IOC Report
Autofill Manufacturing Sdn Bhd 28-08-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
Autofill Manufacturing Sdn Bhd 28-08-2024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Autofill Manufacturing Sdn Bhd 28-08-2024.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp8289.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GhrKoSGuCdvpJ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0gaiz3yh.3nb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ed1eyoy.dbh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hy4umc5.uqy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dtxhfwmy.4jf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jt3cnewh.wog.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lobd44dl.mhw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmlenjg4.p34.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxkjhyeq.kuf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9536.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
"C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8289.tmp"
malicious
C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe
"C:\Users\user\Desktop\Autofill Manufacturing Sdn Bhd 28-08-2024.exe"
malicious
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GhrKoSGuCdvpJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9536.tmp"
malicious
C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe
"C:\Users\user\AppData\Roaming\GhrKoSGuCdvpJ.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2029/08/2024%20/%2019:20:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
https://chrome.google.com/webstore?hl=enp
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20a
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2030/08/2024%20/%2000:43:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org/
193.122.6.168
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://www.office.com/p
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Autofill Manufacturing Sdn Bhd 28-08-2024_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GhrKoSGuCdvpJ_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
34B5000
trusted library allocation
page read and write
malicious
2D61000
trusted library allocation
page read and write
malicious
433000
remote allocation
page execute and read and write
malicious
3231000
trusted library allocation
page read and write
malicious
4026000
trusted library allocation
page read and write
40AB000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
40C6000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
3037000
trusted library allocation
page execute and read and write
33CC000
trusted library allocation
page read and write
6BB2000
trusted library allocation
page read and write
2B3A000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
9B8E000
stack
page read and write
5500000
heap
page execute and read and write
6990000
trusted library allocation
page execute and read and write
3220000
heap
page read and write
7640000
trusted library allocation
page execute and read and write
7660000
trusted library allocation
page read and write
526C000
stack
page read and write
12F7000
stack
page read and write
4DD0000
heap
page read and write
79BE000
stack
page read and write
9F0F000
stack
page read and write
1070000
trusted library allocation
page read and write
3022000
trusted library allocation
page read and write
243E000
stack
page read and write
1090000
trusted library allocation
page read and write
A42000
trusted library allocation
page read and write
3DD2000
trusted library allocation
page read and write
417E000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
3040000
heap
page read and write
306C000
trusted library allocation
page read and write
13B0000
heap
page read and write
687E000
stack
page read and write
3022000
trusted library allocation
page read and write
413000
remote allocation
page execute and read and write
2ED1000
trusted library allocation
page read and write
15F7000
heap
page read and write
3536000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
EC1000
heap
page read and write
8DE000
stack
page read and write
6AC0000
heap
page read and write
B3B000
trusted library allocation
page read and write
5BF0000
heap
page read and write
5756000
trusted library allocation
page read and write
713F000
stack
page read and write
3004000
trusted library allocation
page read and write
3060000
trusted library allocation
page execute and read and write
144D000
heap
page read and write
3160000
trusted library allocation
page read and write
691D000
trusted library allocation
page read and write
301D000
trusted library allocation
page execute and read and write
E09000
heap
page read and write
4567000
trusted library allocation
page read and write
102E000
stack
page read and write
1517000
heap
page read and write
60F000
heap
page read and write
7600000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
3533000
trusted library allocation
page read and write
A57000
trusted library allocation
page execute and read and write
3F5E000
trusted library allocation
page read and write
4619000
trusted library allocation
page read and write
7070000
trusted library allocation
page execute and read and write
49E0000
trusted library allocation
page execute and read and write
1075000
trusted library allocation
page execute and read and write
1428000
heap
page read and write
7020000
trusted library allocation
page read and write
4088000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
43D000
remote allocation
page execute and read and write
2B60000
heap
page read and write
5D0000
heap
page read and write
69F7000
trusted library allocation
page read and write
104D000
trusted library allocation
page execute and read and write
457F000
trusted library allocation
page read and write
56EA000
trusted library allocation
page read and write
2FE9000
trusted library allocation
page read and write
45A4000
trusted library allocation
page read and write
5293000
heap
page read and write
A94E000
stack
page read and write
ABE000
stack
page read and write
6920000
trusted library allocation
page execute and read and write
40AE000
trusted library allocation
page read and write
431A000
trusted library allocation
page read and write
2BDE000
unkown
page read and write
9CCE000
stack
page read and write
15C1000
heap
page read and write
329F000
trusted library allocation
page read and write
3F30000
trusted library allocation
page read and write
5A3B000
stack
page read and write
65BE000
stack
page read and write
2DDE000
trusted library allocation
page read and write
690A000
trusted library allocation
page read and write
42F9000
trusted library allocation
page read and write
FCA000
stack
page read and write
1490000
heap
page read and write
2B46000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
A24000
trusted library allocation
page read and write
68B000
heap
page read and write
14DE000
stack
page read and write
40F9000
trusted library allocation
page read and write
A52000
trusted library allocation
page read and write
10C4000
trusted library allocation
page read and write
442F000
trusted library allocation
page read and write
40BA000
trusted library allocation
page read and write
42F000
remote allocation
page execute and read and write
139E000
heap
page read and write
3114000
trusted library allocation
page read and write
3003000
trusted library allocation
page execute and read and write
33A3000
trusted library allocation
page read and write
4460000
trusted library allocation
page read and write
57A0000
heap
page read and write
1538000
heap
page read and write
1336000
stack
page read and write
6A7D000
stack
page read and write
2DB4000
trusted library allocation
page read and write
619000
heap
page read and write
B80000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
302E000
trusted library allocation
page read and write
65E000
heap
page read and write
5D50000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
9F4B000
stack
page read and write
4576000
trusted library allocation
page read and write
33A0000
heap
page read and write
33DF000
trusted library allocation
page read and write
163B000
trusted library allocation
page execute and read and write
1637000
trusted library allocation
page execute and read and write
6A40000
trusted library allocation
page read and write
B90000
heap
page read and write
457A000
trusted library allocation
page read and write
34EF000
trusted library allocation
page read and write
D90000
heap
page read and write
7FC50000
trusted library allocation
page execute and read and write
5750000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
3F08000
trusted library allocation
page read and write
5BBE000
stack
page read and write
2F2D000
trusted library allocation
page read and write
3026000
trusted library allocation
page execute and read and write
4639000
trusted library allocation
page read and write
14FD000
trusted library allocation
page execute and read and write
306F000
trusted library allocation
page read and write
2E49000
trusted library allocation
page read and write
584E000
stack
page read and write
14F3000
trusted library allocation
page execute and read and write
10C0000
trusted library allocation
page read and write
5CF0000
heap
page read and write
9F7D000
heap
page read and write
2ECB000
trusted library allocation
page read and write
1622000
trusted library allocation
page read and write
695E000
stack
page read and write
6D1E000
stack
page read and write
11DE000
stack
page read and write
34A6000
trusted library allocation
page read and write
4148000
trusted library allocation
page read and write
2FD4000
trusted library allocation
page read and write
5DE000
heap
page read and write
5720000
trusted library allocation
page read and write
4541000
trusted library allocation
page read and write
70A0000
trusted library allocation
page execute and read and write
2ECF000
trusted library allocation
page read and write
437C000
trusted library allocation
page read and write
43D9000
trusted library allocation
page read and write
9C8E000
stack
page read and write
45C3000
trusted library allocation
page read and write
107B000
trusted library allocation
page execute and read and write
64C2000
heap
page read and write
16A0000
heap
page read and write
427000
remote allocation
page execute and read and write
14A0000
heap
page read and write
6730000
trusted library allocation
page read and write
43B3000
trusted library allocation
page read and write
2BE0000
heap
page read and write
A5B000
trusted library allocation
page execute and read and write
303E000
unkown
page read and write
42B8000
trusted library allocation
page read and write
13D1000
heap
page read and write
339B000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
961E000
stack
page read and write
33D0000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
32A9000
trusted library allocation
page read and write
162A000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
2B4D000
trusted library allocation
page read and write
3028000
trusted library allocation
page read and write
6A5F000
stack
page read and write
5762000
trusted library allocation
page read and write
4DBD000
stack
page read and write
677E000
stack
page read and write
7150000
trusted library allocation
page read and write
2D2D000
stack
page read and write
7FC20000
trusted library allocation
page execute and read and write
2E13000
trusted library allocation
page read and write
13C4000
heap
page read and write
2B2E000
trusted library allocation
page read and write
4295000
trusted library allocation
page read and write
12DF000
stack
page read and write
3381000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
353B000
trusted library allocation
page read and write
44E5000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
574E000
stack
page read and write
65B0000
trusted library section
page read and write
2E17000
trusted library allocation
page read and write
4C0B000
stack
page read and write
3486000
trusted library allocation
page read and write
3E49000
trusted library allocation
page read and write
7030000
trusted library allocation
page execute and read and write
430000
remote allocation
page execute and read and write
3024000
trusted library allocation
page read and write
6940000
trusted library allocation
page execute and read and write
435C000
trusted library allocation
page read and write
1520000
heap
page read and write
A5CE000
stack
page read and write
34BE000
trusted library allocation
page read and write
76AE000
stack
page read and write
6D5E000
stack
page read and write
4251000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
A34E000
stack
page read and write
65EC000
heap
page read and write
330F000
stack
page read and write
4571000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
2F0A000
trusted library allocation
page read and write
2B1C000
stack
page read and write
3048000
heap
page read and write
2B3E000
trusted library allocation
page read and write
42F5000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
1066000
trusted library allocation
page execute and read and write
1072000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
428000
remote allocation
page execute and read and write
A4A000
trusted library allocation
page execute and read and write
143B000
heap
page read and write
3E20000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
6960000
trusted library allocation
page execute and read and write
33A1000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
4366000
trusted library allocation
page read and write
7140000
trusted library section
page read and write
3541000
trusted library allocation
page read and write
17AE000
stack
page read and write
4584000
trusted library allocation
page read and write
34B9000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
6AD3000
heap
page read and write
6B9E000
stack
page read and write
2D6A000
stack
page read and write
4A90000
trusted library allocation
page read and write
2B80000
heap
page read and write
3071000
trusted library allocation
page read and write
4CB5000
heap
page read and write
615000
heap
page read and write
2F8F000
stack
page read and write
3EAB000
trusted library allocation
page read and write
40A5000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
9F50000
heap
page read and write
1030000
trusted library allocation
page read and write
67FE000
stack
page read and write
A6CE000
stack
page read and write
A2D000
trusted library allocation
page execute and read and write
303B000
trusted library allocation
page execute and read and write
5290000
heap
page read and write
6930000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
173E000
stack
page read and write
3D89000
trusted library allocation
page read and write
59E0000
heap
page read and write
5810000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
30BE000
stack
page read and write
A23000
trusted library allocation
page execute and read and write
2E23000
trusted library allocation
page read and write
13CF000
heap
page read and write
161D000
trusted library allocation
page execute and read and write
6ADC000
heap
page read and write
A70000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
32AD000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
663E000
stack
page read and write
1380000
heap
page read and write
5880000
heap
page read and write
4478000
trusted library allocation
page read and write
71D0000
heap
page read and write
B10000
trusted library allocation
page read and write
2B1A000
stack
page read and write
30FC000
stack
page read and write
6918000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
40E7000
trusted library allocation
page read and write
42A3000
trusted library allocation
page read and write
45E0000
trusted library allocation
page read and write
10D0000
heap
page read and write
7160000
trusted library allocation
page execute and read and write
900000
heap
page read and write
34AF000
trusted library allocation
page read and write
A060000
trusted library allocation
page execute and read and write
3E75000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
24A9000
trusted library allocation
page read and write
765E000
trusted library allocation
page read and write
49B0000
heap
page execute and read and write
2B20000
trusted library allocation
page read and write
4CB0000
heap
page read and write
5830000
heap
page execute and read and write
7060000
trusted library allocation
page read and write
7050000
trusted library allocation
page execute and read and write
13B5000
heap
page read and write
71A0000
trusted library allocation
page execute and read and write
32B1000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
432A000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
4272000
trusted library allocation
page read and write
6EDE000
stack
page read and write
32DC000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
4021000
trusted library allocation
page read and write
53ED000
stack
page read and write
1610000
trusted library allocation
page read and write
6DDE000
stack
page read and write
4095000
trusted library allocation
page read and write
3D7F000
trusted library allocation
page read and write
E17000
heap
page read and write
DE8000
heap
page read and write
32F4000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
339F000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
673000
heap
page read and write
4597000
trusted library allocation
page read and write
56F1000
trusted library allocation
page read and write
16FF000
stack
page read and write
44BF000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
1330000
heap
page read and write
3130000
trusted library allocation
page read and write
A24F000
stack
page read and write
1044000
trusted library allocation
page read and write
3168000
trusted library allocation
page read and write
3526000
trusted library allocation
page read and write
E9C000
heap
page read and write
40B3000
trusted library allocation
page read and write
49C0000
heap
page read and write
9F66000
heap
page read and write
423000
remote allocation
page execute and read and write
9A4E000
stack
page read and write
5BE5000
heap
page read and write
1050000
trusted library allocation
page read and write
105D000
trusted library allocation
page execute and read and write
6A9A000
heap
page read and write
3DD0000
trusted library allocation
page read and write
42CB000
trusted library allocation
page read and write
6AEA000
heap
page read and write
2E07000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
456D000
trusted library allocation
page read and write
673E000
stack
page read and write
169E000
stack
page read and write
6A60000
heap
page read and write
51DD000
stack
page read and write
43E000
remote allocation
page execute and read and write
32EC000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
34F5000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
B73000
heap
page read and write
660E000
heap
page read and write
40D3000
trusted library allocation
page read and write
605000
heap
page read and write
4168000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
2E1B000
trusted library allocation
page read and write
7652000
trusted library allocation
page read and write
2FF7000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
2E03000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
45B1000
trusted library allocation
page read and write
D37000
stack
page read and write
1635000
trusted library allocation
page execute and read and write
4CA0000
heap
page read and write
9F58000
heap
page read and write
92000
unkown
page readonly
573B000
trusted library allocation
page read and write
3545000
trusted library allocation
page read and write
781E000
stack
page read and write
6980000
trusted library allocation
page execute and read and write
4259000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
5CEA000
trusted library allocation
page read and write
77B8000
trusted library allocation
page read and write
6A50000
trusted library allocation
page execute and read and write
3F1D000
trusted library allocation
page read and write
301C000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
56EE000
trusted library allocation
page read and write
1398000
heap
page read and write
A80C000
stack
page read and write
2FFB000
trusted library allocation
page read and write
44EB000
trusted library allocation
page read and write
B70000
heap
page read and write
3000000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
5258000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
2C6E000
stack
page read and write
45ED000
trusted library allocation
page read and write
69FA000
trusted library allocation
page read and write
5CBF000
stack
page read and write
45D4000
trusted library allocation
page read and write
2C78000
trusted library allocation
page read and write
40E0000
trusted library allocation
page read and write
A84E000
stack
page read and write
B00000
trusted library allocation
page execute and read and write
A44E000
stack
page read and write
40FE000
trusted library allocation
page read and write
570000
heap
page read and write
2DE0000
heap
page read and write
2FDF000
trusted library allocation
page read and write
184F000
stack
page read and write
2ED9000
trusted library allocation
page read and write
45B8000
trusted library allocation
page read and write
77AE000
stack
page read and write
A0E000
stack
page read and write
A14E000
stack
page read and write
32F0000
trusted library allocation
page read and write
6916000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
24BE000
trusted library allocation
page read and write
17EE000
stack
page read and write
1630000
trusted library allocation
page read and write
2F0E000
unkown
page read and write
45CA000
trusted library allocation
page read and write
5C00000
heap
page read and write
43EE000
trusted library allocation
page read and write
4103000
trusted library allocation
page read and write
6AC8000
heap
page read and write
5790000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
65E0000
heap
page read and write
31C0000
heap
page read and write
A48E000
stack
page read and write
4259000
trusted library allocation
page read and write
3E95000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
3F5A000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
6C1E000
stack
page read and write
464F000
trusted library allocation
page read and write
B97000
heap
page read and write
4EC0000
heap
page read and write
56DE000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
57A3000
heap
page read and write
3120000
trusted library allocation
page read and write
6602000
heap
page read and write
410E000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
324E000
stack
page read and write
5BD0000
heap
page read and write
6F70000
heap
page read and write
2EDE000
trusted library allocation
page read and write
1488000
heap
page read and write
74DF000
stack
page read and write
672E000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
137E000
stack
page read and write
5D4E000
stack
page read and write
5740000
heap
page execute and read and write
2FB0000
heap
page read and write
14F4000
trusted library allocation
page read and write
44D5000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
9DCF000
stack
page read and write
1380000
heap
page read and write
6BDE000
stack
page read and write
442B000
trusted library allocation
page read and write
B4E000
trusted library allocation
page read and write
45CF000
trusted library allocation
page read and write
4C10000
trusted library section
page readonly
67BE000
stack
page read and write
FEE000
stack
page read and write
7310000
heap
page read and write
45C5000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
3284000
trusted library allocation
page read and write
3150000
heap
page execute and read and write
1510000
heap
page read and write
B51000
trusted library allocation
page read and write
530000
heap
page read and write
56B0000
trusted library allocation
page execute and read and write
A46000
trusted library allocation
page execute and read and write
5BE0000
heap
page read and write
40F2000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
10A0000
trusted library allocation
page execute and read and write
5CE6000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
460C000
stack
page read and write
3F8F000
trusted library allocation
page read and write
4438000
trusted library allocation
page read and write
40A9000
trusted library allocation
page read and write
57E0000
heap
page read and write
4950000
trusted library allocation
page read and write
2471000
trusted library allocation
page read and write
4315000
trusted library allocation
page read and write
2460000
heap
page read and write
6480000
heap
page read and write
411C000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
7090000
trusted library allocation
page execute and read and write
2DDA000
trusted library allocation
page read and write
4019000
trusted library allocation
page read and write
4AC0000
heap
page read and write
1390000
heap
page read and write
34E3000
trusted library allocation
page read and write
32D8000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
41F0000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
5B40000
trusted library section
page readonly
2D10000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
7040000
trusted library allocation
page read and write
7200000
heap
page read and write
31B6000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
3E36000
trusted library allocation
page read and write
317F000
unkown
page read and write
3293000
trusted library allocation
page read and write
41DB000
trusted library allocation
page read and write
4346000
trusted library allocation
page read and write
64EF000
heap
page read and write
703E000
stack
page read and write
44F7000
trusted library allocation
page read and write
6D9E000
stack
page read and write
6A67000
trusted library allocation
page read and write
C3A000
stack
page read and write
A58E000
stack
page read and write
42D8000
trusted library allocation
page read and write
131E000
stack
page read and write
353F000
trusted library allocation
page read and write
7080000
trusted library allocation
page execute and read and write
1510000
heap
page read and write
44BD000
trusted library allocation
page read and write
2F0F000
trusted library allocation
page read and write
6906000
trusted library allocation
page read and write
5733000
heap
page read and write
5340000
heap
page read and write
DE0000
heap
page read and write
1626000
trusted library allocation
page execute and read and write
333C000
trusted library allocation
page read and write
575D000
trusted library allocation
page read and write
1062000
trusted library allocation
page read and write
9B4E000
stack
page read and write
E73000
heap
page read and write
B5D000
trusted library allocation
page read and write
349B000
trusted library allocation
page read and write
31F0000
heap
page read and write
57F0000
trusted library allocation
page read and write
5751000
trusted library allocation
page read and write
981E000
stack
page read and write
7200000
trusted library section
page read and write
68FE000
stack
page read and write
1490000
heap
page read and write
3DE7000
trusted library allocation
page read and write
444B000
trusted library allocation
page read and write
521E000
stack
page read and write
677E000
stack
page read and write
7100000
trusted library allocation
page read and write
64B0000
heap
page read and write
4559000
trusted library allocation
page read and write
9E0E000
stack
page read and write
42E000
remote allocation
page execute and read and write
7650000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
458B000
trusted library allocation
page read and write
106A000
trusted library allocation
page execute and read and write
300D000
trusted library allocation
page execute and read and write
1740000
heap
page read and write
123A000
stack
page read and write
3D61000
trusted library allocation
page read and write
2E6D000
trusted library allocation
page read and write
13B7000
heap
page read and write
57CE000
stack
page read and write
2DD6000
trusted library allocation
page read and write
B56000
trusted library allocation
page read and write
7177000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page execute and read and write
14F0000
trusted library allocation
page read and write
314E000
stack
page read and write
2DD0000
heap
page read and write
1060000
trusted library allocation
page read and write
1330000
heap
page read and write
5BE000
stack
page read and write
1E9000
stack
page read and write
2E0F000
trusted library allocation
page read and write
2ED3000
trusted library allocation
page read and write
1043000
trusted library allocation
page execute and read and write
991E000
stack
page read and write
714E000
stack
page read and write
2B90000
heap
page read and write
1620000
trusted library allocation
page read and write
2F4E000
stack
page read and write
A70B000
stack
page read and write
5702000
trusted library allocation
page read and write
1632000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
2F02000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
6970000
trusted library allocation
page execute and read and write
44F2000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
6904000
trusted library allocation
page read and write
64E4000
heap
page read and write
6950000
trusted library allocation
page read and write
2B2B000
trusted library allocation
page read and write
2440000
trusted library allocation
page read and write
57FE000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
4203000
trusted library allocation
page read and write
457C000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
431000
remote allocation
page execute and read and write
2FB8000
heap
page read and write
574E000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
3070000
heap
page read and write
6710000
trusted library allocation
page execute and read and write
2DC0000
trusted library allocation
page read and write
750E000
stack
page read and write
409C000
trusted library allocation
page read and write
89E000
stack
page read and write
400000
remote allocation
page execute and read and write
13AF000
heap
page read and write
560000
heap
page read and write
367D000
trusted library allocation
page read and write
3200000
heap
page read and write
5734000
trusted library allocation
page read and write
2D50000
heap
page execute and read and write
5CD0000
trusted library allocation
page read and write
4F7000
stack
page read and write
2E1F000
trusted library allocation
page read and write
4401000
trusted library allocation
page read and write
5730000
heap
page read and write
A04C000
stack
page read and write
429000
remote allocation
page execute and read and write
4DC0000
heap
page read and write
6628000
heap
page read and write
3140000
heap
page execute and read and write
647F000
stack
page read and write
2ADD000
stack
page read and write
1546000
heap
page read and write
3078000
trusted library allocation
page read and write
56DB000
trusted library allocation
page read and write
2450000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
AFB000
stack
page read and write
2C70000
trusted library allocation
page read and write
4014000
trusted library allocation
page read and write
408F000
trusted library allocation
page read and write
90000
unkown
page readonly
302A000
trusted library allocation
page execute and read and write
56E2000
trusted library allocation
page read and write
65FF000
stack
page read and write
3F7A000
trusted library allocation
page read and write
DC0000
heap
page read and write
536E000
stack
page read and write
702D000
trusted library allocation
page read and write
31BE000
stack
page read and write
612000
heap
page read and write
422D000
trusted library allocation
page read and write
5B3D000
stack
page read and write
1500000
heap
page read and write
3020000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
4DF4000
heap
page read and write
1077000
trusted library allocation
page execute and read and write
637E000
stack
page read and write
B20000
heap
page execute and read and write
5800000
trusted library allocation
page execute and read and write
7180000
trusted library allocation
page read and write
A3D000
trusted library allocation
page execute and read and write
4560000
trusted library allocation
page read and write
4E5D000
stack
page read and write
328E000
trusted library allocation
page read and write
There are 719 hidden memdumps, click here to show them.