direct allocation
page read and write
4DF000
unkown
page execute and read and write
4D70000
heap
page read and write
4D61000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
4D50000
direct allocation
page read and write
FB4000
heap
page read and write
383E000
stack
page read and write
4471000
heap
page read and write
4D61000
heap
page read and write
FB4000
heap
page read and write
2EAB000
stack
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
DF4000
heap
page read and write
A64000
heap
page read and write
4471000
heap
page read and write
3A7F000
stack
page read and write
4471000
heap
page read and write
13E0000
heap
page read and write
5350000
heap
page read and write
213000
unkown
page execute and read and write
A64000
heap
page read and write
36AF000
stack
page read and write
31AF000
stack
page read and write
2EB0000
heap
page read and write
6F4B000
stack
page read and write
4C20000
direct allocation
page execute and read and write
DF4000
heap
page read and write
4D50000
direct allocation
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
2F2F000
stack
page read and write
4471000
heap
page read and write
728000
unkown
page execute and write copy
4471000
heap
page read and write
4471000
heap
page read and write
6DF000
unkown
page execute and read and write
A64000
heap
page read and write
4471000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
A64000
heap
page read and write
10000
unkown
page readonly
727000
unkown
page execute and read and write
2EB7000
heap
page read and write
FD0000
direct allocation
page read and write
2850000
direct allocation
page read and write
FD0000
direct allocation
page read and write
2CBF000
stack
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
36BF000
stack
page read and write
FD0000
direct allocation
page read and write
4D50000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
DCF000
stack
page read and write
A64000
heap
page read and write
4ECF000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
3BBF000
stack
page read and write
7150000
heap
page read and write
400000
unkown
page readonly
6DBF000
stack
page read and write
4D61000
heap
page read and write
FB4000
heap
page read and write
84F0000
heap
page read and write
6C7C000
stack
page read and write
19C000
stack
page read and write
1468000
heap
page read and write
1485000
heap
page read and write
401000
unkown
page execute and write copy
FB4000
heap
page read and write
FB4000
heap
page read and write
F47000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
53A0000
direct allocation
page execute and read and write
446F000
stack
page read and write
A64000
heap
page read and write
4D50000
direct allocation
page read and write
5380000
direct allocation
page execute and read and write
1411000
heap
page read and write
4471000
heap
page read and write
2850000
direct allocation
page read and write
4D61000
heap
page read and write
14A9000
heap
page read and write
5370000
direct allocation
page execute and read and write
4D61000
heap
page read and write
A64000
heap
page read and write
A64000
heap
page read and write
4D61000
heap
page read and write
A64000
heap
page read and write
4A90000
direct allocation
page execute and read and write
4A9E000
stack
page read and write
14AE000
heap
page read and write
F8E000
stack
page read and write
A64000
heap
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
84F3000
heap
page read and write
4D61000
heap
page read and write
FB4000
heap
page read and write
4D61000
heap
page read and write
6625000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
3D2E000
stack
page read and write
49CE000
stack
page read and write
51E0000
heap
page read and write
4471000
heap
page read and write
3E2F000
stack
page read and write
8D1000
unkown
page execute and write copy
4471000
heap
page read and write
FD0000
direct allocation
page read and write
4490000
heap
page read and write
13EA000
heap
page read and write
4D61000
heap
page read and write
14A4000
heap
page read and write
346E000
stack
page read and write
162E000
stack
page read and write
393F000
stack
page read and write
F40000
heap
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
4C0F000
stack
page read and write
45C1000
heap
page read and write
4A80000
direct allocation
page execute and read and write
4471000
heap
page read and write
4471000
heap
page read and write
32FF000
stack
page read and write
4D61000
heap
page read and write
27CF000
stack
page read and write
30BE000
stack
page read and write
A64000
heap
page read and write
4F0E000
stack
page read and write
A64000
heap
page read and write
A64000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
396E000
stack
page read and write
2850000
direct allocation
page read and write
2850000
direct allocation
page read and write
DF4000
heap
page read and write
2850000
direct allocation
page read and write
A64000
heap
page read and write
4471000
heap
page read and write
A64000
heap
page read and write
7B000
unkown
page execute and read and write
4D61000
heap
page read and write
A64000
heap
page read and write
4471000
heap
page read and write
718000
unkown
page execute and read and write
559E000
stack
page read and write
337000
unkown
page execute and read and write
FD0000
direct allocation
page read and write
40BF000
stack
page read and write
4D61000
heap
page read and write
3D3E000
stack
page read and write
4D61000
heap
page read and write
44BE000
stack
page read and write
1496000
heap
page read and write
4A90000
direct allocation
page execute and read and write
523E000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
A64000
heap
page read and write
2850000
direct allocation
page read and write
4A90000
direct allocation
page execute and read and write
14A4000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
A64000
heap
page read and write
FB4000
heap
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
473E000
stack
page read and write
4471000
heap
page read and write
4D61000
heap
page read and write
6DF000
unkown
page execute and read and write
10000
unkown
page read and write
A64000
heap
page read and write
1481000
heap
page read and write
870A000
heap
page read and write
86EC000
stack
page read and write
4900000
direct allocation
page read and write
382E000
stack
page read and write
FB4000
heap
page read and write
423E000
stack
page read and write
3BFE000
stack
page read and write
14BF000
heap
page read and write
40BF000
stack
page read and write
DF4000
heap
page read and write
516F000
stack
page read and write
4471000
heap
page read and write
6B2F000
stack
page read and write
718000
unkown
page execute and read and write
145F000
heap
page read and write
A64000
heap
page read and write
5380000
direct allocation
page execute and read and write
2850000
direct allocation
page read and write
4D61000
heap
page read and write
423E000
stack
page read and write
280E000
stack
page read and write
A64000
heap
page read and write
2CAF000
stack
page read and write
447F000
stack
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
469000
unkown
page read and write
FB4000
heap
page read and write
3E3F000
stack
page read and write
45C0000
heap
page read and write
FB4000
heap
page read and write
3A7F000
stack
page read and write
728000
unkown
page execute and write copy
4471000
heap
page read and write
469000
unkown
page write copy
FD0000
direct allocation
page read and write
DF4000
heap
page read and write
3E3F000
stack
page read and write
549E000
stack
page read and write
9AE000
stack
page read and write
A50000
heap
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
53C0000
direct allocation
page execute and read and write
5390000
direct allocation
page execute and read and write
2850000
direct allocation
page read and write
5400000
direct allocation
page execute and read and write
397E000
stack
page read and write
397E000
stack
page read and write
C8E000
heap
page read and write
2850000
direct allocation
page read and write
1493000
heap
page read and write
30AE000
stack
page read and write
4D61000
heap
page read and write
145C000
heap
page read and write
4471000
heap
page read and write
4C50000
direct allocation
page execute and read and write
A64000
heap
page read and write
14C0000
heap
page read and write
4471000
heap
page read and write
4D61000
heap
page read and write
C20000
heap
page read and write
DE0000
heap
page read and write
4980000
heap
page read and write
FD0000
direct allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
41FF000
stack
page read and write
4AC1000
direct allocation
page read and write
2867000
heap
page read and write
347E000
stack
page read and write
72000
unkown
page execute and read and write
4D61000
heap
page read and write
2850000
direct allocation
page read and write
7151000
heap
page read and write
342F000
stack
page read and write
3D3E000
stack
page read and write
1432000
heap
page read and write
FB4000
heap
page read and write
79000
unkown
page write copy
FE0000
heap
page read and write
31E000
unkown
page execute and read and write
5380000
direct allocation
page execute and read and write
4D61000
heap
page read and write
2860000
heap
page read and write
5380000
direct allocation
page execute and read and write
4D61000
heap
page read and write
14A9000
heap
page read and write
31BF000
stack
page read and write
51F0000
direct allocation
page read and write
4D61000
heap
page read and write
400000
unkown
page readonly
4D60000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
46FF000
stack
page read and write
2FBF000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
4471000
heap
page read and write
14BF000
heap
page read and write
67AE000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
422E000
stack
page read and write
727000
unkown
page execute and read and write
53B0000
direct allocation
page execute and read and write
30BF000
stack
page read and write
4D61000
heap
page read and write
437E000
stack
page read and write
FD0000
direct allocation
page read and write
4C70000
direct allocation
page execute and read and write
31FE000
stack
page read and write
4471000
heap
page read and write
A64000
heap
page read and write
3E7E000
stack
page read and write
6626000
heap
page read and write
FB4000
heap
page read and write
4471000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
45C1000
heap
page read and write
2DEF000
stack
page read and write
A60000
heap
page read and write
469000
unkown
page read and write
4D61000
heap
page read and write
45C1000
heap
page read and write
41EF000
stack
page read and write
4471000
heap
page read and write
A64000
heap
page read and write
2E6E000
stack
page read and write
51F0000
direct allocation
page read and write
46B000
unkown
page execute and read and write
40EE000
stack
page read and write
4D61000
heap
page read and write
4D50000
direct allocation
page read and write
3ABE000
stack
page read and write
4D50000
direct allocation
page read and write
FB4000
heap
page read and write
3BEE000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
5261000
direct allocation
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
4D61000
heap
page read and write
86F1000
heap
page read and write
4E1000
unkown
page execute and write copy
4471000
heap
page read and write
4471000
heap
page read and write
603000
unkown
page execute and read and write
2EC000
stack
page read and write
A64000
heap
page read and write
4D61000
heap
page read and write
A64000
heap
page read and write
9DD000
stack
page read and write
7160000
heap
page read and write
4D61000
heap
page read and write
12FA000
stack
page read and write
4471000
heap
page read and write
500E000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
FB4000
heap
page read and write
4C60000
direct allocation
page execute and read and write
DF4000
heap
page read and write
1493000
heap
page read and write
FF0000
heap
page read and write
45BF000
stack
page read and write
2B6F000
stack
page read and write
4471000
heap
page read and write
4A50000
direct allocation
page read and write
45C1000
heap
page read and write
4471000
heap
page read and write
FB4000
heap
page read and write
6B30000
heap
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
FB4000
heap
page read and write
4C4E000
stack
page read and write
4D61000
heap
page read and write
1481000
heap
page read and write
FB4000
heap
page read and write
4D61000
heap
page read and write
FEA000
heap
page read and write
4471000
heap
page read and write
2CEE000
stack
page read and write
343F000
stack
page read and write
2850000
direct allocation
page read and write
1481000
heap
page read and write
433F000
stack
page read and write
4471000
heap
page read and write
FB4000
heap
page read and write
5420000
direct allocation
page execute and read and write
4D50000
direct allocation
page read and write
4B9F000
stack
page read and write
333E000
stack
page read and write
9EE000
stack
page read and write
4471000
heap
page read and write
357F000
stack
page read and write
533F000
stack
page read and write
4471000
heap
page read and write
4B00000
direct allocation
page execute and read and write
392F000
stack
page read and write
14A9000
heap
page read and write
2BBE000
stack
page read and write
4D61000
heap
page read and write
2850000
direct allocation
page read and write
4D61000
heap
page read and write
FCE000
stack
page read and write
A64000
heap
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
400000
unkown
page read and write
4A50000
direct allocation
page read and write
4D50000
direct allocation
page read and write
2DFF000
stack
page read and write
297F000
stack
page read and write
C38000
heap
page read and write
31EE000
stack
page read and write
31FE000
stack
page read and write
4570000
trusted library allocation
page read and write
4D61000
heap
page read and write
35BE000
stack
page read and write
940000
heap
page read and write
53D0000
direct allocation
page execute and read and write
2A6F000
stack
page read and write
3BAF000
stack
page read and write
356F000
stack
page read and write
4D61000
heap
page read and write
FB4000
heap
page read and write
4471000
heap
page read and write
4ACF000
stack
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
3F6F000
stack
page read and write
284E000
stack
page read and write
715E000
heap
page read and write
FB4000
heap
page read and write
52BE000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
494B000
stack
page read and write
4471000
heap
page read and write
C1B000
stack
page read and write
A64000
heap
page read and write
487E000
stack
page read and write
5380000
direct allocation
page execute and read and write
4D61000
heap
page read and write
2F7E000
stack
page read and write
1461000
heap
page read and write
4D61000
heap
page read and write
A64000
heap
page read and write
2E1E000
stack
page read and write
307F000
stack
page read and write
44BE000
stack
page read and write
4C8E000
stack
page read and write
A64000
heap
page read and write
31BF000
stack
page read and write
FB4000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
86F0000
heap
page read and write
14A4000
heap
page read and write
4471000
heap
page read and write
3E6E000
stack
page read and write
401000
unkown
page execute and write copy
2A7F000
stack
page read and write
3AAE000
stack
page read and write
4D75000
heap
page read and write
C69000
heap
page read and write
FB4000
heap
page read and write
40AF000
stack
page read and write
3F7F000
stack
page read and write
68EE000
stack
page read and write
296F000
stack
page read and write
4471000
heap
page read and write
4971000
direct allocation
page read and write
436E000
stack
page read and write
4480000
heap
page read and write
FB4000
heap
page read and write
4D61000
heap
page read and write
4C10000
direct allocation
page execute and read and write
FD0000
direct allocation
page read and write
4471000
heap
page read and write
A64000
heap
page read and write
142F000
heap
page read and write
F6B000
stack
page read and write
FEE000
heap
page read and write
4D50000
direct allocation
page read and write
4D61000
heap
page read and write
2E3E000
stack
page read and write
11000
unkown
page execute and write copy
37EF000
stack
page read and write
6CBD000
stack
page read and write
3FBE000
stack
page read and write
11000
unkown
page execute and write copy
14AE000
heap
page read and write
149C000
heap
page read and write
4471000
heap
page read and write
DF4000
heap
page read and write
A64000
heap
page read and write
53F0000
direct allocation
page execute and read and write
4D8F000
stack
page read and write
4D61000
heap
page read and write
FB4000
heap
page read and write
393F000
stack
page read and write
4D61000
heap
page read and write
FD0000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
4471000
heap
page read and write
4D61000
heap
page read and write
8CF000
unkown
page execute and read and write
4471000
heap
page read and write
497F000
stack
page read and write
4D80000
heap
page read and write
4D61000
heap
page read and write
2BAE000
stack
page read and write
432F000
stack
page read and write
152E000
stack
page read and write
14BF000
heap
page read and write
2CFE000
stack
page read and write
40FE000
stack
page read and write
3A6F000
stack
page read and write
4C40000
direct allocation
page execute and read and write
437E000
stack
page read and write
FB4000
heap
page read and write
A64000
heap
page read and write
4D61000
heap
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
5380000
direct allocation
page execute and read and write
14AE000
heap
page read and write
4DCE000
stack
page read and write
FB4000
heap
page read and write
4D61000
heap
page read and write
4900000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
37FF000
stack
page read and write
462000
unkown
page execute and read and write
3ABE000
stack
page read and write
4B30000
direct allocation
page execute and read and write
4A9C000
stack
page read and write
FB4000
heap
page read and write
3CEF000
stack
page read and write
4D50000
direct allocation
page read and write
There are 722 hidden memdumps, click here to show them.