IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php.
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpm
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.php4079-b30a-7368302a1ad4LMEMp
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpj
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php)
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpI
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpi
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpd
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncodedBB
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpa
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php?
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php=
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php6B
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpyB
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpw
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpu
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php$BG
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncodedlB
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpt
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpdedgB
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php1
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
malicious
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
241.42.69.40.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B21000
unkown
page execute and read and write
malicious
4D40000
direct allocation
page read and write
malicious
B21000
unkown
page execute and read and write
malicious
B21000
unkown
page execute and read and write
malicious
5190000
direct allocation
page read and write
malicious
5180000
direct allocation
page read and write
malicious
4920000
direct allocation
page read and write
malicious
ED1000
unkown
page execute and read and write
malicious
AB4000
heap
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
AB4000
heap
page read and write
6B4000
heap
page read and write
6EEE000
stack
page read and write
5390000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
29AE000
stack
page read and write
38AF000
stack
page read and write
4CF1000
heap
page read and write
11E9000
unkown
page execute and read and write
AB4000
heap
page read and write
4D01000
heap
page read and write
42AF000
stack
page read and write
D1D000
unkown
page execute and read and write
4A5F000
stack
page read and write
5320000
direct allocation
page execute and read and write
1623000
heap
page read and write
48A0000
direct allocation
page read and write
7BF000
stack
page read and write
6B4000
heap
page read and write
4CF1000
heap
page read and write
371F000
stack
page read and write
4D01000
heap
page read and write
492F000
stack
page read and write
4D01000
heap
page read and write
3C1E000
stack
page read and write
2817000
heap
page read and write
4D01000
heap
page read and write
E47000
unkown
page execute and write copy
40AE000
stack
page read and write
4CC0000
heap
page read and write
482E000
stack
page read and write
36DF000
stack
page read and write
356E000
stack
page read and write
14AF000
stack
page read and write
44A1000
heap
page read and write
4CF1000
heap
page read and write
2A30000
heap
page read and write
48A0000
direct allocation
page read and write
E39000
unkown
page execute and read and write
11CF000
stack
page read and write
411F000
stack
page read and write
4D01000
heap
page read and write
4E00000
trusted library allocation
page read and write
682E000
stack
page read and write
6DAC000
stack
page read and write
7FE000
stack
page read and write
13A1000
unkown
page execute and write copy
4CF1000
heap
page read and write
4F20000
direct allocation
page execute and read and write
AB4000
heap
page read and write
465E000
stack
page read and write
2B9F000
stack
page read and write
31DF000
stack
page read and write
366E000
stack
page read and write
AB4000
heap
page read and write
4CE0000
direct allocation
page read and write
160B000
heap
page read and write
FF0000
unkown
page execute and read and write
5300000
direct allocation
page execute and read and write
721D000
heap
page read and write
4CF1000
heap
page read and write
479E000
stack
page read and write
5330000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
2A57000
heap
page read and write
4CE0000
direct allocation
page read and write
52E0000
direct allocation
page execute and read and write
6A0000
direct allocation
page read and write
4D01000
heap
page read and write
321F000
stack
page read and write
4D01000
heap
page read and write
48B0000
heap
page read and write
54CB000
stack
page read and write
302F000
stack
page read and write
6A0000
direct allocation
page read and write
4CF1000
heap
page read and write
6B4000
heap
page read and write
371E000
stack
page read and write
4D01000
heap
page read and write
4AAE000
stack
page read and write
AB4000
heap
page read and write
6B4000
heap
page read and write
4F60000
direct allocation
page execute and read and write
6C74000
heap
page read and write
4CF1000
heap
page read and write
3C5E000
stack
page read and write
446E000
stack
page read and write
4D01000
heap
page read and write
E39000
unkown
page execute and read and write
4ED0000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
15FE000
heap
page read and write
3EDE000
stack
page read and write
4A6F000
stack
page read and write
560F000
stack
page read and write
3A2E000
stack
page read and write
4CF1000
heap
page read and write
AB0000
heap
page read and write
11E0000
unkown
page execute and read and write
4CF1000
heap
page read and write
9FB000
stack
page read and write
3F2F000
stack
page read and write
FF0000
unkown
page execute and read and write
E48000
unkown
page execute and write copy
4CF1000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
E48000
unkown
page execute and write copy
4CF1000
heap
page read and write
44A0000
heap
page read and write
2810000
heap
page read and write
5320000
direct allocation
page execute and read and write
349F000
stack
page read and write
342E000
stack
page read and write
4CF1000
heap
page read and write
44DF000
stack
page read and write
3DAF000
stack
page read and write
432E000
stack
page read and write
4CE0000
direct allocation
page read and write
6A0000
direct allocation
page read and write
1620000
heap
page read and write
F32000
unkown
page execute and read and write
4A7E000
stack
page read and write
6A0000
direct allocation
page read and write
5320000
direct allocation
page execute and read and write
4A70000
direct allocation
page execute and read and write
B89000
unkown
page write copy
4D40000
direct allocation
page read and write
4CEF000
stack
page read and write
4A80000
direct allocation
page execute and read and write
AB4000
heap
page read and write
AB4000
heap
page read and write
4CF1000
heap
page read and write
11F8000
unkown
page execute and write copy
4F50000
direct allocation
page execute and read and write
48A0000
direct allocation
page read and write
4CF1000
heap
page read and write
316E000
stack
page read and write
4A3F000
stack
page read and write
4D01000
heap
page read and write
5BC000
stack
page read and write
4CF1000
heap
page read and write
352F000
stack
page read and write
887E000
stack
page read and write
94A000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
406F000
stack
page read and write
311E000
stack
page read and write
33EE000
stack
page read and write
4D02000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
5C8E000
stack
page read and write
2F9E000
stack
page read and write
4D01000
heap
page read and write
6B4000
heap
page read and write
4D40000
direct allocation
page read and write
4EC0000
direct allocation
page execute and read and write
4ED0000
direct allocation
page execute and read and write
AB4000
heap
page read and write
376F000
stack
page read and write
2E5F000
stack
page read and write
AB4000
heap
page read and write
4F30000
direct allocation
page execute and read and write
47EF000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
3C6F000
stack
page read and write
AB4000
heap
page read and write
FF2000
unkown
page execute and read and write
154E000
heap
page read and write
6566000
heap
page read and write
3A9F000
stack
page read and write
4CE0000
direct allocation
page read and write
4D01000
heap
page read and write
17C000
stack
page read and write
4CF1000
heap
page read and write
1616000
heap
page read and write
AFE000
stack
page read and write
4CF1000
heap
page read and write
4D06000
heap
page read and write
46BE000
stack
page read and write
4CF1000
heap
page read and write
B82000
unkown
page execute and read and write
E47000
unkown
page execute and write copy
335F000
stack
page read and write
4D01000
heap
page read and write
B20000
unkown
page read and write
269F000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
1591000
heap
page read and write
42EE000
stack
page read and write
AB4000
heap
page read and write
4D01000
heap
page read and write
326F000
stack
page read and write
159E000
heap
page read and write
4CF1000
heap
page read and write
5340000
direct allocation
page execute and read and write
4EA0000
direct allocation
page execute and read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
2EE0000
heap
page read and write
6A0000
direct allocation
page read and write
4CF1000
heap
page read and write
4CE0000
direct allocation
page read and write
4D01000
heap
page read and write
D60000
heap
page read and write
14EE000
stack
page read and write
4CF1000
heap
page read and write
2D1E000
stack
page read and write
3E2E000
stack
page read and write
5320000
direct allocation
page execute and read and write
6B4000
heap
page read and write
4D01000
heap
page read and write
2FDE000
stack
page read and write
4CE0000
direct allocation
page read and write
2B5F000
stack
page read and write
4CF0000
direct allocation
page read and write
E30000
unkown
page execute and read and write
5390000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
48A0000
direct allocation
page read and write
4CF0000
direct allocation
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
402F000
stack
page read and write
F39000
unkown
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
2A50000
heap
page read and write
29EE000
stack
page read and write
4BBE000
stack
page read and write
B89000
unkown
page read and write
AB4000
heap
page read and write
2E9E000
stack
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
3CEE000
stack
page read and write
2A9E000
stack
page read and write
B21000
unkown
page execute and write copy
4D01000
heap
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
6A0000
direct allocation
page read and write
4BAF000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
53A0000
direct allocation
page execute and read and write
5140000
heap
page read and write
52CF000
stack
page read and write
2CDF000
stack
page read and write
4CF1000
heap
page read and write
AB4000
heap
page read and write
AB4000
heap
page read and write
13AC000
heap
page read and write
4CF0000
direct allocation
page read and write
451E000
stack
page read and write
6B0000
heap
page read and write
48A0000
direct allocation
page read and write
4CF1000
heap
page read and write
5320000
direct allocation
page execute and read and write
48B1000
heap
page read and write
4D01000
heap
page read and write
4DF0000
trusted library allocation
page read and write
449F000
stack
page read and write
F3B000
unkown
page execute and read and write
2F5F000
stack
page read and write
FF1000
unkown
page execute and write copy
439F000
stack
page read and write
4D01000
heap
page read and write
6A0000
direct allocation
page read and write
4CF1000
heap
page read and write
F39000
unkown
page write copy
E04000
unkown
page execute and read and write
E80000
heap
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
416F000
stack
page read and write
FF1000
unkown
page execute and write copy
3CAE000
stack
page read and write
A90000
heap
page read and write
4CF1000
heap
page read and write
316F000
stack
page read and write
562F000
stack
page read and write
4A90000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
2EE7000
heap
page read and write
48B1000
heap
page read and write
4CF1000
heap
page read and write
3DEE000
stack
page read and write
E40000
heap
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
37AE000
stack
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
B20000
unkown
page readonly
6B40000
heap
page read and write
425E000
stack
page read and write
4B00000
direct allocation
page execute and read and write
FF3000
unkown
page execute and write copy
3D9E000
stack
page read and write
3DEF000
stack
page read and write
3BAE000
stack
page read and write
5B4D000
stack
page read and write
4CF1000
heap
page read and write
495E000
stack
page read and write
4CF1000
heap
page read and write
306C000
stack
page read and write
13A2000
unkown
page execute and read and write
160E000
heap
page read and write
312F000
stack
page read and write
309F000
stack
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
11F7000
unkown
page execute and read and write
30DF000
stack
page read and write
4CF1000
heap
page read and write
AB4000
heap
page read and write
1350000
heap
page read and write
158B000
heap
page read and write
58FE000
stack
page read and write
48A0000
direct allocation
page read and write
6A0000
direct allocation
page read and write
4D01000
heap
page read and write
B89000
unkown
page read and write
B89000
unkown
page read and write
5350000
direct allocation
page execute and read and write
12FD000
stack
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
4D40000
direct allocation
page read and write
32EE000
stack
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
44A1000
heap
page read and write
B21000
unkown
page execute and write copy
325E000
stack
page read and write
4CF1000
heap
page read and write
95B000
heap
page read and write
AB4000
heap
page read and write
4CBF000
stack
page read and write
920000
heap
page read and write
4CF1000
heap
page read and write
425F000
stack
page read and write
13A3000
unkown
page execute and write copy
5524000
heap
page read and write
4CF1000
heap
page read and write
15F7000
heap
page read and write
4CF0000
direct allocation
page read and write
32AE000
stack
page read and write
AB4000
heap
page read and write
37EE000
stack
page read and write
70FB000
stack
page read and write
496E000
stack
page read and write
4D01000
heap
page read and write
B10000
direct allocation
page read and write
4CF1000
heap
page read and write
59FF000
stack
page read and write
4CF1000
heap
page read and write
A90000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
493E000
stack
page read and write
4670000
heap
page read and write
4BEE000
stack
page read and write
48FF000
stack
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
160B000
heap
page read and write
AB4000
heap
page read and write
67E000
stack
page read and write
452F000
stack
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
AB4000
heap
page read and write
3B1E000
stack
page read and write
AB4000
heap
page read and write
4D01000
heap
page read and write
4CE0000
direct allocation
page read and write
362F000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
43DE000
stack
page read and write
47FE000
stack
page read and write
40DF000
stack
page read and write
279F000
stack
page read and write
B10000
direct allocation
page read and write
30DE000
stack
page read and write
4D01000
heap
page read and write
AB4000
heap
page read and write
6B3E000
heap
page read and write
3F9F000
stack
page read and write
5190000
direct allocation
page read and write
6A0000
direct allocation
page read and write
3CAF000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
4E8F000
stack
page read and write
5180000
direct allocation
page read and write
4D01000
heap
page read and write
ED1000
unkown
page execute and write copy
4D01000
heap
page read and write
AB4000
heap
page read and write
B20000
unkown
page read and write
4CF1000
heap
page read and write
39EF000
stack
page read and write
AB4000
heap
page read and write
489F000
stack
page read and write
4CF1000
heap
page read and write
5350000
direct allocation
page execute and read and write
4CF0000
direct allocation
page read and write
AB4000
heap
page read and write
1E0000
heap
page read and write
6B4000
heap
page read and write
4D01000
heap
page read and write
A95000
heap
page read and write
331F000
stack
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
13D3000
heap
page read and write
4FD000
stack
page read and write
4A70000
direct allocation
page execute and read and write
392E000
stack
page read and write
48B1000
heap
page read and write
4CF1000
heap
page read and write
B20000
unkown
page readonly
4CE0000
direct allocation
page read and write
ECE000
stack
page read and write
3E9E000
stack
page read and write
3E5F000
stack
page read and write
B10000
direct allocation
page read and write
AB4000
heap
page read and write
6565000
heap
page read and write
4D01000
heap
page read and write
B8B000
unkown
page execute and read and write
401E000
stack
page read and write
2F2E000
stack
page read and write
AB4000
heap
page read and write
5180000
direct allocation
page read and write
335E000
stack
page read and write
6B4000
heap
page read and write
1620000
heap
page read and write
395F000
stack
page read and write
AB4000
heap
page read and write
4D01000
heap
page read and write
48B1000
heap
page read and write
5360000
direct allocation
page execute and read and write
4D01000
heap
page read and write
6B30000
heap
page read and write
1620000
heap
page read and write
4D01000
heap
page read and write
AB4000
heap
page read and write
4CF1000
heap
page read and write
158E000
heap
page read and write
5310000
direct allocation
page execute and read and write
6B4000
heap
page read and write
3F2E000
stack
page read and write
4F00000
direct allocation
page execute and read and write
6B4000
heap
page read and write
3BDE000
stack
page read and write
FF2000
unkown
page execute and read and write
4CE0000
direct allocation
page read and write
4CF0000
direct allocation
page read and write
4CE0000
direct allocation
page read and write
4CF0000
direct allocation
page read and write
435F000
stack
page read and write
4CF1000
heap
page read and write
B82000
unkown
page execute and read and write
4CF1000
heap
page read and write
B20000
unkown
page read and write
E39000
unkown
page execute and read and write
7200000
heap
page read and write
389E000
stack
page read and write
48A0000
direct allocation
page read and write
13A0000
unkown
page execute and read and write
E47000
unkown
page execute and read and write
6B4000
heap
page read and write
4D01000
heap
page read and write
45AE000
stack
page read and write
6560000
heap
page read and write
4CF1000
heap
page read and write
3FDF000
stack
page read and write
B89000
unkown
page write copy
4EB0000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
2A2E000
stack
page read and write
B8B000
unkown
page execute and read and write
4D01000
heap
page read and write
399E000
stack
page read and write
31AE000
stack
page read and write
456E000
stack
page read and write
2F9F000
stack
page read and write
33EF000
stack
page read and write
2ED0000
heap
page read and write
352E000
stack
page read and write
3D5F000
stack
page read and write
5319000
stack
page read and write
6A0000
direct allocation
page read and write
35DF000
stack
page read and write
8FD000
stack
page read and write
442F000
stack
page read and write
4CF0000
direct allocation
page read and write
160E000
heap
page read and write
E48000
unkown
page execute and write copy
2A5F000
stack
page read and write
4CF0000
direct allocation
page read and write
4CF1000
heap
page read and write
AB4000
heap
page read and write
4CE0000
direct allocation
page read and write
4CF1000
heap
page read and write
A2C000
stack
page read and write
321E000
stack
page read and write
AB4000
heap
page read and write
6B4000
heap
page read and write
692F000
stack
page read and write
48B1000
heap
page read and write
3ADF000
stack
page read and write
4CF1000
heap
page read and write
3ADE000
stack
page read and write
39DE000
stack
page read and write
71FC000
stack
page read and write
66EE000
stack
page read and write
4CF1000
heap
page read and write
44A1000
heap
page read and write
47BF000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
399F000
stack
page read and write
15FD000
heap
page read and write
5190000
direct allocation
page read and write
51DB000
stack
page read and write
4B7F000
stack
page read and write
4CF1000
heap
page read and write
51E1000
direct allocation
page read and write
B10000
heap
page read and write
5180000
direct allocation
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
67EF000
stack
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
E04000
unkown
page execute and read and write
4CF1000
heap
page read and write
385E000
stack
page read and write
A8E000
stack
page read and write
406E000
stack
page read and write
345F000
stack
page read and write
45A0000
trusted library allocation
page read and write
3F6E000
stack
page read and write
4D01000
heap
page read and write
51F1000
direct allocation
page read and write
B10000
heap
page read and write
6A0000
direct allocation
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
42EF000
stack
page read and write
361E000
stack
page read and write
44A1000
heap
page read and write
AB4000
heap
page read and write
6B4000
heap
page read and write
48A0000
direct allocation
page read and write
153E000
stack
page read and write
AB4000
heap
page read and write
B21000
unkown
page execute and write copy
4ED0000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
6A0000
direct allocation
page read and write
4CF1000
heap
page read and write
532C000
stack
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
AB4000
heap
page read and write
D1D000
unkown
page execute and read and write
4F70000
direct allocation
page execute and read and write
456F000
stack
page read and write
4D01000
heap
page read and write
13C9000
heap
page read and write
CFA000
stack
page read and write
5300000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
AB4000
heap
page read and write
10CD000
unkown
page execute and read and write
FF3000
unkown
page execute and write copy
80E000
heap
page read and write
2FDF000
stack
page read and write
439E000
stack
page read and write
5320000
direct allocation
page execute and read and write
52DF000
stack
page read and write
3D5E000
stack
page read and write
48A0000
direct allocation
page read and write
E47000
unkown
page execute and read and write
B82000
unkown
page execute and read and write
AB4000
heap
page read and write
4CF1000
heap
page read and write
475F000
stack
page read and write
5310000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
AA0000
heap
page read and write
3D1F000
stack
page read and write
54FC000
stack
page read and write
1607000
heap
page read and write
3FDE000
stack
page read and write
2FE7000
heap
page read and write
33AF000
stack
page read and write
349E000
stack
page read and write
4CF1000
heap
page read and write
4D10000
heap
page read and write
E30000
unkown
page execute and read and write
5A4E000
stack
page read and write
5380000
direct allocation
page execute and read and write
3B6F000
stack
page read and write
B89000
unkown
page write copy
564D000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
6A6F000
stack
page read and write
5310000
direct allocation
page execute and read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
AB4000
heap
page read and write
4D01000
heap
page read and write
5310000
direct allocation
page execute and read and write
4D01000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
466F000
stack
page read and write
4CE0000
direct allocation
page read and write
160B000
heap
page read and write
2EED000
heap
page read and write
4CF0000
direct allocation
page read and write
5310000
direct allocation
page execute and read and write
940000
heap
page read and write
690000
heap
page read and write
ED0000
unkown
page readonly
3C1F000
stack
page read and write
48A0000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
AB4000
heap
page read and write
1382000
heap
page read and write
4CF1000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
4DA1000
direct allocation
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
D1D000
unkown
page execute and read and write
1357000
heap
page read and write
4A70000
direct allocation
page execute and read and write
3E9F000
stack
page read and write
FF0000
unkown
page execute and read and write
6C70000
heap
page read and write
4D01000
heap
page read and write
375E000
stack
page read and write
49B0000
trusted library allocation
page read and write
4CF1000
heap
page read and write
38EE000
stack
page read and write
51CE000
stack
page read and write
48A0000
direct allocation
page read and write
461F000
stack
page read and write
4A60000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
550E000
stack
page read and write
2FE0000
heap
page read and write
AB4000
heap
page read and write
48A0000
direct allocation
page read and write
4D01000
heap
page read and write
32AF000
stack
page read and write
4D01000
heap
page read and write
1616000
heap
page read and write
43EF000
stack
page read and write
1613000
heap
page read and write
11F7000
unkown
page execute and write copy
4CF0000
direct allocation
page read and write
6B40000
heap
page read and write
4CF1000
heap
page read and write
5330000
direct allocation
page execute and read and write
4D8E000
stack
page read and write
295E000
stack
page read and write
4CF0000
heap
page read and write
6B31000
heap
page read and write
27F0000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
578E000
stack
page read and write
5360000
direct allocation
page execute and read and write
5380000
direct allocation
page execute and read and write
AB4000
heap
page read and write
80A000
heap
page read and write
574F000
stack
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
1587000
heap
page read and write
AB4000
heap
page read and write
41AE000
stack
page read and write
3EEF000
stack
page read and write
5B8E000
stack
page read and write
62E000
stack
page read and write
415E000
stack
page read and write
15E1000
heap
page read and write
4CF1000
heap
page read and write
2E1F000
stack
page read and write
5320000
direct allocation
page execute and read and write
E47000
unkown
page execute and write copy
E04000
unkown
page execute and read and write
41EE000
stack
page read and write
38EF000
stack
page read and write
6B4000
heap
page read and write
588F000
stack
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
FF1000
unkown
page execute and write copy
6B4000
heap
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
B20000
unkown
page readonly
339E000
stack
page read and write
3A2F000
stack
page read and write
34EF000
stack
page read and write
5370000
direct allocation
page execute and read and write
48B1000
heap
page read and write
359F000
stack
page read and write
4CF0000
direct allocation
page read and write
696E000
stack
page read and write
46EE000
stack
page read and write
4CE0000
direct allocation
page read and write
4ED0000
direct allocation
page execute and read and write
3A6E000
stack
page read and write
15E1000
heap
page read and write
4CF1000
heap
page read and write
421F000
stack
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
6A90000
heap
page read and write
48A0000
direct allocation
page read and write
E85000
heap
page read and write
E30000
unkown
page execute and read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
48A0000
direct allocation
page read and write
1613000
heap
page read and write
6EAC000
stack
page read and write
27DE000
stack
page read and write
4D20000
heap
page read and write
302B000
stack
page read and write
154A000
heap
page read and write
4D01000
heap
page read and write
4A70000
direct allocation
page execute and read and write
AB4000
heap
page read and write
411E000
stack
page read and write
5310000
direct allocation
page execute and read and write
800000
heap
page read and write
AB4000
heap
page read and write
4981000
direct allocation
page read and write
FF2000
unkown
page execute and read and write
35DE000
stack
page read and write
2BDE000
stack
page read and write
4D01000
heap
page read and write
34DE000
stack
page read and write
442E000
stack
page read and write
B8B000
unkown
page execute and read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
ED0000
unkown
page read and write
1609000
heap
page read and write
52F0000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
54AB000
stack
page read and write
53B0000
direct allocation
page execute and read and write
173E000
stack
page read and write
5310000
direct allocation
page execute and read and write
41AF000
stack
page read and write
6A0000
direct allocation
page read and write
1F0000
heap
page read and write
53A0000
direct allocation
page execute and read and write
37AF000
stack
page read and write
4CE0000
direct allocation
page read and write
5370000
direct allocation
page execute and read and write
291F000
stack
page read and write
3B6E000
stack
page read and write
5190000
direct allocation
page read and write
2800000
direct allocation
page execute and read and write
2E5E000
stack
page read and write
4D01000
heap
page read and write
1540000
heap
page read and write
36AE000
stack
page read and write
5520000
heap
page read and write
46AF000
stack
page read and write
6A0000
direct allocation
page read and write
52F0000
direct allocation
page execute and read and write
366F000
stack
page read and write
2C5F000
stack
page read and write
429E000
stack
page read and write
4D01000
heap
page read and write
4D00000
heap
page read and write
4CF1000
heap
page read and write
4F40000
direct allocation
page execute and read and write
4CF0000
direct allocation
page read and write
11B4000
unkown
page execute and read and write
4CF1000
heap
page read and write
FF3000
unkown
page execute and write copy
4CF0000
direct allocation
page read and write
385F000
stack
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
4D01000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4F10000
direct allocation
page execute and read and write
4D01000
heap
page read and write
4CF1000
heap
page read and write
E47000
unkown
page execute and read and write
4CF1000
heap
page read and write
2D5F000
stack
page read and write
3B2F000
stack
page read and write
381F000
stack
page read and write
1386000
heap
page read and write
AB4000
heap
page read and write
There are 824 hidden memdumps, click here to show them.