IOC Report
installer.exe

loading gif

Files

File Path
Type
Category
Malicious
installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\installer.exe
"C:\Users\user\Desktop\installer.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORTS
unknown
https://ipinfo.io/
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown

IPs

IP
Domain
Country
Malicious
77.91.77.66
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
423E000
stack
page read and write
39DF000
stack
page read and write
C10000
direct allocation
page read and write
3A7F000
stack
page read and write
54B0000
direct allocation
page execute and read and write
3CFE000
stack
page read and write
447F000
stack
page read and write
31F0000
direct allocation
page read and write
53D0000
direct allocation
page execute and read and write
2FDE000
stack
page read and write
4E71000
heap
page read and write
B74000
heap
page read and write
13CA000
heap
page read and write
794000
heap
page read and write
141F000
heap
page read and write
36BF000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
44BE000
stack
page read and write
794000
heap
page read and write
B74000
heap
page read and write
3E3F000
stack
page read and write
12FC000
stack
page read and write
469E000
stack
page read and write
2E0E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
C5F000
heap
page read and write
5540000
direct allocation
page execute and read and write
4E71000
heap
page read and write
4B5F000
stack
page read and write
51D0000
direct allocation
page execute and read and write
26F0000
heap
page read and write
3180000
direct allocation
page read and write
3160000
direct allocation
page read and write
7A6E000
stack
page read and write
1484000
heap
page read and write
29C0000
heap
page read and write
51E0000
direct allocation
page execute and read and write
A8F000
stack
page read and write
794000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4E71000
heap
page read and write
160E000
heap
page read and write
4C00000
heap
page read and write
B74000
heap
page read and write
1382000
unkown
page execute and read and write
5420000
direct allocation
page execute and read and write
140F000
heap
page read and write
4711000
heap
page read and write
B74000
heap
page read and write
C44000
heap
page read and write
2F8E000
stack
page read and write
D20000
direct allocation
page read and write
4E4F000
stack
page read and write
2F4F000
stack
page read and write
28FF000
stack
page read and write
26E0000
direct allocation
page read and write
1422000
heap
page read and write
315E000
stack
page read and write
4810000
trusted library allocation
page read and write
C44000
heap
page read and write
F50000
unkown
page read and write
794000
heap
page read and write
870000
direct allocation
page read and write
4E71000
heap
page read and write
C72000
heap
page read and write
547E000
stack
page read and write
8D9000
heap
page read and write
2CD000
unkown
page execute and read and write
794000
heap
page read and write
3180000
direct allocation
page read and write
2E37000
heap
page read and write
5450000
direct allocation
page execute and read and write
1448000
heap
page read and write
8F7000
heap
page read and write
491E000
stack
page read and write
29C7000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
4BBD000
stack
page read and write
45BF000
stack
page read and write
389F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
5210000
direct allocation
page execute and read and write
C10000
direct allocation
page read and write
B74000
heap
page read and write
56B000
unkown
page execute and read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
54B0000
heap
page read and write
794000
heap
page read and write
8CF000
heap
page read and write
368F000
stack
page read and write
D20000
direct allocation
page read and write
C44000
heap
page read and write
430F000
stack
page read and write
794000
heap
page read and write
5480000
direct allocation
page execute and read and write
C44000
heap
page read and write
3FC000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
793F000
stack
page read and write
455E000
stack
page read and write
C10000
direct allocation
page read and write
79EE000
stack
page read and write
3A1E000
stack
page read and write
483F000
stack
page read and write
5410000
direct allocation
page execute and read and write
438E000
stack
page read and write
C10000
direct allocation
page read and write
B74000
heap
page read and write
3BBF000
stack
page read and write
5484000
direct allocation
page read and write
B74000
heap
page read and write
4F70000
trusted library allocation
page read and write
794000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
794000
heap
page read and write
4AFE000
stack
page read and write
45C0000
heap
page read and write
794000
heap
page read and write
141000
unkown
page execute and write copy
5510000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
393F000
stack
page read and write
31F0000
direct allocation
page read and write
C74000
heap
page read and write
46C0000
trusted library allocation
page read and write
40CE000
stack
page read and write
487E000
stack
page read and write
51D0000
direct allocation
page execute and read and write
48DF000
stack
page read and write
53D0000
direct allocation
page execute and read and write
5480000
direct allocation
page execute and read and write
315F000
stack
page read and write
37FF000
stack
page read and write
4B80000
direct allocation
page execute and read and write
1392000
unkown
page execute and write copy
2CA000
unkown
page write copy
B74000
heap
page read and write
4E71000
heap
page read and write
53D0000
direct allocation
page execute and read and write
3F8F000
stack
page read and write
5240000
direct allocation
page execute and read and write
1480000
heap
page read and write
D9E000
heap
page read and write
794000
heap
page read and write
4E71000
heap
page read and write
51BF000
stack
page read and write
3197000
heap
page read and write
F6B000
unkown
page execute and read and write
5204000
direct allocation
page read and write
870000
direct allocation
page read and write
26E0000
direct allocation
page read and write
794000
heap
page read and write
77A8000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
DC2000
unkown
page execute and read and write
B74000
heap
page read and write
1382000
unkown
page execute and read and write
4711000
heap
page read and write
31F0000
direct allocation
page read and write
4CE0000
direct allocation
page execute and read and write
C55000
heap
page read and write
C44000
heap
page read and write
45C1000
heap
page read and write
3BFE000
stack
page read and write
51F0000
direct allocation
page execute and read and write
4E71000
heap
page read and write
1484000
heap
page read and write
BBE000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
F20000
direct allocation
page read and write
B74000
heap
page read and write
31FE000
stack
page read and write
4E7E000
stack
page read and write
1484000
heap
page read and write
3A7F000
stack
page read and write
DA6000
heap
page read and write
2CCF000
stack
page read and write
8F1000
heap
page read and write
C44000
heap
page read and write
29BE000
stack
page read and write
3160000
direct allocation
page read and write
173F000
stack
page read and write
5480000
direct allocation
page execute and read and write
C79000
heap
page read and write
85E000
stack
page read and write
870000
direct allocation
page read and write
F6D000
unkown
page execute and write copy
3160000
direct allocation
page read and write
794000
heap
page read and write
C44000
heap
page read and write
C96000
heap
page read and write
5290000
direct allocation
page execute and read and write
5480000
direct allocation
page execute and read and write
152D000
unkown
page execute and write copy
8EF000
heap
page read and write
4DE1000
heap
page read and write
582000
unkown
page execute and write copy
3200000
heap
page read and write
794000
heap
page read and write
C44000
heap
page read and write
3B5E000
stack
page read and write
2E10000
direct allocation
page execute and read and write
2B7F000
stack
page read and write
398E000
stack
page read and write
348E000
stack
page read and write
51D0000
direct allocation
page execute and read and write
365E000
stack
page read and write
890000
heap
page read and write
1484000
heap
page read and write
141000
unkown
page execute and read and write
4711000
heap
page read and write
4A5E000
stack
page read and write
71B000
unkown
page execute and read and write
794000
heap
page read and write
790000
heap
page read and write
4E71000
heap
page read and write
379E000
stack
page read and write
870000
direct allocation
page read and write
D6F000
heap
page read and write
5440000
direct allocation
page execute and read and write
1484000
heap
page read and write
45FE000
stack
page read and write
1600000
heap
page read and write
4EBE000
stack
page read and write
140000
unkown
page read and write
1484000
heap
page read and write
30CE000
stack
page read and write
5280000
direct allocation
page execute and read and write
DA8000
heap
page read and write
36CF000
stack
page read and write
794000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
B74000
heap
page read and write
1484000
heap
page read and write
3B8F000
stack
page read and write
8DE000
heap
page read and write
357F000
stack
page read and write
C44000
heap
page read and write
783E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
7AEF000
stack
page read and write
358E000
stack
page read and write
51D0000
direct allocation
page execute and read and write
537D000
stack
page read and write
EEF000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
C44000
heap
page read and write
31F0000
direct allocation
page read and write
1484000
heap
page read and write
C10000
direct allocation
page read and write
660000
heap
page read and write
4C70000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
4710000
heap
page read and write
1391000
unkown
page execute and write copy
1484000
heap
page read and write
2F3F000
stack
page read and write
3160000
direct allocation
page read and write
D20000
direct allocation
page read and write
4E71000
heap
page read and write
C44000
heap
page read and write
3ABE000
stack
page read and write
470F000
stack
page read and write
4C40000
direct allocation
page execute and read and write
2FB000
stack
page read and write
F50000
unkown
page read and write
1408000
heap
page read and write
870000
direct allocation
page read and write
343F000
stack
page read and write
4DE1000
heap
page read and write
F2F000
stack
page read and write
C44000
heap
page read and write
330F000
stack
page read and write
3B1F000
stack
page read and write
8C7000
heap
page read and write
F51000
unkown
page execute and write copy
1484000
heap
page read and write
5480000
direct allocation
page execute and read and write
5490000
direct allocation
page execute and read and write
5570000
direct allocation
page execute and read and write
358F000
stack
page read and write
480F000
stack
page read and write
4C00000
direct allocation
page execute and read and write
36CE000
stack
page read and write
40FE000
stack
page read and write
C10000
direct allocation
page read and write
B74000
heap
page read and write
3D3E000
stack
page read and write
1484000
heap
page read and write
4E71000
heap
page read and write
C9F000
unkown
page execute and read and write
41CF000
stack
page read and write
125B000
stack
page read and write
1654000
heap
page read and write
375F000
stack
page read and write
539F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
383E000
stack
page read and write
4C80000
direct allocation
page execute and read and write
3FCE000
stack
page read and write
C44000
heap
page read and write
4C01000
heap
page read and write
10DA000
unkown
page write copy
424E000
stack
page read and write
794000
heap
page read and write
D10000
heap
page read and write
C44000
heap
page read and write
52C0000
direct allocation
page execute and read and write
30BE000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
77FF000
stack
page read and write
54D0000
direct allocation
page execute and read and write
143F000
heap
page read and write
1687000
heap
page read and write
5200000
direct allocation
page execute and read and write
991000
unkown
page execute and write copy
4C01000
heap
page read and write
434E000
stack
page read and write
2BBE000
stack
page read and write
B74000
heap
page read and write
D20000
direct allocation
page read and write
3207000
heap
page read and write
5260000
direct allocation
page read and write
7840000
heap
page read and write
B74000
heap
page read and write
10D5000
unkown
page execute and read and write
794000
heap
page read and write
473E000
stack
page read and write
5480000
direct allocation
page execute and read and write
794000
heap
page read and write
52C000
unkown
page execute and read and write
380F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
308F000
stack
page read and write
137B000
unkown
page execute and read and write
B74000
heap
page read and write
10DD000
unkown
page execute and read and write
1668000
heap
page read and write
77A3000
heap
page read and write
6E66000
heap
page read and write
4C90000
direct allocation
page execute and read and write
52C000
unkown
page execute and read and write
4C01000
heap
page read and write
3DDE000
stack
page read and write
31F0000
direct allocation
page read and write
1637000
heap
page read and write
45C1000
heap
page read and write
31E0000
heap
page read and write
54C0000
direct allocation
page execute and read and write
1410000
heap
page read and write
390F000
stack
page read and write
794000
heap
page read and write
1391000
unkown
page execute and read and write
792E000
stack
page read and write
5430000
direct allocation
page execute and read and write
37FF000
stack
page read and write
C44000
heap
page read and write
4711000
heap
page read and write
3FBE000
stack
page read and write
319B000
stack
page read and write
5480000
direct allocation
page execute and read and write
C10000
direct allocation
page read and write
47DE000
stack
page read and write
C2B000
heap
page read and write
794000
heap
page read and write
32FF000
stack
page read and write
C44000
heap
page read and write
860000
heap
page read and write
2E30000
heap
page read and write
3CFF000
stack
page read and write
4A8F000
stack
page read and write
1659000
heap
page read and write
79AF000
stack
page read and write
4DE1000
heap
page read and write
141D000
heap
page read and write
31F0000
direct allocation
page read and write
C10000
direct allocation
page read and write
C44000
heap
page read and write
1434000
heap
page read and write
C6E000
heap
page read and write
26F7000
heap
page read and write
34DF000
stack
page read and write
458F000
stack
page read and write
794000
heap
page read and write
71CE000
stack
page read and write
305E000
stack
page read and write
4711000
heap
page read and write
1484000
heap
page read and write
3A8F000
stack
page read and write
339F000
stack
page read and write
4E71000
heap
page read and write
441E000
stack
page read and write
2CA000
unkown
page write copy
D82000
heap
page read and write
140B000
heap
page read and write
4D40000
direct allocation
page execute and read and write
51D0000
direct allocation
page execute and read and write
3160000
direct allocation
page read and write
2CA000
unkown
page write copy
3E7E000
stack
page read and write
B15000
unkown
page execute and read and write
D84000
heap
page read and write
46CF000
stack
page read and write
53DD000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
72CF000
stack
page read and write
361F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
35BE000
stack
page read and write
4D00000
trusted library allocation
page read and write
4E71000
heap
page read and write
3ABE000
stack
page read and write
4E71000
heap
page read and write
2DFF000
stack
page read and write
5480000
heap
page read and write
4DE1000
heap
page read and write
D7E000
heap
page read and write
3F7F000
stack
page read and write
35CE000
stack
page read and write
1525000
heap
page read and write
31BF000
stack
page read and write
380E000
stack
page read and write
43DF000
stack
page read and write
B50000
heap
page read and write
7EB000
stack
page read and write
2C5000
unkown
page execute and read and write
3BFD000
stack
page read and write
2F3F000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
C44000
heap
page read and write
384E000
stack
page read and write
470E000
stack
page read and write
158F000
stack
page read and write
330F000
stack
page read and write
5270000
direct allocation
page execute and read and write
B74000
heap
page read and write
51D0000
direct allocation
page execute and read and write
3D9F000
stack
page read and write
26CE000
stack
page read and write
D89000
heap
page read and write
1392000
unkown
page execute and write copy
53A0000
direct allocation
page execute and read and write
36BF000
stack
page read and write
1484000
heap
page read and write
163E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
B74000
heap
page read and write
794000
heap
page read and write
45BF000
stack
page read and write
329F000
stack
page read and write
51D0000
direct allocation
page execute and read and write
582000
unkown
page execute and write copy
C10000
direct allocation
page read and write
1413000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
3E7E000
stack
page read and write
10D5000
unkown
page execute and read and write
4711000
heap
page read and write
72DF000
stack
page read and write
53C0000
direct allocation
page execute and read and write
293C000
stack
page read and write
5500000
direct allocation
page execute and read and write
794000
heap
page read and write
3F1E000
stack
page read and write
408F000
stack
page read and write
F50000
unkown
page readonly
54B0000
direct allocation
page execute and read and write
4C01000
heap
page read and write
2E0F000
stack
page read and write
F40000
direct allocation
page read and write
C44000
heap
page read and write
125F000
unkown
page execute and read and write
F40000
direct allocation
page read and write
15F0000
heap
page read and write
C20000
heap
page read and write
533B000
stack
page read and write
2D0E000
stack
page read and write
3FBE000
stack
page read and write
794000
heap
page read and write
50BC000
stack
page read and write
77DD000
stack
page read and write
F50000
unkown
page readonly
14D0000
heap
page read and write
4DE0000
heap
page read and write
DA8000
heap
page read and write
10DA000
unkown
page write copy
1484000
heap
page read and write
447F000
stack
page read and write
B74000
heap
page read and write
90E000
heap
page read and write
3C0E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
5460000
direct allocation
page execute and read and write
4DE1000
heap
page read and write
419E000
stack
page read and write
423E000
stack
page read and write
1484000
heap
page read and write
370E000
stack
page read and write
1484000
heap
page read and write
2CD000
unkown
page execute and read and write
4C01000
heap
page read and write
1484000
heap
page read and write
794000
heap
page read and write
44F000
unkown
page execute and read and write
71B000
unkown
page execute and read and write
F51000
unkown
page execute and write copy
141000
unkown
page execute and read and write
13CE000
heap
page read and write
5480000
direct allocation
page execute and read and write
4D14000
direct allocation
page read and write
1484000
heap
page read and write
437E000
stack
page read and write
B1A000
unkown
page write copy
393F000
stack
page read and write
C44000
heap
page read and write
38DE000
stack
page read and write
5460000
direct allocation
page execute and read and write
333E000
stack
page read and write
3E4F000
stack
page read and write
45CF000
stack
page read and write
D87000
heap
page read and write
433F000
stack
page read and write
4DE1000
heap
page read and write
4DDF000
stack
page read and write
870000
direct allocation
page read and write
5590000
direct allocation
page execute and read and write
F51000
unkown
page execute and read and write
45C1000
heap
page read and write
140000
unkown
page readonly
7A2F000
stack
page read and write
52D0000
direct allocation
page execute and read and write
B74000
heap
page read and write
C44000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
433F000
stack
page read and write
B74000
heap
page read and write
5480000
direct allocation
page execute and read and write
1391000
unkown
page execute and read and write
2BCF000
stack
page read and write
3E8E000
stack
page read and write
D20000
direct allocation
page read and write
794000
heap
page read and write
4DE1000
heap
page read and write
40CF000
stack
page read and write
5480000
direct allocation
page execute and read and write
543F000
stack
page read and write
3EDF000
stack
page read and write
5250000
direct allocation
page execute and read and write
4D30000
direct allocation
page execute and read and write
51D0000
direct allocation
page execute and read and write
4D60000
direct allocation
page execute and read and write
4A7C000
stack
page read and write
498E000
stack
page read and write
741F000
stack
page read and write
581000
unkown
page execute and write copy
D8D000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
C44000
heap
page read and write
333E000
stack
page read and write
C44000
heap
page read and write
13C0000
heap
page read and write
31F0000
direct allocation
page read and write
40BF000
stack
page read and write
DD1000
unkown
page execute and write copy
7AB000
stack
page read and write
794000
heap
page read and write
45C1000
heap
page read and write
31BF000
stack
page read and write
C40000
heap
page read and write
320E000
stack
page read and write
740000
heap
page read and write
4C30000
direct allocation
page execute and read and write
3160000
direct allocation
page read and write
C44000
heap
page read and write
152D000
unkown
page execute and write copy
3BCF000
stack
page read and write
4E71000
heap
page read and write
D74000
heap
page read and write
529B000
stack
page read and write
71D000
unkown
page execute and write copy
10DD000
unkown
page execute and read and write
C44000
heap
page read and write
31F0000
direct allocation
page read and write
C10000
direct allocation
page read and write
4DC0000
direct allocation
page execute and read and write
4BB0000
direct allocation
page execute and read and write
4C10000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
4BC4000
direct allocation
page read and write
4DE1000
heap
page read and write
783E000
stack
page read and write
731E000
stack
page read and write
4ED0000
heap
page read and write
3D3E000
stack
page read and write
4DE1000
heap
page read and write
B70000
heap
page read and write
2CFE000
stack
page read and write
31FE000
stack
page read and write
7DE000
stack
page read and write
5220000
direct allocation
page execute and read and write
165D000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4CE0000
direct allocation
page execute and read and write
794000
heap
page read and write
3A8E000
stack
page read and write
6EE9000
heap
page read and write
3F8E000
stack
page read and write
581000
unkown
page execute and write copy
3160000
direct allocation
page read and write
B74000
heap
page read and write
870000
direct allocation
page read and write
89A000
heap
page read and write
56B000
unkown
page execute and read and write
4BE0000
direct allocation
page execute and read and write
B74000
heap
page read and write
44BE000
stack
page read and write
794000
heap
page read and write
5300000
direct allocation
page read and write
4E50000
heap
page read and write
5480000
direct allocation
page execute and read and write
794000
heap
page read and write
4C01000
heap
page read and write
3A4F000
stack
page read and write
794000
heap
page read and write
1424000
heap
page read and write
718F000
stack
page read and write
160A000
heap
page read and write
4A1F000
stack
page read and write
4D4E000
stack
page read and write
2C5000
unkown
page execute and read and write
1429000
heap
page read and write
C7E000
heap
page read and write
B74000
heap
page read and write
D20000
direct allocation
page read and write
D20000
direct allocation
page read and write
DA6000
heap
page read and write
2CA000
unkown
page write copy
1484000
heap
page read and write
54D0000
direct allocation
page execute and read and write
437E000
stack
page read and write
5470000
direct allocation
page execute and read and write
4E10000
heap
page read and write
1484000
heap
page read and write
4CDE000
stack
page read and write
52E0000
direct allocation
page execute and read and write
D20000
direct allocation
page read and write
164A000
heap
page read and write
49BE000
stack
page read and write
37CF000
stack
page read and write
152B000
unkown
page execute and read and write
1484000
heap
page read and write
581000
unkown
page execute and read and write
C44000
heap
page read and write
AFB000
stack
page read and write
990000
unkown
page read and write
4BB0000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
32FF000
stack
page read and write
B74000
heap
page read and write
B74000
heap
page read and write
351E000
stack
page read and write
B74000
heap
page read and write
1391000
unkown
page execute and write copy
1484000
heap
page read and write
1330000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
D5C000
heap
page read and write
4711000
heap
page read and write
5480000
direct allocation
page execute and read and write
B74000
heap
page read and write
2A7E000
stack
page read and write
141000
unkown
page execute and write copy
794000
heap
page read and write
3190000
heap
page read and write
1484000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
C00000
heap
page read and write
870000
direct allocation
page read and write
C8E000
heap
page read and write
4E50000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
1664000
heap
page read and write
54E0000
direct allocation
page execute and read and write
870000
direct allocation
page read and write
36FE000
stack
page read and write
C44000
heap
page read and write
44CE000
stack
page read and write
51D0000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
357F000
stack
page read and write
C44000
heap
page read and write
420F000
stack
page read and write
794000
heap
page read and write
354F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
B1D000
unkown
page execute and read and write
C44000
heap
page read and write
415F000
stack
page read and write
4D0F000
stack
page read and write
76FE000
stack
page read and write
4C01000
heap
page read and write
164F000
heap
page read and write
51C0000
direct allocation
page execute and read and write
754F000
heap
page read and write
5050000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
1687000
heap
page read and write
B74000
heap
page read and write
1484000
heap
page read and write
3D0E000
stack
page read and write
78DE000
stack
page read and write
B40000
heap
page read and write
4E71000
heap
page read and write
74CA000
heap
page read and write
405E000
stack
page read and write
311C000
stack
page read and write
140000
unkown
page readonly
133C000
unkown
page execute and read and write
5530000
direct allocation
page execute and read and write
4D10000
direct allocation
page execute and read and write
465F000
stack
page read and write
343F000
stack
page read and write
B74000
heap
page read and write
133C000
unkown
page execute and read and write
5230000
direct allocation
page execute and read and write
708E000
stack
page read and write
4711000
heap
page read and write
52A0000
direct allocation
page execute and read and write
3160000
direct allocation
page read and write
B74000
heap
page read and write
B74000
heap
page read and write
420E000
stack
page read and write
494F000
stack
page read and write
1484000
heap
page read and write
DD2000
unkown
page execute and write copy
F40000
direct allocation
page execute and read and write
4E71000
heap
page read and write
4CCF000
stack
page read and write
794000
heap
page read and write
C10000
direct allocation
page read and write
4B7F000
stack
page read and write
CE0000
heap
page read and write
3E0F000
stack
page read and write
4C0E000
stack
page read and write
C44000
heap
page read and write
484E000
stack
page read and write
794000
heap
page read and write
444F000
stack
page read and write
794000
heap
page read and write
1640000
heap
page read and write
794000
heap
page read and write
297B000
stack
page read and write
C44000
heap
page read and write
451E000
stack
page read and write
3ACE000
stack
page read and write
F51000
unkown
page execute and read and write
41FF000
stack
page read and write
54A0000
direct allocation
page execute and read and write
C44000
heap
page read and write
45C1000
heap
page read and write
10DA000
unkown
page write copy
7B6F000
stack
page read and write
4D20000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
3D4D000
stack
page read and write
FCB000
stack
page read and write
4E71000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
C10000
direct allocation
page read and write
C44000
heap
page read and write
152B000
unkown
page execute and read and write
4E71000
heap
page read and write
5480000
direct allocation
page execute and read and write
4ACE000
stack
page read and write
35BE000
stack
page read and write
870000
direct allocation
page read and write
1662000
heap
page read and write
3CCF000
stack
page read and write
B74000
heap
page read and write
3C9E000
stack
page read and write
4C01000
heap
page read and write
572000
unkown
page execute and read and write
794000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
340F000
stack
page read and write
5300000
direct allocation
page read and write
B10000
heap
page read and write
4B90000
direct allocation
page read and write
C10000
direct allocation
page read and write
8E8000
heap
page read and write
14C0000
heap
page read and write
3160000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
C44000
heap
page read and write
44F000
unkown
page execute and read and write
4711000
heap
page read and write
51D0000
direct allocation
page execute and read and write
1484000
heap
page read and write
4C20000
direct allocation
page execute and read and write
383E000
stack
page read and write
4E71000
heap
page read and write
DBB000
unkown
page execute and read and write
3BBF000
stack
page read and write
394E000
stack
page read and write
45C1000
heap
page read and write
D20000
direct allocation
page read and write
5580000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
3D0F000
stack
page read and write
4C9F000
stack
page read and write
46FF000
stack
page read and write
C10000
direct allocation
page read and write
30BE000
stack
page read and write
394F000
stack
page read and write
4E71000
heap
page read and write
51D0000
direct allocation
page execute and read and write
AFC000
stack
page read and write
C44000
heap
page read and write
45C1000
heap
page read and write
448F000
stack
page read and write
C44000
heap
page read and write
4D90000
direct allocation
page execute and read and write
D20000
direct allocation
page read and write
F20000
direct allocation
page read and write
4EE0000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
89E000
heap
page read and write
3160000
direct allocation
page read and write
1484000
heap
page read and write
C64000
heap
page read and write
4E71000
heap
page read and write
2E4E000
stack
page read and write
45C1000
heap
page read and write
4A40000
direct allocation
page read and write
397E000
stack
page read and write
75B0000
heap
page read and write
4BFF000
stack
page read and write
D7C000
unkown
page execute and read and write
B74000
heap
page read and write
4E71000
heap
page read and write
125F000
unkown
page execute and read and write
990000
unkown
page readonly
D3B000
heap
page read and write
DD1000
unkown
page execute and read and write
147E000
stack
page read and write
B74000
heap
page read and write
C9E000
stack
page read and write
1484000
heap
page read and write
1484000
heap
page read and write
71DE000
stack
page read and write
401F000
stack
page read and write
1484000
heap
page read and write
4BCF000
stack
page read and write
5400000
direct allocation
page execute and read and write
54E0000
direct allocation
page execute and read and write
3F4F000
stack
page read and write
51D0000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
2E3E000
stack
page read and write
4E71000
heap
page read and write
4C01000
heap
page read and write
54A0000
direct allocation
page execute and read and write
4E71000
heap
page read and write
140000
unkown
page read and write
5470000
direct allocation
page execute and read and write
344F000
stack
page read and write
4BCC000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4ABF000
stack
page read and write
137B000
unkown
page execute and read and write
307F000
stack
page read and write
D20000
direct allocation
page read and write
54F0000
direct allocation
page execute and read and write
5560000
direct allocation
page execute and read and write
344E000
stack
page read and write
36FE000
stack
page read and write
581000
unkown
page execute and read and write
410E000
stack
page read and write
3BCE000
stack
page read and write
78AE000
stack
page read and write
1484000
heap
page read and write
D20000
direct allocation
page read and write
794000
heap
page read and write
3160000
direct allocation
page read and write
4B9E000
stack
page read and write
1484000
heap
page read and write
2F7E000
stack
page read and write
4C01000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
4E70000
heap
page read and write
31DE000
stack
page read and write
5080000
direct allocation
page read and write
1484000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
30DF000
stack
page read and write
1484000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
C44000
heap
page read and write
42DE000
stack
page read and write
4E71000
heap
page read and write
1419000
heap
page read and write
572000
unkown
page execute and read and write
45C1000
heap
page read and write
41FF000
stack
page read and write
135B000
stack
page read and write
397E000
stack
page read and write
B74000
heap
page read and write
307F000
stack
page read and write
917000
heap
page read and write
4DE1000
heap
page read and write
D20000
direct allocation
page read and write
460E000
stack
page read and write
C44000
heap
page read and write
479F000
stack
page read and write
10DA000
unkown
page write copy
1675000
heap
page read and write
3E3F000
stack
page read and write
4E71000
heap
page read and write
2F7C000
stack
page read and write
31F0000
direct allocation
page read and write
4E0E000
stack
page read and write
D30000
heap
page read and write
2A3F000
stack
page read and write
C44000
heap
page read and write
4E71000
heap
page read and write
2E20000
direct allocation
page execute and read and write
C44000
heap
page read and write
5260000
direct allocation
page execute and read and write
1484000
heap
page read and write
5520000
direct allocation
page execute and read and write
4BB0000
direct allocation
page execute and read and write
870000
direct allocation
page read and write
794000
heap
page read and write
40BF000
stack
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
C44000
heap
page read and write
3F7F000
stack
page read and write
904000
heap
page read and write
3160000
direct allocation
page read and write
870000
direct allocation
page read and write
3160000
direct allocation
page read and write
1448000
heap
page read and write
53E4000
direct allocation
page read and write
4B60000
heap
page read and write
3170000
heap
page read and write
1484000
heap
page read and write
347E000
stack
page read and write
D20000
direct allocation
page read and write
5550000
direct allocation
page execute and read and write
4711000
heap
page read and write
31F0000
direct allocation
page read and write
2ACF000
stack
page read and write
2CBF000
stack
page read and write
5490000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
F30000
direct allocation
page execute and read and write
53B0000
direct allocation
page execute and read and write
71D000
unkown
page execute and write copy
3E4E000
stack
page read and write
13F7000
heap
page read and write
53F0000
direct allocation
page execute and read and write
5300000
direct allocation
page read and write
3C5F000
stack
page read and write
870000
direct allocation
page read and write
794000
heap
page read and write
991000
unkown
page execute and read and write
31CF000
stack
page read and write
870000
direct allocation
page read and write
1484000
heap
page read and write
429F000
stack
page read and write
D65000
heap
page read and write
40FE000
stack
page read and write
C96000
heap
page read and write
3160000
direct allocation
page read and write
33DE000
stack
page read and write
434F000
stack
page read and write
334E000
stack
page read and write
B1A000
unkown
page write copy
448E000
stack
page read and write
4E71000
heap
page read and write
1520000
heap
page read and write
1484000
heap
page read and write
347E000
stack
page read and write
497F000
stack
page read and write
45CE000
stack
page read and write
31F0000
direct allocation
page read and write
54C0000
direct allocation
page execute and read and write
4CE0000
direct allocation
page execute and read and write
794000
heap
page read and write
167F000
heap
page read and write
There are 989 hidden memdumps, click here to show them.