IOC Report
LisectAVT_2403002A_140.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_140.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_140.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_140.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORTR
unknown
https://t.me/RiseProSUPPORT;
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
D21000
unkown
page execute and read and write
malicious
55E0000
direct allocation
page read and write
malicious
2C1000
unkown
page execute and read and write
malicious
2C1000
unkown
page execute and read and write
malicious
4E60000
direct allocation
page read and write
malicious
52E0000
direct allocation
page read and write
malicious
4B80000
direct allocation
page read and write
malicious
A21000
unkown
page execute and read and write
malicious
A21000
unkown
page execute and read and write
malicious
4DF0000
direct allocation
page read and write
malicious
1514000
heap
page read and write
4D90000
direct allocation
page execute and read and write
1867000
heap
page read and write
480F000
stack
page read and write
49DE000
stack
page read and write
16D1000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
13E4000
heap
page read and write
5770000
direct allocation
page execute and read and write
385F000
stack
page read and write
2E2E000
stack
page read and write
4D10000
direct allocation
page execute and read and write
F40000
direct allocation
page read and write
50F0000
direct allocation
page execute and read and write
330F000
stack
page read and write
31F0000
direct allocation
page read and write
55DE000
stack
page read and write
5860000
direct allocation
page execute and read and write
1514000
heap
page read and write
32CF000
stack
page read and write
32EF000
stack
page read and write
1050000
heap
page read and write
465E000
stack
page read and write
3E9F000
stack
page read and write
9F4000
heap
page read and write
3357000
heap
page read and write
FA6000
heap
page read and write
2D30000
direct allocation
page read and write
E1A000
unkown
page execute and read and write
9FD000
stack
page read and write
4E60000
direct allocation
page read and write
10D4000
heap
page read and write
461F000
stack
page read and write
9F4000
heap
page read and write
31F0000
direct allocation
page read and write
3330000
direct allocation
page read and write
D9E000
stack
page read and write
306E000
stack
page read and write
4D9F000
stack
page read and write
A10000
heap
page read and write
49E0000
heap
page read and write
3E4E000
stack
page read and write
57B0000
direct allocation
page execute and read and write
9F4000
heap
page read and write
411F000
stack
page read and write
66B000
unkown
page execute and read and write
1510000
heap
page read and write
1514000
heap
page read and write
389E000
stack
page read and write
3A8E000
stack
page read and write
46F1000
heap
page read and write
4D10000
direct allocation
page execute and read and write
5770000
direct allocation
page execute and read and write
425F000
stack
page read and write
13E4000
heap
page read and write
5500000
direct allocation
page execute and read and write
10D4000
heap
page read and write
2BAE000
stack
page read and write
3F4F000
stack
page read and write
D20000
unkown
page readonly
9F4000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
46F1000
heap
page read and write
11AA000
heap
page read and write
4950000
direct allocation
page read and write
F40000
direct allocation
page read and write
562B000
stack
page read and write
F30000
heap
page read and write
31F0000
direct allocation
page read and write
9F4000
heap
page read and write
4F80000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
4FF0000
direct allocation
page execute and read and write
16C7000
heap
page read and write
DC0000
heap
page read and write
F89000
heap
page read and write
4DA0000
trusted library allocation
page read and write
2BBC000
stack
page read and write
2D50000
heap
page read and write
45CE000
stack
page read and write
50D0000
direct allocation
page execute and read and write
10D4000
heap
page read and write
430F000
stack
page read and write
4CE0000
heap
page read and write
13E4000
heap
page read and write
2D30000
direct allocation
page read and write
5740000
direct allocation
page execute and read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
49E1000
heap
page read and write
50A0000
direct allocation
page execute and read and write
11AD000
heap
page read and write
415E000
stack
page read and write
55A0000
trusted library allocation
page read and write
DC4000
heap
page read and write
4961000
heap
page read and write
4F70000
direct allocation
page execute and read and write
2D30000
direct allocation
page read and write
5830000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
408F000
stack
page read and write
375E000
stack
page read and write
DC4000
heap
page read and write
4EDF000
stack
page read and write
31F0000
direct allocation
page read and write
430F000
stack
page read and write
3FC000
unkown
page execute and read and write
B53000
unkown
page execute and read and write
4F80000
direct allocation
page execute and read and write
DC4000
heap
page read and write
3CEF000
stack
page read and write
3FC000
unkown
page execute and read and write
1869000
heap
page read and write
4D4E000
stack
page read and write
5580000
direct allocation
page execute and read and write
6AC000
unkown
page execute and read and write
4FF0000
direct allocation
page execute and read and write
6A0000
unkown
page execute and read and write
3A6F000
stack
page read and write
5070000
direct allocation
page execute and read and write
501F000
stack
page read and write
5470000
direct allocation
page execute and read and write
375E000
stack
page read and write
3330000
direct allocation
page read and write
3BAF000
stack
page read and write
11A0000
heap
page read and write
10D4000
heap
page read and write
5790000
direct allocation
page execute and read and write
532B000
stack
page read and write
13E4000
heap
page read and write
5050000
direct allocation
page execute and read and write
4C9E000
stack
page read and write
5750000
direct allocation
page execute and read and write
E1A000
unkown
page execute and write copy
55E0000
direct allocation
page read and write
9F4000
heap
page read and write
B5C000
unkown
page execute and read and write
DA0000
heap
page read and write
4DF0000
direct allocation
page read and write
3E4E000
stack
page read and write
49E1000
heap
page read and write
FC2000
unkown
page execute and read and write
371F000
stack
page read and write
4D10000
direct allocation
page execute and read and write
8FD000
stack
page read and write
1514000
heap
page read and write
55E0000
direct allocation
page read and write
35AE000
stack
page read and write
3E9F000
stack
page read and write
356F000
stack
page read and write
41CF000
stack
page read and write
4E60000
direct allocation
page read and write
DC4000
heap
page read and write
862000
unkown
page execute and read and write
13D0000
heap
page read and write
4EAC000
stack
page read and write
2BDE000
stack
page read and write
4E51000
heap
page read and write
451E000
stack
page read and write
E00000
unkown
page execute and read and write
5470000
direct allocation
page execute and read and write
358E000
stack
page read and write
10D4000
heap
page read and write
5770000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
13E4000
heap
page read and write
385F000
stack
page read and write
2B7E000
stack
page read and write
DC4000
heap
page read and write
6A0000
unkown
page execute and read and write
4E51000
heap
page read and write
13E4000
heap
page read and write
B53000
unkown
page execute and read and write
432F000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
E00000
unkown
page execute and read and write
4961000
heap
page read and write
37EF000
stack
page read and write
2D30000
direct allocation
page read and write
10D4000
heap
page read and write
1514000
heap
page read and write
489F000
stack
page read and write
446F000
stack
page read and write
5040000
direct allocation
page execute and read and write
3E0F000
stack
page read and write
E53000
unkown
page execute and read and write
35DF000
stack
page read and write
408F000
stack
page read and write
2DEF000
stack
page read and write
1810000
heap
page read and write
E0C000
unkown
page execute and read and write
3B8E000
stack
page read and write
4FAF000
stack
page read and write
3330000
direct allocation
page read and write
10D4000
heap
page read and write
111B000
unkown
page execute and write copy
52CD000
stack
page read and write
46F1000
heap
page read and write
9F4000
heap
page read and write
4A1E000
stack
page read and write
458F000
stack
page read and write
10D4000
heap
page read and write
4950000
direct allocation
page read and write
344E000
stack
page read and write
401E000
stack
page read and write
9F4000
heap
page read and write
4F80000
direct allocation
page execute and read and write
D20000
unkown
page read and write
479E000
stack
page read and write
36CE000
stack
page read and write
330E000
stack
page read and write
3E0F000
stack
page read and write
5820000
direct allocation
page execute and read and write
3C5E000
stack
page read and write
4950000
direct allocation
page read and write
4F1E000
stack
page read and write
10BE000
stack
page read and write
3AAE000
stack
page read and write
3330000
direct allocation
page read and write
40AF000
stack
page read and write
4F80000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
4A8F000
stack
page read and write
2A2F000
stack
page read and write
13E4000
heap
page read and write
4B80000
direct allocation
page read and write
4B80000
direct allocation
page read and write
31EE000
stack
page read and write
401E000
stack
page read and write
542F000
stack
page read and write
5161000
heap
page read and write
194E000
stack
page read and write
4F80000
direct allocation
page execute and read and write
2C47000
heap
page read and write
1514000
heap
page read and write
4D10000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
2A6C000
stack
page read and write
57C0000
direct allocation
page execute and read and write
2D30000
direct allocation
page read and write
4E00000
direct allocation
page execute and read and write
F93000
heap
page read and write
13E4000
heap
page read and write
585000
unkown
page execute and read and write
311E000
stack
page read and write
31F0000
direct allocation
page read and write
1514000
heap
page read and write
46CF000
stack
page read and write
444F000
stack
page read and write
5550000
direct allocation
page execute and read and write
5060000
direct allocation
page execute and read and write
ECF000
stack
page read and write
2E9E000
stack
page read and write
40CE000
stack
page read and write
F6B000
heap
page read and write
4E3B000
stack
page read and write
4E36000
heap
page read and write
37CF000
stack
page read and write
9F4000
heap
page read and write
F50000
heap
page read and write
304F000
stack
page read and write
415E000
stack
page read and write
57D0000
direct allocation
page execute and read and write
4CCF000
stack
page read and write
511E000
stack
page read and write
1514000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
4E51000
heap
page read and write
CE5000
unkown
page execute and read and write
4DDD000
stack
page read and write
3D5F000
stack
page read and write
4DF0000
direct allocation
page read and write
5460000
direct allocation
page execute and read and write
F40000
direct allocation
page read and write
55A7000
heap
page read and write
4961000
heap
page read and write
39DE000
stack
page read and write
339E000
stack
page read and write
2C1000
unkown
page execute and write copy
12AF000
stack
page read and write
43DE000
stack
page read and write
5470000
direct allocation
page execute and read and write
46F1000
heap
page read and write
2C3E000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
F40000
direct allocation
page read and write
4E51000
heap
page read and write
46F1000
heap
page read and write
6BB000
unkown
page execute and write copy
5510000
direct allocation
page execute and read and write
A21000
unkown
page execute and write copy
5B8E000
stack
page read and write
13E4000
heap
page read and write
4950000
direct allocation
page read and write
31F0000
direct allocation
page read and write
DC4000
heap
page read and write
3C1F000
stack
page read and write
4E4F000
stack
page read and write
3BCE000
stack
page read and write
3F8000
unkown
page write copy
135C000
stack
page read and write
306F000
stack
page read and write
F91000
heap
page read and write
510F000
heap
page read and write
498E000
stack
page read and write
DCB000
unkown
page execute and read and write
1514000
heap
page read and write
DC4000
heap
page read and write
3F6F000
stack
page read and write
475F000
stack
page read and write
10D4000
heap
page read and write
52E0000
direct allocation
page read and write
4950000
direct allocation
page read and write
5560000
direct allocation
page execute and read and write
930000
heap
page read and write
A20000
unkown
page read and write
5770000
direct allocation
page execute and read and write
4950000
direct allocation
page read and write
292E000
stack
page read and write
436E000
stack
page read and write
A21000
unkown
page execute and write copy
4FF0000
direct allocation
page execute and read and write
5770000
direct allocation
page execute and read and write
31CE000
stack
page read and write
368F000
stack
page read and write
44AE000
stack
page read and write
135D000
stack
page read and write
111A000
unkown
page execute and write copy
4F3F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
5BC000
stack
page read and write
4950000
direct allocation
page read and write
572F000
stack
page read and write
10D0000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
3CCF000
stack
page read and write
4E51000
heap
page read and write
2E5F000
stack
page read and write
55E0000
direct allocation
page read and write
2D57000
heap
page read and write
5840000
direct allocation
page execute and read and write
10D4000
heap
page read and write
4D70000
direct allocation
page execute and read and write
390F000
stack
page read and write
10D4000
heap
page read and write
3330000
direct allocation
page read and write
3FAE000
stack
page read and write
5450000
direct allocation
page execute and read and write
169B000
heap
page read and write
321F000
stack
page read and write
335F000
stack
page read and write
36EE000
stack
page read and write
5540000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
4961000
heap
page read and write
5060000
direct allocation
page execute and read and write
5030000
direct allocation
page execute and read and write
5570000
direct allocation
page execute and read and write
11E2000
heap
page read and write
3EDE000
stack
page read and write
389E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
2CAF000
stack
page read and write
3D9E000
stack
page read and write
536E000
stack
page read and write
F5B000
heap
page read and write
11F4000
heap
page read and write
9F4000
heap
page read and write
3D0E000
stack
page read and write
43DE000
stack
page read and write
10D4000
heap
page read and write
2C0000
unkown
page readonly
3A8E000
stack
page read and write
3BCE000
stack
page read and write
589E000
stack
page read and write
5161000
heap
page read and write
13E0000
heap
page read and write
439F000
stack
page read and write
3D2D000
stack
page read and write
2C40000
heap
page read and write
10D4000
heap
page read and write
6BA000
unkown
page execute and write copy
3C1F000
stack
page read and write
13E4000
heap
page read and write
10D4000
heap
page read and write
4961000
heap
page read and write
5412000
direct allocation
page read and write
1514000
heap
page read and write
494F000
stack
page read and write
DC4000
heap
page read and write
1680000
heap
page read and write
4F80000
direct allocation
page execute and read and write
4D30000
direct allocation
page execute and read and write
FE5000
unkown
page execute and read and write
46F1000
heap
page read and write
4E51000
heap
page read and write
1514000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
57F0000
direct allocation
page execute and read and write
399F000
stack
page read and write
4DDE000
stack
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
862000
unkown
page execute and read and write
9F4000
heap
page read and write
58A3000
heap
page read and write
1690000
heap
page read and write
DC4000
heap
page read and write
31AB000
stack
page read and write
5770000
direct allocation
page execute and read and write
A20000
unkown
page read and write
349F000
stack
page read and write
57A0000
direct allocation
page execute and read and write
10D4000
heap
page read and write
3F8E000
stack
page read and write
10D4000
heap
page read and write
1514000
heap
page read and write
1100000
unkown
page execute and read and write
4F22000
direct allocation
page read and write
9F4000
heap
page read and write
F10000
heap
page read and write
2D20000
heap
page read and write
31F0000
direct allocation
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
394E000
stack
page read and write
E1A000
unkown
page execute and read and write
5A96000
heap
page read and write
54F0000
direct allocation
page execute and read and write
F6D000
heap
page read and write
13E4000
heap
page read and write
5010000
direct allocation
page execute and read and write
46CF000
stack
page read and write
461F000
stack
page read and write
11EC000
heap
page read and write
F17000
heap
page read and write
5090000
direct allocation
page execute and read and write
46EF000
stack
page read and write
10D4000
heap
page read and write
10D4000
heap
page read and write
3F8000
unkown
page read and write
2D30000
direct allocation
page read and write
2C0000
unkown
page readonly
6BA000
unkown
page execute and read and write
181E000
heap
page read and write
1867000
heap
page read and write
31AF000
stack
page read and write
344E000
stack
page read and write
340E000
stack
page read and write
5480000
direct allocation
page execute and read and write
4FF0000
direct allocation
page execute and read and write
3B1E000
stack
page read and write
4950000
direct allocation
page read and write
13E4000
heap
page read and write
F40000
heap
page read and write
13E4000
heap
page read and write
5490000
direct allocation
page execute and read and write
1500000
heap
page read and write
16FC000
stack
page read and write
1869000
heap
page read and write
3200000
heap
page read and write
10D4000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
3330000
direct allocation
page read and write
10D4000
heap
page read and write
5000000
direct allocation
page execute and read and write
46F0000
heap
page read and write
9F4000
heap
page read and write
F93000
heap
page read and write
3E6E000
stack
page read and write
5520000
direct allocation
page execute and read and write
1514000
heap
page read and write
DCB000
unkown
page execute and read and write
5770000
direct allocation
page execute and read and write
3FDF000
stack
page read and write
4D0F000
stack
page read and write
DC4000
heap
page read and write
3D9E000
stack
page read and write
16D1000
heap
page read and write
2D30000
direct allocation
page read and write
F5E000
heap
page read and write
392F000
stack
page read and write
3330000
direct allocation
page read and write
3A4F000
stack
page read and write
5800000
direct allocation
page execute and read and write
13E4000
heap
page read and write
4961000
heap
page read and write
5161000
heap
page read and write
479D000
stack
page read and write
34DE000
stack
page read and write
CE5000
unkown
page execute and read and write
E1B000
unkown
page execute and write copy
465E000
stack
page read and write
5050000
direct allocation
page execute and read and write
484E000
stack
page read and write
35DF000
stack
page read and write
4D10000
direct allocation
page execute and read and write
425F000
stack
page read and write
2C1000
unkown
page execute and write copy
36CE000
stack
page read and write
5770000
direct allocation
page execute and read and write
5A91000
heap
page read and write
4D50000
direct allocation
page execute and read and write
399F000
stack
page read and write
458F000
stack
page read and write
5530000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
9F4000
heap
page read and write
5760000
direct allocation
page execute and read and write
2D4F000
stack
page read and write
5770000
direct allocation
page execute and read and write
4FC0000
direct allocation
page execute and read and write
4950000
direct allocation
page read and write
37CF000
stack
page read and write
10D4000
heap
page read and write
F40000
direct allocation
page read and write
4961000
heap
page read and write
10D4000
heap
page read and write
3ADF000
stack
page read and write
2F9F000
stack
page read and write
5040000
direct allocation
page execute and read and write
40CE000
stack
page read and write
3B8F000
stack
page read and write
5810000
direct allocation
page execute and read and write
4FC0000
heap
page read and write
4950000
direct allocation
page read and write
FA6000
heap
page read and write
4B30000
trusted library allocation
page read and write
DC4000
heap
page read and write
4E51000
heap
page read and write
4950000
direct allocation
page read and write
1800000
heap
page read and write
F40000
direct allocation
page read and write
4F50000
heap
page read and write
2D30000
direct allocation
page read and write
354F000
stack
page read and write
54E0000
direct allocation
page execute and read and write
49E1000
heap
page read and write
13E4000
heap
page read and write
F40000
direct allocation
page read and write
420E000
stack
page read and write
DC4000
heap
page read and write
3F8E000
stack
page read and write
4D40000
direct allocation
page execute and read and write
358E000
stack
page read and write
4F80000
direct allocation
page execute and read and write
489F000
stack
page read and write
5081000
heap
page read and write
354F000
stack
page read and write
44DF000
stack
page read and write
444F000
stack
page read and write
3D0E000
stack
page read and write
B58000
unkown
page read and write
10D4000
heap
page read and write
F5A000
heap
page read and write
434E000
stack
page read and write
8FC000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
5770000
direct allocation
page execute and read and write
515F000
stack
page read and write
DC4000
heap
page read and write
3F3000
unkown
page execute and read and write
41CF000
stack
page read and write
50B0000
direct allocation
page execute and read and write
13E4000
heap
page read and write
5020000
direct allocation
page execute and read and write
45CE000
stack
page read and write
49E1000
heap
page read and write
2C0000
unkown
page read and write
6BA000
unkown
page execute and write copy
3330000
direct allocation
page read and write
1514000
heap
page read and write
B58000
unkown
page write copy
4DF0000
direct allocation
page execute and read and write
5770000
direct allocation
page execute and read and write
2B6F000
stack
page read and write
13E4000
heap
page read and write
F40000
direct allocation
page read and write
4F80000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
318F000
stack
page read and write
FC2000
unkown
page execute and read and write
13E4000
heap
page read and write
361E000
stack
page read and write
4BCF000
stack
page read and write
4961000
heap
page read and write
12C2000
unkown
page execute and read and write
1514000
heap
page read and write
5470000
direct allocation
page execute and read and write
49E1000
heap
page read and write
332E000
stack
page read and write
E0C000
unkown
page execute and read and write
3FDF000
stack
page read and write
13E4000
heap
page read and write
54A0000
direct allocation
page execute and read and write
31EE000
stack
page read and write
5470000
direct allocation
page execute and read and write
4D10000
direct allocation
page execute and read and write
1514000
heap
page read and write
5770000
direct allocation
page execute and read and write
4950000
direct allocation
page read and write
181A000
heap
page read and write
448E000
stack
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
13E4000
heap
page read and write
46F1000
heap
page read and write
30DF000
stack
page read and write
342F000
stack
page read and write
4ACE000
stack
page read and write
380E000
stack
page read and write
5780000
direct allocation
page execute and read and write
F9E000
heap
page read and write
31F0000
direct allocation
page read and write
2F4F000
stack
page read and write
39DE000
stack
page read and write
5440000
heap
page read and write
125C000
stack
page read and write
2D30000
direct allocation
page read and write
34DB000
stack
page read and write
1514000
heap
page read and write
13E4000
heap
page read and write
DC4000
heap
page read and write
11F4000
heap
page read and write
4B6E000
stack
page read and write
110C000
unkown
page execute and read and write
13E4000
heap
page read and write
480F000
stack
page read and write
5470000
direct allocation
page execute and read and write
4D10000
direct allocation
page execute and read and write
F40000
direct allocation
page read and write
4D10000
direct allocation
page execute and read and write
382E000
stack
page read and write
1514000
heap
page read and write
E58000
unkown
page write copy
5890000
direct allocation
page execute and read and write
1514000
heap
page read and write
13E4000
heap
page read and write
4D60000
direct allocation
page execute and read and write
3BEE000
stack
page read and write
49E1000
heap
page read and write
1514000
heap
page read and write
4D10000
direct allocation
page execute and read and write
E1B000
unkown
page execute and write copy
40EE000
stack
page read and write
325E000
stack
page read and write
2CDF000
stack
page read and write
F40000
direct allocation
page read and write
13C0000
heap
page read and write
4961000
heap
page read and write
B58000
unkown
page read and write
31F0000
direct allocation
page read and write
E58000
unkown
page read and write
A20000
unkown
page readonly
2BFE000
stack
page read and write
368F000
stack
page read and write
F40000
direct allocation
page read and write
13E4000
heap
page read and write
5080000
direct allocation
page execute and read and write
10D4000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
DC4000
heap
page read and write
470E000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
340F000
stack
page read and write
1514000
heap
page read and write
2F6E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
111A000
unkown
page execute and read and write
4B1F000
stack
page read and write
30AE000
stack
page read and write
5870000
direct allocation
page execute and read and write
E5C000
unkown
page execute and read and write
4F80000
direct allocation
page execute and read and write
4F50000
direct allocation
page execute and read and write
3F8000
unkown
page write copy
9F4000
heap
page read and write
54D0000
direct allocation
page execute and read and write
B5C000
unkown
page execute and read and write
2D30000
direct allocation
page read and write
48DE000
stack
page read and write
4E51000
heap
page read and write
66B000
unkown
page execute and read and write
F93000
heap
page read and write
13C0000
heap
page read and write
5030000
direct allocation
page execute and read and write
54B0000
direct allocation
page execute and read and write
3EDE000
stack
page read and write
394E000
stack
page read and write
5160000
heap
page read and write
308E000
stack
page read and write
346E000
stack
page read and write
1854000
heap
page read and write
9F4000
heap
page read and write
13E4000
heap
page read and write
2D1B000
stack
page read and write
420E000
stack
page read and write
31F0000
direct allocation
page read and write
4F80000
direct allocation
page execute and read and write
13E4000
heap
page read and write
339E000
stack
page read and write
422E000
stack
page read and write
4D10000
direct allocation
page execute and read and write
1A4F000
stack
page read and write
4E5E000
stack
page read and write
50E0000
direct allocation
page execute and read and write
13E4000
heap
page read and write
49E1000
heap
page read and write
31F0000
direct allocation
page read and write
DC4000
heap
page read and write
6BA000
unkown
page execute and read and write
5440000
direct allocation
page execute and read and write
10D4000
heap
page read and write
46F1000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
4BCC000
stack
page read and write
53FE000
stack
page read and write
2D30000
direct allocation
page read and write
9F4000
heap
page read and write
4D20000
direct allocation
page execute and read and write
2E4F000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
1514000
heap
page read and write
DC4000
heap
page read and write
3ADF000
stack
page read and write
F9B000
heap
page read and write
57E0000
direct allocation
page execute and read and write
2D30000
direct allocation
page read and write
4950000
direct allocation
page read and write
DC4000
heap
page read and write
5880000
direct allocation
page execute and read and write
4F92000
direct allocation
page read and write
6BB000
unkown
page execute and write copy
9F4000
heap
page read and write
4DF0000
direct allocation
page read and write
5470000
direct allocation
page execute and read and write
BDC000
stack
page read and write
F91000
heap
page read and write
3330000
direct allocation
page read and write
9F4000
heap
page read and write
6AC000
unkown
page execute and read and write
3F4F000
stack
page read and write
396E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
4950000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
9F4000
heap
page read and write
13E4000
heap
page read and write
2CEE000
stack
page read and write
4D80000
direct allocation
page execute and read and write
371F000
stack
page read and write
5020000
direct allocation
page execute and read and write
49E1000
heap
page read and write
5850000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
EFD000
stack
page read and write
4E60000
direct allocation
page read and write
13E4000
heap
page read and write
434E000
stack
page read and write
F50000
heap
page read and write
3330000
direct allocation
page read and write
4D10000
direct allocation
page execute and read and write
4FF0000
direct allocation
page execute and read and write
2C0000
unkown
page read and write
9F0000
heap
page read and write
5470000
direct allocation
page execute and read and write
3E2F000
stack
page read and write
49DF000
stack
page read and write
10D4000
heap
page read and write
1514000
heap
page read and write
4B80000
direct allocation
page read and write
2D30000
direct allocation
page read and write
448E000
stack
page read and write
48DE000
stack
page read and write
920000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
52E0000
direct allocation
page read and write
F40000
direct allocation
page read and write
9F4000
heap
page read and write
3350000
heap
page read and write
F40000
direct allocation
page read and write
2FDE000
stack
page read and write
C60000
heap
page read and write
4CB2000
direct allocation
page read and write
9F4000
heap
page read and write
10D4000
heap
page read and write
4960000
heap
page read and write
4E20000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
429E000
stack
page read and write
4C5F000
stack
page read and write
3C5E000
stack
page read and write
9F4000
heap
page read and write
2D30000
direct allocation
page read and write
10D4000
heap
page read and write
45EE000
stack
page read and write
1514000
heap
page read and write
4E51000
heap
page read and write
13E4000
heap
page read and write
4E20000
direct allocation
page execute and read and write
52E0000
direct allocation
page read and write
10D4000
heap
page read and write
475F000
stack
page read and write
DC4000
heap
page read and write
3D5F000
stack
page read and write
41EF000
stack
page read and write
10D4000
heap
page read and write
5470000
direct allocation
page execute and read and write
505E000
stack
page read and write
411F000
stack
page read and write
451E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
1514000
heap
page read and write
3B1E000
stack
page read and write
494F000
stack
page read and write
36AF000
stack
page read and write
4D10000
direct allocation
page execute and read and write
4B5E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
3330000
direct allocation
page read and write
2F2F000
stack
page read and write
4C0E000
stack
page read and write
316F000
stack
page read and write
DC4000
heap
page read and write
9F4000
heap
page read and write
F40000
direct allocation
page read and write
5590000
direct allocation
page execute and read and write
13E4000
heap
page read and write
484E000
stack
page read and write
3330000
direct allocation
page read and write
390F000
stack
page read and write
DC4000
heap
page read and write
5070000
direct allocation
page execute and read and write
429E000
stack
page read and write
9F4000
heap
page read and write
A20000
unkown
page readonly
13E4000
heap
page read and write
10CB000
unkown
page execute and read and write
B58000
unkown
page write copy
470E000
stack
page read and write
13E4000
heap
page read and write
361E000
stack
page read and write
3F8000
unkown
page read and write
3207000
heap
page read and write
E1A000
unkown
page execute and write copy
5712000
direct allocation
page read and write
585000
unkown
page execute and read and write
46F1000
heap
page read and write
49E1000
heap
page read and write
3A4F000
stack
page read and write
DC4000
heap
page read and write
439F000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
4FF0000
direct allocation
page execute and read and write
44DF000
stack
page read and write
13E4000
heap
page read and write
54C0000
direct allocation
page execute and read and write
3CCF000
stack
page read and write
13E4000
heap
page read and write
3330000
direct allocation
page read and write
3F3000
unkown
page execute and read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
45AF000
stack
page read and write
380E000
stack
page read and write
4E50000
heap
page read and write
3330000
direct allocation
page read and write
4E10000
direct allocation
page execute and read and write
4FF0000
direct allocation
page execute and read and write
DC4000
heap
page read and write
13E4000
heap
page read and write
349F000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
D21000
unkown
page execute and write copy
There are 876 hidden memdumps, click here to show them.