IOC Report
Lisect_AVT_24003_G1B_108.exe

loading gif

Files

File Path
Type
Category
Malicious
Lisect_AVT_24003_G1B_108.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe
"C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT-h
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORTt
unknown
https://t.me/RiseProSUPPORT;
unknown

Domains

Name
IP
Malicious
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.62
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
4D10000
direct allocation
page read and write
malicious
431000
unkown
page execute and read and write
malicious
4E30000
direct allocation
page read and write
malicious
4C70000
direct allocation
page read and write
malicious
441000
unkown
page execute and read and write
malicious
431000
unkown
page execute and read and write
malicious
50D0000
direct allocation
page read and write
malicious
441000
unkown
page execute and read and write
malicious
811000
unkown
page execute and read and write
malicious
51D0000
direct allocation
page read and write
malicious
4D50000
heap
page read and write
7EA000
unkown
page execute and read and write
3E0E000
stack
page read and write
5260000
direct allocation
page execute and read and write
F74000
heap
page read and write
49CE000
stack
page read and write
41EF000
stack
page read and write
4E10000
direct allocation
page execute and read and write
4C30000
direct allocation
page read and write
50B0000
direct allocation
page execute and read and write
C8C000
stack
page read and write
14E4000
heap
page read and write
1214000
heap
page read and write
436E000
stack
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
4DE0000
heap
page read and write
B44000
heap
page read and write
1214000
heap
page read and write
4F10000
direct allocation
page execute and read and write
4ED0000
direct allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
14E4000
heap
page read and write
5302000
direct allocation
page read and write
3ECE000
stack
page read and write
57A000
unkown
page execute and read and write
3BEF000
stack
page read and write
70E000
unkown
page execute and read and write
3C4E000
stack
page read and write
522F000
stack
page read and write
14E0000
heap
page read and write
1214000
heap
page read and write
45CF000
stack
page read and write
5070000
direct allocation
page execute and read and write
2ECF000
stack
page read and write
32EF000
stack
page read and write
B60000
heap
page read and write
4D51000
heap
page read and write
4FC7000
heap
page read and write
1214000
heap
page read and write
3A6F000
stack
page read and write
5320000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
4C30000
direct allocation
page read and write
4891000
heap
page read and write
468F000
stack
page read and write
116E000
stack
page read and write
FAD000
heap
page read and write
F74000
heap
page read and write
486F000
stack
page read and write
5080000
direct allocation
page execute and read and write
84C000
unkown
page execute and read and write
384F000
stack
page read and write
49A1000
heap
page read and write
2EA0000
heap
page read and write
50D1000
direct allocation
page read and write
3C8F000
stack
page read and write
2B8E000
stack
page read and write
398F000
stack
page read and write
4E42000
direct allocation
page read and write
45EF000
stack
page read and write
83D000
unkown
page execute and write copy
430000
unkown
page read and write
40EF000
stack
page read and write
34CE000
stack
page read and write
422E000
stack
page read and write
567000
unkown
page write copy
4990000
direct allocation
page read and write
4C4E000
stack
page read and write
342F000
stack
page read and write
308F000
stack
page read and write
1214000
heap
page read and write
2E6F000
stack
page read and write
132E000
stack
page read and write
2DCF000
stack
page read and write
1340000
direct allocation
page read and write
83C000
unkown
page execute and read and write
B44000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
348F000
stack
page read and write
F74000
heap
page read and write
2F6F000
stack
page read and write
F74000
heap
page read and write
BCA000
unkown
page execute and read and write
4C41000
heap
page read and write
83C000
unkown
page execute and read and write
F74000
heap
page read and write
5370000
direct allocation
page execute and read and write
1340000
direct allocation
page read and write
B44000
heap
page read and write
4C30000
direct allocation
page read and write
3E8E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
1214000
heap
page read and write
41CE000
stack
page read and write
547E000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
2FCE000
stack
page read and write
432F000
stack
page read and write
3C2E000
stack
page read and write
36EE000
stack
page read and write
5270000
direct allocation
page execute and read and write
3D0F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
5360000
direct allocation
page execute and read and write
47D1000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
47D1000
heap
page read and write
356F000
stack
page read and write
B70000
heap
page read and write
3BAF000
stack
page read and write
137A000
heap
page read and write
E60000
heap
page read and write
39CE000
stack
page read and write
BF0000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
1214000
heap
page read and write
5390000
direct allocation
page execute and read and write
2A60000
direct allocation
page read and write
420F000
stack
page read and write
5410000
direct allocation
page execute and read and write
30CB000
stack
page read and write
576E000
stack
page read and write
396E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
2F87000
heap
page read and write
3ACF000
stack
page read and write
4AEF000
stack
page read and write
3D4E000
stack
page read and write
4C5E000
stack
page read and write
47D1000
heap
page read and write
3F0F000
stack
page read and write
3E6E000
stack
page read and write
36EF000
stack
page read and write
F00000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
3E8F000
stack
page read and write
496F000
stack
page read and write
47D0000
heap
page read and write
2AB0000
direct allocation
page read and write
40EE000
stack
page read and write
360E000
stack
page read and write
4C0F000
stack
page read and write
3FAF000
stack
page read and write
5080000
trusted library allocation
page read and write
3CEF000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
2D0F000
stack
page read and write
5350000
direct allocation
page execute and read and write
B44000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4E50000
direct allocation
page execute and read and write
2AB0000
direct allocation
page read and write
4D51000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4F30000
direct allocation
page execute and read and write
4E70000
direct allocation
page execute and read and write
3AAF000
stack
page read and write
115C000
stack
page read and write
52A0000
direct allocation
page execute and read and write
4FD0000
direct allocation
page execute and read and write
4C30000
direct allocation
page read and write
558F000
heap
page read and write
F10000
heap
page read and write
5250000
direct allocation
page execute and read and write
83E000
unkown
page execute and read and write
5270000
direct allocation
page execute and read and write
2D4E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
430000
unkown
page readonly
563000
unkown
page execute and read and write
5350000
direct allocation
page execute and read and write
426E000
stack
page read and write
C1D000
unkown
page execute and write copy
4891000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
4C20000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
3E4F000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
5389000
heap
page read and write
49A0000
heap
page read and write
5290000
direct allocation
page execute and read and write
4E80000
direct allocation
page execute and read and write
5202000
direct allocation
page read and write
52F0000
direct allocation
page execute and read and write
2AB0000
direct allocation
page read and write
C1C000
unkown
page execute and write copy
47D1000
heap
page read and write
306F000
stack
page read and write
11B0000
heap
page read and write
482F000
stack
page read and write
36AF000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
3A4E000
stack
page read and write
2E4F000
stack
page read and write
5060000
direct allocation
page execute and read and write
354E000
stack
page read and write
14E4000
heap
page read and write
474F000
stack
page read and write
71E000
unkown
page execute and read and write
5460000
direct allocation
page execute and read and write
7FA000
unkown
page execute and read and write
486E000
stack
page read and write
338E000
stack
page read and write
B44000
heap
page read and write
320E000
stack
page read and write
13C5000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
156F000
stack
page read and write
5270000
direct allocation
page execute and read and write
5270000
direct allocation
page execute and read and write
49A1000
heap
page read and write
47D1000
heap
page read and write
2C0E000
stack
page read and write
1214000
heap
page read and write
5400000
direct allocation
page execute and read and write
4990000
direct allocation
page read and write
83C000
unkown
page execute and write copy
320F000
stack
page read and write
B44000
heap
page read and write
13C5000
heap
page read and write
396F000
stack
page read and write
14E4000
heap
page read and write
336E000
stack
page read and write
5240000
direct allocation
page execute and read and write
577000
unkown
page write copy
4DA2000
direct allocation
page read and write
4D51000
heap
page read and write
474E000
stack
page read and write
B44000
heap
page read and write
350F000
stack
page read and write
30AF000
stack
page read and write
440000
unkown
page readonly
5350000
direct allocation
page execute and read and write
34AE000
stack
page read and write
2A50000
heap
page read and write
3B4F000
stack
page read and write
1214000
heap
page read and write
431000
unkown
page execute and write copy
F74000
heap
page read and write
7FA000
unkown
page execute and read and write
394F000
stack
page read and write
84C000
unkown
page execute and write copy
F6E000
heap
page read and write
14E4000
heap
page read and write
B44000
heap
page read and write
3A0F000
stack
page read and write
947000
unkown
page write copy
44EE000
stack
page read and write
55D8000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
50F2000
heap
page read and write
B44000
heap
page read and write
4C30000
direct allocation
page read and write
53A0000
direct allocation
page execute and read and write
5090000
direct allocation
page execute and read and write
14E4000
heap
page read and write
5270000
direct allocation
page execute and read and write
83D000
unkown
page execute and write copy
1340000
direct allocation
page read and write
2E8B000
stack
page read and write
4C41000
heap
page read and write
4D4F000
stack
page read and write
476E000
stack
page read and write
434F000
stack
page read and write
52D0000
direct allocation
page execute and read and write
4C30000
direct allocation
page read and write
84D000
unkown
page execute and write copy
5350000
direct allocation
page execute and read and write
2C67000
heap
page read and write
138E000
heap
page read and write
5450000
direct allocation
page execute and read and write
414E000
stack
page read and write
5350000
direct allocation
page execute and read and write
F74000
heap
page read and write
3FEE000
stack
page read and write
F74000
heap
page read and write
2F70000
direct allocation
page read and write
2F60000
direct allocation
page read and write
84C000
unkown
page execute and read and write
4C41000
heap
page read and write
F74000
heap
page read and write
49A1000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
48AE000
stack
page read and write
4E60000
direct allocation
page execute and read and write
32CE000
stack
page read and write
4F00000
direct allocation
page execute and read and write
4C30000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
398E000
stack
page read and write
135A000
heap
page read and write
5440000
direct allocation
page execute and read and write
84C000
unkown
page execute and write copy
4E10000
direct allocation
page execute and read and write
1340000
direct allocation
page read and write
3A8F000
stack
page read and write
810000
unkown
page readonly
1340000
direct allocation
page read and write
49A1000
heap
page read and write
13C7000
heap
page read and write
1340000
direct allocation
page read and write
F74000
heap
page read and write
58A000
unkown
page execute and read and write
7EA000
unkown
page execute and read and write
4990000
direct allocation
page read and write
4C80000
direct allocation
page read and write
523E000
stack
page read and write
4990000
direct allocation
page read and write
304E000
stack
page read and write
35CF000
stack
page read and write
835000
unkown
page execute and read and write
1214000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
4B2E000
stack
page read and write
4C30000
direct allocation
page read and write
334E000
stack
page read and write
45AF000
stack
page read and write
3FCE000
stack
page read and write
F0A000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
2AB0000
direct allocation
page read and write
4DF0000
direct allocation
page execute and read and write
530F000
stack
page read and write
488E000
stack
page read and write
3FAE000
stack
page read and write
4E10000
direct allocation
page execute and read and write
418F000
stack
page read and write
49A1000
heap
page read and write
30EE000
stack
page read and write
1340000
direct allocation
page read and write
1214000
heap
page read and write
472F000
stack
page read and write
14E4000
heap
page read and write
114F000
stack
page read and write
4E10000
direct allocation
page execute and read and write
3EAE000
stack
page read and write
50C0000
direct allocation
page execute and read and write
1350000
heap
page read and write
436F000
stack
page read and write
4891000
heap
page read and write
332F000
stack
page read and write
A02000
unkown
page execute and read and write
4E10000
direct allocation
page execute and read and write
4891000
heap
page read and write
410E000
stack
page read and write
3FCE000
stack
page read and write
5270000
direct allocation
page execute and read and write
B44000
heap
page read and write
40CF000
stack
page read and write
825000
unkown
page execute and read and write
1214000
heap
page read and write
52B0000
direct allocation
page execute and read and write
1214000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
567000
unkown
page read and write
424E000
stack
page read and write
F74000
heap
page read and write
2A80000
heap
page read and write
4D20000
direct allocation
page read and write
1214000
heap
page read and write
370E000
stack
page read and write
49A1000
heap
page read and write
4C30000
direct allocation
page read and write
F74000
heap
page read and write
5420000
direct allocation
page execute and read and write
2D6F000
stack
page read and write
1300000
heap
page read and write
A02000
unkown
page execute and read and write
2AB0000
direct allocation
page read and write
5270000
direct allocation
page execute and read and write
4990000
direct allocation
page read and write
1340000
direct allocation
page read and write
1214000
heap
page read and write
464E000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
558E000
heap
page read and write
346F000
stack
page read and write
4E90000
direct allocation
page execute and read and write
45EE000
stack
page read and write
330F000
stack
page read and write
3F8F000
stack
page read and write
2BCB000
stack
page read and write
44CF000
stack
page read and write
5320000
direct allocation
page execute and read and write
3ACE000
stack
page read and write
1214000
heap
page read and write
4990000
direct allocation
page read and write
84D000
unkown
page execute and write copy
12FD000
stack
page read and write
440000
unkown
page read and write
46CE000
stack
page read and write
14E4000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
4DCF000
stack
page read and write
4F4B000
heap
page read and write
460E000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
B44000
heap
page read and write
4C30000
direct allocation
page read and write
374E000
stack
page read and write
430000
unkown
page readonly
50E0000
direct allocation
page execute and read and write
37CE000
stack
page read and write
31EF000
stack
page read and write
512B000
stack
page read and write
2AB0000
direct allocation
page read and write
573000
unkown
page execute and read and write
F74000
heap
page read and write
F74000
heap
page read and write
14E4000
heap
page read and write
14E4000
heap
page read and write
35AF000
stack
page read and write
4990000
direct allocation
page read and write
4C30000
direct allocation
page read and write
2F8F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
2AB0000
direct allocation
page read and write
C1C000
unkown
page execute and read and write
4FD0000
direct allocation
page execute and read and write
2AC0000
heap
page read and write
4CCB000
stack
page read and write
5350000
direct allocation
page execute and read and write
1214000
heap
page read and write
D8D000
stack
page read and write
428E000
stack
page read and write
14E4000
heap
page read and write
4D11000
direct allocation
page read and write
5330000
direct allocation
page execute and read and write
4F00000
direct allocation
page execute and read and write
5310000
direct allocation
page execute and read and write
44AF000
stack
page read and write
567000
unkown
page read and write
F74000
heap
page read and write
4891000
heap
page read and write
31AF000
stack
page read and write
2FAF000
stack
page read and write
B44000
heap
page read and write
2E90000
heap
page read and write
2C60000
heap
page read and write
5350000
direct allocation
page execute and read and write
378F000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
4D51000
heap
page read and write
B40000
heap
page read and write
F74000
heap
page read and write
4D51000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
2AC7000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
C0E000
unkown
page execute and read and write
1210000
heap
page read and write
5380000
direct allocation
page execute and read and write
4F62000
direct allocation
page read and write
947000
unkown
page read and write
F74000
heap
page read and write
4C41000
heap
page read and write
5330000
direct allocation
page execute and read and write
1370000
heap
page read and write
FB5000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
2F61000
direct allocation
page read and write
5040000
direct allocation
page execute and read and write
446F000
stack
page read and write
440000
unkown
page readonly
DF0000
heap
page read and write
4C70000
direct allocation
page read and write
2A60000
direct allocation
page read and write
B44000
heap
page read and write
440F000
stack
page read and write
3D4F000
stack
page read and write
4D0E000
stack
page read and write
5300000
direct allocation
page execute and read and write
F12000
heap
page read and write
382E000
stack
page read and write
EA0000
heap
page read and write
4CD0000
trusted library allocation
page read and write
4E10000
direct allocation
page execute and read and write
2BCF000
stack
page read and write
4DE0000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
9F2000
unkown
page execute and read and write
4891000
heap
page read and write
2AB0000
direct allocation
page read and write
2C50000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
3BCF000
stack
page read and write
4890000
heap
page read and write
83E000
unkown
page execute and read and write
2A87000
heap
page read and write
520B000
stack
page read and write
2A60000
direct allocation
page read and write
126F000
stack
page read and write
44AE000
stack
page read and write
3F6F000
stack
page read and write
810000
unkown
page read and write
2A60000
direct allocation
page read and write
322E000
stack
page read and write
2AB0000
direct allocation
page read and write
4D10000
direct allocation
page read and write
1340000
direct allocation
page read and write
4D51000
heap
page read and write
5350000
direct allocation
page execute and read and write
577000
unkown
page read and write
1214000
heap
page read and write
13BC000
heap
page read and write
57A000
unkown
page execute and read and write
53D0000
direct allocation
page execute and read and write
14E4000
heap
page read and write
5270000
direct allocation
page execute and read and write
4E40000
direct allocation
page read and write
14E4000
heap
page read and write
5350000
direct allocation
page execute and read and write
3AEE000
stack
page read and write
3C0E000
stack
page read and write
4C41000
heap
page read and write
14E4000
heap
page read and write
1386000
heap
page read and write
4891000
heap
page read and write
47CF000
stack
page read and write
2F0E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
300F000
stack
page read and write
2AB0000
direct allocation
page read and write
1340000
direct allocation
page read and write
41C000
stack
page read and write
31EE000
stack
page read and write
FB5000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
2AB0000
direct allocation
page read and write
460F000
stack
page read and write
3E6F000
stack
page read and write
4E8B000
stack
page read and write
F74000
heap
page read and write
4990000
direct allocation
page read and write
358F000
stack
page read and write
5340000
direct allocation
page execute and read and write
567000
unkown
page write copy
82E000
unkown
page execute and read and write
1214000
heap
page read and write
EA0000
heap
page read and write
FA2000
heap
page read and write
3D2E000
stack
page read and write
4E6F000
stack
page read and write
50A0000
direct allocation
page execute and read and write
430000
unkown
page read and write
458E000
stack
page read and write
4891000
heap
page read and write
1214000
heap
page read and write
AEE000
unkown
page execute and read and write
30CF000
stack
page read and write
58A000
unkown
page execute and read and write
4E80000
direct allocation
page execute and read and write
B44000
heap
page read and write
47D1000
heap
page read and write
344F000
stack
page read and write
4E00000
direct allocation
page execute and read and write
412E000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
50D0000
direct allocation
page read and write
1330000
heap
page read and write
2AB0000
direct allocation
page read and write
3E2F000
stack
page read and write
390E000
stack
page read and write
4F50000
direct allocation
page execute and read and write
47D1000
heap
page read and write
F74000
heap
page read and write
4C30000
direct allocation
page read and write
F90000
heap
page read and write
95A000
unkown
page execute and read and write
2AAE000
stack
page read and write
440000
unkown
page read and write
4EB0000
direct allocation
page execute and read and write
4EF0000
direct allocation
page execute and read and write
F74000
heap
page read and write
ECD000
heap
page read and write
E5E000
stack
page read and write
2A60000
direct allocation
page read and write
33CF000
stack
page read and write
F74000
heap
page read and write
9F2000
unkown
page execute and read and write
346E000
stack
page read and write
2A60000
direct allocation
page read and write
4990000
direct allocation
page read and write
470F000
stack
page read and write
4E10000
direct allocation
page execute and read and write
52BE000
stack
page read and write
2ACE000
stack
page read and write
47D1000
heap
page read and write
438F000
stack
page read and write
4F10000
direct allocation
page execute and read and write
4D10000
direct allocation
page read and write
1214000
heap
page read and write
400E000
stack
page read and write
5270000
direct allocation
page execute and read and write
370F000
stack
page read and write
50D0000
direct allocation
page read and write
44CE000
stack
page read and write
2C4E000
stack
page read and write
2A60000
direct allocation
page read and write
49AF000
stack
page read and write
4D51000
heap
page read and write
567E000
stack
page read and write
5320000
direct allocation
page execute and read and write
F74000
heap
page read and write
B44000
heap
page read and write
1214000
heap
page read and write
4E1E000
stack
page read and write
5240000
heap
page read and write
49A1000
heap
page read and write
46EF000
stack
page read and write
70E000
unkown
page execute and read and write
448F000
stack
page read and write
14E4000
heap
page read and write
4E30000
direct allocation
page read and write
EC0000
heap
page read and write
49A1000
heap
page read and write
2AB0000
direct allocation
page read and write
404F000
stack
page read and write
2F60000
direct allocation
page read and write
2A60000
direct allocation
page read and write
F00000
heap
page read and write
4F8F000
stack
page read and write
2E8E000
stack
page read and write
B44000
heap
page read and write
1214000
heap
page read and write
422F000
stack
page read and write
4C30000
direct allocation
page read and write
825000
unkown
page execute and read and write
478E000
stack
page read and write
F2C000
stack
page read and write
454F000
stack
page read and write
4B0E000
stack
page read and write
382F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
14E4000
heap
page read and write
1340000
direct allocation
page read and write
441000
unkown
page execute and write copy
4C71000
direct allocation
page read and write
B44000
heap
page read and write
1214000
heap
page read and write
4E30000
direct allocation
page execute and read and write
4C40000
heap
page read and write
E6B000
heap
page read and write
47D1000
heap
page read and write
55D9000
heap
page read and write
2A60000
direct allocation
page read and write
40AE000
stack
page read and write
577000
unkown
page read and write
39AE000
stack
page read and write
450E000
stack
page read and write
53F0000
direct allocation
page execute and read and write
E7E000
stack
page read and write
4F40000
direct allocation
page execute and read and write
138E000
heap
page read and write
14E4000
heap
page read and write
2A60000
direct allocation
page read and write
B8C000
stack
page read and write
BF5000
heap
page read and write
1214000
heap
page read and write
2A60000
direct allocation
page read and write
577000
unkown
page write copy
F12000
heap
page read and write
4E80000
heap
page read and write
3AAE000
stack
page read and write
2CCF000
stack
page read and write
4D51000
heap
page read and write
13B0000
heap
page read and write
4D51000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
14E4000
heap
page read and write
431000
unkown
page execute and write copy
4E30000
direct allocation
page read and write
2BCF000
stack
page read and write
11C0000
heap
page read and write
49A1000
heap
page read and write
5020000
direct allocation
page execute and read and write
310E000
stack
page read and write
14E4000
heap
page read and write
5350000
direct allocation
page execute and read and write
1214000
heap
page read and write
36CF000
stack
page read and write
14E4000
heap
page read and write
835000
unkown
page execute and read and write
50E0000
direct allocation
page read and write
3F4E000
stack
page read and write
48D0000
heap
page read and write
573000
unkown
page execute and read and write
5270000
direct allocation
page execute and read and write
332E000
stack
page read and write
C05000
unkown
page execute and read and write
3DCF000
stack
page read and write
14E4000
heap
page read and write
498F000
stack
page read and write
2F80000
heap
page read and write
4C41000
heap
page read and write
5010000
direct allocation
page execute and read and write
14CE000
stack
page read and write
49A1000
heap
page read and write
ECA000
heap
page read and write
348E000
stack
page read and write
392F000
stack
page read and write
3B8E000
stack
page read and write
30AE000
stack
page read and write
F74000
heap
page read and write
3D6E000
stack
page read and write
3D8E000
stack
page read and write
4E31000
direct allocation
page read and write
35EE000
stack
page read and write
52C0000
direct allocation
page execute and read and write
4E20000
direct allocation
page execute and read and write
4970000
heap
page read and write
50BD000
stack
page read and write
2C0C000
stack
page read and write
4C2F000
stack
page read and write
4E10000
direct allocation
page execute and read and write
105C000
stack
page read and write
37EF000
stack
page read and write
4990000
direct allocation
page read and write
4C41000
heap
page read and write
51CD000
stack
page read and write
B44000
heap
page read and write
3D2F000
stack
page read and write
4C70000
direct allocation
page read and write
43CE000
stack
page read and write
49A1000
heap
page read and write
334F000
stack
page read and write
5270000
direct allocation
page execute and read and write
4990000
direct allocation
page read and write
380F000
stack
page read and write
49A1000
heap
page read and write
364F000
stack
page read and write
4C30000
direct allocation
page read and write
441000
unkown
page execute and write copy
5370000
direct allocation
page execute and read and write
324E000
stack
page read and write
2A60000
direct allocation
page read and write
4FD0000
direct allocation
page execute and read and write
368E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
5430000
direct allocation
page execute and read and write
5280000
direct allocation
page execute and read and write
340E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
3BEE000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
EFD000
stack
page read and write
B0D000
stack
page read and write
13C7000
heap
page read and write
2A6E000
stack
page read and write
1214000
heap
page read and write
71E000
unkown
page execute and read and write
4891000
heap
page read and write
388E000
stack
page read and write
1214000
heap
page read and write
14E4000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
2EA7000
heap
page read and write
314F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
444E000
stack
page read and write
438D000
stack
page read and write
31CF000
stack
page read and write
43AE000
stack
page read and write
424F000
stack
page read and write
35AE000
stack
page read and write
DD2000
unkown
page execute and read and write
5350000
direct allocation
page execute and read and write
1340000
direct allocation
page read and write
4F20000
direct allocation
page execute and read and write
2A60000
direct allocation
page read and write
4FB0000
direct allocation
page execute and read and write
F60000
heap
page read and write
35CE000
stack
page read and write
2E4E000
stack
page read and write
2AB0000
direct allocation
page read and write
53DE000
stack
page read and write
811000
unkown
page execute and write copy
4990000
direct allocation
page read and write
410E000
stack
page read and write
49A1000
heap
page read and write
328F000
stack
page read and write
F70000
heap
page read and write
318E000
stack
page read and write
E98000
heap
page read and write
1214000
heap
page read and write
384E000
stack
page read and write
4D6C000
stack
page read and write
3B0E000
stack
page read and write
4C41000
heap
page read and write
F6A000
heap
page read and write
4F20000
direct allocation
page execute and read and write
5350000
direct allocation
page execute and read and write
1340000
direct allocation
page read and write
4ACF000
stack
page read and write
5270000
direct allocation
page execute and read and write
49A1000
heap
page read and write
430E000
stack
page read and write
484F000
stack
page read and write
5000000
direct allocation
page execute and read and write
5350000
direct allocation
page execute and read and write
462E000
stack
page read and write
408E000
stack
page read and write
563000
unkown
page execute and read and write
EBB000
stack
page read and write
5360000
direct allocation
page execute and read and write
372E000
stack
page read and write
137E000
heap
page read and write
42CF000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
943000
unkown
page execute and read and write
1214000
heap
page read and write
5190000
trusted library allocation
page read and write
83C000
unkown
page execute and write copy
4FC0000
direct allocation
page execute and read and write
1340000
direct allocation
page read and write
F60000
heap
page read and write
82E000
unkown
page execute and read and write
4C41000
heap
page read and write
3C0F000
stack
page read and write
1214000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
4990000
direct allocation
page read and write
52E0000
direct allocation
page execute and read and write
488F000
stack
page read and write
38CF000
stack
page read and write
386E000
stack
page read and write
3CCE000
stack
page read and write
F74000
heap
page read and write
53C0000
direct allocation
page execute and read and write
50D0000
direct allocation
page execute and read and write
13B8000
heap
page read and write
472E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
4990000
direct allocation
page read and write
1215000
heap
page read and write
4F90000
direct allocation
page execute and read and write
5340000
direct allocation
page execute and read and write
E8E000
heap
page read and write
49EE000
stack
page read and write
4E10000
direct allocation
page execute and read and write
B44000
heap
page read and write
There are 844 hidden memdumps, click here to show them.