IOC Report
LisectAVT_2403002A_191.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_191.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_191.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_191.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.62
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
571000
unkown
page execute and read and write
malicious
151000
unkown
page execute and read and write
malicious
4820000
direct allocation
page read and write
malicious
4820000
direct allocation
page read and write
malicious
4640000
direct allocation
page read and write
malicious
4720000
direct allocation
page read and write
malicious
C81000
unkown
page execute and read and write
malicious
C81000
unkown
page execute and read and write
malicious
4450000
direct allocation
page read and write
malicious
571000
unkown
page execute and read and write
malicious
2A1F000
stack
page read and write
41AE000
stack
page read and write
2D6F000
stack
page read and write
331E000
stack
page read and write
3B5E000
stack
page read and write
347E000
stack
page read and write
4835000
heap
page read and write
366E000
stack
page read and write
151000
unkown
page execute and write copy
449E000
stack
page read and write
311F000
stack
page read and write
11D0000
direct allocation
page execute and read and write
478E000
stack
page read and write
365E000
stack
page read and write
2B9F000
stack
page read and write
4490000
direct allocation
page execute and read and write
32AE000
stack
page read and write
2A7E000
stack
page read and write
30BE000
stack
page read and write
7AE000
heap
page read and write
2CBF000
stack
page read and write
919000
unkown
page execute and read and write
32DF000
stack
page read and write
9F0000
heap
page read and write
2C9F000
stack
page read and write
4974000
heap
page read and write
2C5E000
stack
page read and write
87A000
unkown
page execute and read and write
F4C000
unkown
page execute and write copy
416F000
stack
page read and write
101A000
unkown
page execute and write copy
DB8000
unkown
page write copy
41AE000
stack
page read and write
3D9F000
stack
page read and write
1277000
heap
page read and write
919000
unkown
page execute and write copy
2F5E000
stack
page read and write
45DE000
stack
page read and write
2ABE000
stack
page read and write
452F000
stack
page read and write
3BBF000
stack
page read and write
6B8000
unkown
page execute and write copy
8E0000
heap
page read and write
F64000
unkown
page execute and write copy
4740000
direct allocation
page execute and read and write
391E000
stack
page read and write
DB3000
unkown
page execute and read and write
38AF000
stack
page read and write
406E000
stack
page read and write
459F000
stack
page read and write
455F000
stack
page read and write
319F000
stack
page read and write
28C000
unkown
page execute and write copy
101A000
unkown
page execute and write copy
854000
unkown
page execute and write copy
2EEE000
stack
page read and write
CEF000
stack
page read and write
82F000
unkown
page execute and read and write
4490000
direct allocation
page execute and read and write
9F5000
heap
page read and write
F76000
unkown
page execute and read and write
47B000
unkown
page execute and read and write
DBB000
unkown
page read and write
298000
unkown
page execute and write copy
3F5E000
stack
page read and write
838000
unkown
page execute and read and write
32FF000
stack
page read and write
305E000
stack
page read and write
312F000
stack
page read and write
41DE000
stack
page read and write
82C000
unkown
page execute and read and write
4680000
direct allocation
page execute and read and write
2A90000
heap
page read and write
F48000
unkown
page execute and write copy
2EAF000
stack
page read and write
431E000
stack
page read and write
11D0000
direct allocation
page execute and read and write
3BFD000
stack
page read and write
856000
unkown
page execute and read and write
DC6000
unkown
page execute and write copy
3CFF000
stack
page read and write
2DDE000
stack
page read and write
89A000
unkown
page execute and write copy
11D0000
direct allocation
page execute and read and write
4465000
heap
page read and write
F20000
unkown
page execute and read and write
82F000
unkown
page execute and read and write
C81000
unkown
page execute and write copy
4740000
direct allocation
page execute and read and write
352E000
stack
page read and write
1029000
unkown
page execute and write copy
345E000
stack
page read and write
6B6000
unkown
page execute and write copy
316E000
stack
page read and write
DBC000
unkown
page execute and write copy
3B5F000
stack
page read and write
4740000
direct allocation
page execute and read and write
F5B000
unkown
page execute and write copy
A42000
heap
page read and write
260E000
stack
page read and write
570000
unkown
page readonly
1029000
unkown
page execute and write copy
3A2E000
stack
page read and write
F48000
unkown
page execute and read and write
2CFE000
stack
page read and write
4490000
direct allocation
page execute and read and write
90A000
unkown
page execute and write copy
866000
unkown
page execute and read and write
351E000
stack
page read and write
37DF000
stack
page read and write
2AC0000
direct allocation
page execute and read and write
A00000
heap
page read and write
42C000
unkown
page execute and read and write
4680000
direct allocation
page execute and read and write
4740000
direct allocation
page execute and read and write
4C8000
unkown
page execute and write copy
4F9000
unkown
page execute and read and write
6AC000
unkown
page execute and write copy
101A000
unkown
page execute and write copy
1137000
heap
page read and write
A36000
heap
page read and write
274E000
stack
page read and write
369E000
stack
page read and write
DB8000
unkown
page write copy
3CDF000
stack
page read and write
1012000
unkown
page execute and write copy
F7E000
unkown
page execute and write copy
2DAE000
stack
page read and write
315F000
stack
page read and write
880000
heap
page read and write
4996000
heap
page read and write
838000
unkown
page execute and read and write
FE5000
unkown
page execute and read and write
3FBE000
stack
page read and write
3DEE000
stack
page read and write
DB8000
unkown
page write copy
812000
unkown
page execute and write copy
980000
heap
page read and write
F3F000
unkown
page execute and read and write
11D0000
direct allocation
page execute and read and write
C80000
unkown
page read and write
844000
unkown
page execute and read and write
434000
unkown
page execute and write copy
FF8000
unkown
page execute and write copy
4490000
direct allocation
page execute and read and write
497B000
heap
page read and write
4680000
direct allocation
page execute and read and write
34DF000
stack
page read and write
84C000
unkown
page execute and read and write
E10000
heap
page read and write
4860000
direct allocation
page execute and read and write
301E000
stack
page read and write
FFB000
unkown
page execute and write copy
445E000
stack
page read and write
46DF000
stack
page read and write
101A000
unkown
page execute and write copy
31FE000
stack
page read and write
333E000
stack
page read and write
288000
unkown
page write copy
FAB000
unkown
page execute and read and write
2FEF000
stack
page read and write
8D5000
unkown
page execute and read and write
1012000
unkown
page execute and write copy
437E000
stack
page read and write
442E000
stack
page read and write
45BF000
stack
page read and write
AF8000
heap
page read and write
B32000
heap
page read and write
A40000
heap
page read and write
DC7000
unkown
page execute and read and write
302E000
stack
page read and write
865000
unkown
page execute and write copy
4740000
direct allocation
page execute and read and write
4490000
direct allocation
page execute and read and write
4680000
direct allocation
page execute and read and write
C10000
heap
page read and write
45C0000
heap
page read and write
3E1E000
stack
page read and write
810000
unkown
page execute and read and write
C80000
unkown
page readonly
84C000
unkown
page execute and read and write
F5C000
unkown
page execute and read and write
40DE000
stack
page read and write
4790000
heap
page read and write
28B000
unkown
page read and write
361F000
stack
page read and write
296000
unkown
page execute and write copy
3ABE000
stack
page read and write
307F000
stack
page read and write
325F000
stack
page read and write
6A8000
unkown
page write copy
418000
unkown
page execute and write copy
4680000
direct allocation
page execute and read and write
37DE000
stack
page read and write
497E000
stack
page read and write
2CDF000
stack
page read and write
4740000
direct allocation
page execute and read and write
6B7000
unkown
page execute and read and write
108F000
stack
page read and write
1190000
heap
page read and write
391F000
stack
page read and write
6AC000
unkown
page execute and read and write
A75000
heap
page read and write
150000
unkown
page read and write
4B5E000
stack
page read and write
31BF000
stack
page read and write
402F000
stack
page read and write
DB8000
unkown
page write copy
389F000
stack
page read and write
1029000
unkown
page execute and read and write
E9A000
heap
page read and write
4A5E000
stack
page read and write
90A000
unkown
page execute and write copy
38EE000
stack
page read and write
571000
unkown
page execute and write copy
435E000
stack
page read and write
7AE000
heap
page read and write
3B2F000
stack
page read and write
F64000
unkown
page execute and write copy
89B000
unkown
page execute and read and write
116E000
stack
page read and write
2B5E000
stack
page read and write
270F000
stack
page read and write
4582000
direct allocation
page read and write
4654000
heap
page read and write
11D0000
direct allocation
page execute and read and write
82C000
unkown
page execute and read and write
F3C000
unkown
page execute and read and write
FFB000
unkown
page execute and write copy
4490000
direct allocation
page execute and read and write
4740000
direct allocation
page execute and read and write
838000
unkown
page execute and write copy
4EA000
unkown
page execute and write copy
4CB000
unkown
page execute and write copy
F20000
unkown
page execute and read and write
DC8000
unkown
page execute and write copy
6A3000
unkown
page execute and read and write
3A5E000
stack
page read and write
2A3F000
stack
page read and write
38DF000
stack
page read and write
F5C000
unkown
page execute and read and write
28C000
unkown
page execute and read and write
C4E000
stack
page read and write
4952000
direct allocation
page read and write
76D000
heap
page read and write
2F7E000
stack
page read and write
2EDF000
stack
page read and write
865000
unkown
page execute and write copy
41DF000
stack
page read and write
379F000
stack
page read and write
B2A000
heap
page read and write
8D3000
unkown
page execute and read and write
DC8000
unkown
page execute and write copy
86E000
unkown
page execute and write copy
3DA0000
heap
page read and write
301F000
stack
page read and write
4490000
direct allocation
page execute and read and write
F22000
unkown
page execute and write copy
11D0000
direct allocation
page execute and read and write
115E000
stack
page read and write
902000
unkown
page execute and write copy
A38000
heap
page read and write
47A000
unkown
page execute and write copy
419F000
stack
page read and write
3C6F000
stack
page read and write
11D0000
direct allocation
page execute and read and write
34EF000
stack
page read and write
376F000
stack
page read and write
4490000
direct allocation
page execute and read and write
3E7E000
stack
page read and write
4A5D000
stack
page read and write
3B6E000
stack
page read and write
43EF000
stack
page read and write
E2E000
heap
page read and write
4490000
direct allocation
page execute and read and write
33DE000
stack
page read and write
D80000
heap
page read and write
379E000
stack
page read and write
441F000
stack
page read and write
4977000
heap
page read and write
2BDF000
stack
page read and write
4B3000
unkown
page execute and read and write
4860000
direct allocation
page execute and read and write
4740000
direct allocation
page execute and read and write
6B6000
unkown
page execute and write copy
89A000
unkown
page execute and write copy
4680000
direct allocation
page execute and read and write
FAB000
unkown
page execute and read and write
4E2000
unkown
page execute and write copy
4929000
heap
page read and write
357F000
stack
page read and write
381E000
stack
page read and write
A42000
heap
page read and write
6A3000
unkown
page execute and read and write
2F1E000
stack
page read and write
47DF000
stack
page read and write
355E000
stack
page read and write
2B1F000
stack
page read and write
124E000
stack
page read and write
11B0000
heap
page read and write
902000
unkown
page execute and write copy
DBC000
unkown
page execute and read and write
40F000
unkown
page execute and read and write
31DE000
stack
page read and write
8D5000
unkown
page execute and read and write
A50000
heap
page read and write
341E000
stack
page read and write
3CDE000
stack
page read and write
4B5000
unkown
page execute and read and write
87A000
unkown
page execute and read and write
4490000
direct allocation
page execute and read and write
38DE000
stack
page read and write
A08000
heap
page read and write
297000
unkown
page execute and read and write
4860000
direct allocation
page execute and read and write
4680000
direct allocation
page execute and read and write
E20000
heap
page read and write
4680000
direct allocation
page execute and read and write
409E000
stack
page read and write
D85000
heap
page read and write
B32000
heap
page read and write
9AC000
stack
page read and write
45A000
unkown
page execute and read and write
2FDF000
stack
page read and write
33DF000
stack
page read and write
F48000
unkown
page execute and read and write
F54000
unkown
page execute and read and write
445F000
stack
page read and write
406E000
stack
page read and write
812000
unkown
page execute and write copy
3F7F000
stack
page read and write
E0E000
stack
page read and write
DBB000
unkown
page read and write
AF0000
heap
page read and write
A57000
heap
page read and write
424000
unkown
page execute and read and write
8AC000
stack
page read and write
36DE000
stack
page read and write
42B000
unkown
page execute and write copy
930000
heap
page read and write
F3E000
unkown
page execute and write copy
37FF000
stack
page read and write
F48000
unkown
page execute and write copy
3F9E000
stack
page read and write
FE3000
unkown
page execute and read and write
446000
unkown
page execute and read and write
84B000
unkown
page execute and write copy
E6F000
heap
page read and write
343F000
stack
page read and write
1014000
unkown
page execute and write copy
46DE000
stack
page read and write
A40000
heap
page read and write
2ADF000
stack
page read and write
112F000
stack
page read and write
1029000
unkown
page execute and read and write
3B1E000
stack
page read and write
3B9F000
stack
page read and write
3F2E000
stack
page read and write
6A8000
unkown
page write copy
83C000
unkown
page execute and write copy
63C000
stack
page read and write
3A1F000
stack
page read and write
2E3E000
stack
page read and write
4852000
direct allocation
page read and write
D6E000
stack
page read and write
3DAF000
stack
page read and write
4993000
heap
page read and write
40BF000
stack
page read and write
3A9E000
stack
page read and write
2F3F000
stack
page read and write
4E4000
unkown
page execute and write copy
C80000
unkown
page read and write
35BE000
stack
page read and write
F3F000
unkown
page execute and read and write
40C000
unkown
page execute and read and write
102A000
unkown
page execute and write copy
E90000
heap
page read and write
8D3000
unkown
page execute and read and write
42AF000
stack
page read and write
D6E000
stack
page read and write
40E000
unkown
page execute and write copy
76A000
heap
page read and write
FAA000
unkown
page execute and write copy
3A7F000
stack
page read and write
150000
unkown
page readonly
436000
unkown
page execute and read and write
82E000
unkown
page execute and write copy
919000
unkown
page execute and read and write
1013000
unkown
page execute and read and write
433F000
stack
page read and write
5CC000
stack
page read and write
F75000
unkown
page execute and write copy
DB3000
unkown
page execute and read and write
329E000
stack
page read and write
3F2000
unkown
page execute and write copy
4825000
heap
page read and write
326F000
stack
page read and write
289E000
stack
page read and write
1250000
heap
page read and write
902000
unkown
page execute and write copy
810000
unkown
page execute and read and write
359E000
stack
page read and write
42EE000
stack
page read and write
844000
unkown
page execute and read and write
283000
unkown
page execute and read and write
E6F000
heap
page read and write
405F000
stack
page read and write
903000
unkown
page execute and read and write
456E000
stack
page read and write
4830000
direct allocation
page execute and read and write
9AC000
stack
page read and write
F76000
unkown
page execute and read and write
402F000
stack
page read and write
4490000
direct allocation
page execute and read and write
47AF000
stack
page read and write
8E5000
heap
page read and write
C7E000
stack
page read and write
2B1E000
stack
page read and write
33AF000
stack
page read and write
6B7000
unkown
page execute and read and write
11D0000
direct allocation
page execute and read and write
3A1E000
stack
page read and write
40FE000
stack
page read and write
383E000
stack
page read and write
3DEE000
stack
page read and write
4E3000
unkown
page execute and read and write
2E1E000
stack
page read and write
339F000
stack
page read and write
11E0000
heap
page read and write
11E7000
heap
page read and write
4680000
direct allocation
page execute and read and write
904000
unkown
page execute and write copy
29DE000
stack
page read and write
6AB000
unkown
page read and write
4460000
direct allocation
page execute and read and write
1012000
unkown
page execute and write copy
570000
unkown
page read and write
F4C000
unkown
page execute and write copy
856000
unkown
page execute and read and write
42EE000
stack
page read and write
4680000
direct allocation
page execute and read and write
3F2E000
stack
page read and write
86E000
unkown
page execute and write copy
F5B000
unkown
page execute and write copy
3BDE000
stack
page read and write
351F000
stack
page read and write
459E000
stack
page read and write
4925000
heap
page read and write
421E000
stack
page read and write
43EF000
stack
page read and write
423E000
stack
page read and write
39DF000
stack
page read and write
445000
unkown
page execute and write copy
4E2000
unkown
page execute and write copy
4F9000
unkown
page execute and write copy
6AC000
unkown
page execute and write copy
DBC000
unkown
page execute and read and write
41FF000
stack
page read and write
299F000
stack
page read and write
2B7F000
stack
page read and write
F8A000
unkown
page execute and read and write
11D0000
direct allocation
page execute and read and write
42AF000
stack
page read and write
DBC000
unkown
page execute and write copy
4772000
direct allocation
page read and write
32DE000
stack
page read and write
4860000
direct allocation
page execute and read and write
4680000
direct allocation
page execute and read and write
409F000
stack
page read and write
4680000
direct allocation
page execute and read and write
495D000
stack
page read and write
F22000
unkown
page execute and write copy
3A5F000
stack
page read and write
E9E000
heap
page read and write
2EDE000
stack
page read and write
903000
unkown
page execute and read and write
41C000
unkown
page execute and write copy
3C5F000
stack
page read and write
309E000
stack
page read and write
33EE000
stack
page read and write
3B9E000
stack
page read and write
904000
unkown
page execute and write copy
291E000
stack
page read and write
2A60000
heap
page read and write
285F000
stack
page read and write
C81000
unkown
page execute and write copy
4860000
direct allocation
page execute and read and write
FE5000
unkown
page execute and read and write
866000
unkown
page execute and read and write
393F000
stack
page read and write
4740000
direct allocation
page execute and read and write
570000
unkown
page readonly
11AE000
stack
page read and write
ED6000
heap
page read and write
431F000
stack
page read and write
84B000
unkown
page execute and write copy
2A5E000
stack
page read and write
2C1F000
stack
page read and write
C80000
unkown
page readonly
73C000
stack
page read and write
3E1F000
stack
page read and write
4FA000
unkown
page execute and write copy
571000
unkown
page execute and write copy
9D0000
heap
page read and write
6AB000
unkown
page read and write
3F5F000
stack
page read and write
A40000
heap
page read and write
B0C000
heap
page read and write
89B000
unkown
page execute and read and write
8FC000
stack
page read and write
3EEF000
stack
page read and write
1012000
unkown
page execute and write copy
3CAE000
stack
page read and write
D20000
heap
page read and write
4740000
direct allocation
page execute and read and write
319E000
stack
page read and write
6A8000
unkown
page write copy
2A70000
heap
page read and write
4860000
direct allocation
page execute and read and write
F3C000
unkown
page execute and read and write
2D5F000
stack
page read and write
36FE000
stack
page read and write
305F000
stack
page read and write
F54000
unkown
page execute and read and write
90A000
unkown
page execute and write copy
2F1F000
stack
page read and write
469F000
stack
page read and write
365F000
stack
page read and write
F66000
unkown
page execute and read and write
4860000
direct allocation
page execute and read and write
39EF000
stack
page read and write
2DFF000
stack
page read and write
ABE000
stack
page read and write
2C6F000
stack
page read and write
4860000
direct allocation
page execute and read and write
4740000
direct allocation
page execute and read and write
760000
heap
page read and write
3E5E000
stack
page read and write
919000
unkown
page execute and write copy
FF8000
unkown
page execute and write copy
1270000
heap
page read and write
329F000
stack
page read and write
1130000
heap
page read and write
3DDF000
stack
page read and write
570000
unkown
page read and write
11D0000
direct allocation
page execute and read and write
4740000
direct allocation
page execute and read and write
3E3F000
stack
page read and write
F8A000
unkown
page execute and read and write
315E000
stack
page read and write
C20000
heap
page read and write
466F000
stack
page read and write
369F000
stack
page read and write
3D1E000
stack
page read and write
6B8000
unkown
page execute and write copy
3EEF000
stack
page read and write
55D000
stack
page read and write
E67000
heap
page read and write
44BE000
stack
page read and write
3F1E000
stack
page read and write
838000
unkown
page execute and write copy
499A000
heap
page read and write
37AE000
stack
page read and write
3D3E000
stack
page read and write
487E000
stack
page read and write
4490000
direct allocation
page execute and read and write
83C000
unkown
page execute and write copy
F7E000
unkown
page execute and write copy
854000
unkown
page execute and write copy
8EB000
unkown
page execute and write copy
91A000
unkown
page execute and write copy
890000
heap
page read and write
7A6000
heap
page read and write
36BF000
stack
page read and write
395E000
stack
page read and write
8EB000
unkown
page execute and write copy
498F000
heap
page read and write
4A4E000
stack
page read and write
3F0000
unkown
page execute and read and write
102A000
unkown
page execute and write copy
FAA000
unkown
page execute and write copy
6A8000
unkown
page write copy
341F000
stack
page read and write
47B0000
heap
page read and write
DC7000
unkown
page execute and read and write
CFD000
stack
page read and write
2AD0000
heap
page read and write
8E8000
unkown
page execute and write copy
8E8000
unkown
page execute and write copy
F66000
unkown
page execute and read and write
F75000
unkown
page execute and write copy
355F000
stack
page read and write
C50000
heap
page read and write
4EA000
unkown
page execute and write copy
2BBE000
stack
page read and write
6AC000
unkown
page execute and read and write
B26000
heap
page read and write
4860000
direct allocation
page execute and read and write
2E9F000
stack
page read and write
11D0000
direct allocation
page execute and read and write
45C000
stack
page read and write
90A000
unkown
page execute and write copy
FE3000
unkown
page execute and read and write
91A000
unkown
page execute and write copy
44E000
unkown
page execute and write copy
DC6000
unkown
page execute and write copy
447F000
stack
page read and write
E2A000
heap
page read and write
4860000
direct allocation
page execute and read and write
1014000
unkown
page execute and write copy
EDE000
heap
page read and write
11D0000
direct allocation
page execute and read and write
4650000
direct allocation
page execute and read and write
4978000
heap
page read and write
288000
unkown
page write copy
1013000
unkown
page execute and read and write
42DF000
stack
page read and write
3C9F000
stack
page read and write
468D000
stack
page read and write
120E000
stack
page read and write
46AE000
stack
page read and write
375F000
stack
page read and write
902000
unkown
page execute and write copy
2D9E000
stack
page read and write
397E000
stack
page read and write
960000
heap
page read and write
C70000
direct allocation
page execute and read and write
418000
unkown
page execute and read and write
D10000
heap
page read and write
2DDF000
stack
page read and write
4952000
direct allocation
page read and write
362F000
stack
page read and write
2750000
heap
page read and write
4860000
direct allocation
page execute and read and write
82E000
unkown
page execute and write copy
472D000
heap
page read and write
4860000
direct allocation
page execute and read and write
2B60000
heap
page read and write
EDE000
heap
page read and write
F3E000
unkown
page execute and write copy
3C9E000
stack
page read and write
2D9F000
stack
page read and write
416F000
stack
page read and write
A70000
heap
page read and write
1197000
heap
page read and write
4B4E000
stack
page read and write
101F000
stack
page read and write
There are 647 hidden memdumps, click here to show them.