IOC Report
LisectAVT_2403002A_224.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_224.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_224.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_224.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://t.me/RiseProSUPPORTX
unknown
https://t.me/RiseProSUPPORTbYE
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
171000
unkown
page execute and read and write
malicious
A71000
unkown
page execute and read and write
malicious
48F0000
direct allocation
page read and write
malicious
4A30000
direct allocation
page read and write
malicious
A71000
unkown
page execute and read and write
malicious
221000
unkown
page execute and read and write
malicious
5330000
direct allocation
page read and write
malicious
221000
unkown
page execute and read and write
malicious
4960000
direct allocation
page read and write
malicious
5330000
direct allocation
page read and write
malicious
4AD0000
direct allocation
page execute and read and write
4B62000
direct allocation
page read and write
A71000
unkown
page execute and write copy
35EE000
stack
page read and write
CA4000
heap
page read and write
55A0000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
285F000
stack
page read and write
2F70000
direct allocation
page read and write
14D4000
heap
page read and write
382F000
stack
page read and write
573000
unkown
page execute and write copy
44AF000
stack
page read and write
5500000
direct allocation
page execute and read and write
4CE0000
direct allocation
page execute and read and write
1760000
heap
page read and write
B80000
direct allocation
page read and write
1554000
heap
page read and write
E72000
unkown
page execute and write copy
55E0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
5D5000
unkown
page execute and read and write
CFF000
stack
page read and write
5490000
heap
page read and write
2AC000
unkown
page execute and read and write
4A70000
direct allocation
page execute and read and write
D90000
heap
page read and write
43AE000
stack
page read and write
436F000
stack
page read and write
B0E000
stack
page read and write
2F80000
heap
page read and write
CA4000
heap
page read and write
7CB000
unkown
page execute and read and write
2F70000
direct allocation
page read and write
2B5F000
stack
page read and write
CA4000
heap
page read and write
BE0000
direct allocation
page read and write
396F000
stack
page read and write
BAC000
unkown
page execute and read and write
AFC000
stack
page read and write
622000
unkown
page execute and write copy
2940000
direct allocation
page read and write
35AF000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
4BC0000
direct allocation
page execute and read and write
2A5F000
stack
page read and write
48AE000
stack
page read and write
54C0000
direct allocation
page execute and read and write
11AD000
stack
page read and write
3200000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
1554000
heap
page read and write
54C0000
direct allocation
page execute and read and write
101B000
unkown
page execute and read and write
4B40000
direct allocation
page execute and read and write
5500000
direct allocation
page execute and read and write
429E000
stack
page read and write
E94000
heap
page read and write
54C0000
direct allocation
page execute and read and write
2C9F000
stack
page read and write
2DEF000
stack
page read and write
3200000
direct allocation
page read and write
54C0000
direct allocation
page execute and read and write
476E000
stack
page read and write
BF4000
heap
page read and write
1554000
heap
page read and write
E5C000
unkown
page execute and read and write
DA0000
direct allocation
page read and write
1554000
heap
page read and write
3FAE000
stack
page read and write
31DE000
stack
page read and write
382F000
stack
page read and write
BA3000
unkown
page execute and read and write
2CAF000
stack
page read and write
BA8000
unkown
page read and write
CE9000
heap
page read and write
4B50000
direct allocation
page execute and read and write
210000
heap
page read and write
4AEF000
stack
page read and write
3D6E000
stack
page read and write
4EB1000
heap
page read and write
4471000
heap
page read and write
2F6E000
stack
page read and write
BF0000
heap
page read and write
CA4000
heap
page read and write
54C0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
3FEE000
stack
page read and write
1424000
heap
page read and write
3200000
direct allocation
page read and write
3A5F000
stack
page read and write
4471000
heap
page read and write
3CEE000
stack
page read and write
CA4000
heap
page read and write
45A1000
heap
page read and write
35EE000
stack
page read and write
31EC000
stack
page read and write
148A000
heap
page read and write
3220000
heap
page read and write
1424000
heap
page read and write
BF4000
heap
page read and write
3E2F000
stack
page read and write
4EB1000
heap
page read and write
44E1000
heap
page read and write
39DE000
stack
page read and write
54E0000
direct allocation
page execute and read and write
4F2000
unkown
page execute and read and write
34AE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
CA4000
heap
page read and write
BA8000
unkown
page write copy
5D5000
unkown
page execute and read and write
54C0000
direct allocation
page execute and read and write
5540000
direct allocation
page execute and read and write
4A30000
direct allocation
page read and write
2940000
direct allocation
page read and write
4DAE000
stack
page read and write
BF4000
heap
page read and write
4B80000
direct allocation
page execute and read and write
358000
unkown
page read and write
49E0000
trusted library allocation
page read and write
1424000
heap
page read and write
CA4000
heap
page read and write
395E000
stack
page read and write
2A8000
unkown
page read and write
422F000
stack
page read and write
5330000
direct allocation
page read and write
BA8000
unkown
page read and write
4B20000
direct allocation
page execute and read and write
BF4000
heap
page read and write
4B30000
direct allocation
page execute and read and write
4A70000
direct allocation
page execute and read and write
BA4000
heap
page read and write
B80000
direct allocation
page read and write
422F000
stack
page read and write
101B000
unkown
page execute and read and write
4EB1000
heap
page read and write
358000
unkown
page write copy
E63000
unkown
page execute and read and write
37DF000
stack
page read and write
54B0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
2A3000
unkown
page execute and read and write
55A0000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
4EEE000
stack
page read and write
4D6F000
stack
page read and write
BE0000
direct allocation
page read and write
4EB0000
heap
page read and write
3AAF000
stack
page read and write
396F000
stack
page read and write
412E000
stack
page read and write
3F5F000
stack
page read and write
3E6F000
stack
page read and write
CA4000
heap
page read and write
4A90000
direct allocation
page execute and read and write
462E000
stack
page read and write
171000
unkown
page execute and write copy
3200000
direct allocation
page read and write
44E1000
heap
page read and write
3AEE000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
D42000
unkown
page execute and read and write
4EB1000
heap
page read and write
3C1E000
stack
page read and write
422E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
A70000
unkown
page read and write
55B0000
direct allocation
page execute and read and write
3E1E000
stack
page read and write
4A70000
direct allocation
page execute and read and write
14D4000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
4D6F000
stack
page read and write
221000
unkown
page execute and write copy
1420000
heap
page read and write
7CB000
unkown
page execute and read and write
1554000
heap
page read and write
396E000
stack
page read and write
2F2F000
stack
page read and write
322B000
stack
page read and write
BA4000
heap
page read and write
BA0000
heap
page read and write
2940000
direct allocation
page read and write
B00000
heap
page read and write
2FA7000
heap
page read and write
2940000
direct allocation
page read and write
3BEF000
stack
page read and write
7AC000
stack
page read and write
4EB1000
heap
page read and write
BA3000
unkown
page execute and read and write
4BD0000
direct allocation
page execute and read and write
5590000
direct allocation
page execute and read and write
37EF000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
BF4000
heap
page read and write
2F70000
direct allocation
page read and write
E0E000
stack
page read and write
1554000
heap
page read and write
385F000
stack
page read and write
E25000
unkown
page execute and read and write
4C00000
direct allocation
page execute and read and write
54F0000
direct allocation
page execute and read and write
44E0000
heap
page read and write
3B1E000
stack
page read and write
54B0000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
342F000
stack
page read and write
A70000
unkown
page readonly
E25000
unkown
page execute and read and write
439F000
stack
page read and write
CB0000
heap
page read and write
1554000
heap
page read and write
532D000
stack
page read and write
2D5E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
60C000
unkown
page execute and read and write
4471000
heap
page read and write
55C0000
direct allocation
page execute and read and write
CA0000
heap
page read and write
27D0000
direct allocation
page read and write
386E000
stack
page read and write
353000
unkown
page execute and read and write
4471000
heap
page read and write
332F000
stack
page read and write
2F9F000
stack
page read and write
BE0000
direct allocation
page read and write
B10000
heap
page read and write
40DE000
stack
page read and write
BA4000
heap
page read and write
44E1000
heap
page read and write
372E000
stack
page read and write
55B0000
direct allocation
page execute and read and write
1424000
heap
page read and write
31EF000
stack
page read and write
B80000
direct allocation
page read and write
572000
unkown
page execute and write copy
346E000
stack
page read and write
3200000
direct allocation
page read and write
4EB1000
heap
page read and write
39AE000
stack
page read and write
1554000
heap
page read and write
BF4000
heap
page read and write
1554000
heap
page read and write
1424000
heap
page read and write
1554000
heap
page read and write
40AF000
stack
page read and write
339E000
stack
page read and write
381E000
stack
page read and write
4A70000
direct allocation
page execute and read and write
4AB0000
direct allocation
page execute and read and write
44E1000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
336E000
stack
page read and write
E4B000
stack
page read and write
1410000
heap
page read and write
BA4000
heap
page read and write
2940000
direct allocation
page read and write
27D0000
direct allocation
page read and write
4C60000
direct allocation
page execute and read and write
5462000
direct allocation
page read and write
4AD0000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
BA4000
heap
page read and write
44AF000
stack
page read and write
3CDF000
stack
page read and write
BF4000
heap
page read and write
A70000
unkown
page read and write
44E1000
heap
page read and write
3D5F000
stack
page read and write
1554000
heap
page read and write
CA4000
heap
page read and write
431F000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
3BDD000
stack
page read and write
5490000
direct allocation
page execute and read and write
4A9F000
stack
page read and write
CF1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
292E000
stack
page read and write
168D000
heap
page read and write
CA4000
heap
page read and write
5330000
direct allocation
page read and write
3C5E000
stack
page read and write
BA4000
heap
page read and write
35AE000
stack
page read and write
1424000
heap
page read and write
5520000
direct allocation
page execute and read and write
5580000
direct allocation
page execute and read and write
2A8000
unkown
page write copy
4A70000
direct allocation
page execute and read and write
30EE000
stack
page read and write
BA4000
heap
page read and write
1554000
heap
page read and write
2940000
direct allocation
page read and write
BE0000
direct allocation
page read and write
CA4000
heap
page read and write
4C70000
direct allocation
page execute and read and write
5570000
direct allocation
page execute and read and write
4CF2000
heap
page read and write
CA4000
heap
page read and write
BE0000
direct allocation
page read and write
11AD000
stack
page read and write
BE0000
direct allocation
page read and write
BA4000
heap
page read and write
532D000
stack
page read and write
3E5E000
stack
page read and write
358000
unkown
page read and write
4CC0000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
4B2E000
stack
page read and write
E50000
heap
page read and write
27E0000
heap
page read and write
1424000
heap
page read and write
30DF000
stack
page read and write
2F70000
direct allocation
page read and write
2E2E000
stack
page read and write
54C0000
direct allocation
page execute and read and write
32EF000
stack
page read and write
1424000
heap
page read and write
A20000
heap
page read and write
54F0000
direct allocation
page execute and read and write
2F70000
direct allocation
page read and write
4AA0000
direct allocation
page execute and read and write
332F000
stack
page read and write
409F000
stack
page read and write
353000
unkown
page execute and read and write
E72000
unkown
page execute and write copy
DCE000
heap
page read and write
4EB1000
heap
page read and write
2E5F000
stack
page read and write
CA4000
heap
page read and write
2940000
direct allocation
page read and write
E5A000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
BE0000
direct allocation
page read and write
2950000
heap
page read and write
332E000
stack
page read and write
220000
unkown
page read and write
DAF000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
3C2E000
stack
page read and write
35DF000
stack
page read and write
2D1F000
stack
page read and write
BA4000
heap
page read and write
4A70000
direct allocation
page execute and read and write
BF4000
heap
page read and write
4A40000
direct allocation
page execute and read and write
DA0000
direct allocation
page read and write
7F0000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
34AE000
stack
page read and write
2A9F000
stack
page read and write
2F70000
direct allocation
page read and write
4CB0000
direct allocation
page execute and read and write
44EE000
stack
page read and write
CA4000
heap
page read and write
492B000
stack
page read and write
391F000
stack
page read and write
27CC000
stack
page read and write
359E000
stack
page read and write
486F000
stack
page read and write
2940000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
BA4000
heap
page read and write
309E000
stack
page read and write
D3E000
stack
page read and write
4F2000
unkown
page execute and read and write
278F000
stack
page read and write
31F0000
heap
page read and write
4EB1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
4EB1000
heap
page read and write
BF4000
heap
page read and write
5510000
direct allocation
page execute and read and write
EA7000
heap
page read and write
623000
unkown
page execute and write copy
1424000
heap
page read and write
49EE000
stack
page read and write
1554000
heap
page read and write
BA4000
heap
page read and write
2B9E000
stack
page read and write
166A000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
4A70000
direct allocation
page execute and read and write
1480000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
4A2F000
stack
page read and write
268E000
stack
page read and write
537C000
stack
page read and write
1550000
heap
page read and write
372E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
49AF000
stack
page read and write
BA4000
heap
page read and write
425F000
stack
page read and write
486F000
stack
page read and write
5590000
direct allocation
page execute and read and write
2A6E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
4EB0000
heap
page read and write
2930000
heap
page read and write
3200000
direct allocation
page read and write
E72000
unkown
page execute and read and write
EA7000
heap
page read and write
BF0000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4A30000
direct allocation
page read and write
346F000
stack
page read and write
3D9E000
stack
page read and write
CA4000
heap
page read and write
45A1000
heap
page read and write
10C000
stack
page read and write
B80000
direct allocation
page read and write
CA4000
heap
page read and write
36DE000
stack
page read and write
CA4000
heap
page read and write
BF4000
heap
page read and write
27D0000
direct allocation
page read and write
499C000
stack
page read and write
E72000
unkown
page execute and read and write
3EAE000
stack
page read and write
44E1000
heap
page read and write
426E000
stack
page read and write
1424000
heap
page read and write
CA4000
heap
page read and write
32DF000
stack
page read and write
3200000
direct allocation
page read and write
356F000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
4470000
heap
page read and write
3E6F000
stack
page read and write
1424000
heap
page read and write
E73000
unkown
page execute and write copy
2BDF000
stack
page read and write
CA4000
heap
page read and write
BF4000
heap
page read and write
1424000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
2CDE000
stack
page read and write
2F70000
direct allocation
page read and write
BE0000
direct allocation
page read and write
3D2E000
stack
page read and write
D7C000
stack
page read and write
220000
unkown
page readonly
4CD0000
direct allocation
page execute and read and write
5330000
direct allocation
page read and write
5490000
heap
page read and write
5570000
direct allocation
page execute and read and write
2940000
direct allocation
page read and write
BE0000
direct allocation
page read and write
5330000
direct allocation
page read and write
CA4000
heap
page read and write
35C000
unkown
page execute and read and write
40EF000
stack
page read and write
3200000
direct allocation
page read and write
2F70000
direct allocation
page read and write
3AAF000
stack
page read and write
E14000
heap
page read and write
2F70000
direct allocation
page read and write
B70000
heap
page read and write
41EF000
stack
page read and write
5520000
direct allocation
page execute and read and write
E63000
unkown
page execute and read and write
54D0000
direct allocation
page execute and read and write
436E000
stack
page read and write
1554000
heap
page read and write
389E000
stack
page read and write
4C2F000
stack
page read and write
52F0000
trusted library allocation
page read and write
31EE000
stack
page read and write
4FDE000
stack
page read and write
382E000
stack
page read and write
58CE000
stack
page read and write
5330000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
54D0000
direct allocation
page execute and read and write
DA0000
direct allocation
page read and write
1554000
heap
page read and write
BA4000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
392F000
stack
page read and write
4A7B000
stack
page read and write
4A70000
direct allocation
page execute and read and write
623000
unkown
page execute and write copy
4AF0000
direct allocation
page execute and read and write
4BB0000
direct allocation
page execute and read and write
613000
unkown
page execute and read and write
371F000
stack
page read and write
BF4000
heap
page read and write
3EDE000
stack
page read and write
1554000
heap
page read and write
54C0000
direct allocation
page execute and read and write
1424000
heap
page read and write
3AAE000
stack
page read and write
CAF000
stack
page read and write
375E000
stack
page read and write
BA4000
heap
page read and write
1424000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
3D1E000
stack
page read and write
B80000
direct allocation
page read and write
5462000
direct allocation
page read and write
1660000
heap
page read and write
36EE000
stack
page read and write
55E0000
heap
page read and write
54C0000
direct allocation
page execute and read and write
28EF000
stack
page read and write
BE0000
direct allocation
page read and write
3BAF000
stack
page read and write
4A30000
direct allocation
page read and write
CA4000
heap
page read and write
2CEE000
stack
page read and write
CA4000
heap
page read and write
1554000
heap
page read and write
BA4000
heap
page read and write
5560000
direct allocation
page execute and read and write
5550000
direct allocation
page execute and read and write
358000
unkown
page write copy
BA4000
heap
page read and write
BA4000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
1430000
heap
page read and write
335F000
stack
page read and write
220000
unkown
page read and write
55F4000
heap
page read and write
170000
unkown
page read and write
54C0000
direct allocation
page execute and read and write
3B9F000
stack
page read and write
3200000
direct allocation
page read and write
3A9E000
stack
page read and write
BE0000
direct allocation
page read and write
4B2E000
stack
page read and write
E73000
unkown
page execute and write copy
4C6E000
stack
page read and write
4AA0000
heap
page read and write
54C0000
direct allocation
page execute and read and write
43AE000
stack
page read and write
4B93000
heap
page read and write
BA4000
heap
page read and write
3D2F000
stack
page read and write
BA4000
heap
page read and write
BF4000
heap
page read and write
39AE000
stack
page read and write
44E1000
heap
page read and write
4A60000
direct allocation
page execute and read and write
3200000
direct allocation
page read and write
3E6E000
stack
page read and write
28EF000
stack
page read and write
55C000
unkown
page execute and read and write
31AF000
stack
page read and write
54C0000
direct allocation
page execute and read and write
EA9000
heap
page read and write
446F000
stack
page read and write
3D6E000
stack
page read and write
4471000
heap
page read and write
BF4000
heap
page read and write
4C20000
direct allocation
page execute and read and write
4B40000
direct allocation
page execute and read and write
B80000
direct allocation
page read and write
CF1000
heap
page read and write
B80000
direct allocation
page read and write
2F1F000
stack
page read and write
336E000
stack
page read and write
4B60000
direct allocation
page execute and read and write
4EAF000
stack
page read and write
48B0000
trusted library allocation
page read and write
622000
unkown
page execute and write copy
472F000
stack
page read and write
547F000
stack
page read and write
10AC000
stack
page read and write
525000
unkown
page execute and read and write
B80000
direct allocation
page read and write
CA4000
heap
page read and write
361E000
stack
page read and write
BF4000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4AB0000
direct allocation
page execute and read and write
54A0000
direct allocation
page execute and read and write
2940000
direct allocation
page read and write
BF4000
heap
page read and write
54C0000
direct allocation
page execute and read and write
30AE000
stack
page read and write
BAC000
unkown
page execute and read and write
4B60000
direct allocation
page execute and read and write
BA8000
unkown
page write copy
5490000
direct allocation
page execute and read and write
331E000
stack
page read and write
1554000
heap
page read and write
4EB1000
heap
page read and write
3EAE000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
E5E000
heap
page read and write
27E7000
heap
page read and write
BF4000
heap
page read and write
4A1D000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
399F000
stack
page read and write
321F000
stack
page read and write
4A70000
direct allocation
page execute and read and write
299E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
622000
unkown
page execute and read and write
4EEB000
heap
page read and write
BA4000
heap
page read and write
2C1E000
stack
page read and write
1554000
heap
page read and write
1554000
heap
page read and write
2A2F000
stack
page read and write
54E0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
B80000
direct allocation
page read and write
4BC0000
direct allocation
page execute and read and write
C5E000
stack
page read and write
4A22000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
4C10000
direct allocation
page execute and read and write
B80000
direct allocation
page read and write
CA4000
heap
page read and write
54C0000
direct allocation
page execute and read and write
432F000
stack
page read and write
45A1000
heap
page read and write
4920000
trusted library allocation
page read and write
E0C000
heap
page read and write
1424000
heap
page read and write
386E000
stack
page read and write
54C0000
direct allocation
page execute and read and write
1424000
heap
page read and write
BA4000
heap
page read and write
1410000
heap
page read and write
220000
unkown
page readonly
346F000
stack
page read and write
45A0000
heap
page read and write
B80000
direct allocation
page read and write
BA4000
heap
page read and write
4B70000
direct allocation
page execute and read and write
43DE000
stack
page read and write
4B80000
direct allocation
page execute and read and write
44E1000
heap
page read and write
5580000
direct allocation
page execute and read and write
3FDF000
stack
page read and write
1424000
heap
page read and write
36AF000
stack
page read and write
BF4000
heap
page read and write
4B00000
direct allocation
page execute and read and write
E5C000
unkown
page execute and read and write
3AEE000
stack
page read and write
2F70000
direct allocation
page read and write
4EB1000
heap
page read and write
5550000
direct allocation
page execute and read and write
3F6F000
stack
page read and write
52F0000
trusted library allocation
page read and write
4EB1000
heap
page read and write
BF4000
heap
page read and write
1554000
heap
page read and write
2957000
heap
page read and write
5540000
direct allocation
page execute and read and write
1424000
heap
page read and write
CA4000
heap
page read and write
341F000
stack
page read and write
4EB1000
heap
page read and write
3200000
direct allocation
page read and write
4471000
heap
page read and write
3227000
heap
page read and write
BF4000
heap
page read and write
2940000
direct allocation
page read and write
1424000
heap
page read and write
5530000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
476E000
stack
page read and write
14CC000
heap
page read and write
306F000
stack
page read and write
4A70000
direct allocation
page execute and read and write
3FAF000
stack
page read and write
537B000
stack
page read and write
3FAF000
stack
page read and write
BE0000
direct allocation
page read and write
CA4000
heap
page read and write
415E000
stack
page read and write
E14000
heap
page read and write
3200000
direct allocation
page read and write
1424000
heap
page read and write
CBB000
heap
page read and write
421E000
stack
page read and write
148D000
heap
page read and write
44ED000
stack
page read and write
4A50000
direct allocation
page execute and read and write
45EF000
stack
page read and write
B80000
direct allocation
page read and write
BA4000
heap
page read and write
5330000
direct allocation
page read and write
3F9E000
stack
page read and write
435E000
stack
page read and write
3FEE000
stack
page read and write
16A1000
heap
page read and write
4C2F000
stack
page read and write
292E000
stack
page read and write
71B000
unkown
page execute and read and write
31AF000
stack
page read and write
CA4000
heap
page read and write
449E000
stack
page read and write
1424000
heap
page read and write
BF4000
heap
page read and write
426E000
stack
page read and write
3200000
direct allocation
page read and write
44E1000
heap
page read and write
2B6F000
stack
page read and write
1AD000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
36EF000
stack
page read and write
622000
unkown
page execute and read and write
325E000
stack
page read and write
55D0000
direct allocation
page execute and read and write
401E000
stack
page read and write
B80000
direct allocation
page read and write
A71000
unkown
page execute and write copy
5560000
direct allocation
page execute and read and write
B80000
direct allocation
page read and write
20D000
stack
page read and write
CA4000
heap
page read and write
4EE2000
heap
page read and write
2940000
direct allocation
page read and write
58DE000
stack
page read and write
311E000
stack
page read and write
14C2000
heap
page read and write
A70000
unkown
page readonly
BF4000
heap
page read and write
55C0000
direct allocation
page execute and read and write
495D000
stack
page read and write
EA9000
heap
page read and write
4B10000
direct allocation
page execute and read and write
30AE000
stack
page read and write
BF4000
heap
page read and write
3BEF000
stack
page read and write
BE0000
direct allocation
page read and write
CA4000
heap
page read and write
B6E000
stack
page read and write
319F000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
2DDF000
stack
page read and write
1424000
heap
page read and write
4B50000
direct allocation
page execute and read and write
2BAE000
stack
page read and write
10AC000
stack
page read and write
4EB1000
heap
page read and write
3E9F000
stack
page read and write
3C2E000
stack
page read and write
462E000
stack
page read and write
3ADF000
stack
page read and write
4471000
heap
page read and write
1554000
heap
page read and write
355F000
stack
page read and write
4EAF000
stack
page read and write
4BFA000
heap
page read and write
412E000
stack
page read and write
54C0000
direct allocation
page execute and read and write
305F000
stack
page read and write
BF4000
heap
page read and write
BE0000
direct allocation
page read and write
459F000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
436F000
stack
page read and write
60C000
unkown
page execute and read and write
1424000
heap
page read and write
4DAE000
stack
page read and write
54C0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
4EB1000
heap
page read and write
DCA000
heap
page read and write
295F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
5530000
direct allocation
page execute and read and write
472F000
stack
page read and write
411F000
stack
page read and write
CA4000
heap
page read and write
44DF000
stack
page read and write
4B30000
direct allocation
page execute and read and write
BF4000
heap
page read and write
D97000
heap
page read and write
3A6F000
stack
page read and write
4B7F000
stack
page read and write
1554000
heap
page read and write
369F000
stack
page read and write
2ADE000
stack
page read and write
48EE000
stack
page read and write
35AF000
stack
page read and write
BA4000
heap
page read and write
1424000
heap
page read and write
2FDE000
stack
page read and write
345E000
stack
page read and write
2FA0000
heap
page read and write
55D0000
direct allocation
page execute and read and write
3BEE000
stack
page read and write
2F70000
direct allocation
page read and write
547F000
stack
page read and write
4471000
heap
page read and write
4C80000
direct allocation
page execute and read and write
2F70000
direct allocation
page read and write
BD0000
heap
page read and write
4A92000
direct allocation
page read and write
4A40000
heap
page read and write
572000
unkown
page execute and read and write
4AEF000
stack
page read and write
CA4000
heap
page read and write
2F70000
direct allocation
page read and write
1554000
heap
page read and write
221000
unkown
page execute and write copy
4B00000
direct allocation
page execute and read and write
1554000
heap
page read and write
3D2F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
4C6E000
stack
page read and write
4A80000
direct allocation
page execute and read and write
4B70000
direct allocation
page execute and read and write
40EF000
stack
page read and write
1697000
heap
page read and write
1424000
heap
page read and write
2940000
direct allocation
page read and write
48AE000
stack
page read and write
170000
unkown
page readonly
4B20000
direct allocation
page execute and read and write
613000
unkown
page execute and read and write
2E9E000
stack
page read and write
41DF000
stack
page read and write
35C000
unkown
page execute and read and write
4AD0000
direct allocation
page execute and read and write
D42000
unkown
page execute and read and write
445F000
stack
page read and write
442000
unkown
page execute and read and write
2940000
direct allocation
page read and write
2F70000
direct allocation
page read and write
DC0000
heap
page read and write
49AF000
stack
page read and write
4471000
heap
page read and write
2F5E000
stack
page read and write
CA4000
heap
page read and write
54C0000
direct allocation
page execute and read and write
AC000
stack
page read and write
349F000
stack
page read and write
45EF000
stack
page read and write
16A1000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
E02000
heap
page read and write
563000
unkown
page execute and read and write
BF4000
heap
page read and write
34DE000
stack
page read and write
3200000
direct allocation
page read and write
CA4000
heap
page read and write
4C30000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
40EE000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4BC0000
direct allocation
page execute and read and write
49EE000
stack
page read and write
5510000
direct allocation
page execute and read and write
4E7E000
stack
page read and write
2E1E000
stack
page read and write
36EF000
stack
page read and write
There are 875 hidden memdumps, click here to show them.