IOC Report
Lisect_AVT_24003_G1A_37.exe

loading gif

Files

File Path
Type
Category
Malicious
Lisect_AVT_24003_G1A_37.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\7-Zip\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\MlpxPf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MlpxPf.exe_44251beb80dd5e7d95c3aacd014eb4bd9dd3755_509ea325_9e635127-f99b-40a5-a75b-dba6d17ffe59\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER432A.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jul 25 02:53:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4493.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44C3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\k1[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\k1[2].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\k2[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\k2[2].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\k3[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\k4[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\k5[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\229772F3.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\43f50b5b.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\5A42065E.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\61C82BFB.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\63655949.exe
ASCII text
modified
C:\Users\user\AppData\Local\Temp\63730BF4.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\6DD449CA.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\70E05704.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe
"C:\Users\user\Desktop\Lisect_AVT_24003_G1A_37.exe"
malicious
C:\Users\user\AppData\Local\Temp\MlpxPf.exe
C:\Users\user\AppData\Local\Temp\MlpxPf.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\MlpxPf.exe
C:\Users\user\AppData\Local\Temp\MlpxPf.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1572
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\43f50b5b.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://ddos.dnsnb8.net:799/cj//k2.rar=6
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k3.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k2.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarH
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarp
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rar#7
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rar.7
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rar66
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarS6
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k3.rart
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k5.rarY
unknown
https://t.me/RiseProSUPPORTu
unknown
http://www.scintilla.org/scite.rng
unknown
http://www.rftp.comJosiah
unknown
https://t.me/RiseProSUPPORTuH
unknown
http://www.activestate.com
unknown
http://www.activestate.comHolger
unknown
http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://upx.sf.net
unknown
http://www.rftp.com
unknown
https://t.me/RiseProSUPPORT
unknown
http://ddos.dnsnb8.net:799/cj//k5.rarq
unknown
http://www.baanboard.comBrendon
unknown
https://www.smartsharesystems.com/
unknown
http://ddos.dnsnb8.net:799/cj//k4.rarC:
unknown
http://www.scintilla.org
unknown
http://www.spaceblue.comMathias
unknown
https://www.smartsharesystems.com/Morten
unknown
http://ddos.dnsnb8.net:799/cj//k5.rar
44.221.84.105
http://www.develop.com
unknown
http://www.lua.org
unknown
http://www.spaceblue.com
unknown
http://ddos.dnsnb8.net:799/cj//k4.rar
44.221.84.105
http://www.winimage.com/zLibDll
unknown
http://ddos.dnsnb8.net:799/cj//k5.rarcC:
unknown
http://www.baanboard.com
unknown
http://www.develop.comDeepak
unknown
http://ddos.dnsnb8.net:799/cj//k4.rark
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ddos.dnsnb8.net
44.221.84.105

IPs

IP
Domain
Country
Malicious
44.221.84.105
ddos.dnsnb8.net
United States
193.233.132.62
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
ProgramId
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
FileId
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
LowerCaseLongPath
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
LongPathHash
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
Name
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
OriginalFileName
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
Publisher
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
Version
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
BinFileVersion
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
BinaryType
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
ProductName
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
ProductVersion
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
LinkDate
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
BinProductVersion
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
AppxPackageFullName
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
AppxPackageRelativeId
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
Size
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
Language
\REGISTRY\A\{31a7705e-e0b3-12c7-9685-3e7e68f1ea31}\Root\InventoryApplicationFile\mlpxpf.exe|ff14c25704fb48aa
Usn
HKEY_CURRENT_USER_Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\GTplus
Time
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
931000
unkown
page execute and read and write
malicious
5240000
direct allocation
page read and write
malicious
271000
unkown
page execute and read and write
malicious
831000
unkown
page execute and read and write
malicious
5240000
direct allocation
page read and write
malicious
4BE0000
direct allocation
page read and write
malicious
4B30000
direct allocation
page read and write
malicious
831000
unkown
page execute and read and write
malicious
300E000
stack
page read and write
12B0000
heap
page read and write
15CD000
stack
page read and write
4DA1000
heap
page read and write
3C0F000
stack
page read and write
450E000
stack
page read and write
1315000
heap
page read and write
41EE000
stack
page read and write
4D80000
direct allocation
page execute and read and write
14C4000
heap
page read and write
44CF000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
7E0000
heap
page read and write
5470000
direct allocation
page execute and read and write
44FF000
stack
page read and write
10B0000
heap
page read and write
36AE000
stack
page read and write
4D10000
direct allocation
page execute and read and write
132A000
heap
page read and write
5420000
direct allocation
page execute and read and write
158E000
stack
page read and write
16E4000
heap
page read and write
132A000
heap
page read and write
4DA1000
heap
page read and write
3030000
heap
page read and write
3B1B000
stack
page read and write
D7E000
heap
page read and write
590000
unkown
page readonly
46B1000
heap
page read and write
32D0000
heap
page read and write
4B8C000
stack
page read and write
30FB000
stack
page read and write
4D90000
direct allocation
page execute and read and write
3020000
direct allocation
page read and write
350000
unkown
page readonly
830000
unkown
page read and write
E70000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
13C6000
heap
page read and write
386F000
stack
page read and write
3C1E000
stack
page read and write
137E000
stack
page read and write
E84000
heap
page read and write
125D000
heap
page read and write
1660000
direct allocation
page read and write
327E000
stack
page read and write
4E00000
direct allocation
page execute and read and write
34FE000
stack
page read and write
E84000
heap
page read and write
591000
unkown
page execute read
1380000
direct allocation
page read and write
DB1000
heap
page read and write
1660000
direct allocation
page read and write
D47000
unkown
page execute and write copy
F9C000
stack
page read and write
50EE000
stack
page read and write
2DEE000
stack
page read and write
5240000
direct allocation
page read and write
4CD0000
direct allocation
page execute and read and write
5200000
trusted library allocation
page read and write
168E000
stack
page read and write
13B0000
heap
page read and write
16E2000
heap
page read and write
4DA1000
heap
page read and write
51F0000
trusted library allocation
page read and write
3A7000
unkown
page write copy
810000
direct allocation
page read and write
D70000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
424F000
stack
page read and write
2B2F000
stack
page read and write
4D80000
direct allocation
page execute and read and write
155E000
stack
page read and write
129A000
heap
page read and write
F5B000
heap
page read and write
B07000
unkown
page execute and read and write
FA9000
stack
page read and write
4E20000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
4DC0000
direct allocation
page execute and read and write
1210000
heap
page read and write
46AF000
stack
page read and write
356000
unkown
page execute and write copy
4D80000
direct allocation
page execute and read and write
384F000
stack
page read and write
D46000
unkown
page execute and write copy
12DE000
heap
page read and write
4E70000
direct allocation
page execute and read and write
46B1000
heap
page read and write
2640000
heap
page read and write
5250000
direct allocation
page read and write
14C4000
heap
page read and write
14C4000
heap
page read and write
54D0000
direct allocation
page execute and read and write
46B1000
heap
page read and write
334F000
stack
page read and write
3F6E000
stack
page read and write
F1D000
heap
page read and write
38AF000
stack
page read and write
4D80000
direct allocation
page execute and read and write
14C4000
heap
page read and write
2BCF000
stack
page read and write
E84000
heap
page read and write
323F000
stack
page read and write
46B1000
heap
page read and write
12B0000
heap
page read and write
4DA1000
heap
page read and write
1392000
heap
page read and write
E84000
heap
page read and write
4BF0000
direct allocation
page read and write
F63000
heap
page read and write
831000
unkown
page execute and write copy
3FAF000
stack
page read and write
15DA000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
16E2000
heap
page read and write
129A000
heap
page read and write
1120000
direct allocation
page read and write
FAC000
stack
page read and write
529B000
stack
page read and write
169A000
heap
page read and write
E84000
heap
page read and write
12C7000
heap
page read and write
48BF000
stack
page read and write
2D4E000
stack
page read and write
E08000
unkown
page execute and write copy
830000
unkown
page read and write
53C0000
direct allocation
page execute and read and write
320F000
stack
page read and write
844000
unkown
page execute and write copy
169E000
heap
page read and write
4DA1000
heap
page read and write
810000
direct allocation
page read and write
4DC1000
heap
page read and write
126E000
heap
page read and write
5490000
direct allocation
page execute and read and write
4D90000
direct allocation
page execute and read and write
3560000
heap
page read and write
160E000
stack
page read and write
14C4000
heap
page read and write
376F000
stack
page read and write
35AF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
E84000
heap
page read and write
4D90000
direct allocation
page read and write
4B2E000
stack
page read and write
F10000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
306E000
stack
page read and write
14C4000
heap
page read and write
46B1000
heap
page read and write
352E000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
1286000
heap
page read and write
346F000
stack
page read and write
4D70000
direct allocation
page execute and read and write
967000
unkown
page write copy
4D80000
direct allocation
page execute and read and write
2D0F000
stack
page read and write
54C0000
direct allocation
page execute and read and write
48AE000
stack
page read and write
687000
unkown
page execute and write copy
14C4000
heap
page read and write
1248000
heap
page read and write
810000
direct allocation
page read and write
30CF000
stack
page read and write
271000
unkown
page execute and write copy
4D80000
direct allocation
page execute and read and write
1349000
heap
page read and write
4D90000
direct allocation
page read and write
15D0000
heap
page read and write
363E000
stack
page read and write
1310000
heap
page read and write
42EF000
stack
page read and write
1240000
heap
page read and write
32AF000
stack
page read and write
E04000
unkown
page execute and write copy
4CD0000
direct allocation
page execute and read and write
27A0000
heap
page read and write
3CEE000
stack
page read and write
E84000
heap
page read and write
633000
unkown
page execute and read and write
1660000
direct allocation
page read and write
F08000
unkown
page execute and write copy
C46000
unkown
page execute and write copy
47BE000
stack
page read and write
377E000
stack
page read and write
3B3E000
stack
page read and write
2E4F000
stack
page read and write
14C0000
heap
page read and write
53D0000
direct allocation
page execute and read and write
E03000
unkown
page execute and read and write
313F000
stack
page read and write
D60000
heap
page read and write
13CC000
heap
page read and write
53E0000
direct allocation
page execute and read and write
2A8F000
stack
page read and write
519E000
stack
page read and write
37AE000
stack
page read and write
4AF0000
trusted library allocation
page read and write
E84000
heap
page read and write
1660000
direct allocation
page read and write
E03000
unkown
page execute and read and write
486F000
stack
page read and write
847000
unkown
page execute and write copy
3368000
stack
page read and write
610000
heap
page read and write
12F4000
heap
page read and write
5372000
direct allocation
page read and write
1670000
heap
page read and write
4D70000
direct allocation
page execute and read and write
388E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
593000
unkown
page write copy
1380000
direct allocation
page read and write
810000
direct allocation
page read and write
5410000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
40AE000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
37EE000
stack
page read and write
4DC1000
heap
page read and write
12B0000
heap
page read and write
1200000
heap
page read and write
5372000
direct allocation
page read and write
E70000
direct allocation
page read and write
312F000
stack
page read and write
39DB000
stack
page read and write
16D0000
heap
page read and write
54B0000
direct allocation
page execute and read and write
12C2000
heap
page read and write
138A000
heap
page read and write
406F000
stack
page read and write
3AEE000
stack
page read and write
12F4000
heap
page read and write
E84000
heap
page read and write
310F000
unkown
page read and write
297E000
stack
page read and write
807000
heap
page read and write
12CD000
heap
page read and write
472F000
stack
page read and write
4A3E000
stack
page read and write
4C3B000
stack
page read and write
403E000
stack
page read and write
387F000
stack
page read and write
53F0000
direct allocation
page execute and read and write
12EA000
heap
page read and write
4D12000
direct allocation
page read and write
138A000
heap
page read and write
15B0000
heap
page read and write
43AE000
stack
page read and write
31AE000
stack
page read and write
44EE000
stack
page read and write
3E8E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
356000
unkown
page execute and read and write
3DBE000
stack
page read and write
34E4000
heap
page read and write
46B0000
heap
page read and write
132A000
heap
page read and write
16AF000
heap
page read and write
39AE000
stack
page read and write
398F000
stack
page read and write
843000
unkown
page execute and read and write
9D0000
heap
page read and write
2620000
heap
page read and write
370F000
stack
page read and write
E84000
heap
page read and write
5480000
direct allocation
page execute and read and write
3DEF000
stack
page read and write
105F000
stack
page read and write
53E0000
direct allocation
page execute and read and write
4CC0000
direct allocation
page execute and read and write
427F000
stack
page read and write
4DA1000
heap
page read and write
848000
unkown
page execute and write copy
14C4000
heap
page read and write
35FF000
stack
page read and write
382F000
stack
page read and write
53E0000
direct allocation
page execute and read and write
1660000
direct allocation
page read and write
4CA0000
direct allocation
page execute and read and write
5410000
direct allocation
page execute and read and write
4CB0000
direct allocation
page execute and read and write
3B6F000
stack
page read and write
54B0000
direct allocation
page execute and read and write
464E000
stack
page read and write
3564000
heap
page read and write
4DC1000
heap
page read and write
13CA000
heap
page read and write
4751000
heap
page read and write
41AF000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
4BCD000
stack
page read and write
350000
unkown
page readonly
DC4000
heap
page read and write
1264000
heap
page read and write
E80000
heap
page read and write
4D3F000
stack
page read and write
14C4000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4D80000
direct allocation
page execute and read and write
810000
direct allocation
page read and write
129A000
heap
page read and write
53D0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
53E0000
direct allocation
page execute and read and write
34BF000
stack
page read and write
3EAE000
stack
page read and write
14C4000
heap
page read and write
4E40000
direct allocation
page execute and read and write
D3E000
stack
page read and write
1380000
heap
page read and write
97A000
unkown
page execute and read and write
356E000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
E70000
direct allocation
page read and write
967000
unkown
page read and write
3BAE000
stack
page read and write
1120000
direct allocation
page read and write
13A4000
heap
page read and write
3EBF000
stack
page read and write
A67000
unkown
page write copy
15B7000
heap
page read and write
E70000
direct allocation
page read and write
3B0E000
stack
page read and write
C36000
unkown
page execute and read and write
15D6000
heap
page read and write
E84000
heap
page read and write
360E000
stack
page read and write
1495000
heap
page read and write
4751000
heap
page read and write
1650000
heap
page read and write
3BA000
unkown
page execute and read and write
46B1000
heap
page read and write
4B31000
direct allocation
page read and write
2AB0000
heap
page read and write
354000
unkown
page read and write
5420000
direct allocation
page execute and read and write
126E000
heap
page read and write
50F6000
heap
page read and write
4D00000
direct allocation
page execute and read and write
132E000
heap
page read and write
4DA1000
heap
page read and write
3CAF000
stack
page read and write
4B7E000
stack
page read and write
539F000
stack
page read and write
C46000
unkown
page execute and read and write
3C3F000
stack
page read and write
351000
unkown
page execute and write copy
392E000
stack
page read and write
279F000
unkown
page read and write
13B5000
heap
page read and write
963000
unkown
page execute and read and write
476E000
stack
page read and write
5440000
direct allocation
page execute and read and write
53A0000
direct allocation
page execute and read and write
810000
direct allocation
page read and write
3ACF000
stack
page read and write
E7C000
stack
page read and write
2E8E000
stack
page read and write
E70000
direct allocation
page read and write
529B000
stack
page read and write
4D90000
direct allocation
page read and write
4D90000
direct allocation
page read and write
6F0000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4DF8000
heap
page read and write
3D2F000
stack
page read and write
3A7000
unkown
page read and write
810000
direct allocation
page read and write
E84000
heap
page read and write
1300000
heap
page read and write
3AD000
stack
page read and write
324E000
stack
page read and write
E84000
heap
page read and write
12CA000
stack
page read and write
1145000
heap
page read and write
66F000
unkown
page execute and read and write
2C0E000
stack
page read and write
2C6F000
stack
page read and write
2B6E000
stack
page read and write
4D40000
direct allocation
page execute and read and write
593000
unkown
page readonly
740000
heap
page read and write
3FEE000
stack
page read and write
477F000
stack
page read and write
E84000
heap
page read and write
14C4000
heap
page read and write
39BF000
stack
page read and write
14C4000
heap
page read and write
53A0000
heap
page read and write
522D000
stack
page read and write
413F000
stack
page read and write
53B0000
direct allocation
page execute and read and write
745000
heap
page read and write
14C4000
heap
page read and write
E70000
direct allocation
page read and write
E70000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
54D0000
direct allocation
page execute and read and write
33EF000
stack
page read and write
4DA1000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
376F000
stack
page read and write
13CA000
heap
page read and write
E84000
heap
page read and write
5450000
direct allocation
page execute and read and write
A7A000
unkown
page execute and read and write
3090000
heap
page read and write
3AAF000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
14C4000
heap
page read and write
1370000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
46B1000
heap
page read and write
29EF000
stack
page read and write
12E5000
heap
page read and write
14C4000
heap
page read and write
53F0000
direct allocation
page execute and read and write
291F000
stack
page read and write
1380000
direct allocation
page read and write
53B0000
direct allocation
page execute and read and write
831000
unkown
page execute and write copy
164C000
stack
page read and write
362F000
stack
page read and write
1660000
direct allocation
page read and write
E84000
heap
page read and write
1660000
direct allocation
page read and write
2ACB000
stack
page read and write
4B40000
direct allocation
page read and write
4DA1000
heap
page read and write
28EE000
stack
page read and write
547000
unkown
page execute and read and write
353000
unkown
page write copy
4E90000
direct allocation
page execute and read and write
348F000
stack
page read and write
830000
unkown
page readonly
4D6F000
stack
page read and write
539F000
stack
page read and write
4CBE000
stack
page read and write
5430000
direct allocation
page execute and read and write
EAB000
stack
page read and write
C36000
unkown
page execute and read and write
523D000
stack
page read and write
5241000
direct allocation
page read and write
3D7F000
stack
page read and write
462E000
stack
page read and write
4B30000
direct allocation
page read and write
54EF000
heap
page read and write
F7C000
stack
page read and write
12AF000
heap
page read and write
F03000
unkown
page execute and read and write
3A6E000
stack
page read and write
463F000
stack
page read and write
3D6E000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
336E000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
33BE000
stack
page read and write
328F000
stack
page read and write
2D0A000
stack
page read and write
591000
unkown
page execute and write copy
4D90000
direct allocation
page read and write
810000
direct allocation
page read and write
46B1000
heap
page read and write
E07000
unkown
page execute and write copy
4DA1000
heap
page read and write
B07000
unkown
page execute and read and write
C47000
unkown
page execute and write copy
14C4000
heap
page read and write
410F000
stack
page read and write
2DA0000
heap
page read and write
422F000
stack
page read and write
E84000
heap
page read and write
5520000
trusted library allocation
page read and write
46B1000
heap
page read and write
128E000
stack
page read and write
E84000
heap
page read and write
4D90000
direct allocation
page read and write
46B1000
heap
page read and write
D7A000
heap
page read and write
1450000
heap
page read and write
4B3F000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
396F000
stack
page read and write
4AEF000
stack
page read and write
F51000
heap
page read and write
460F000
stack
page read and write
12D9000
heap
page read and write
4DC1000
heap
page read and write
12E9000
heap
page read and write
34CE000
stack
page read and write
13A3000
heap
page read and write
5240000
direct allocation
page read and write
5430000
direct allocation
page execute and read and write
4D80000
direct allocation
page execute and read and write
36EF000
stack
page read and write
1660000
direct allocation
page read and write
270000
unkown
page read and write
1587000
heap
page read and write
13A3000
heap
page read and write
1318000
heap
page read and write
4BE0000
direct allocation
page read and write
810000
direct allocation
page read and write
E07000
unkown
page execute and write copy
686000
unkown
page execute and read and write
53D0000
direct allocation
page execute and read and write
4E30000
direct allocation
page execute and read and write
16DA000
heap
page read and write
F1A000
heap
page read and write
810000
direct allocation
page read and write
27AB000
heap
page read and write
400E000
stack
page read and write
39EE000
stack
page read and write
275E000
unkown
page read and write
13CC000
heap
page read and write
596000
unkown
page execute and read and write
2920000
heap
page read and write
3E6F000
stack
page read and write
DC4000
heap
page read and write
810000
direct allocation
page read and write
302F000
stack
page read and write
40EF000
stack
page read and write
37AF000
stack
page read and write
2CCD000
stack
page read and write
46B1000
heap
page read and write
9C0000
heap
page read and write
3A2F000
stack
page read and write
E84000
heap
page read and write
12FD000
stack
page read and write
338E000
stack
page read and write
12B0000
heap
page read and write
4D90000
direct allocation
page read and write
49FF000
stack
page read and write
F63000
heap
page read and write
E84000
heap
page read and write
5400000
direct allocation
page execute and read and write
E70000
direct allocation
page read and write
967000
unkown
page read and write
E08000
unkown
page execute and write copy
324D000
stack
page read and write
2D80000
heap
page read and write
1370000
heap
page read and write
43CE000
stack
page read and write
1286000
heap
page read and write
D46000
unkown
page execute and read and write
800000
heap
page read and write
1264000
heap
page read and write
3A3000
unkown
page execute and read and write
7D0000
heap
page read and write
53E0000
direct allocation
page execute and read and write
D2F000
unkown
page execute and read and write
51E0000
heap
page read and write
4DBF000
stack
page read and write
355E000
stack
page read and write
39CE000
stack
page read and write
4C62000
direct allocation
page read and write
4D90000
direct allocation
page read and write
C46000
unkown
page execute and read and write
332F000
stack
page read and write
35EE000
stack
page read and write
FD0000
heap
page read and write
4DA1000
heap
page read and write
322F000
stack
page read and write
3B3D000
stack
page read and write
436F000
stack
page read and write
E84000
heap
page read and write
3D4F000
stack
page read and write
53E0000
direct allocation
page execute and read and write
3EFE000
stack
page read and write
963000
unkown
page execute and read and write
2FCE000
stack
page read and write
43BF000
stack
page read and write
4B30000
direct allocation
page read and write
DB8000
heap
page read and write
34AE000
stack
page read and write
160E000
stack
page read and write
16AF000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
326F000
stack
page read and write
49EE000
stack
page read and write
2DEE000
unkown
page read and write
4D70000
heap
page read and write
1264000
heap
page read and write
E84000
heap
page read and write
1660000
direct allocation
page read and write
366F000
stack
page read and write
50A5000
heap
page read and write
3080000
heap
page read and write
E84000
heap
page read and write
14C4000
heap
page read and write
CFC000
stack
page read and write
34DE000
stack
page read and write
14C4000
heap
page read and write
5440000
direct allocation
page execute and read and write
2F8F000
stack
page read and write
4E50000
direct allocation
page execute and read and write
4B2D000
stack
page read and write
53D0000
direct allocation
page execute and read and write
1380000
direct allocation
page read and write
4DA1000
heap
page read and write
442F000
stack
page read and write
BF3000
unkown
page execute and read and write
1660000
direct allocation
page read and write
676000
unkown
page execute and read and write
428E000
stack
page read and write
44AF000
stack
page read and write
4D50000
direct allocation
page execute and read and write
270000
unkown
page readonly
4CD0000
direct allocation
page execute and read and write
E70000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
E70000
direct allocation
page read and write
316F000
stack
page read and write
396F000
stack
page read and write
5480000
direct allocation
page execute and read and write
456F000
stack
page read and write
4D60000
direct allocation
page execute and read and write
38BE000
stack
page read and write
432E000
stack
page read and write
372E000
stack
page read and write
4D80000
direct allocation
page execute and read and write
3FCF000
stack
page read and write
1660000
direct allocation
page read and write
BF3000
unkown
page execute and read and write
53E0000
direct allocation
page execute and read and write
1580000
heap
page read and write
373F000
stack
page read and write
28DE000
stack
page read and write
2E7E000
stack
page read and write
43FE000
stack
page read and write
39FE000
stack
page read and write
53D0000
direct allocation
page execute and read and write
14C4000
heap
page read and write
4D90000
direct allocation
page read and write
E84000
heap
page read and write
F04000
unkown
page execute and write copy
4D80000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
1690000
heap
page read and write
4D90000
direct allocation
page read and write
33BE000
stack
page read and write
1110000
direct allocation
page read and write
1230000
direct allocation
page read and write
45EF000
stack
page read and write
446E000
stack
page read and write
3F2F000
stack
page read and write
3110000
heap
page read and write
E84000
heap
page read and write
596000
unkown
page execute and write copy
A63000
unkown
page execute and read and write
4D90000
direct allocation
page read and write
5400000
direct allocation
page execute and read and write
810000
direct allocation
page read and write
E70000
direct allocation
page read and write
830000
unkown
page readonly
53D0000
direct allocation
page execute and read and write
3E2E000
stack
page read and write
467E000
stack
page read and write
34E0000
heap
page read and write
4C8F000
stack
page read and write
E84000
heap
page read and write
3ADC000
stack
page read and write
E07000
unkown
page execute and read and write
5460000
direct allocation
page execute and read and write
50F7000
heap
page read and write
E70000
direct allocation
page read and write
16A7000
heap
page read and write
4E80000
direct allocation
page execute and read and write
5430000
heap
page read and write
353000
unkown
page readonly
4750000
heap
page read and write
2980000
heap
page read and write
34BF000
stack
page read and write
C46000
unkown
page execute and write copy
2D70000
heap
page read and write
97A000
unkown
page execute and read and write
1320000
heap
page read and write
1286000
heap
page read and write
129A000
heap
page read and write
3D2C000
stack
page read and write
167A000
heap
page read and write
4DC0000
heap
page read and write
5490000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
931000
unkown
page execute and write copy
4C2F000
stack
page read and write
E70000
direct allocation
page read and write
4DC1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4C6E000
stack
page read and write
1490000
heap
page read and write
4DC1000
heap
page read and write
130E000
stack
page read and write
342E000
stack
page read and write
E84000
heap
page read and write
967000
unkown
page write copy
5500000
trusted library allocation
page read and write
3FFF000
stack
page read and write
1286000
heap
page read and write
386E000
stack
page read and write
3020000
direct allocation
page read and write
1230000
direct allocation
page read and write
3D8E000
stack
page read and write
5250000
direct allocation
page read and write
32EE000
stack
page read and write
847000
unkown
page execute and read and write
1660000
direct allocation
page read and write
CF3000
unkown
page execute and read and write
49AF000
stack
page read and write
50A6000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
352F000
stack
page read and write
2987000
heap
page read and write
14C4000
heap
page read and write
5460000
direct allocation
page execute and read and write
125D000
heap
page read and write
3037000
heap
page read and write
4751000
heap
page read and write
4D80000
direct allocation
page execute and read and write
46B1000
heap
page read and write
4EAB000
heap
page read and write
164C000
stack
page read and write
12FD000
stack
page read and write
351E000
stack
page read and write
E07000
unkown
page execute and read and write
366F000
stack
page read and write
351000
unkown
page execute read
E70000
direct allocation
page read and write
5241000
direct allocation
page read and write
686000
unkown
page execute and write copy
310E000
stack
page read and write
F07000
unkown
page execute and read and write
2EEF000
stack
page read and write
E84000
heap
page read and write
412E000
stack
page read and write
2F2E000
stack
page read and write
16E4000
heap
page read and write
48FE000
stack
page read and write
45AE000
stack
page read and write
54A0000
direct allocation
page execute and read and write
4DA0000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
13E0000
heap
page read and write
53D0000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
158A000
heap
page read and write
53E0000
direct allocation
page execute and read and write
3ECE000
stack
page read and write
417E000
stack
page read and write
42BE000
stack
page read and write
DBC000
heap
page read and write
C07000
unkown
page execute and read and write
57CE000
stack
page read and write
53D0000
direct allocation
page execute and read and write
1318000
heap
page read and write
57DE000
stack
page read and write
E84000
heap
page read and write
38EF000
stack
page read and write
2A2C000
stack
page read and write
46B1000
heap
page read and write
10FE000
stack
page read and write
C2F000
unkown
page execute and read and write
3C4E000
stack
page read and write
38ED000
stack
page read and write
12E9000
heap
page read and write
54C0000
heap
page read and write
4DA0000
heap
page read and write
4DC1000
heap
page read and write
3AFF000
stack
page read and write
151E000
stack
page read and write
4DA1000
heap
page read and write
1286000
heap
page read and write
14C4000
heap
page read and write
1120000
direct allocation
page read and write
5470000
direct allocation
page execute and read and write
4C7F000
stack
page read and write
46B1000
heap
page read and write
810000
direct allocation
page read and write
2E2A000
stack
page read and write
3A3B000
stack
page read and write
5450000
direct allocation
page execute and read and write
C2F000
unkown
page execute and read and write
4B90000
trusted library allocation
page read and write
810000
direct allocation
page read and write
426E000
stack
page read and write
3BEF000
stack
page read and write
594000
unkown
page read and write
23CA000
stack
page read and write
A67000
unkown
page read and write
95C000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
1110000
direct allocation
page read and write
54C0000
direct allocation
page execute and read and write
590000
unkown
page readonly
E04000
unkown
page execute and write copy
4D60000
direct allocation
page execute and read and write
1120000
heap
page read and write
35CF000
stack
page read and write
54A0000
direct allocation
page execute and read and write
238D000
stack
page read and write
4D80000
direct allocation
page execute and read and write
453E000
stack
page read and write
4D90000
direct allocation
page read and write
4CD0000
direct allocation
page execute and read and write
F07000
unkown
page execute and write copy
1140000
heap
page read and write
53C0000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
337F000
stack
page read and write
2CAE000
stack
page read and write
124E000
stack
page read and write
14C4000
heap
page read and write
414E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
1315000
heap
page read and write
D36000
unkown
page execute and read and write
474F000
stack
page read and write
3118000
heap
page read and write
4BE0000
direct allocation
page read and write
2AC000
stack
page read and write
930000
unkown
page readonly
E84000
heap
page read and write
54E3000
heap
page read and write
C47000
unkown
page execute and write copy
438F000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
374E000
stack
page read and write
E84000
heap
page read and write
930000
unkown
page read and write
12C2000
heap
page read and write
3C2E000
stack
page read and write
1120000
direct allocation
page read and write
1660000
direct allocation
page read and write
366E000
stack
page read and write
4BE1000
direct allocation
page read and write
142E000
stack
page read and write
4D30000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
3C7E000
stack
page read and write
E84000
heap
page read and write
159F000
stack
page read and write
2DAF000
stack
page read and write
1660000
direct allocation
page read and write
There are 846 hidden memdumps, click here to show them.