IOC Report
LisectAVT_2403002A_218.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_218.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_218.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_218.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORTd
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
AC1000
unkown
page execute and read and write
malicious
52E0000
direct allocation
page read and write
malicious
4AA0000
direct allocation
page read and write
malicious
971000
unkown
page execute and read and write
malicious
4BD0000
direct allocation
page read and write
malicious
AC1000
unkown
page execute and read and write
malicious
9E1000
unkown
page execute and read and write
malicious
4BA0000
direct allocation
page read and write
malicious
971000
unkown
page execute and read and write
malicious
49C0000
direct allocation
page read and write
malicious
9B0000
direct allocation
page read and write
463E000
stack
page read and write
9D0000
direct allocation
page read and write
2A90000
direct allocation
page read and write
1580000
direct allocation
page read and write
3F0000
heap
page read and write
421E000
stack
page read and write
407E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
960000
direct allocation
page read and write
3FFE000
stack
page read and write
4AFF000
stack
page read and write
4721000
heap
page read and write
84B000
heap
page read and write
3FDE000
stack
page read and write
940000
direct allocation
page read and write
4DE0000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
159B000
heap
page read and write
4BDC000
stack
page read and write
4D00000
direct allocation
page execute and read and write
8F6000
heap
page read and write
4C00000
direct allocation
page execute and read and write
3B3F000
stack
page read and write
1194000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
DC6000
unkown
page execute and read and write
1580000
direct allocation
page read and write
34DE000
stack
page read and write
680000
heap
page read and write
2BBF000
stack
page read and write
4D90000
direct allocation
page execute and read and write
5460000
direct allocation
page execute and read and write
1194000
heap
page read and write
70B000
heap
page read and write
531C000
stack
page read and write
35DE000
stack
page read and write
2EFE000
stack
page read and write
4B10000
direct allocation
page execute and read and write
4E50000
direct allocation
page execute and read and write
32BE000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
43DE000
stack
page read and write
803000
heap
page read and write
4541000
heap
page read and write
4840000
trusted library allocation
page read and write
4B10000
direct allocation
page execute and read and write
6D4000
heap
page read and write
427E000
stack
page read and write
970000
unkown
page read and write
30EE000
stack
page read and write
4541000
heap
page read and write
190000
heap
page read and write
844000
heap
page read and write
D70000
unkown
page execute and read and write
4C00000
direct allocation
page execute and read and write
960000
direct allocation
page read and write
84D000
heap
page read and write
369F000
stack
page read and write
9E0000
unkown
page read and write
4A9D000
stack
page read and write
3C4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4DB0000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
293E000
stack
page read and write
7BF000
stack
page read and write
940000
direct allocation
page read and write
6B0000
heap
page read and write
2A8B000
stack
page read and write
80E000
heap
page read and write
499E000
stack
page read and write
425F000
stack
page read and write
4D50000
direct allocation
page execute and read and write
4741000
heap
page read and write
4D50000
direct allocation
page execute and read and write
855000
heap
page read and write
377F000
stack
page read and write
4D50000
direct allocation
page execute and read and write
9B0000
direct allocation
page read and write
309F000
stack
page read and write
844000
heap
page read and write
3C4000
heap
page read and write
7A0000
direct allocation
page read and write
8E9000
heap
page read and write
EC1000
unkown
page execute and write copy
485E000
stack
page read and write
9B0000
direct allocation
page read and write
4DF0000
direct allocation
page execute and read and write
3110000
heap
page read and write
30DE000
stack
page read and write
2B3F000
stack
page read and write
4721000
heap
page read and write
1194000
heap
page read and write
54A0000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
1194000
heap
page read and write
1194000
heap
page read and write
2D1E000
stack
page read and write
3117000
heap
page read and write
2D5E000
stack
page read and write
844000
heap
page read and write
4D5E000
stack
page read and write
49FC000
stack
page read and write
7CA000
heap
page read and write
6D4000
heap
page read and write
BF8000
unkown
page write copy
1190000
heap
page read and write
2DBE000
stack
page read and write
81F000
stack
page read and write
3D3F000
stack
page read and write
742000
heap
page read and write
71E000
stack
page read and write
294E000
stack
page read and write
4E40000
direct allocation
page execute and read and write
9B0000
direct allocation
page read and write
415E000
stack
page read and write
1570000
heap
page read and write
4E61000
heap
page read and write
1590000
heap
page read and write
40DE000
stack
page read and write
4D60000
direct allocation
page execute and read and write
3C4000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
AC1000
unkown
page execute and write copy
35BF000
stack
page read and write
36DF000
stack
page read and write
3C4000
heap
page read and write
6D4000
heap
page read and write
321F000
stack
page read and write
2C7E000
stack
page read and write
429E000
stack
page read and write
844000
heap
page read and write
6D4000
heap
page read and write
45DE000
stack
page read and write
4F1E000
stack
page read and write
5460000
direct allocation
page execute and read and write
335F000
stack
page read and write
4541000
heap
page read and write
68E000
stack
page read and write
4CD2000
direct allocation
page read and write
4D20000
direct allocation
page execute and read and write
6D4000
heap
page read and write
4C70000
direct allocation
page execute and read and write
7FC000
stack
page read and write
EC0000
unkown
page execute and read and write
2F7F000
stack
page read and write
7CD000
heap
page read and write
445F000
stack
page read and write
940000
direct allocation
page read and write
6D4000
heap
page read and write
4E61000
heap
page read and write
106A000
unkown
page execute and read and write
4B60000
direct allocation
page execute and read and write
4BB0000
direct allocation
page execute and read and write
3C1E000
stack
page read and write
4E61000
heap
page read and write
4E60000
direct allocation
page execute and read and write
559A000
heap
page read and write
4721000
heap
page read and write
401E000
stack
page read and write
4C00000
direct allocation
page execute and read and write
39DE000
stack
page read and write
BF3000
unkown
page execute and read and write
6B5000
heap
page read and write
4D40000
direct allocation
page execute and read and write
323E000
stack
page read and write
844000
heap
page read and write
3D9E000
stack
page read and write
2BFE000
stack
page read and write
AA3000
unkown
page execute and read and write
1194000
heap
page read and write
2F5F000
stack
page read and write
4D00000
direct allocation
page execute and read and write
2F9E000
stack
page read and write
3C4000
heap
page read and write
2A90000
direct allocation
page read and write
6FD000
stack
page read and write
3C3E000
stack
page read and write
CA1000
unkown
page execute and read and write
4ADE000
stack
page read and write
1194000
heap
page read and write
EC0000
unkown
page execute and read and write
2FFF000
stack
page read and write
15BD000
heap
page read and write
4721000
heap
page read and write
3C4000
heap
page read and write
A90000
direct allocation
page read and write
4E61000
heap
page read and write
2A9F000
stack
page read and write
4D50000
direct allocation
page execute and read and write
4741000
heap
page read and write
844000
heap
page read and write
840000
heap
page read and write
2A90000
direct allocation
page read and write
500E000
stack
page read and write
11C0000
heap
page read and write
844000
heap
page read and write
D62000
unkown
page execute and read and write
425E000
stack
page read and write
7C0000
heap
page read and write
3C5E000
stack
page read and write
3100000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
940000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
3ABF000
stack
page read and write
3A3E000
stack
page read and write
D56000
unkown
page execute and read and write
34FF000
stack
page read and write
6D4000
heap
page read and write
73A000
heap
page read and write
9B0000
direct allocation
page read and write
844000
heap
page read and write
1194000
heap
page read and write
3A5F000
stack
page read and write
9E1000
unkown
page execute and write copy
2A90000
direct allocation
page read and write
3C4000
heap
page read and write
3C0000
heap
page read and write
40DF000
stack
page read and write
435E000
stack
page read and write
4CDF000
stack
page read and write
6D4000
heap
page read and write
BF8000
unkown
page read and write
6D4000
heap
page read and write
844000
heap
page read and write
3F9F000
stack
page read and write
844000
heap
page read and write
4541000
heap
page read and write
5460000
direct allocation
page execute and read and write
2E5F000
stack
page read and write
12C000
stack
page read and write
359E000
stack
page read and write
DE0000
unkown
page execute and write copy
9B0000
direct allocation
page read and write
399F000
stack
page read and write
95E000
stack
page read and write
11F0000
heap
page read and write
30AC000
stack
page read and write
8B0000
heap
page read and write
3A9F000
stack
page read and write
AC0000
unkown
page read and write
D81000
unkown
page execute and read and write
3D5F000
stack
page read and write
908000
heap
page read and write
4B10000
direct allocation
page execute and read and write
101F000
stack
page read and write
9D0000
direct allocation
page read and write
4E00000
direct allocation
page execute and read and write
3E1F000
stack
page read and write
4B10000
direct allocation
page execute and read and write
815000
heap
page read and write
1194000
heap
page read and write
3DFE000
stack
page read and write
4721000
heap
page read and write
1194000
heap
page read and write
D71000
unkown
page execute and write copy
6D4000
heap
page read and write
383F000
stack
page read and write
411E000
stack
page read and write
431F000
stack
page read and write
345F000
stack
page read and write
6D4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
8BA000
heap
page read and write
4E61000
heap
page read and write
4CE0000
heap
page read and write
449E000
stack
page read and write
D70000
unkown
page execute and read and write
1194000
heap
page read and write
EB2000
unkown
page execute and read and write
4B80000
direct allocation
page execute and read and write
9B0000
direct allocation
page read and write
A90000
direct allocation
page read and write
3C4000
heap
page read and write
395F000
stack
page read and write
4B20000
direct allocation
page execute and read and write
6D4000
heap
page read and write
3B0000
heap
page read and write
2A3F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
423F000
stack
page read and write
306E000
stack
page read and write
2D3E000
stack
page read and write
4E10000
direct allocation
page execute and read and write
5440000
direct allocation
page execute and read and write
6D4000
heap
page read and write
844000
heap
page read and write
4720000
heap
page read and write
5460000
direct allocation
page execute and read and write
BFC000
unkown
page execute and read and write
4D00000
direct allocation
page execute and read and write
4D00000
direct allocation
page execute and read and write
AC0000
unkown
page readonly
395E000
stack
page read and write
7A0000
direct allocation
page read and write
4721000
heap
page read and write
437F000
stack
page read and write
AA8000
unkown
page write copy
B13000
unkown
page execute and read and write
2A4F000
stack
page read and write
2BDF000
stack
page read and write
6D4000
heap
page read and write
3B1E000
stack
page read and write
37DF000
stack
page read and write
2ACE000
stack
page read and write
4D00000
direct allocation
page execute and read and write
53C000
stack
page read and write
2A90000
direct allocation
page read and write
2FBE000
stack
page read and write
42BF000
stack
page read and write
331F000
stack
page read and write
52DD000
stack
page read and write
800000
heap
page read and write
15C9000
heap
page read and write
409F000
stack
page read and write
2BDF000
stack
page read and write
3C4000
heap
page read and write
2AD7000
heap
page read and write
41BE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
516E000
stack
page read and write
311E000
stack
page read and write
EC1000
unkown
page execute and write copy
4B10000
direct allocation
page execute and read and write
940000
direct allocation
page read and write
3EFF000
stack
page read and write
5460000
direct allocation
page execute and read and write
844000
heap
page read and write
940000
direct allocation
page read and write
2A7B000
stack
page read and write
4741000
heap
page read and write
353E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
844000
heap
page read and write
4541000
heap
page read and write
4BC0000
direct allocation
page read and write
4F1F000
heap
page read and write
337E000
stack
page read and write
5460000
direct allocation
page execute and read and write
6D4000
heap
page read and write
3B7E000
stack
page read and write
2A90000
direct allocation
page read and write
4541000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
AA8000
unkown
page write copy
439F000
stack
page read and write
4721000
heap
page read and write
4621000
heap
page read and write
4D50000
direct allocation
page execute and read and write
7A0000
direct allocation
page read and write
5500000
direct allocation
page execute and read and write
844000
heap
page read and write
B1C000
unkown
page execute and read and write
3C1F000
stack
page read and write
AC0000
unkown
page readonly
15C7000
heap
page read and write
EA6000
unkown
page execute and read and write
1194000
heap
page read and write
4D90000
direct allocation
page execute and read and write
4D00000
direct allocation
page execute and read and write
3CDF000
stack
page read and write
4D00000
direct allocation
page execute and read and write
5540000
direct allocation
page execute and read and write
4541000
heap
page read and write
345E000
stack
page read and write
5460000
direct allocation
page execute and read and write
4541000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4721000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
4E61000
heap
page read and write
461E000
stack
page read and write
375E000
stack
page read and write
AC1000
unkown
page execute and write copy
6D4000
heap
page read and write
960000
direct allocation
page read and write
4541000
heap
page read and write
46DF000
stack
page read and write
844000
heap
page read and write
5430000
heap
page read and write
940000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
1194000
heap
page read and write
6D4000
heap
page read and write
54D0000
direct allocation
page execute and read and write
4B70000
direct allocation
page execute and read and write
2830000
heap
page read and write
4E5F000
stack
page read and write
34BE000
stack
page read and write
1194000
heap
page read and write
451E000
stack
page read and write
6FD000
stack
page read and write
4E30000
direct allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
4D02000
direct allocation
page read and write
347F000
stack
page read and write
3C4000
heap
page read and write
541F000
stack
page read and write
2A90000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
5480000
direct allocation
page execute and read and write
41DF000
stack
page read and write
60E000
stack
page read and write
4D50000
direct allocation
page execute and read and write
3C7F000
stack
page read and write
2810000
direct allocation
page execute and read and write
4541000
heap
page read and write
6D4000
heap
page read and write
4E00000
direct allocation
page execute and read and write
331F000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
2A80000
heap
page read and write
3D7D000
stack
page read and write
4D30000
direct allocation
page execute and read and write
54B0000
direct allocation
page execute and read and write
411F000
stack
page read and write
3E5E000
stack
page read and write
700000
heap
page read and write
286C000
stack
page read and write
4741000
heap
page read and write
381E000
stack
page read and write
4741000
heap
page read and write
9E0000
unkown
page readonly
3C4000
heap
page read and write
844000
heap
page read and write
4E61000
heap
page read and write
80A000
heap
page read and write
461F000
stack
page read and write
844000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
4D1F000
stack
page read and write
7A0000
direct allocation
page read and write
4DC0000
direct allocation
page execute and read and write
6D4000
heap
page read and write
4640000
trusted library allocation
page read and write
2ADE000
stack
page read and write
C31000
unkown
page execute and read and write
6D4000
heap
page read and write
4C80000
direct allocation
page execute and read and write
36FF000
stack
page read and write
2A90000
direct allocation
page read and write
5560000
direct allocation
page execute and read and write
2CDF000
stack
page read and write
4D00000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
2AB7000
heap
page read and write
45DF000
stack
page read and write
4D60000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
9B0000
direct allocation
page read and write
1580000
direct allocation
page read and write
3C4000
heap
page read and write
3C4000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4621000
heap
page read and write
33FE000
stack
page read and write
4D80000
direct allocation
page execute and read and write
5520000
direct allocation
page execute and read and write
363F000
stack
page read and write
3C4000
heap
page read and write
4541000
heap
page read and write
6D4000
heap
page read and write
4ADC000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
4721000
heap
page read and write
3C4000
heap
page read and write
9B0000
direct allocation
page read and write
2D7F000
stack
page read and write
8BE000
heap
page read and write
4541000
heap
page read and write
7A0000
direct allocation
page read and write
5450000
direct allocation
page execute and read and write
940000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
373E000
stack
page read and write
1580000
direct allocation
page read and write
7A0000
direct allocation
page read and write
4D50000
direct allocation
page execute and read and write
15D1000
heap
page read and write
37BE000
stack
page read and write
2A90000
direct allocation
page read and write
6D4000
heap
page read and write
900000
heap
page read and write
908000
heap
page read and write
361E000
stack
page read and write
2A90000
direct allocation
page read and write
844000
heap
page read and write
3A9E000
stack
page read and write
6D4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
971000
unkown
page execute and write copy
2E7E000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
6D4000
heap
page read and write
4B40000
direct allocation
page execute and read and write
858000
heap
page read and write
421F000
stack
page read and write
4741000
heap
page read and write
AA3000
unkown
page execute and read and write
7A0000
direct allocation
page read and write
2A90000
direct allocation
page read and write
2D1F000
stack
page read and write
4B10000
direct allocation
page execute and read and write
385E000
stack
page read and write
971000
unkown
page execute and write copy
8A0000
heap
page read and write
3FDF000
stack
page read and write
4D50000
direct allocation
page execute and read and write
35DF000
stack
page read and write
4D10000
direct allocation
page execute and read and write
815000
heap
page read and write
2AB0000
heap
page read and write
844000
heap
page read and write
940000
direct allocation
page read and write
855000
heap
page read and write
6D0000
heap
page read and write
4720000
trusted library allocation
page read and write
1580000
direct allocation
page read and write
D71000
unkown
page execute and write copy
4D22000
heap
page read and write
1194000
heap
page read and write
54E0000
direct allocation
page execute and read and write
1194000
heap
page read and write
313F000
stack
page read and write
4FD000
stack
page read and write
481F000
stack
page read and write
2897000
heap
page read and write
4B00000
direct allocation
page execute and read and write
5460000
direct allocation
page execute and read and write
6D4000
heap
page read and write
940000
direct allocation
page read and write
3DBE000
stack
page read and write
1194000
heap
page read and write
4E61000
heap
page read and write
BF8000
unkown
page write copy
4C00000
direct allocation
page execute and read and write
4C1E000
stack
page read and write
F1A000
unkown
page execute and read and write
317E000
stack
page read and write
5460000
direct allocation
page execute and read and write
4D00000
direct allocation
page execute and read and write
5530000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
1580000
direct allocation
page read and write
40FF000
stack
page read and write
93E000
stack
page read and write
EB2000
unkown
page execute and read and write
3100000
direct allocation
page read and write
4540000
heap
page read and write
6D4000
heap
page read and write
327F000
stack
page read and write
2A90000
direct allocation
page read and write
DD2000
unkown
page execute and read and write
6D4000
heap
page read and write
5580000
direct allocation
page execute and read and write
6D4000
heap
page read and write
5430000
direct allocation
page execute and read and write
1580000
direct allocation
page read and write
9B0000
direct allocation
page read and write
1580000
direct allocation
page read and write
4740000
heap
page read and write
2FDE000
stack
page read and write
435F000
stack
page read and write
4C40000
direct allocation
page execute and read and write
33BF000
stack
page read and write
471F000
stack
page read and write
970000
unkown
page read and write
4E60000
heap
page read and write
844000
heap
page read and write
4B10000
direct allocation
page execute and read and write
4F10000
heap
page read and write
742000
heap
page read and write
43FF000
stack
page read and write
31DF000
stack
page read and write
BF3000
unkown
page execute and read and write
80D000
heap
page read and write
4B10000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
15D1000
heap
page read and write
371E000
stack
page read and write
39FF000
stack
page read and write
3F3E000
stack
page read and write
7A0000
direct allocation
page read and write
4541000
heap
page read and write
5460000
direct allocation
page execute and read and write
4BBE000
stack
page read and write
7A0000
direct allocation
page read and write
389E000
stack
page read and write
473F000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
7A0000
direct allocation
page read and write
1194000
heap
page read and write
1194000
heap
page read and write
4D0F000
stack
page read and write
1194000
heap
page read and write
33C000
stack
page read and write
45FF000
stack
page read and write
9B0000
direct allocation
page read and write
495F000
stack
page read and write
6D4000
heap
page read and write
4BDF000
stack
page read and write
B18000
unkown
page write copy
6D4000
heap
page read and write
359F000
stack
page read and write
858000
heap
page read and write
4E61000
heap
page read and write
321E000
stack
page read and write
3D5D000
stack
page read and write
4BC0000
direct allocation
page read and write
1194000
heap
page read and write
391F000
stack
page read and write
4E20000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
970000
unkown
page readonly
321F000
stack
page read and write
D70000
unkown
page execute and write copy
844000
heap
page read and write
3C4000
heap
page read and write
1194000
heap
page read and write
1580000
direct allocation
page read and write
4F60000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
AA8000
unkown
page read and write
7A0000
direct allocation
page read and write
AA8000
unkown
page read and write
30BF000
stack
page read and write
3F9E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
BF8000
unkown
page read and write
D62000
unkown
page execute and read and write
E71000
unkown
page execute and read and write
2F9F000
stack
page read and write
6D4000
heap
page read and write
5412000
direct allocation
page read and write
3B9F000
stack
page read and write
690000
heap
page read and write
4C20000
direct allocation
page execute and read and write
940000
direct allocation
page read and write
3C4000
heap
page read and write
2837000
heap
page read and write
4B30000
direct allocation
page execute and read and write
5460000
direct allocation
page execute and read and write
381F000
stack
page read and write
385F000
stack
page read and write
6D4000
heap
page read and write
6D4000
heap
page read and write
4E78000
heap
page read and write
7A0000
direct allocation
page read and write
417F000
stack
page read and write
439E000
stack
page read and write
3100000
direct allocation
page read and write
3C4000
heap
page read and write
4820000
trusted library allocation
page read and write
6D4000
heap
page read and write
4BC0000
direct allocation
page read and write
4D50000
direct allocation
page execute and read and write
3D1F000
stack
page read and write
3E5F000
stack
page read and write
844000
heap
page read and write
1194000
heap
page read and write
2A3F000
stack
page read and write
F8A000
unkown
page execute and read and write
3E7F000
stack
page read and write
4BDF000
stack
page read and write
4621000
heap
page read and write
38C000
stack
page read and write
EC0000
unkown
page execute and write copy
2E5E000
stack
page read and write
54F0000
direct allocation
page execute and read and write
4D20000
direct allocation
page execute and read and write
4541000
heap
page read and write
D21000
unkown
page execute and read and write
9D0000
direct allocation
page read and write
820000
heap
page read and write
27FE000
stack
page read and write
35FE000
stack
page read and write
36DE000
stack
page read and write
4620000
heap
page read and write
1194000
heap
page read and write
341F000
stack
page read and write
349E000
stack
page read and write
339E000
stack
page read and write
3C4000
heap
page read and write
2C3F000
stack
page read and write
510E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
1580000
direct allocation
page read and write
4C0C000
stack
page read and write
4A9F000
stack
page read and write
1195000
heap
page read and write
303E000
stack
page read and write
2820000
direct allocation
page execute and read and write
30FE000
stack
page read and write
6D4000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
4D80000
direct allocation
page execute and read and write
3C4000
heap
page read and write
2CFF000
stack
page read and write
116D000
stack
page read and write
44BF000
stack
page read and write
EC0000
unkown
page execute and write copy
6D4000
heap
page read and write
44FE000
stack
page read and write
5460000
direct allocation
page execute and read and write
355F000
stack
page read and write
4B9E000
stack
page read and write
49BD000
stack
page read and write
1580000
direct allocation
page read and write
4C00000
direct allocation
page execute and read and write
8FD000
heap
page read and write
D70000
unkown
page execute and write copy
4D40000
direct allocation
page execute and read and write
1580000
direct allocation
page read and write
4BE0000
direct allocation
page execute and read and write
6D4000
heap
page read and write
3FBF000
stack
page read and write
844000
heap
page read and write
2E9E000
stack
page read and write
4C00000
direct allocation
page execute and read and write
4741000
heap
page read and write
3A0000
heap
page read and write
3D1E000
stack
page read and write
443E000
stack
page read and write
844000
heap
page read and write
6D4000
heap
page read and write
349F000
stack
page read and write
31FF000
stack
page read and write
3EBE000
stack
page read and write
AAC000
unkown
page execute and read and write
2A90000
direct allocation
page read and write
3E9F000
stack
page read and write
1F0000
heap
page read and write
D56000
unkown
page execute and read and write
299F000
stack
page read and write
3AFE000
stack
page read and write
9B0000
direct allocation
page read and write
4E61000
heap
page read and write
413E000
stack
page read and write
30DF000
stack
page read and write
42FE000
stack
page read and write
6D4000
heap
page read and write
6D4000
heap
page read and write
C31000
unkown
page execute and read and write
3CBE000
stack
page read and write
AAC000
unkown
page execute and read and write
B18000
unkown
page read and write
397F000
stack
page read and write
4BD2000
direct allocation
page read and write
6D4000
heap
page read and write
9B0000
direct allocation
page read and write
A90000
direct allocation
page read and write
38BF000
stack
page read and write
335E000
stack
page read and write
7A0000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
BFC000
unkown
page execute and read and write
459F000
stack
page read and write
453F000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
4541000
heap
page read and write
3EDE000
stack
page read and write
DE1000
unkown
page execute and write copy
4DA0000
direct allocation
page execute and read and write
790000
heap
page read and write
39BE000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
A9C000
stack
page read and write
D81000
unkown
page execute and read and write
5570000
direct allocation
page execute and read and write
387E000
stack
page read and write
3C4000
heap
page read and write
4541000
heap
page read and write
4D00000
direct allocation
page execute and read and write
4D20000
heap
page read and write
7A0000
direct allocation
page read and write
4C00000
direct allocation
page execute and read and write
4621000
heap
page read and write
4C00000
direct allocation
page execute and read and write
3E9E000
stack
page read and write
1580000
direct allocation
page read and write
5A0000
heap
page read and write
3F5F000
stack
page read and write
E71000
unkown
page execute and read and write
371F000
stack
page read and write
9B0000
direct allocation
page read and write
3C4000
heap
page read and write
4AF2000
direct allocation
page read and write
844000
heap
page read and write
4C34000
heap
page read and write
4741000
heap
page read and write
3BDE000
stack
page read and write
2C1E000
stack
page read and write
325E000
stack
page read and write
D21000
unkown
page execute and read and write
1A0000
heap
page read and write
89E000
stack
page read and write
2E1F000
stack
page read and write
4D70000
direct allocation
page execute and read and write
970000
unkown
page readonly
2A90000
direct allocation
page read and write
940000
direct allocation
page read and write
940000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
293F000
stack
page read and write
43BE000
stack
page read and write
333F000
stack
page read and write
471E000
stack
page read and write
D91000
unkown
page execute and read and write
38FE000
stack
page read and write
4B90000
direct allocation
page execute and read and write
4721000
heap
page read and write
3ADF000
stack
page read and write
1580000
direct allocation
page read and write
844000
heap
page read and write
5550000
direct allocation
page execute and read and write
4D10000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
2E3F000
stack
page read and write
588E000
stack
page read and write
43C000
stack
page read and write
844000
heap
page read and write
2880000
direct allocation
page execute and read and write
AB0000
direct allocation
page execute and read and write
106A000
unkown
page execute and read and write
2EBF000
stack
page read and write
367E000
stack
page read and write
2AD0000
heap
page read and write
1194000
heap
page read and write
44DE000
stack
page read and write
AC0000
unkown
page read and write
4E20000
heap
page read and write
4C00000
direct allocation
page execute and read and write
844000
heap
page read and write
4C60000
direct allocation
page execute and read and write
4D00000
direct allocation
page execute and read and write
399E000
stack
page read and write
449F000
stack
page read and write
6D4000
heap
page read and write
2890000
heap
page read and write
3BFF000
stack
page read and write
403F000
stack
page read and write
4741000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
940000
direct allocation
page read and write
DE0000
unkown
page execute and read and write
3ADE000
stack
page read and write
44DF000
stack
page read and write
5510000
direct allocation
page execute and read and write
EA6000
unkown
page execute and read and write
3BDF000
stack
page read and write
F1A000
unkown
page execute and read and write
4741000
heap
page read and write
There are 860 hidden memdumps, click here to show them.