IOC Report
LisectAVT_2403002A_228.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_228.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_228.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_228.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://t.me/RiseProSUPPORTmJ
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORTHr
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
4AD0000
direct allocation
page read and write
malicious
1A1000
unkown
page execute and read and write
malicious
91000
unkown
page execute and read and write
malicious
91000
unkown
page execute and read and write
malicious
4BA0000
direct allocation
page read and write
malicious
4E90000
direct allocation
page read and write
malicious
1A1000
unkown
page execute and read and write
malicious
4950000
direct allocation
page read and write
malicious
661000
unkown
page execute and read and write
malicious
52C0000
direct allocation
page read and write
malicious
308F000
stack
page read and write
1CC000
unkown
page execute and read and write
974000
heap
page read and write
62C000
unkown
page execute and read and write
4E31000
heap
page read and write
1C3000
unkown
page execute and read and write
1134000
heap
page read and write
4E20000
direct allocation
page read and write
C34000
heap
page read and write
B90000
direct allocation
page read and write
C34000
heap
page read and write
3DBE000
stack
page read and write
3AFF000
stack
page read and write
13A4000
heap
page read and write
313E000
stack
page read and write
13A4000
heap
page read and write
BA4000
heap
page read and write
C34000
heap
page read and write
4D60000
direct allocation
page execute and read and write
341E000
stack
page read and write
3D4D000
stack
page read and write
5430000
direct allocation
page execute and read and write
3D7F000
stack
page read and write
35FF000
stack
page read and write
310E000
stack
page read and write
484000
unkown
page execute and read and write
BA4000
heap
page read and write
A46000
unkown
page execute and read and write
D10000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
3A5E000
stack
page read and write
4B50000
direct allocation
page execute and read and write
424F000
stack
page read and write
90000
unkown
page read and write
3FFF000
stack
page read and write
1134000
heap
page read and write
39CE000
stack
page read and write
4C1F000
stack
page read and write
410E000
stack
page read and write
4D10000
direct allocation
page execute and read and write
44D1000
heap
page read and write
2D0F000
stack
page read and write
79C000
unkown
page execute and read and write
50F0000
direct allocation
page execute and read and write
3F8F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
974000
heap
page read and write
A5C000
stack
page read and write
2D30000
heap
page read and write
13A4000
heap
page read and write
2D10000
heap
page read and write
BA4000
heap
page read and write
384F000
stack
page read and write
3CDE000
stack
page read and write
C34000
heap
page read and write
360E000
stack
page read and write
E1B000
heap
page read and write
4E20000
direct allocation
page read and write
445E000
stack
page read and write
33BE000
stack
page read and write
1134000
heap
page read and write
403E000
stack
page read and write
5490000
direct allocation
page execute and read and write
5570000
direct allocation
page execute and read and write
F0E000
stack
page read and write
13A4000
heap
page read and write
3ACE000
stack
page read and write
974000
heap
page read and write
974000
heap
page read and write
358F000
stack
page read and write
455F000
stack
page read and write
4711000
heap
page read and write
13A4000
heap
page read and write
BA4000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
1134000
heap
page read and write
2A70000
direct allocation
page read and write
3EBF000
stack
page read and write
540F000
stack
page read and write
4B80000
direct allocation
page execute and read and write
1494000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
4B60000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
374E000
stack
page read and write
5090000
direct allocation
page execute and read and write
370E000
stack
page read and write
4CD2000
direct allocation
page read and write
1070000
heap
page read and write
2AFE000
stack
page read and write
26C7000
heap
page read and write
319F000
stack
page read and write
F7A000
heap
page read and write
5450000
direct allocation
page execute and read and write
35CE000
stack
page read and write
39BF000
stack
page read and write
3E1E000
stack
page read and write
4D90000
direct allocation
page execute and read and write
2D20000
direct allocation
page read and write
BA4000
heap
page read and write
73C000
unkown
page execute and read and write
E0F000
stack
page read and write
1134000
heap
page read and write
388E000
stack
page read and write
13A4000
heap
page read and write
494E000
stack
page read and write
2A70000
direct allocation
page read and write
4E31000
heap
page read and write
330F000
stack
page read and write
448F000
stack
page read and write
3F5E000
stack
page read and write
46D000
unkown
page execute and read and write
4D20000
direct allocation
page execute and read and write
2B8F000
stack
page read and write
E51000
heap
page read and write
2D0E000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
2D20000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
C34000
heap
page read and write
D4C000
heap
page read and write
2D20000
direct allocation
page read and write
2A70000
direct allocation
page read and write
377E000
stack
page read and write
4E20000
direct allocation
page read and write
4FC2000
direct allocation
page read and write
4C60000
direct allocation
page execute and read and write
3FCF000
stack
page read and write
4C06000
heap
page read and write
284C000
stack
page read and write
47DF000
stack
page read and write
2D20000
direct allocation
page read and write
410F000
stack
page read and write
10EE000
stack
page read and write
BA4000
heap
page read and write
44CE000
stack
page read and write
30CE000
stack
page read and write
B90000
direct allocation
page read and write
4C40000
direct allocation
page execute and read and write
3D8E000
stack
page read and write
5520000
direct allocation
page execute and read and write
44D0000
heap
page read and write
A54000
unkown
page execute and write copy
4B40000
direct allocation
page execute and read and write
2D20000
direct allocation
page read and write
470F000
stack
page read and write
3E4F000
stack
page read and write
974000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
5420000
heap
page read and write
2BFF000
stack
page read and write
373F000
stack
page read and write
5140000
direct allocation
page execute and read and write
438E000
stack
page read and write
91000
unkown
page execute and write copy
4CA0000
direct allocation
page execute and read and write
3D4F000
stack
page read and write
419F000
stack
page read and write
C34000
heap
page read and write
453E000
stack
page read and write
C34000
heap
page read and write
5450000
direct allocation
page execute and read and write
1A0000
unkown
page read and write
4C60000
direct allocation
page execute and read and write
294F000
stack
page read and write
4D30000
direct allocation
page execute and read and write
1A0000
unkown
page readonly
974000
heap
page read and write
BA4000
heap
page read and write
4FDF000
stack
page read and write
4ABD000
stack
page read and write
27F0000
heap
page read and write
3D7F000
stack
page read and write
30FF000
stack
page read and write
417E000
stack
page read and write
379F000
stack
page read and write
5020000
direct allocation
page execute and read and write
5030000
direct allocation
page execute and read and write
40CF000
stack
page read and write
E53000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
2FCE000
stack
page read and write
4B50000
trusted library allocation
page read and write
4C02000
direct allocation
page read and write
C34000
heap
page read and write
4C60000
direct allocation
page execute and read and write
974000
heap
page read and write
F7E000
heap
page read and write
974000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4E20000
direct allocation
page read and write
398F000
stack
page read and write
1134000
heap
page read and write
284E000
stack
page read and write
1134000
heap
page read and write
974000
heap
page read and write
2CFF000
stack
page read and write
660000
unkown
page read and write
2860000
direct allocation
page read and write
BA4000
heap
page read and write
2FBF000
stack
page read and write
B90000
direct allocation
page read and write
B90000
direct allocation
page read and write
FB4000
heap
page read and write
54E0000
direct allocation
page execute and read and write
2AB0000
heap
page read and write
1482000
heap
page read and write
B5D000
stack
page read and write
485000
unkown
page execute and write copy
44D1000
heap
page read and write
974000
heap
page read and write
B90000
direct allocation
page read and write
1C3000
unkown
page execute and read and write
2860000
direct allocation
page read and write
491F000
stack
page read and write
100F000
stack
page read and write
5450000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
5060000
direct allocation
page execute and read and write
BFC000
unkown
page execute and read and write
5450000
direct allocation
page execute and read and write
B90000
direct allocation
page read and write
4641000
heap
page read and write
FC7000
heap
page read and write
323F000
stack
page read and write
2A70000
direct allocation
page read and write
2AF0000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
C34000
heap
page read and write
29C0000
heap
page read and write
365F000
stack
page read and write
49FF000
stack
page read and write
1134000
heap
page read and write
1440000
heap
page read and write
C34000
heap
page read and write
3ACF000
stack
page read and write
B60000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
4E20000
direct allocation
page read and write
50A0000
direct allocation
page execute and read and write
4D40000
direct allocation
page execute and read and write
13C0000
heap
page read and write
273A000
stack
page read and write
544E000
stack
page read and write
394F000
stack
page read and write
370F000
stack
page read and write
974000
heap
page read and write
2860000
direct allocation
page read and write
C34000
heap
page read and write
292E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
133D000
stack
page read and write
13A4000
heap
page read and write
34FE000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
FC7000
heap
page read and write
414E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
13A4000
heap
page read and write
974000
heap
page read and write
13A4000
heap
page read and write
2A80000
heap
page read and write
C34000
heap
page read and write
3B0E000
stack
page read and write
C34000
heap
page read and write
477F000
stack
page read and write
54F0000
direct allocation
page execute and read and write
148C000
heap
page read and write
4710000
heap
page read and write
4A80000
trusted library allocation
page read and write
4EDC000
stack
page read and write
38BE000
stack
page read and write
48FE000
stack
page read and write
469F000
stack
page read and write
42BE000
stack
page read and write
5450000
direct allocation
page execute and read and write
348E000
stack
page read and write
4D00000
heap
page read and write
4C30000
heap
page read and write
4CEF000
stack
page read and write
369E000
stack
page read and write
2A70000
direct allocation
page read and write
C34000
heap
page read and write
6BC000
stack
page read and write
2E4E000
stack
page read and write
481E000
stack
page read and write
5000000
direct allocation
page execute and read and write
1134000
heap
page read and write
974000
heap
page read and write
46D000
unkown
page execute and read and write
D57000
heap
page read and write
3D0F000
stack
page read and write
3DDF000
stack
page read and write
484000
unkown
page execute and write copy
BA4000
heap
page read and write
2E7F000
stack
page read and write
4D30000
direct allocation
page execute and read and write
2D10000
heap
page read and write
13A4000
heap
page read and write
2A70000
direct allocation
page read and write
4E90000
direct allocation
page read and write
344F000
stack
page read and write
A20000
heap
page read and write
3AFF000
stack
page read and write
5550000
direct allocation
page execute and read and write
BA4000
heap
page read and write
427F000
stack
page read and write
4E1F000
stack
page read and write
C34000
heap
page read and write
2860000
direct allocation
page read and write
26FD000
stack
page read and write
1134000
heap
page read and write
1134000
heap
page read and write
4A82000
direct allocation
page read and write
46DE000
stack
page read and write
B90000
direct allocation
page read and write
2D37000
heap
page read and write
32DE000
stack
page read and write
974000
heap
page read and write
2C0E000
stack
page read and write
C20000
heap
page read and write
320F000
stack
page read and write
144A000
heap
page read and write
460E000
stack
page read and write
2860000
direct allocation
page read and write
52C0000
direct allocation
page read and write
47BE000
stack
page read and write
4EEE000
stack
page read and write
4E20000
direct allocation
page read and write
B90000
direct allocation
page read and write
D4D000
heap
page read and write
586000
unkown
page execute and read and write
1134000
heap
page read and write
5450000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
30CF000
stack
page read and write
C34000
heap
page read and write
798000
unkown
page read and write
391E000
stack
page read and write
329F000
stack
page read and write
5020000
direct allocation
page execute and read and write
4711000
heap
page read and write
4D40000
direct allocation
page execute and read and write
4CF0000
direct allocation
page execute and read and write
D0E000
heap
page read and write
1080000
heap
page read and write
123C000
stack
page read and write
41DE000
stack
page read and write
C30000
heap
page read and write
4641000
heap
page read and write
A06000
unkown
page execute and read and write
2BCE000
stack
page read and write
5500000
direct allocation
page execute and read and write
1134000
heap
page read and write
4E31000
heap
page read and write
D61000
heap
page read and write
2F97000
heap
page read and write
1134000
heap
page read and write
586000
unkown
page execute and read and write
5010000
direct allocation
page execute and read and write
1134000
heap
page read and write
44D1000
heap
page read and write
280F000
stack
page read and write
54D0000
direct allocation
page execute and read and write
4D10000
direct allocation
page execute and read and write
3A8F000
stack
page read and write
B90000
direct allocation
page read and write
4BA0000
direct allocation
page read and write
798000
unkown
page write copy
4E31000
heap
page read and write
546000
unkown
page execute and read and write
337F000
stack
page read and write
327E000
stack
page read and write
D61000
heap
page read and write
50C0000
direct allocation
page execute and read and write
2F90000
heap
page read and write
4C60000
direct allocation
page execute and read and write
974000
heap
page read and write
427F000
stack
page read and write
13A4000
heap
page read and write
4E20000
direct allocation
page read and write
4711000
heap
page read and write
2A2F000
stack
page read and write
974000
heap
page read and write
974000
heap
page read and write
1134000
heap
page read and write
BA4000
heap
page read and write
4E20000
direct allocation
page read and write
327E000
stack
page read and write
2F8F000
stack
page read and write
5020000
direct allocation
page execute and read and write
467E000
stack
page read and write
4E20000
direct allocation
page read and write
44D1000
heap
page read and write
BA4000
heap
page read and write
4E40000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
1134000
heap
page read and write
4E30000
heap
page read and write
4711000
heap
page read and write
587E000
stack
page read and write
4E31000
heap
page read and write
974000
heap
page read and write
2E7F000
stack
page read and write
BA4000
heap
page read and write
2D8000
unkown
page read and write
BA4000
heap
page read and write
1134000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
974000
heap
page read and write
5050000
direct allocation
page execute and read and write
1134000
heap
page read and write
BA4000
heap
page read and write
2A70000
direct allocation
page read and write
974000
heap
page read and write
3C9F000
stack
page read and write
57D000
unkown
page execute and read and write
3FCE000
stack
page read and write
4711000
heap
page read and write
2850000
heap
page read and write
1130000
heap
page read and write
BA0000
heap
page read and write
2EBE000
stack
page read and write
363E000
stack
page read and write
2F80000
heap
page read and write
4BEC000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
974000
heap
page read and write
2E0F000
stack
page read and write
974000
heap
page read and write
974000
heap
page read and write
5130000
direct allocation
page execute and read and write
3B9E000
stack
page read and write
144D000
heap
page read and write
45CF000
stack
page read and write
2D20000
direct allocation
page read and write
43FE000
stack
page read and write
13A4000
heap
page read and write
3C3F000
stack
page read and write
4D30000
direct allocation
page execute and read and write
2E8E000
stack
page read and write
BA4000
heap
page read and write
348000
unkown
page execute and read and write
43CE000
stack
page read and write
2A70000
direct allocation
page read and write
BA4000
heap
page read and write
FBF000
heap
page read and write
13A4000
heap
page read and write
323F000
stack
page read and write
384E000
stack
page read and write
4B30000
direct allocation
page execute and read and write
4641000
heap
page read and write
4C60000
direct allocation
page execute and read and write
4641000
heap
page read and write
5510000
direct allocation
page execute and read and write
1A0000
unkown
page readonly
2877000
heap
page read and write
5270000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
A55000
unkown
page execute and write copy
2A70000
direct allocation
page read and write
4E31000
heap
page read and write
2DC000
unkown
page execute and read and write
4BF0000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
D4F000
heap
page read and write
5020000
direct allocation
page execute and read and write
D57000
heap
page read and write
50E0000
direct allocation
page execute and read and write
284E000
unkown
page read and write
334E000
stack
page read and write
5530000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
D57000
heap
page read and write
2860000
direct allocation
page read and write
1134000
heap
page read and write
BA4000
heap
page read and write
E49000
heap
page read and write
52C0000
direct allocation
page read and write
4D30000
direct allocation
page execute and read and write
320E000
stack
page read and write
62C000
unkown
page execute and read and write
C34000
heap
page read and write
1134000
heap
page read and write
974000
heap
page read and write
D0A000
heap
page read and write
52C0000
direct allocation
page read and write
595000
unkown
page execute and write copy
13A4000
heap
page read and write
1C8000
unkown
page read and write
91000
unkown
page execute and write copy
1134000
heap
page read and write
436000
unkown
page execute and read and write
3B5F000
stack
page read and write
298F000
unkown
page read and write
4E20000
direct allocation
page execute and read and write
2EBE000
stack
page read and write
595000
unkown
page execute and write copy
1134000
heap
page read and write
2860000
direct allocation
page read and write
5020000
direct allocation
page execute and read and write
43BF000
stack
page read and write
130F000
stack
page read and write
C34000
heap
page read and write
476000
unkown
page execute and read and write
D20000
heap
page read and write
1134000
heap
page read and write
2C0E000
stack
page read and write
337F000
stack
page read and write
4BDE000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
4A5F000
stack
page read and write
4E10000
direct allocation
page execute and read and write
54B0000
direct allocation
page execute and read and write
348000
unkown
page execute and read and write
4D80000
direct allocation
page execute and read and write
2CCF000
stack
page read and write
403E000
stack
page read and write
39FE000
stack
page read and write
398E000
stack
page read and write
2F8E000
stack
page read and write
5450000
direct allocation
page execute and read and write
43BF000
stack
page read and write
313E000
stack
page read and write
355E000
stack
page read and write
4E67000
heap
page read and write
D00000
heap
page read and write
990000
heap
page read and write
485000
unkown
page execute and write copy
974000
heap
page read and write
4D60000
direct allocation
page execute and read and write
BA4000
heap
page read and write
515E000
stack
page read and write
CFD000
stack
page read and write
338E000
stack
page read and write
417E000
stack
page read and write
4D90000
direct allocation
page execute and read and write
D10000
direct allocation
page read and write
2A3F000
unkown
page read and write
459E000
stack
page read and write
26C0000
heap
page read and write
2ABF000
stack
page read and write
387F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
4E31000
heap
page read and write
297F000
stack
page read and write
1A1000
unkown
page execute and write copy
5352000
heap
page read and write
BA4000
heap
page read and write
4D70000
direct allocation
page execute and read and write
3EBF000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
2860000
direct allocation
page read and write
5355000
heap
page read and write
4C60000
direct allocation
page execute and read and write
2A70000
direct allocation
page read and write
3C7E000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
4A9E000
stack
page read and write
2D20000
direct allocation
page read and write
34FE000
stack
page read and write
974000
heap
page read and write
C34000
heap
page read and write
91C000
stack
page read and write
5020000
direct allocation
page execute and read and write
974000
heap
page read and write
4B9F000
stack
page read and write
970000
heap
page read and write
13A4000
heap
page read and write
5100000
direct allocation
page execute and read and write
4E20000
direct allocation
page read and write
5540000
direct allocation
page execute and read and write
4E31000
heap
page read and write
1134000
heap
page read and write
4711000
heap
page read and write
2AFB000
heap
page read and write
436000
unkown
page execute and read and write
3E8E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
1134000
heap
page read and write
31CF000
stack
page read and write
44D1000
heap
page read and write
351F000
stack
page read and write
C1E000
stack
page read and write
5560000
direct allocation
page execute and read and write
4D30000
direct allocation
page execute and read and write
298E000
stack
page read and write
4B00000
direct allocation
page execute and read and write
1134000
heap
page read and write
4A01000
heap
page read and write
44FF000
stack
page read and write
4D00000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
BA4000
heap
page read and write
34BF000
stack
page read and write
4641000
heap
page read and write
4CDF000
stack
page read and write
3C0E000
stack
page read and write
90000
unkown
page read and write
409E000
stack
page read and write
5020000
direct allocation
page execute and read and write
4E90000
direct allocation
page read and write
3E8F000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
1494000
heap
page read and write
39FE000
stack
page read and write
546000
unkown
page execute and read and write
F70000
heap
page read and write
73C000
unkown
page execute and read and write
2D8000
unkown
page write copy
363E000
stack
page read and write
1C8000
unkown
page write copy
4D80000
direct allocation
page execute and read and write
4D30000
direct allocation
page execute and read and write
54A0000
direct allocation
page execute and read and write
3DBE000
stack
page read and write
27A0000
heap
page read and write
13A4000
heap
page read and write
793000
unkown
page execute and read and write
2A70000
direct allocation
page read and write
2A6C000
stack
page read and write
44D1000
heap
page read and write
4C60000
direct allocation
page execute and read and write
4A01000
heap
page read and write
1134000
heap
page read and write
463F000
stack
page read and write
4DAD000
heap
page read and write
33DF000
stack
page read and write
4D30000
direct allocation
page execute and read and write
441F000
stack
page read and write
377E000
stack
page read and write
4D30000
direct allocation
page execute and read and write
35FF000
stack
page read and write
2D20000
direct allocation
page read and write
1134000
heap
page read and write
D10000
direct allocation
page read and write
4AD0000
direct allocation
page execute and read and write
974000
heap
page read and write
4711000
heap
page read and write
2D20000
direct allocation
page read and write
974000
heap
page read and write
918000
unkown
page execute and read and write
4A01000
heap
page read and write
48BF000
stack
page read and write
35CF000
stack
page read and write
515A000
heap
page read and write
1134000
heap
page read and write
13A4000
heap
page read and write
5070000
direct allocation
page execute and read and write
2870000
heap
page read and write
3A1F000
stack
page read and write
C34000
heap
page read and write
3FFF000
stack
page read and write
E53000
heap
page read and write
44FF000
stack
page read and write
594000
unkown
page execute and write copy
2E4F000
stack
page read and write
428E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
424E000
stack
page read and write
4C90000
direct allocation
page execute and read and write
4B1C000
stack
page read and write
C34000
heap
page read and write
BA4000
heap
page read and write
7BD000
stack
page read and write
C34000
heap
page read and write
2F4F000
stack
page read and write
4BA0000
direct allocation
page read and write
2BCF000
stack
page read and write
13A4000
heap
page read and write
54C0000
direct allocation
page execute and read and write
2A87000
heap
page read and write
4AA0000
heap
page read and write
E3C000
stack
page read and write
2D20000
direct allocation
page read and write
37DE000
stack
page read and write
B90000
direct allocation
page read and write
324E000
stack
page read and write
509E000
stack
page read and write
2B1E000
stack
page read and write
4E20000
direct allocation
page read and write
2A70000
direct allocation
page read and write
661000
unkown
page execute and write copy
27EE000
unkown
page read and write
4A00000
heap
page read and write
3C7E000
stack
page read and write
4711000
heap
page read and write
BA4000
heap
page read and write
5040000
direct allocation
page execute and read and write
4E30000
direct allocation
page execute and read and write
1A1000
unkown
page execute and write copy
380F000
stack
page read and write
334F000
stack
page read and write
2ADE000
stack
page read and write
438F000
stack
page read and write
13A4000
heap
page read and write
5450000
direct allocation
page execute and read and write
4D30000
direct allocation
page execute and read and write
4D20000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
4640000
heap
page read and write
57D000
unkown
page execute and read and write
5470000
direct allocation
page execute and read and write
400E000
stack
page read and write
30FF000
stack
page read and write
3F1F000
stack
page read and write
2D8000
unkown
page read and write
495E000
stack
page read and write
3C0E000
stack
page read and write
1134000
heap
page read and write
43FE000
stack
page read and write
5020000
direct allocation
page execute and read and write
405F000
stack
page read and write
5110000
direct allocation
page execute and read and write
2D7C000
stack
page read and write
C34000
heap
page read and write
2D0F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
413F000
stack
page read and write
E51000
heap
page read and write
4641000
heap
page read and write
2FBF000
stack
page read and write
1134000
heap
page read and write
4D30000
direct allocation
page execute and read and write
C34000
heap
page read and write
5480000
direct allocation
page execute and read and write
453E000
stack
page read and write
C34000
heap
page read and write
348F000
stack
page read and write
5020000
direct allocation
page execute and read and write
B90000
direct allocation
page read and write
4CE0000
direct allocation
page execute and read and write
CF0000
heap
page read and write
5020000
direct allocation
page execute and read and write
5440000
direct allocation
page execute and read and write
9F0000
heap
page read and write
2990000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
2D20000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
2D7E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
3BCF000
stack
page read and write
4E7D000
stack
page read and write
E10000
heap
page read and write
D43000
heap
page read and write
3EFE000
stack
page read and write
558C000
heap
page read and write
4C30000
direct allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
387F000
stack
page read and write
4E00000
direct allocation
page execute and read and write
660000
unkown
page readonly
4BA0000
direct allocation
page read and write
4AC0000
direct allocation
page execute and read and write
44CF000
stack
page read and write
594000
unkown
page execute and read and write
2DC000
unkown
page execute and read and write
458000
unkown
page execute and read and write
3B3E000
stack
page read and write
38DF000
stack
page read and write
3C3F000
stack
page read and write
1134000
heap
page read and write
2850000
heap
page read and write
2D20000
direct allocation
page read and write
484000
unkown
page execute and write copy
2D8000
unkown
page write copy
D2A000
heap
page read and write
4E90000
direct allocation
page read and write
C34000
heap
page read and write
2D60000
heap
page read and write
44D1000
heap
page read and write
51D000
stack
page read and write
3B3E000
stack
page read and write
2A7E000
stack
page read and write
594000
unkown
page execute and write copy
9A0000
heap
page read and write
13B0000
heap
page read and write
1134000
heap
page read and write
4D50000
direct allocation
page execute and read and write
484000
unkown
page execute and read and write
2860000
direct allocation
page read and write
1C8000
unkown
page write copy
55A000
stack
page read and write
13A4000
heap
page read and write
2D4E000
stack
page read and write
1134000
heap
page read and write
4E20000
direct allocation
page read and write
42BE000
stack
page read and write
270E000
stack
page read and write
1134000
heap
page read and write
13A4000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
2A70000
direct allocation
page read and write
34CE000
stack
page read and write
4E20000
direct allocation
page read and write
2D3F000
stack
page read and write
498C000
stack
page read and write
5450000
direct allocation
page execute and read and write
44D1000
heap
page read and write
4D30000
direct allocation
page execute and read and write
3ECE000
stack
page read and write
1134000
heap
page read and write
4B20000
direct allocation
page execute and read and write
52AD000
stack
page read and write
2ACE000
stack
page read and write
5460000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
2F3E000
stack
page read and write
974000
heap
page read and write
13A0000
heap
page read and write
1134000
heap
page read and write
4B10000
direct allocation
page execute and read and write
39BF000
stack
page read and write
4C80000
direct allocation
page execute and read and write
F3C000
stack
page read and write
4A8F000
stack
page read and write
463F000
stack
page read and write
B90000
direct allocation
page read and write
A3D000
unkown
page execute and read and write
434F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
13A4000
heap
page read and write
594000
unkown
page execute and read and write
4641000
heap
page read and write
3EFE000
stack
page read and write
2A70000
direct allocation
page read and write
4AD0000
direct allocation
page execute and read and write
2800000
heap
page read and write
2D3000
unkown
page execute and read and write
4B90000
direct allocation
page execute and read and write
413F000
stack
page read and write
13A4000
heap
page read and write
4D50000
direct allocation
page execute and read and write
13A4000
heap
page read and write
4AD0000
direct allocation
page read and write
4711000
heap
page read and write
90000
unkown
page readonly
431E000
stack
page read and write
1A0000
unkown
page read and write
4AD0000
direct allocation
page read and write
2860000
direct allocation
page read and write
4D30000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
36CF000
stack
page read and write
5450000
direct allocation
page execute and read and write
4E50000
direct allocation
page execute and read and write
2D20000
direct allocation
page read and write
1C8000
unkown
page read and write
C34000
heap
page read and write
2F7C000
stack
page read and write
4B8E000
stack
page read and write
34BF000
stack
page read and write
1CC000
unkown
page execute and read and write
2A8F000
stack
page read and write
44D1000
heap
page read and write
458000
unkown
page execute and read and write
4910000
trusted library allocation
page read and write
A54000
unkown
page execute and read and write
4E31000
heap
page read and write
2FFE000
stack
page read and write
2FFE000
stack
page read and write
4D1E000
stack
page read and write
C34000
heap
page read and write
420F000
stack
page read and write
4B70000
direct allocation
page execute and read and write
29BC000
stack
page read and write
1134000
heap
page read and write
1134000
heap
page read and write
38BE000
stack
page read and write
2858000
heap
page read and write
4E20000
direct allocation
page read and write
B90000
direct allocation
page read and write
C34000
heap
page read and write
5420000
direct allocation
page execute and read and write
3C4E000
stack
page read and write
B90000
direct allocation
page read and write
4AE0000
direct allocation
page execute and read and write
373F000
stack
page read and write
530C000
stack
page read and write
42DF000
stack
page read and write
90000
unkown
page readonly
2D3000
unkown
page execute and read and write
53F2000
direct allocation
page read and write
1134000
heap
page read and write
33BE000
stack
page read and write
13A4000
heap
page read and write
5020000
direct allocation
page execute and read and write
C34000
heap
page read and write
4641000
heap
page read and write
476000
unkown
page execute and read and write
4DD0000
direct allocation
page execute and read and write
4641000
heap
page read and write
1134000
heap
page read and write
BB0000
heap
page read and write
4C60000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
2C3E000
stack
page read and write
4C70000
direct allocation
page execute and read and write
2D20000
direct allocation
page read and write
There are 908 hidden memdumps, click here to show them.