IOC Report
LisectAVT_2403002A_163.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_163.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_163.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_163.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
52C0000
direct allocation
page read and write
malicious
4A00000
direct allocation
page read and write
malicious
131000
unkown
page execute and read and write
malicious
131000
unkown
page execute and read and write
malicious
1D1000
unkown
page execute and read and write
malicious
4AA0000
direct allocation
page read and write
malicious
21000
unkown
page execute and read and write
malicious
4E30000
direct allocation
page read and write
malicious
4A10000
direct allocation
page read and write
malicious
1D1000
unkown
page execute and read and write
malicious
1D1000
unkown
page execute and write copy
4FA0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
10B4000
heap
page read and write
3AAF000
stack
page read and write
B64000
heap
page read and write
2FBE000
stack
page read and write
48AE000
stack
page read and write
3A0F000
stack
page read and write
4B50000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
5010000
direct allocation
page execute and read and write
10B4000
heap
page read and write
C60000
direct allocation
page read and write
4D10000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
1010000
heap
page read and write
CC4000
heap
page read and write
387E000
stack
page read and write
468F000
stack
page read and write
1090000
direct allocation
page read and write
CC4000
heap
page read and write
303000
unkown
page execute and read and write
15A0000
heap
page read and write
52F000
unkown
page execute and read and write
1480000
heap
page read and write
404F000
stack
page read and write
31AE000
stack
page read and write
1D0000
unkown
page readonly
5500000
direct allocation
page execute and read and write
131000
unkown
page execute and write copy
4601000
heap
page read and write
5440000
direct allocation
page execute and read and write
B3D000
stack
page read and write
1484000
heap
page read and write
4B80000
direct allocation
page execute and read and write
10B4000
heap
page read and write
368E000
stack
page read and write
3ABF000
stack
page read and write
4A7D000
stack
page read and write
10B4000
heap
page read and write
CC4000
heap
page read and write
1484000
heap
page read and write
4F80000
direct allocation
page execute and read and write
3CAF000
stack
page read and write
380E000
stack
page read and write
CC4000
heap
page read and write
C94000
heap
page read and write
2860000
direct allocation
page read and write
C80000
direct allocation
page read and write
158000
unkown
page read and write
CC4000
heap
page read and write
4C40000
direct allocation
page execute and read and write
6D9000
unkown
page execute and read and write
5410000
heap
page read and write
CC4000
heap
page read and write
383F000
stack
page read and write
4700000
trusted library allocation
page read and write
52F000
unkown
page execute and write copy
430E000
stack
page read and write
C80000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
49B1000
heap
page read and write
49C000
unkown
page execute and read and write
40AE000
stack
page read and write
2DCF000
stack
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
4C00000
direct allocation
page execute and read and write
49B1000
heap
page read and write
7B0000
heap
page read and write
4C50000
direct allocation
page execute and read and write
1090000
direct allocation
page read and write
394E000
stack
page read and write
4D0E000
stack
page read and write
C94000
heap
page read and write
530000
unkown
page execute and write copy
3DCF000
stack
page read and write
C80000
direct allocation
page read and write
11D9000
heap
page read and write
420E000
stack
page read and write
337E000
stack
page read and write
BE0000
heap
page read and write
4F6F000
stack
page read and write
1484000
heap
page read and write
41CE000
stack
page read and write
10B4000
heap
page read and write
1180000
direct allocation
page read and write
3A4E000
stack
page read and write
316F000
stack
page read and write
1090000
direct allocation
page read and write
B64000
heap
page read and write
2EEF000
stack
page read and write
CC4000
heap
page read and write
E7E000
heap
page read and write
5410000
direct allocation
page execute and read and write
4CC0000
direct allocation
page execute and read and write
4DF000
unkown
page execute and read and write
302F000
stack
page read and write
4E6B000
stack
page read and write
3AFE000
stack
page read and write
CC4000
heap
page read and write
E7A000
heap
page read and write
4C60000
direct allocation
page execute and read and write
C90000
heap
page read and write
4C60000
direct allocation
page execute and read and write
1484000
heap
page read and write
32EE000
stack
page read and write
10B4000
heap
page read and write
4CA6000
heap
page read and write
4570000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
3C2E000
stack
page read and write
2D10000
direct allocation
page execute and read and write
263000
unkown
page execute and read and write
5440000
direct allocation
page execute and read and write
C94000
heap
page read and write
CC4000
heap
page read and write
37EE000
stack
page read and write
5440000
direct allocation
page execute and read and write
11E1000
heap
page read and write
15C000
unkown
page execute and read and write
390F000
stack
page read and write
4C20000
direct allocation
page execute and read and write
C94000
heap
page read and write
4CCF000
stack
page read and write
340F000
stack
page read and write
B64000
heap
page read and write
CC4000
heap
page read and write
49EE000
stack
page read and write
5080000
direct allocation
page execute and read and write
4571000
heap
page read and write
302F000
stack
page read and write
C60000
direct allocation
page read and write
1484000
heap
page read and write
4D30000
direct allocation
page execute and read and write
3CF000
unkown
page execute and read and write
10B4000
heap
page read and write
35AF000
stack
page read and write
3A4F000
stack
page read and write
356E000
stack
page read and write
C80000
direct allocation
page read and write
4BD0000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
2D3E000
stack
page read and write
308000
unkown
page write copy
280E000
stack
page read and write
354F000
stack
page read and write
4B80000
direct allocation
page execute and read and write
E60000
direct allocation
page execute and read and write
57F000
unkown
page execute and read and write
10B4000
heap
page read and write
490F000
stack
page read and write
4571000
heap
page read and write
418F000
stack
page read and write
B73000
heap
page read and write
10B4000
heap
page read and write
32CE000
stack
page read and write
15F2000
heap
page read and write
366F000
stack
page read and write
480E000
stack
page read and write
B64000
heap
page read and write
C6E000
stack
page read and write
3E0F000
stack
page read and write
153000
unkown
page execute and read and write
41CF000
stack
page read and write
CC4000
heap
page read and write
AFD000
stack
page read and write
CC4000
heap
page read and write
39AE000
stack
page read and write
C80000
direct allocation
page read and write
39BE000
stack
page read and write
4F80000
direct allocation
page execute and read and write
2D20000
heap
page read and write
308000
unkown
page read and write
CC4000
heap
page read and write
2E7E000
stack
page read and write
130000
unkown
page read and write
263000
unkown
page execute and read and write
390E000
stack
page read and write
4E21000
heap
page read and write
38CF000
stack
page read and write
406F000
stack
page read and write
2860000
direct allocation
page read and write
52FC000
stack
page read and write
5040000
direct allocation
page execute and read and write
2CFF000
stack
page read and write
5B8000
unkown
page execute and read and write
4B50000
direct allocation
page execute and read and write
11AB000
heap
page read and write
4AB0000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
B86000
heap
page read and write
382F000
stack
page read and write
333F000
stack
page read and write
3EBE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
5050000
direct allocation
page execute and read and write
10B4000
heap
page read and write
10B4000
heap
page read and write
476E000
stack
page read and write
4E2D000
stack
page read and write
4690000
trusted library allocation
page read and write
EC7000
heap
page read and write
5480000
direct allocation
page execute and read and write
B64000
heap
page read and write
C87000
heap
page read and write
4B80000
direct allocation
page execute and read and write
26CB000
stack
page read and write
3CCF000
stack
page read and write
2C6F000
stack
page read and write
4C20000
direct allocation
page execute and read and write
49B1000
heap
page read and write
44EE000
stack
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
26C000
unkown
page execute and read and write
40CE000
stack
page read and write
B64000
heap
page read and write
4B80000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
3A2F000
stack
page read and write
1090000
direct allocation
page read and write
4571000
heap
page read and write
B64000
heap
page read and write
1090000
direct allocation
page read and write
B64000
heap
page read and write
2EC000
unkown
page execute and read and write
1557000
heap
page read and write
2E0E000
stack
page read and write
5560000
direct allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
52F000
unkown
page execute and write copy
4B50000
direct allocation
page execute and read and write
49B0000
heap
page read and write
10B4000
heap
page read and write
5D0000
unkown
page execute and write copy
C80000
direct allocation
page read and write
3A8E000
stack
page read and write
C1B000
heap
page read and write
52B0000
direct allocation
page read and write
4E21000
heap
page read and write
5450000
direct allocation
page execute and read and write
30FE000
stack
page read and write
54A0000
direct allocation
page execute and read and write
C94000
heap
page read and write
C94000
heap
page read and write
4E10000
direct allocation
page read and write
C80000
direct allocation
page read and write
396F000
stack
page read and write
4E10000
direct allocation
page read and write
CC4000
heap
page read and write
4E10000
direct allocation
page read and write
4B80000
direct allocation
page execute and read and write
CC4000
heap
page read and write
B64000
heap
page read and write
1484000
heap
page read and write
26C000
unkown
page execute and read and write
4BF0000
heap
page read and write
41AF000
stack
page read and write
308E000
stack
page read and write
1180000
direct allocation
page read and write
440F000
stack
page read and write
530000
unkown
page execute and write copy
10B0000
heap
page read and write
397F000
stack
page read and write
31FF000
stack
page read and write
4E10000
direct allocation
page read and write
4BA0000
direct allocation
page execute and read and write
2CBE000
stack
page read and write
5440000
direct allocation
page execute and read and write
3B8F000
stack
page read and write
3CEE000
stack
page read and write
2860000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
CC4000
heap
page read and write
B80000
heap
page read and write
268000
unkown
page read and write
4E21000
heap
page read and write
49B1000
heap
page read and write
1080000
heap
page read and write
34AE000
stack
page read and write
1604000
heap
page read and write
7D0000
heap
page read and write
346F000
stack
page read and write
5090000
direct allocation
page execute and read and write
30C000
unkown
page execute and read and write
268E000
stack
page read and write
DCF000
stack
page read and write
49B1000
heap
page read and write
54F0000
direct allocation
page execute and read and write
32CF000
stack
page read and write
5CF000
unkown
page execute and read and write
139F000
stack
page read and write
10B4000
heap
page read and write
11E1000
heap
page read and write
1090000
direct allocation
page read and write
158000
unkown
page write copy
352F000
stack
page read and write
4B60000
direct allocation
page execute and read and write
10B4000
heap
page read and write
386E000
stack
page read and write
44BF000
stack
page read and write
420000
unkown
page execute and write copy
1484000
heap
page read and write
49B1000
heap
page read and write
7A0000
heap
page read and write
5060000
direct allocation
page execute and read and write
4E10000
direct allocation
page read and write
5CF000
unkown
page execute and read and write
52F000
unkown
page execute and read and write
C94000
heap
page read and write
5CF000
unkown
page execute and write copy
3F4E000
stack
page read and write
3B8E000
stack
page read and write
290F000
stack
page read and write
4601000
heap
page read and write
268000
unkown
page write copy
130000
unkown
page readonly
E6F000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4F5E000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
C94000
heap
page read and write
284B000
stack
page read and write
C60000
direct allocation
page read and write
2E3F000
stack
page read and write
4591000
heap
page read and write
50AD000
heap
page read and write
4591000
heap
page read and write
15FC000
heap
page read and write
4D20000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
B64000
heap
page read and write
268000
unkown
page write copy
5440000
direct allocation
page execute and read and write
C94000
heap
page read and write
C25000
heap
page read and write
4E10000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
4CF0000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
297F000
stack
page read and write
4E10000
direct allocation
page read and write
2850000
heap
page read and write
43BE000
stack
page read and write
4C90000
direct allocation
page execute and read and write
458F000
stack
page read and write
10B4000
heap
page read and write
4E21000
heap
page read and write
3BEF000
stack
page read and write
4E21000
heap
page read and write
2860000
direct allocation
page read and write
4591000
heap
page read and write
2F0F000
stack
page read and write
40FF000
stack
page read and write
2860000
direct allocation
page read and write
C60000
direct allocation
page read and write
3E7F000
stack
page read and write
B64000
heap
page read and write
CC4000
heap
page read and write
2CCE000
stack
page read and write
1485000
heap
page read and write
CC4000
heap
page read and write
10B4000
heap
page read and write
C11000
heap
page read and write
368F000
stack
page read and write
4C20000
direct allocation
page execute and read and write
CC4000
heap
page read and write
4C73000
heap
page read and write
4F80000
direct allocation
page execute and read and write
486F000
stack
page read and write
10B4000
heap
page read and write
CC4000
heap
page read and write
45EF000
stack
page read and write
52B0000
direct allocation
page read and write
521000
unkown
page execute and read and write
342E000
stack
page read and write
1604000
heap
page read and write
2BFE000
stack
page read and write
3BCE000
stack
page read and write
42EF000
stack
page read and write
347F000
stack
page read and write
4A4B000
stack
page read and write
CC4000
heap
page read and write
2870000
heap
page read and write
518000
unkown
page execute and read and write
4CB0000
direct allocation
page execute and read and write
344E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
C90000
direct allocation
page read and write
2BBF000
stack
page read and write
5C9000
unkown
page execute and read and write
113B000
stack
page read and write
C94000
heap
page read and write
35FE000
stack
page read and write
4E21000
heap
page read and write
10B4000
heap
page read and write
350F000
stack
page read and write
1484000
heap
page read and write
323E000
stack
page read and write
E70000
heap
page read and write
4571000
heap
page read and write
408000
unkown
page execute and read and write
3D6E000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
4B70000
direct allocation
page execute and read and write
373E000
stack
page read and write
10B4000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
EFD000
stack
page read and write
4B50000
direct allocation
page execute and read and write
35BF000
stack
page read and write
318F000
stack
page read and write
1550000
heap
page read and write
33EF000
stack
page read and write
CC4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
4590000
heap
page read and write
4B80000
direct allocation
page execute and read and write
4E21000
heap
page read and write
41EE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
C25000
heap
page read and write
B64000
heap
page read and write
10B4000
heap
page read and write
4A3C000
stack
page read and write
C94000
heap
page read and write
1484000
heap
page read and write
4C60000
direct allocation
page execute and read and write
1484000
heap
page read and write
C70000
heap
page read and write
CC4000
heap
page read and write
2A4E000
stack
page read and write
5000000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
4E10000
direct allocation
page read and write
4601000
heap
page read and write
CC4000
heap
page read and write
4601000
heap
page read and write
4670000
trusted library allocation
page read and write
306E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
38EF000
stack
page read and write
4E66000
heap
page read and write
4B3F000
stack
page read and write
49F0000
direct allocation
page read and write
4C20000
direct allocation
page execute and read and write
1484000
heap
page read and write
437F000
stack
page read and write
C80000
direct allocation
page read and write
2B4F000
stack
page read and write
76C000
stack
page read and write
B64000
heap
page read and write
3F6E000
stack
page read and write
C80000
direct allocation
page read and write
1090000
direct allocation
page read and write
41F000
unkown
page execute and read and write
CC4000
heap
page read and write
322F000
stack
page read and write
EB5000
heap
page read and write
413E000
stack
page read and write
4ADB000
stack
page read and write
C80000
direct allocation
page read and write
1484000
heap
page read and write
3E2E000
stack
page read and write
4C80000
direct allocation
page execute and read and write
C60000
direct allocation
page read and write
5550000
direct allocation
page execute and read and write
2B6E000
stack
page read and write
318C000
stack
page read and write
1484000
heap
page read and write
5440000
direct allocation
page execute and read and write
5440000
direct allocation
page execute and read and write
4F62000
direct allocation
page read and write
4D51000
heap
page read and write
B86000
heap
page read and write
4F90000
direct allocation
page execute and read and write
2720000
heap
page read and write
53F2000
direct allocation
page read and write
6D9000
unkown
page execute and read and write
46CE000
stack
page read and write
B60000
heap
page read and write
4B60000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
C94000
heap
page read and write
CC4000
heap
page read and write
2CAE000
stack
page read and write
49F0000
direct allocation
page read and write
3B6F000
stack
page read and write
392E000
stack
page read and write
340E000
stack
page read and write
10B4000
heap
page read and write
C60000
direct allocation
page read and write
426E000
stack
page read and write
408F000
stack
page read and write
123C000
stack
page read and write
4571000
heap
page read and write
37AF000
stack
page read and write
2C7E000
stack
page read and write
C94000
heap
page read and write
442F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
4A90000
direct allocation
page read and write
B64000
heap
page read and write
4600000
heap
page read and write
B7E000
heap
page read and write
4601000
heap
page read and write
4C40000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
C94000
heap
page read and write
C94000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
E4B000
stack
page read and write
131000
unkown
page execute and write copy
4C70000
direct allocation
page execute and read and write
1090000
direct allocation
page read and write
B3E000
heap
page read and write
378F000
stack
page read and write
54D0000
direct allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
5070000
direct allocation
page execute and read and write
458E000
stack
page read and write
4D40000
direct allocation
page execute and read and write
BB0000
heap
page read and write
4601000
heap
page read and write
5030000
direct allocation
page execute and read and write
C60000
direct allocation
page read and write
4BCE000
stack
page read and write
B64000
heap
page read and write
C60000
direct allocation
page read and write
4F8E000
stack
page read and write
C94000
heap
page read and write
4F80000
direct allocation
page execute and read and write
4E10000
direct allocation
page read and write
2860000
direct allocation
page read and write
4CD0000
direct allocation
page execute and read and write
1484000
heap
page read and write
5430000
direct allocation
page execute and read and write
292F000
stack
page read and write
270E000
stack
page read and write
4F20000
trusted library allocation
page read and write
1090000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
5CF000
unkown
page execute and write copy
52B0000
direct allocation
page read and write
45FF000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
2E2F000
stack
page read and write
49B1000
heap
page read and write
5574000
heap
page read and write
5540000
direct allocation
page execute and read and write
4BB0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
4B8F000
stack
page read and write
330E000
stack
page read and write
3FC000
unkown
page execute and read and write
1484000
heap
page read and write
3DEF000
stack
page read and write
3FEE000
stack
page read and write
411000
unkown
page execute and read and write
35EE000
stack
page read and write
C94000
heap
page read and write
332F000
stack
page read and write
20000
unkown
page read and write
4B42000
direct allocation
page read and write
2877000
heap
page read and write
2B2F000
stack
page read and write
130000
unkown
page readonly
CC4000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
494E000
stack
page read and write
3BFF000
stack
page read and write
434E000
stack
page read and write
4E20000
heap
page read and write
CC4000
heap
page read and write
2A2F000
stack
page read and write
73C000
stack
page read and write
EBF000
heap
page read and write
539E000
stack
page read and write
2F4E000
stack
page read and write
C80000
direct allocation
page read and write
4B50000
direct allocation
page execute and read and write
CC4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
4601000
heap
page read and write
4C70000
direct allocation
page execute and read and write
1484000
heap
page read and write
1484000
heap
page read and write
C94000
heap
page read and write
10FE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
354E000
stack
page read and write
117E000
stack
page read and write
1484000
heap
page read and write
C80000
direct allocation
page read and write
CC4000
heap
page read and write
4B4F000
stack
page read and write
308000
unkown
page write copy
44AF000
stack
page read and write
C94000
heap
page read and write
5C1000
unkown
page execute and read and write
412E000
stack
page read and write
4571000
heap
page read and write
448E000
stack
page read and write
4B50000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
2727000
heap
page read and write
456F000
stack
page read and write
3D3F000
stack
page read and write
21000
unkown
page execute and write copy
44FE000
stack
page read and write
1484000
heap
page read and write
1390000
heap
page read and write
4C20000
direct allocation
page execute and read and write
3FBF000
stack
page read and write
C94000
heap
page read and write
E50000
direct allocation
page execute and read and write
15BA000
heap
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
2D00000
direct allocation
page execute and read and write
BD0000
heap
page read and write
779000
unkown
page execute and read and write
C60000
direct allocation
page read and write
4C20000
direct allocation
page execute and read and write
314F000
stack
page read and write
3E6F000
stack
page read and write
423F000
stack
page read and write
4E21000
heap
page read and write
4E21000
heap
page read and write
CC4000
heap
page read and write
43AE000
stack
page read and write
3D2F000
stack
page read and write
4A4F000
stack
page read and write
5B8000
unkown
page execute and read and write
518000
unkown
page execute and read and write
2F7F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
2CFE000
stack
page read and write
3D7E000
stack
page read and write
328F000
stack
page read and write
3BAE000
stack
page read and write
1D1000
unkown
page execute and write copy
5460000
direct allocation
page execute and read and write
49B1000
heap
page read and write
41F000
unkown
page execute and write copy
47CF000
stack
page read and write
1090000
direct allocation
page read and write
2A7F000
stack
page read and write
444E000
stack
page read and write
1090000
direct allocation
page read and write
4E66000
heap
page read and write
585E000
stack
page read and write
C90000
direct allocation
page read and write
C50000
heap
page read and write
4571000
heap
page read and write
AFC000
stack
page read and write
CC4000
heap
page read and write
3FFE000
stack
page read and write
CC4000
heap
page read and write
3FC000
unkown
page execute and read and write
49C000
unkown
page execute and read and write
444F000
stack
page read and write
C80000
direct allocation
page read and write
10B4000
heap
page read and write
53FF000
stack
page read and write
34BE000
stack
page read and write
5420000
direct allocation
page execute and read and write
B64000
heap
page read and write
4DF000
unkown
page execute and read and write
C94000
heap
page read and write
42CF000
stack
page read and write
2A0F000
stack
page read and write
304F000
stack
page read and write
49F0000
direct allocation
page read and write
4B32000
direct allocation
page read and write
1180000
direct allocation
page read and write
3EAE000
stack
page read and write
B30000
heap
page read and write
268000
unkown
page read and write
4E21000
heap
page read and write
4E10000
direct allocation
page read and write
1090000
direct allocation
page read and write
36FF000
stack
page read and write
10B4000
heap
page read and write
1D0000
unkown
page readonly
4BE0000
direct allocation
page execute and read and write
10B4000
heap
page read and write
4C30000
direct allocation
page execute and read and write
C94000
heap
page read and write
3F4F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
B6C000
stack
page read and write
4B50000
direct allocation
page execute and read and write
10B4000
heap
page read and write
4A90000
direct allocation
page read and write
5520000
direct allocation
page execute and read and write
5510000
direct allocation
page execute and read and write
3F8E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
312F000
stack
page read and write
3E4E000
stack
page read and write
54E0000
direct allocation
page execute and read and write
3F2F000
stack
page read and write
358E000
stack
page read and write
37CE000
stack
page read and write
B3A000
heap
page read and write
10B4000
heap
page read and write
1D0000
unkown
page read and write
2D27000
heap
page read and write
15BD000
heap
page read and write
3CCE000
stack
page read and write
4B50000
direct allocation
page execute and read and write
3C3E000
stack
page read and write
4571000
heap
page read and write
5440000
direct allocation
page execute and read and write
C60000
direct allocation
page read and write
2860000
direct allocation
page read and write
CC4000
heap
page read and write
4C80000
direct allocation
page execute and read and write
CC4000
heap
page read and write
2DEE000
stack
page read and write
4F80000
direct allocation
page execute and read and write
15B0000
heap
page read and write
7E0000
heap
page read and write
36EF000
stack
page read and write
4B50000
direct allocation
page execute and read and write
5530000
direct allocation
page execute and read and write
4BD2000
direct allocation
page read and write
B64000
heap
page read and write
2ABE000
stack
page read and write
3FAF000
stack
page read and write
37CF000
stack
page read and write
4E21000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
1090000
direct allocation
page read and write
4C20000
direct allocation
page execute and read and write
10B4000
heap
page read and write
CC0000
heap
page read and write
521000
unkown
page execute and read and write
4601000
heap
page read and write
4E10000
direct allocation
page read and write
4B50000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
4E10000
direct allocation
page read and write
2860000
direct allocation
page read and write
472F000
stack
page read and write
4E10000
direct allocation
page read and write
430F000
stack
page read and write
30C000
unkown
page execute and read and write
5440000
direct allocation
page execute and read and write
2860000
direct allocation
page read and write
49B1000
heap
page read and write
4F80000
direct allocation
page execute and read and write
5C1000
unkown
page execute and read and write
21000
unkown
page execute and write copy
32AF000
stack
page read and write
33CF000
stack
page read and write
2D00000
heap
page read and write
2DAF000
stack
page read and write
4571000
heap
page read and write
159E000
stack
page read and write
2C8F000
stack
page read and write
4C20000
direct allocation
page execute and read and write
C60000
direct allocation
page read and write
20000
unkown
page readonly
4C40000
direct allocation
page execute and read and write
4FD0000
direct allocation
page execute and read and write
10B4000
heap
page read and write
5D0000
unkown
page execute and write copy
2860000
direct allocation
page read and write
E0E000
stack
page read and write
C0E000
stack
page read and write
CC4000
heap
page read and write
30BF000
stack
page read and write
54B0000
direct allocation
page execute and read and write
BEA000
heap
page read and write
130000
unkown
page read and write
4B90000
direct allocation
page execute and read and write
1470000
heap
page read and write
454F000
stack
page read and write
100E000
stack
page read and write
4591000
heap
page read and write
3C8F000
stack
page read and write
C90000
direct allocation
page read and write
B7C000
heap
page read and write
A3C000
stack
page read and write
4A8E000
stack
page read and write
3AEE000
stack
page read and write
C94000
heap
page read and write
308000
unkown
page read and write
4BF0000
direct allocation
page execute and read and write
49AF000
stack
page read and write
C60000
direct allocation
page read and write
364F000
stack
page read and write
11A0000
heap
page read and write
15C000
unkown
page execute and read and write
1484000
heap
page read and write
4601000
heap
page read and write
C60000
direct allocation
page read and write
4A90000
direct allocation
page read and write
4571000
heap
page read and write
1090000
direct allocation
page read and write
4C30000
direct allocation
page execute and read and write
49B1000
heap
page read and write
C80000
heap
page read and write
436F000
stack
page read and write
3D0E000
stack
page read and write
4BDF000
stack
page read and write
3E0E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
36CE000
stack
page read and write
4C30000
direct allocation
page execute and read and write
427E000
stack
page read and write
CC4000
heap
page read and write
31CE000
stack
page read and write
1484000
heap
page read and write
CB0000
direct allocation
page execute and read and write
432E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
336E000
stack
page read and write
3B4F000
stack
page read and write
B64000
heap
page read and write
4B50000
direct allocation
page execute and read and write
3A6E000
stack
page read and write
4B70000
direct allocation
page execute and read and write
408E000
stack
page read and write
133D000
stack
page read and write
1484000
heap
page read and write
10B4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
B64000
heap
page read and write
503E000
stack
page read and write
C80000
direct allocation
page read and write
462E000
stack
page read and write
4A0E000
stack
page read and write
779000
unkown
page execute and read and write
5470000
direct allocation
page execute and read and write
C60000
direct allocation
page read and write
3F0F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
372E000
stack
page read and write
10B4000
heap
page read and write
1484000
heap
page read and write
4B80000
direct allocation
page execute and read and write
57F000
unkown
page execute and read and write
2F2F000
stack
page read and write
1484000
heap
page read and write
1484000
heap
page read and write
2F2E000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
36AE000
stack
page read and write
1D0000
unkown
page read and write
422F000
stack
page read and write
B64000
heap
page read and write
40EF000
stack
page read and write
4F80000
direct allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
4E10000
direct allocation
page read and write
303000
unkown
page execute and read and write
529D000
stack
page read and write
5440000
direct allocation
page execute and read and write
4601000
heap
page read and write
446E000
stack
page read and write
EC7000
heap
page read and write
4E0F000
stack
page read and write
2B8E000
stack
page read and write
There are 881 hidden memdumps, click here to show them.