IOC Report
LisectAVT_2403002A_185.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_185.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_185.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_185.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORTD
unknown
https://t.me/RiseProSUPPORTN
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
211000
unkown
page execute and read and write
malicious
4AD0000
direct allocation
page read and write
malicious
5100000
direct allocation
page read and write
malicious
49C0000
direct allocation
page read and write
malicious
50E0000
direct allocation
page read and write
malicious
211000
unkown
page execute and read and write
malicious
841000
unkown
page execute and read and write
malicious
51A0000
direct allocation
page read and write
malicious
821000
unkown
page execute and read and write
malicious
841000
unkown
page execute and read and write
malicious
D14000
heap
page read and write
1214000
heap
page read and write
11D4000
heap
page read and write
13D8000
heap
page read and write
156F000
stack
page read and write
50F0000
direct allocation
page read and write
38BF000
stack
page read and write
5320000
direct allocation
page execute and read and write
1214000
heap
page read and write
304F000
stack
page read and write
1450000
direct allocation
page read and write
2DBE000
stack
page read and write
11D4000
heap
page read and write
478E000
stack
page read and write
5260000
direct allocation
page execute and read and write
428E000
stack
page read and write
821000
unkown
page execute and write copy
D14000
heap
page read and write
5270000
direct allocation
page execute and read and write
430F000
stack
page read and write
4C60000
direct allocation
page execute and read and write
5280000
direct allocation
page execute and read and write
438F000
stack
page read and write
4541000
heap
page read and write
3BCE000
stack
page read and write
5350000
direct allocation
page execute and read and write
4B30000
direct allocation
page execute and read and write
1214000
heap
page read and write
12B4000
heap
page read and write
BAB000
heap
page read and write
5250000
heap
page read and write
35CF000
stack
page read and write
308C000
stack
page read and write
35D000
stack
page read and write
4C50000
direct allocation
page execute and read and write
283E000
stack
page read and write
388E000
stack
page read and write
2860000
direct allocation
page execute and read and write
5280000
direct allocation
page execute and read and write
C44000
heap
page read and write
1214000
heap
page read and write
1450000
direct allocation
page read and write
D14000
heap
page read and write
11D4000
heap
page read and write
4631000
heap
page read and write
C44000
heap
page read and write
4C50000
direct allocation
page execute and read and write
4C61000
heap
page read and write
4C51000
heap
page read and write
311E000
stack
page read and write
1470000
heap
page read and write
2FCE000
stack
page read and write
323F000
stack
page read and write
1214000
heap
page read and write
318F000
stack
page read and write
2C7F000
stack
page read and write
C20000
direct allocation
page read and write
5420000
direct allocation
page execute and read and write
5430000
direct allocation
page execute and read and write
953000
unkown
page execute and read and write
11D4000
heap
page read and write
DBD000
unkown
page execute and read and write
C37000
unkown
page execute and write copy
4B80000
direct allocation
page execute and read and write
340F000
stack
page read and write
5260000
direct allocation
page execute and read and write
11B0000
heap
page read and write
11D0000
heap
page read and write
42BF000
stack
page read and write
14B2000
heap
page read and write
C44000
heap
page read and write
840000
unkown
page read and write
978000
unkown
page write copy
4631000
heap
page read and write
414E000
stack
page read and write
4AC0000
direct allocation
page read and write
30DF000
stack
page read and write
5260000
direct allocation
page execute and read and write
400E000
stack
page read and write
1214000
heap
page read and write
5260000
direct allocation
page execute and read and write
AFD000
stack
page read and write
480F000
stack
page read and write
82C000
stack
page read and write
5212000
direct allocation
page read and write
41BE000
stack
page read and write
48DE000
stack
page read and write
BE9000
unkown
page execute and read and write
338E000
stack
page read and write
11D4000
heap
page read and write
C44000
heap
page read and write
4B0C000
stack
page read and write
1214000
heap
page read and write
820000
unkown
page readonly
12B4000
heap
page read and write
50D0000
direct allocation
page read and write
5350000
direct allocation
page execute and read and write
44CF000
stack
page read and write
BD8000
heap
page read and write
D10000
heap
page read and write
3C5E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
12B4000
heap
page read and write
5360000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
52F0000
direct allocation
page execute and read and write
840000
unkown
page readonly
52F0000
direct allocation
page execute and read and write
1214000
heap
page read and write
4B1F000
stack
page read and write
C28000
unkown
page execute and read and write
E43000
heap
page read and write
5360000
direct allocation
page execute and read and write
C44000
heap
page read and write
360E000
stack
page read and write
398F000
stack
page read and write
2D0F000
stack
page read and write
360E000
stack
page read and write
401E000
stack
page read and write
4C02000
direct allocation
page read and write
115C000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
11D4000
heap
page read and write
1210000
heap
page read and write
12B4000
heap
page read and write
5190000
direct allocation
page read and write
49CF000
stack
page read and write
4C39000
heap
page read and write
313F000
stack
page read and write
138A000
heap
page read and write
33BF000
stack
page read and write
2D7F000
stack
page read and write
324E000
stack
page read and write
5320000
direct allocation
page execute and read and write
41CF000
stack
page read and write
2EAB000
stack
page read and write
3E0F000
stack
page read and write
12B4000
heap
page read and write
4DA000
unkown
page execute and read and write
210000
unkown
page readonly
439F000
stack
page read and write
1214000
heap
page read and write
4631000
heap
page read and write
1450000
direct allocation
page read and write
12AE000
heap
page read and write
607000
unkown
page execute and write copy
12B4000
heap
page read and write
1450000
direct allocation
page read and write
31F0000
heap
page read and write
310F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
C44000
heap
page read and write
52C0000
direct allocation
page execute and read and write
2EE0000
direct allocation
page read and write
210000
unkown
page read and write
4541000
heap
page read and write
4C61000
heap
page read and write
973000
unkown
page execute and read and write
4B10000
direct allocation
page execute and read and write
C44000
heap
page read and write
2DEA000
stack
page read and write
5330000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
1130000
heap
page read and write
1450000
direct allocation
page read and write
4C61000
heap
page read and write
513C000
stack
page read and write
C37000
unkown
page execute and write copy
293F000
stack
page read and write
E3B000
heap
page read and write
5290000
direct allocation
page execute and read and write
2EE0000
direct allocation
page read and write
DCC000
stack
page read and write
444F000
stack
page read and write
465E000
stack
page read and write
841000
unkown
page execute and write copy
4D20000
direct allocation
page execute and read and write
2EC0000
direct allocation
page read and write
12B4000
heap
page read and write
C28000
unkown
page execute and read and write
12EA000
heap
page read and write
DFD000
heap
page read and write
32CF000
stack
page read and write
3E9F000
stack
page read and write
C20000
direct allocation
page read and write
348000
unkown
page write copy
11D4000
heap
page read and write
2EC0000
direct allocation
page read and write
5250000
direct allocation
page execute and read and write
5280000
direct allocation
page execute and read and write
1214000
heap
page read and write
50DD000
stack
page read and write
7EE000
stack
page read and write
1C0000
heap
page read and write
45CE000
stack
page read and write
4D7A000
heap
page read and write
978000
unkown
page write copy
D14000
heap
page read and write
52F0000
heap
page read and write
4C4F000
stack
page read and write
C20000
direct allocation
page read and write
1D0000
heap
page read and write
39CE000
stack
page read and write
2A7F000
stack
page read and write
C44000
heap
page read and write
C40000
heap
page read and write
CA0000
heap
page read and write
50D0000
direct allocation
page read and write
C44000
heap
page read and write
450E000
stack
page read and write
52B0000
direct allocation
page execute and read and write
210000
unkown
page read and write
4ACE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
7AD000
unkown
page execute and read and write
39CE000
stack
page read and write
338E000
stack
page read and write
3CBE000
stack
page read and write
AEA000
unkown
page execute and read and write
4C51000
heap
page read and write
5320000
direct allocation
page execute and read and write
12B4000
heap
page read and write
11C0000
heap
page read and write
35DF000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
5370000
direct allocation
page execute and read and write
4D10000
direct allocation
page execute and read and write
1214000
heap
page read and write
14BA000
heap
page read and write
D14000
heap
page read and write
4620000
direct allocation
page read and write
4AAE000
stack
page read and write
52F0000
direct allocation
page execute and read and write
138E000
heap
page read and write
4631000
heap
page read and write
5190000
direct allocation
page read and write
36CE000
stack
page read and write
40CE000
stack
page read and write
4620000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
12B4000
heap
page read and write
12B4000
heap
page read and write
4C61000
heap
page read and write
3B1E000
stack
page read and write
2D4E000
stack
page read and write
411F000
stack
page read and write
11D4000
heap
page read and write
1214000
heap
page read and write
4620000
direct allocation
page read and write
344E000
stack
page read and write
5260000
direct allocation
page execute and read and write
297F000
stack
page read and write
300F000
stack
page read and write
370F000
stack
page read and write
464E000
stack
page read and write
52A0000
direct allocation
page execute and read and write
5310000
direct allocation
page execute and read and write
5280000
direct allocation
page execute and read and write
410F000
stack
page read and write
417F000
stack
page read and write
33FE000
stack
page read and write
5320000
direct allocation
page execute and read and write
C20000
direct allocation
page read and write
1214000
heap
page read and write
4610000
heap
page read and write
408F000
stack
page read and write
11D4000
heap
page read and write
1214000
heap
page read and write
11D4000
heap
page read and write
12B4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
451E000
stack
page read and write
53F0000
direct allocation
page execute and read and write
389E000
stack
page read and write
363F000
stack
page read and write
C18000
unkown
page execute and write copy
1440000
heap
page read and write
2EC0000
direct allocation
page read and write
52D0000
direct allocation
page execute and read and write
50D0000
direct allocation
page read and write
1214000
heap
page read and write
2EE0000
direct allocation
page read and write
415E000
stack
page read and write
3ACF000
stack
page read and write
5240000
direct allocation
page execute and read and write
2EDE000
stack
page read and write
5260000
direct allocation
page execute and read and write
5F1000
unkown
page execute and read and write
5150000
trusted library allocation
page read and write
4C0F000
stack
page read and write
4980000
trusted library allocation
page read and write
330E000
stack
page read and write
424F000
stack
page read and write
53B0000
direct allocation
page execute and read and write
31AF000
unkown
page read and write
3FCF000
stack
page read and write
3050000
heap
page read and write
D14000
heap
page read and write
13CD000
heap
page read and write
2EE0000
direct allocation
page read and write
5260000
direct allocation
page execute and read and write
2EC0000
direct allocation
page read and write
4C50000
direct allocation
page execute and read and write
C44000
heap
page read and write
5232000
direct allocation
page read and write
50F0000
direct allocation
page read and write
4541000
heap
page read and write
1380000
heap
page read and write
4C5F000
stack
page read and write
5F8000
unkown
page execute and read and write
4541000
heap
page read and write
4F2E000
stack
page read and write
5310000
direct allocation
page execute and read and write
518D000
stack
page read and write
14A8000
heap
page read and write
335F000
stack
page read and write
4620000
direct allocation
page read and write
2EE0000
direct allocation
page read and write
34CE000
stack
page read and write
1214000
heap
page read and write
4B10000
direct allocation
page execute and read and write
12B4000
heap
page read and write
2DAD000
stack
page read and write
334F000
stack
page read and write
374E000
stack
page read and write
11D4000
heap
page read and write
420E000
stack
page read and write
E31000
heap
page read and write
3F3E000
stack
page read and write
34FF000
stack
page read and write
11D4000
heap
page read and write
5380000
direct allocation
page execute and read and write
31CE000
stack
page read and write
4D0F000
stack
page read and write
4AF2000
direct allocation
page read and write
2EE0000
direct allocation
page read and write
13D8000
heap
page read and write
488F000
stack
page read and write
D14000
heap
page read and write
12B4000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
12B4000
heap
page read and write
316E000
unkown
page read and write
11D4000
heap
page read and write
7F0000
heap
page read and write
343000
unkown
page execute and read and write
414E000
stack
page read and write
C20000
direct allocation
page read and write
607000
unkown
page execute and write copy
428E000
stack
page read and write
1450000
direct allocation
page read and write
12B0000
heap
page read and write
3C4E000
stack
page read and write
470E000
stack
page read and write
840000
unkown
page read and write
1450000
direct allocation
page read and write
367E000
stack
page read and write
5370000
direct allocation
page execute and read and write
3C1F000
stack
page read and write
D14000
heap
page read and write
2E8E000
stack
page read and write
C20000
direct allocation
page read and write
BE1000
heap
page read and write
125E000
stack
page read and write
321F000
stack
page read and write
4540000
heap
page read and write
5380000
direct allocation
page execute and read and write
5370000
direct allocation
page execute and read and write
D14000
heap
page read and write
5390000
direct allocation
page execute and read and write
11D4000
heap
page read and write
2EE0000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
1214000
heap
page read and write
C44000
heap
page read and write
608000
unkown
page execute and write copy
4631000
heap
page read and write
5260000
direct allocation
page execute and read and write
5B9000
unkown
page execute and read and write
2A8F000
stack
page read and write
4620000
direct allocation
page read and write
354F000
stack
page read and write
4B10000
direct allocation
page execute and read and write
11D4000
heap
page read and write
4631000
heap
page read and write
D14000
heap
page read and write
370F000
stack
page read and write
15C000
stack
page read and write
2EC0000
direct allocation
page read and write
12B4000
heap
page read and write
4B10000
direct allocation
page execute and read and write
4C90000
direct allocation
page execute and read and write
1450000
direct allocation
page read and write
4B5E000
stack
page read and write
C44000
heap
page read and write
5340000
direct allocation
page execute and read and write
D14000
heap
page read and write
4C50000
heap
page read and write
12B4000
heap
page read and write
4B10000
direct allocation
page execute and read and write
458F000
stack
page read and write
43FF000
stack
page read and write
2EC0000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
2EE0000
direct allocation
page read and write
434E000
stack
page read and write
4631000
heap
page read and write
C20000
direct allocation
page read and write
2EFE000
stack
page read and write
3A8E000
stack
page read and write
1214000
heap
page read and write
D14000
heap
page read and write
12F5000
heap
page read and write
3C7F000
stack
page read and write
DFA000
heap
page read and write
1430000
heap
page read and write
39A000
stack
page read and write
C44000
heap
page read and write
5300000
direct allocation
page execute and read and write
1370000
heap
page read and write
1450000
direct allocation
page read and write
11D4000
heap
page read and write
DD0000
direct allocation
page read and write
BD9000
heap
page read and write
34CE000
stack
page read and write
348000
unkown
page write copy
973000
unkown
page execute and read and write
3ECE000
stack
page read and write
12B4000
heap
page read and write
2E6E000
stack
page read and write
12ED000
heap
page read and write
BE1000
heap
page read and write
12B4000
heap
page read and write
461F000
stack
page read and write
880000
heap
page read and write
4C50000
direct allocation
page execute and read and write
C20000
direct allocation
page read and write
2FFF000
stack
page read and write
D14000
heap
page read and write
B0A000
unkown
page execute and read and write
C37000
unkown
page execute and read and write
49DF000
stack
page read and write
5280000
direct allocation
page execute and read and write
4B60000
direct allocation
page execute and read and write
C20000
direct allocation
page read and write
4B20000
direct allocation
page execute and read and write
D14000
heap
page read and write
1214000
heap
page read and write
C44000
heap
page read and write
5320000
direct allocation
page execute and read and write
523F000
stack
page read and write
1214000
heap
page read and write
43CE000
stack
page read and write
284E000
stack
page read and write
348000
unkown
page read and write
1450000
direct allocation
page read and write
11D4000
heap
page read and write
3D0E000
stack
page read and write
3240000
heap
page read and write
5310000
direct allocation
page execute and read and write
12F5000
heap
page read and write
506E000
stack
page read and write
4B10000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
12A0000
heap
page read and write
12B4000
heap
page read and write
4541000
heap
page read and write
5280000
direct allocation
page execute and read and write
607000
unkown
page execute and read and write
5399000
heap
page read and write
388E000
stack
page read and write
3EDE000
stack
page read and write
12B4000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
52A0000
direct allocation
page execute and read and write
4C40000
direct allocation
page execute and read and write
410F000
stack
page read and write
348F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
2EC0000
direct allocation
page read and write
2E4F000
stack
page read and write
11D4000
heap
page read and write
403F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
7AD000
unkown
page execute and read and write
5280000
direct allocation
page execute and read and write
424F000
stack
page read and write
573E000
stack
page read and write
3A4F000
stack
page read and write
2F4E000
stack
page read and write
D14000
heap
page read and write
390F000
stack
page read and write
27CE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
D8E000
stack
page read and write
3F8E000
stack
page read and write
1214000
heap
page read and write
385F000
stack
page read and write
2EC0000
direct allocation
page read and write
52B0000
direct allocation
page execute and read and write
D14000
heap
page read and write
4C61000
heap
page read and write
1478000
heap
page read and write
2FDF000
stack
page read and write
11D4000
heap
page read and write
211000
unkown
page execute and write copy
438F000
stack
page read and write
2EC0000
direct allocation
page read and write
BE9000
unkown
page execute and read and write
116D000
stack
page read and write
12B4000
heap
page read and write
280E000
stack
page read and write
30CF000
stack
page read and write
4620000
direct allocation
page read and write
C44000
heap
page read and write
5270000
direct allocation
page execute and read and write
4BCF000
stack
page read and write
C38000
unkown
page execute and write copy
3C0F000
stack
page read and write
327F000
stack
page read and write
1450000
direct allocation
page read and write
4B40000
direct allocation
page execute and read and write
5190000
direct allocation
page read and write
49BD000
stack
page read and write
2ED0000
heap
page read and write
3B8F000
stack
page read and write
5350000
direct allocation
page execute and read and write
368F000
stack
page read and write
407E000
stack
page read and write
4620000
direct allocation
page read and write
384F000
stack
page read and write
2EE0000
direct allocation
page read and write
C44000
heap
page read and write
1450000
direct allocation
page read and write
361E000
stack
page read and write
56AE000
stack
page read and write
C44000
heap
page read and write
4A0E000
stack
page read and write
5280000
direct allocation
page execute and read and write
B3D000
stack
page read and write
2F07000
heap
page read and write
32BE000
stack
page read and write
C20000
direct allocation
page read and write
3ACF000
stack
page read and write
4B00000
direct allocation
page execute and read and write
325E000
stack
page read and write
840000
unkown
page readonly
4C61000
heap
page read and write
C44000
heap
page read and write
600000
heap
page read and write
1214000
heap
page read and write
453F000
stack
page read and write
13BF000
stack
page read and write
C20000
direct allocation
page read and write
2940000
heap
page read and write
5390000
direct allocation
page execute and read and write
2EE0000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
4631000
heap
page read and write
52E0000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
2B7F000
stack
page read and write
5320000
direct allocation
page execute and read and write
4D11000
heap
page read and write
53E0000
direct allocation
page execute and read and write
3E4E000
stack
page read and write
3D8E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
5330000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
450E000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
2F8F000
stack
page read and write
DDD000
unkown
page execute and read and write
3ECE000
stack
page read and write
4C0E000
stack
page read and write
375E000
stack
page read and write
34C000
unkown
page execute and read and write
39DE000
stack
page read and write
5280000
direct allocation
page execute and read and write
DF0000
heap
page read and write
1214000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
5B9000
unkown
page execute and read and write
4B0F000
stack
page read and write
3D4F000
stack
page read and write
978000
unkown
page read and write
12B4000
heap
page read and write
2C0E000
stack
page read and write
1214000
heap
page read and write
14BA000
heap
page read and write
2BCF000
stack
page read and write
3C0F000
stack
page read and write
4B10000
direct allocation
page execute and read and write
348F000
stack
page read and write
2EC0000
direct allocation
page read and write
33A0000
heap
page read and write
4A8F000
stack
page read and write
4D40000
direct allocation
page execute and read and write
D14000
heap
page read and write
11D4000
heap
page read and write
380E000
stack
page read and write
371F000
stack
page read and write
5280000
direct allocation
page execute and read and write
97C000
unkown
page execute and read and write
5260000
direct allocation
page execute and read and write
2EE0000
direct allocation
page read and write
4D30000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
43CE000
stack
page read and write
460F000
stack
page read and write
5330000
direct allocation
page execute and read and write
820000
unkown
page read and write
4B4E000
stack
page read and write
4D60000
direct allocation
page execute and read and write
2ACE000
stack
page read and write
52C0000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
399F000
stack
page read and write
690000
heap
page read and write
D14000
heap
page read and write
2870000
heap
page read and write
5280000
direct allocation
page execute and read and write
4630000
heap
page read and write
1450000
direct allocation
page read and write
4541000
heap
page read and write
13D0000
heap
page read and write
343000
unkown
page execute and read and write
39FF000
stack
page read and write
310E000
stack
page read and write
105C000
stack
page read and write
C44000
heap
page read and write
4C30000
direct allocation
page execute and read and write
377F000
stack
page read and write
1214000
heap
page read and write
489F000
stack
page read and write
358E000
stack
page read and write
353E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
494F000
stack
page read and write
53B8000
heap
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
4C00000
direct allocation
page execute and read and write
1214000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
334F000
stack
page read and write
348000
unkown
page read and write
35CF000
stack
page read and write
132E000
stack
page read and write
50F0000
direct allocation
page read and write
12B4000
heap
page read and write
978000
unkown
page read and write
5260000
direct allocation
page execute and read and write
4620000
direct allocation
page read and write
3D8E000
stack
page read and write
4A70000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
841000
unkown
page execute and write copy
4C61000
heap
page read and write
3D4F000
stack
page read and write
1214000
heap
page read and write
53A0000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
2EC0000
direct allocation
page read and write
474F000
stack
page read and write
37CF000
stack
page read and write
1214000
heap
page read and write
511B000
stack
page read and write
4D11000
heap
page read and write
4C50000
direct allocation
page execute and read and write
E43000
heap
page read and write
12B4000
heap
page read and write
5090000
trusted library allocation
page read and write
12B4000
heap
page read and write
10FD000
stack
page read and write
3E8F000
stack
page read and write
5F8000
unkown
page execute and read and write
4CC0000
direct allocation
page execute and read and write
C21000
unkown
page execute and read and write
C08000
unkown
page execute and read and write
484E000
stack
page read and write
12E2000
heap
page read and write
4C61000
heap
page read and write
50CE000
stack
page read and write
11D4000
heap
page read and write
2947000
heap
page read and write
11D4000
heap
page read and write
1214000
heap
page read and write
31EE000
stack
page read and write
2EC0000
direct allocation
page read and write
68F000
unkown
page read and write
C38000
unkown
page execute and write copy
1214000
heap
page read and write
5300000
direct allocation
page execute and read and write
1214000
heap
page read and write
320F000
stack
page read and write
1214000
heap
page read and write
C44000
heap
page read and write
5400000
direct allocation
page execute and read and write
324E000
stack
page read and write
5340000
direct allocation
page execute and read and write
BC9000
unkown
page execute and read and write
C44000
heap
page read and write
4D11000
heap
page read and write
2EBF000
stack
page read and write
34DE000
stack
page read and write
2EB0000
heap
page read and write
5320000
direct allocation
page execute and read and write
11D4000
heap
page read and write
4541000
heap
page read and write
4620000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
12B4000
heap
page read and write
4620000
direct allocation
page read and write
2EC0000
direct allocation
page read and write
2850000
heap
page read and write
C21000
unkown
page execute and read and write
460F000
stack
page read and write
D14000
heap
page read and write
D14000
heap
page read and write
13C6000
heap
page read and write
3DBF000
stack
page read and write
C20000
direct allocation
page read and write
5380000
direct allocation
page execute and read and write
3B0E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
42FE000
stack
page read and write
44DF000
stack
page read and write
211000
unkown
page execute and write copy
3C4E000
stack
page read and write
C01000
unkown
page execute and read and write
210000
unkown
page readonly
11D4000
heap
page read and write
607000
unkown
page execute and read and write
4C80000
direct allocation
page execute and read and write
1400000
heap
page read and write
4D10000
heap
page read and write
C10000
heap
page read and write
5340000
direct allocation
page execute and read and write
5250000
direct allocation
page execute and read and write
43DE000
stack
page read and write
11D4000
heap
page read and write
888000
heap
page read and write
820000
heap
page read and write
3ADF000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
2EE0000
direct allocation
page read and write
4620000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
49FB000
stack
page read and write
3EFF000
stack
page read and write
1214000
heap
page read and write
2EC0000
direct allocation
page read and write
4C70000
direct allocation
page execute and read and write
1214000
heap
page read and write
C44000
heap
page read and write
4631000
heap
page read and write
1450000
direct allocation
page read and write
50A0000
trusted library allocation
page read and write
3CCF000
stack
page read and write
5280000
direct allocation
page execute and read and write
C37000
unkown
page execute and read and write
958000
unkown
page read and write
568E000
stack
page read and write
384F000
stack
page read and write
3A3E000
stack
page read and write
2877000
heap
page read and write
5290000
direct allocation
page execute and read and write
4620000
direct allocation
page read and write
4C20000
heap
page read and write
3FDF000
stack
page read and write
475F000
stack
page read and write
3D5F000
stack
page read and write
320F000
stack
page read and write
2ED7000
heap
page read and write
C44000
heap
page read and write
DD0000
direct allocation
page read and write
3DFE000
stack
page read and write
4B10000
direct allocation
page execute and read and write
498E000
stack
page read and write
37BE000
stack
page read and write
479E000
stack
page read and write
398E000
stack
page read and write
3D9E000
stack
page read and write
1447000
heap
page read and write
429D000
stack
page read and write
3B0E000
stack
page read and write
4AC0000
direct allocation
page read and write
1214000
heap
page read and write
374E000
stack
page read and write
5F1000
unkown
page execute and read and write
52DF000
stack
page read and write
5300000
direct allocation
page execute and read and write
5280000
direct allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
4D11000
heap
page read and write
2EE0000
direct allocation
page read and write
425F000
stack
page read and write
4C61000
heap
page read and write
1030000
heap
page read and write
4D11000
heap
page read and write
52E0000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
1214000
heap
page read and write
4C50000
direct allocation
page execute and read and write
B0A000
unkown
page execute and read and write
11D4000
heap
page read and write
4C51000
heap
page read and write
4B70000
direct allocation
page execute and read and write
3FCF000
stack
page read and write
1214000
heap
page read and write
298C000
stack
page read and write
443E000
stack
page read and write
C44000
heap
page read and write
95C000
unkown
page execute and read and write
5320000
direct allocation
page execute and read and write
48CE000
stack
page read and write
D14000
heap
page read and write
A3C000
stack
page read and write
11D4000
heap
page read and write
4541000
heap
page read and write
2E9B000
stack
page read and write
958000
unkown
page write copy
51DB000
stack
page read and write
46CF000
stack
page read and write
157F000
stack
page read and write
4A1E000
stack
page read and write
5596000
heap
page read and write
303E000
stack
page read and write
11D4000
heap
page read and write
5260000
direct allocation
page execute and read and write
1214000
heap
page read and write
C17000
unkown
page execute and read and write
53C0000
direct allocation
page execute and read and write
3B3F000
stack
page read and write
D14000
heap
page read and write
4620000
direct allocation
page read and write
317E000
stack
page read and write
12B4000
heap
page read and write
126E000
stack
page read and write
34C000
unkown
page execute and read and write
4541000
heap
page read and write
38FE000
stack
page read and write
32C0000
heap
page read and write
C44000
heap
page read and write
4AFF000
stack
page read and write
5320000
direct allocation
page execute and read and write
4620000
direct allocation
page read and write
33AB000
heap
page read and write
448E000
stack
page read and write
3F4F000
stack
page read and write
11D4000
heap
page read and write
4B10000
direct allocation
page execute and read and write
5448000
heap
page read and write
3B7E000
stack
page read and write
BA0000
heap
page read and write
11D4000
heap
page read and write
D14000
heap
page read and write
4C60000
heap
page read and write
4DA000
unkown
page execute and read and write
11E0000
heap
page read and write
44CF000
stack
page read and write
52D0000
direct allocation
page execute and read and write
DDD000
unkown
page execute and read and write
7AE000
stack
page read and write
2EE0000
direct allocation
page read and write
12AA000
heap
page read and write
5260000
direct allocation
page execute and read and write
5410000
direct allocation
page execute and read and write
339E000
stack
page read and write
521F000
stack
page read and write
53A0000
direct allocation
page execute and read and write
64E000
unkown
page read and write
D14000
heap
page read and write
3E8F000
stack
page read and write
349F000
stack
page read and write
106C000
stack
page read and write
52D2000
direct allocation
page read and write
559C000
heap
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
608000
unkown
page execute and write copy
C17000
unkown
page execute and write copy
2E5E000
stack
page read and write
12B4000
heap
page read and write
C20000
direct allocation
page read and write
1214000
heap
page read and write
11F0000
heap
page read and write
97C000
unkown
page execute and read and write
C20000
direct allocation
page read and write
5260000
direct allocation
page execute and read and write
12B4000
heap
page read and write
12B4000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
D14000
heap
page read and write
400E000
stack
page read and write
394E000
stack
page read and write
1214000
heap
page read and write
2F00000
heap
page read and write
2850000
direct allocation
page execute and read and write
There are 904 hidden memdumps, click here to show them.