IOC Report
Lisect_AVT_24003_G1A_89.exe

loading gif

Files

File Path
Type
Category
Malicious
Lisect_AVT_24003_G1A_89.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\7-Zip\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\jHYZko.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_jHYZko.exe_d8685fa3666ef0170de53ca60392592e0c360b1_2472fd22_e3a77683-1b53-4759-a244-058d1fe851d7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA7B2.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jul 25 03:10:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAADF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB0F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k1[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k1[2].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k2[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k2[2].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k3[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k3[2].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k4[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k5[1].rar
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\1E3A2110.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\2b7051ed.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\3EFE34B7.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\412E45BE.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\459048D5.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\5F314FF5.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\78CB03FC.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\7EF10F8C.exe
ASCII text
modified
C:\Users\user\AppData\Local\Temp\7F7A79A8.exe
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe
"C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe"
malicious
C:\Users\user\AppData\Local\Temp\jHYZko.exe
C:\Users\user\AppData\Local\Temp\jHYZko.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\Temp\jHYZko.exe
C:\Users\user\AppData\Local\Temp\jHYZko.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6484 -s 1612
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2b7051ed.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://ddos.dnsnb8.net:799/cj//k1.rarky.tth.txtp
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarZ
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rar=x
unknown
malicious
http://ddos.dnsnb8.net/=
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k3.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k1.rar=x
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k4.rar(y
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarl
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k4.rarC:
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k3.rarL
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k3.rarO
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k5.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k3.rarR
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rartC:
unknown
malicious
http://ddos.dnsnb8.net/
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k5.rarsC:
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k1.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarExh
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k4.rar
44.221.84.105
malicious
http://ddos.dnsnb8.net:799/cj//k1.rarm
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k5.rarHxg
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k3.rarpy_
unknown
malicious
http://ddos.dnsnb8.net:799/cj//k2.rarfC:
unknown
malicious
http://www.scintilla.org/scite.rng
unknown
http://www.rftp.comJosiah
unknown
http://www.activestate.com
unknown
http://www.activestate.comHolger
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://upx.sf.net
unknown
http://www.rftp.com
unknown
https://t.me/RiseProSUPPORT
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
http://www.baanboard.comBrendon
unknown
https://www.smartsharesystems.com/
unknown
http://www.scintilla.org
unknown
http://www.spaceblue.comMathias
unknown
https://www.smartsharesystems.com/Morten
unknown
http://www.develop.com
unknown
http://pki-ocsp.symauth.com0
unknown
http://www.lua.org
unknown
http://www.spaceblue.com
unknown
http://www.winimage.com/zLibDll
unknown
http://www.baanboard.com
unknown
http://www.develop.comDeepak
unknown
https://t.me/RiseProSUPPORTz
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ddos.dnsnb8.net
44.221.84.105

IPs

IP
Domain
Country
Malicious
44.221.84.105
ddos.dnsnb8.net
United States
193.233.132.62
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
ProgramId
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
FileId
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
LowerCaseLongPath
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
LongPathHash
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
Name
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
OriginalFileName
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
Publisher
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
Version
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
BinFileVersion
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
BinaryType
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
ProductName
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
ProductVersion
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
LinkDate
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
BinProductVersion
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
AppxPackageFullName
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
AppxPackageRelativeId
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
Size
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
Language
\REGISTRY\A\{4030ea80-f80f-f2c7-a4f4-57af305670df}\Root\InventoryApplicationFile\jhyzko.exe|cffec1f08f9af141
Usn
HKEY_CURRENT_USER_Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\GTplus
Time
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
FB1000
unkown
page execute and read and write
malicious
8C1000
unkown
page execute and read and write
malicious
571000
unkown
page execute and read and write
malicious
571000
unkown
page execute and read and write
malicious
3827000
direct allocation
page execute and read and write
6C2000
unkown
page readonly
4060000
direct allocation
page execute and read and write
13AA000
heap
page read and write
4EFE000
stack
page read and write
1AAA000
heap
page read and write
3B40000
direct allocation
page execute and read and write
3DA0000
heap
page read and write
CDA000
heap
page read and write
3827000
direct allocation
page execute and read and write
359E000
stack
page read and write
1102000
unkown
page readonly
D15000
heap
page read and write
CDE000
heap
page read and write
12AE000
heap
page read and write
33A0000
heap
page read and write
13EE000
heap
page read and write
125E000
heap
page read and write
1E0000
unkown
page readonly
3B44000
direct allocation
page execute and read and write
1B50000
heap
page read and write
330F000
stack
page read and write
8C1000
unkown
page execute and write copy
3520000
direct allocation
page execute and read and write
1B40000
heap
page read and write
4064000
direct allocation
page execute and read and write
3E10000
heap
page read and write
3564000
direct allocation
page execute and read and write
1240000
direct allocation
page read and write
3C7E000
stack
page read and write
12AE000
heap
page read and write
1970000
heap
page read and write
6C2000
unkown
page readonly
3814000
direct allocation
page execute and read and write
4233000
heap
page read and write
3564000
direct allocation
page execute and read and write
13E6000
heap
page read and write
3420000
direct allocation
page execute and read and write
81C000
unkown
page execute and read and write
1AED000
heap
page read and write
A20000
heap
page read and write
3814000
direct allocation
page execute and read and write
384E000
stack
page read and write
3B57000
direct allocation
page execute and read and write
3180000
heap
page read and write
1E1000
unkown
page execute read
12AC000
heap
page read and write
6CB000
stack
page read and write
3C90000
heap
page read and write
3BDD000
stack
page read and write
21A7000
heap
page read and write
67C000
unkown
page execute and write copy
370E000
stack
page read and write
570000
unkown
page readonly
C65000
heap
page read and write
467E000
stack
page read and write
4053000
direct allocation
page execute and read and write
6A3000
unkown
page execute and read and write
3ACE000
stack
page read and write
2F9A000
stack
page read and write
8C0000
unkown
page readonly
7F220000
direct allocation
page execute and read and write
11C0000
heap
page read and write
F6D000
stack
page read and write
A08000
unkown
page execute and write copy
13EE000
heap
page read and write
1840000
heap
page read and write
E60000
unkown
page readonly
A12000
unkown
page readonly
3DB0000
heap
page read and write
48BE000
stack
page read and write
A12000
unkown
page readonly
1E0000
unkown
page readonly
A08000
unkown
page execute and read and write
E70000
heap
page read and write
A22000
unkown
page execute and read and write
10E3000
unkown
page execute and write copy
1066000
heap
page read and write
46CB000
heap
page read and write
1AAE000
heap
page read and write
2E99000
stack
page read and write
3804000
direct allocation
page execute and read and write
3217000
stack
page read and write
3A70000
direct allocation
page execute and read and write
12F4000
heap
page read and write
4398000
heap
page read and write
11C5000
heap
page read and write
E0B000
stack
page read and write
109B000
unkown
page execute and write copy
257F000
stack
page read and write
3953000
heap
page read and write
3E00000
heap
page read and write
35EB000
stack
page read and write
8C0000
unkown
page readonly
6B8000
unkown
page execute and write copy
12D9000
heap
page read and write
A6D000
stack
page read and write
3970000
direct allocation
page execute and read and write
3AF0000
heap
page read and write
12FC000
heap
page read and write
3ADE000
stack
page read and write
2930000
heap
page read and write
3564000
direct allocation
page execute and read and write
1B30000
heap
page read and write
6D2000
unkown
page execute and write copy
1102000
unkown
page readonly
6B8000
unkown
page execute and read and write
218E000
heap
page read and write
1810000
heap
page read and write
7ECA0000
direct allocation
page execute and read and write
12C5000
heap
page read and write
3577000
direct allocation
page execute and read and write
12EE000
heap
page read and write
CC9000
heap
page read and write
1847000
heap
page read and write
9F3000
unkown
page execute and read and write
E61000
unkown
page execute and write copy
11A0000
heap
page read and write
CE0000
heap
page read and write
12BF000
heap
page read and write
1360000
heap
page read and write
3B44000
direct allocation
page execute and read and write
AD0000
direct allocation
page read and write
12DF000
heap
page read and write
1660000
heap
page read and write
2110000
heap
page read and write
3850000
heap
page read and write
3B44000
direct allocation
page execute and read and write
10BC000
unkown
page execute and write copy
13A0000
heap
page read and write
10F8000
unkown
page execute and read and write
2E00000
heap
page read and write
138E000
stack
page read and write
1AEB000
heap
page read and write
4230000
heap
page read and write
4064000
direct allocation
page execute and read and write
129C000
stack
page read and write
AE0000
direct allocation
page read and write
125C000
unkown
page execute and read and write
CBE000
heap
page read and write
6C2000
unkown
page readonly
3BC0000
heap
page read and write
2E4E000
stack
page read and write
398E000
stack
page read and write
3553000
direct allocation
page execute and read and write
495000
heap
page read and write
1277000
heap
page read and write
3C1E000
stack
page read and write
AE0000
direct allocation
page read and write
11C0000
unkown
page execute and read and write
1060000
heap
page read and write
4064000
direct allocation
page execute and read and write
169B000
heap
page read and write
1E1000
unkown
page execute and write copy
401F000
stack
page read and write
12B0000
heap
page read and write
BC8000
unkown
page execute and read and write
ED0000
heap
page read and write
E6D000
unkown
page execute and write copy
3564000
direct allocation
page execute and read and write
AE0000
direct allocation
page read and write
4ABE000
stack
page read and write
3950000
heap
page read and write
81C000
unkown
page execute and read and write
8AB000
unkown
page execute and read and write
12AC000
heap
page read and write
1326000
heap
page read and write
394F000
stack
page read and write
3310000
direct allocation
page execute and read and write
1250000
heap
page read and write
1E6000
unkown
page execute and read and write
3ADB000
stack
page read and write
F18000
unkown
page execute and read and write
E3E000
stack
page read and write
3810000
direct allocation
page execute and read and write
36C0000
heap
page read and write
AD0000
direct allocation
page read and write
E70000
unkown
page execute and write copy
3A8F000
stack
page read and write
1FFC000
stack
page read and write
31D0000
heap
page read and write
21D0000
heap
page read and write
9F3000
unkown
page execute and write copy
34B0000
direct allocation
page execute and read and write
311E000
stack
page read and write
12D0000
heap
page read and write
36C4000
heap
page read and write
1E3000
unkown
page write copy
4ACE000
heap
page read and write
187C000
stack
page read and write
3814000
direct allocation
page execute and read and write
6D2000
unkown
page execute and read and write
184A000
heap
page read and write
CAD000
heap
page read and write
12C0000
direct allocation
page execute and read and write
123E000
stack
page read and write
E64000
unkown
page read and write
1E3000
unkown
page readonly
4ABE000
stack
page read and write
1C0000
heap
page read and write
570000
unkown
page readonly
37D0000
direct allocation
page execute and read and write
1AA0000
heap
page read and write
3420000
heap
page read and write
4054000
direct allocation
page execute and read and write
3CA0000
heap
page read and write
7F220000
direct allocation
page execute and read and write
440E000
stack
page read and write
16A5000
heap
page read and write
2F8E000
stack
page read and write
4020000
heap
page read and write
193E000
stack
page read and write
1ADB000
unkown
page execute and write copy
CBE000
heap
page read and write
3564000
direct allocation
page execute and read and write
ECE000
stack
page read and write
3D1E000
stack
page read and write
3814000
direct allocation
page execute and read and write
A22000
unkown
page execute and write copy
320E000
stack
page read and write
3577000
direct allocation
page execute and read and write
392E000
stack
page read and write
D14000
heap
page read and write
1240000
direct allocation
page read and write
3564000
direct allocation
page execute and read and write
11C0000
unkown
page execute and write copy
9CC000
unkown
page execute and write copy
FB0000
unkown
page readonly
CE1000
heap
page read and write
AE0000
direct allocation
page read and write
CDE000
heap
page read and write
FD0000
heap
page read and write
10F8000
unkown
page execute and write copy
30CE000
stack
page read and write
CC7000
heap
page read and write
1240000
direct allocation
page read and write
3C80000
heap
page read and write
C58000
heap
page read and write
12F5000
heap
page read and write
6A3000
unkown
page execute and write copy
3B00000
direct allocation
page execute and read and write
CDE000
heap
page read and write
4CC7000
heap
page read and write
7F7F0000
direct allocation
page execute and read and write
3B44000
direct allocation
page execute and read and write
E60000
unkown
page readonly
21D0000
heap
page read and write
B52000
unkown
page execute and read and write
21BF000
heap
page read and write
4BA0000
heap
page read and write
157E000
stack
page read and write
CAD000
heap
page read and write
C48000
heap
page read and write
1BE0000
heap
page read and write
4064000
direct allocation
page execute and read and write
FF0000
direct allocation
page read and write
15FC000
stack
page read and write
3814000
direct allocation
page execute and read and write
6A3000
unkown
page execute and write copy
438F000
stack
page read and write
109B000
unkown
page execute and write copy
3814000
direct allocation
page execute and read and write
3840000
direct allocation
page execute and read and write
4077000
direct allocation
page execute and read and write
10E3000
unkown
page execute and read and write
5620000
trusted library allocation
page read and write
44BF000
stack
page read and write
1667000
heap
page read and write
131B000
heap
page read and write
3410000
heap
page read and write
CC9000
heap
page read and write
12EB000
unkown
page execute and read and write
3B33000
direct allocation
page execute and read and write
4064000
direct allocation
page execute and read and write
153E000
stack
page read and write
571000
unkown
page execute and write copy
16A3000
heap
page read and write
2160000
heap
page read and write
ABE000
stack
page read and write
334E000
stack
page read and write
4077000
direct allocation
page execute and read and write
4CC0000
heap
page read and write
CE1000
heap
page read and write
E63000
unkown
page readonly
3E1F000
stack
page read and write
1190000
heap
page read and write
7C9000
stack
page read and write
3A8E000
stack
page read and write
36EE000
stack
page read and write
2180000
heap
page read and write
308F000
stack
page read and write
B6C000
unkown
page execute and read and write
167F000
stack
page read and write
369F000
stack
page read and write
E70000
unkown
page execute and read and write
67C000
unkown
page execute and write copy
CE8000
heap
page read and write
478E000
stack
page read and write
3B44000
direct allocation
page execute and read and write
4064000
direct allocation
page execute and read and write
1608000
unkown
page execute and read and write
30DF000
stack
page read and write
CC9000
heap
page read and write
3814000
direct allocation
page execute and read and write
3E03000
heap
page read and write
BC8000
unkown
page execute and read and write
AF0000
heap
page read and write
4CFE000
stack
page read and write
12C7000
heap
page read and write
21C8000
heap
page read and write
167B000
stack
page read and write
1E6000
unkown
page execute and write copy
570000
unkown
page readonly
4064000
direct allocation
page execute and read and write
802000
unkown
page execute and read and write
18B0000
unkown
page execute and read and write
802000
unkown
page execute and read and write
1365000
heap
page read and write
129D000
heap
page read and write
1E4000
unkown
page read and write
31E0000
direct allocation
page execute and read and write
18E0000
heap
page read and write
1975000
heap
page read and write
4E80000
trusted library allocation
page read and write
E6D000
unkown
page execute and write copy
18AD000
unkown
page execute and write copy
2E04000
heap
page read and write
570000
unkown
page readonly
2120000
direct allocation
page execute and read and write
3430000
heap
page read and write
36D0000
direct allocation
page execute and read and write
13DD000
heap
page read and write
3803000
direct allocation
page execute and read and write
2A2C000
stack
page read and write
FB0000
unkown
page readonly
1B0000
heap
page read and write
CB3000
heap
page read and write
F3E000
stack
page read and write
1300000
heap
page read and write
6B8000
unkown
page execute and write copy
3B34000
direct allocation
page execute and read and write
446A000
heap
page read and write
4020000
direct allocation
page execute and read and write
1691000
heap
page read and write
6C2000
unkown
page readonly
6A3000
unkown
page execute and read and write
490000
heap
page read and write
A70000
heap
page read and write
3B57000
direct allocation
page execute and read and write
134E000
stack
page read and write
3930000
heap
page read and write
C10000
heap
page read and write
46BF000
stack
page read and write
418F000
stack
page read and write
3F20000
direct allocation
page execute and read and write
3950000
heap
page read and write
12F2000
heap
page read and write
1112000
unkown
page execute and write copy
218A000
heap
page read and write
3EF0000
heap
page read and write
E80000
heap
page read and write
E70000
unkown
page execute and write copy
2FDE000
stack
page read and write
1E9F000
stack
page read and write
317D000
stack
page read and write
1112000
unkown
page execute and read and write
CAD000
heap
page read and write
BFB000
unkown
page execute and read and write
349B000
stack
page read and write
E66000
unkown
page execute and write copy
16A3000
heap
page read and write
CB3000
heap
page read and write
1242000
unkown
page execute and read and write
6B8000
unkown
page execute and read and write
C40000
heap
page read and write
359C000
stack
page read and write
1AEB000
heap
page read and write
3B44000
direct allocation
page execute and read and write
3560000
direct allocation
page execute and read and write
4270000
heap
page read and write
18F0000
heap
page read and write
14B000
stack
page read and write
487F000
stack
page read and write
571000
unkown
page execute and write copy
FC0000
heap
page read and write
E5C000
stack
page read and write
AF5000
heap
page read and write
12F4000
heap
page read and write
2000000
direct allocation
page execute and read and write
6D2000
unkown
page execute and write copy
33B0000
heap
page read and write
31CF000
stack
page read and write
2F4F000
stack
page read and write
E63000
unkown
page write copy
3390000
heap
page read and write
1AE3000
heap
page read and write
11BD000
unkown
page execute and write copy
12D3000
heap
page read and write
E70000
unkown
page execute and read and write
FB1000
unkown
page execute and write copy
106A000
heap
page read and write
34C0000
heap
page read and write
344E000
stack
page read and write
8AB000
unkown
page execute and read and write
3960000
heap
page read and write
1240000
direct allocation
page read and write
479D000
heap
page read and write
3440000
heap
page read and write
6D2000
unkown
page execute and read and write
380F000
stack
page read and write
1AED000
heap
page read and write
C5F000
heap
page read and write
12DF000
heap
page read and write
125A000
heap
page read and write
112B000
stack
page read and write
3C3E000
stack
page read and write
3554000
direct allocation
page execute and read and write
12D9000
heap
page read and write
11D0000
heap
page read and write
CE1000
heap
page read and write
3B44000
direct allocation
page execute and read and write
13EB000
unkown
page execute and write copy
E61000
unkown
page execute read
E66000
unkown
page execute and read and write
381C000
stack
page read and write
CB1000
heap
page read and write
2940000
heap
page read and write
16A5000
heap
page read and write
40F2000
heap
page read and write
12BF000
heap
page read and write
CE0000
heap
page read and write
18B0000
unkown
page execute and write copy
13AD000
heap
page read and write
3564000
direct allocation
page execute and read and write
FF0000
direct allocation
page read and write
There are 429 hidden memdumps, click here to show them.