IOC Report
3u8A2xjbBT.exe

loading gif

Files

File Path
Type
Category
Malicious
3u8A2xjbBT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\OneDrive\autoit3.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\autoit3.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\common files.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\common files.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\OneDrive\google.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\google.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\OneDrive\internet explorer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\internet explorer.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\java.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\java.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\jdownloader.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\jdownloader.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\microsoft office.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\microsoft office.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\microsoft.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\microsoft.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\microsoft.net.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\microsoft.net.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\mozilla maintenance service.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\mozilla maintenance service.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\msbuild.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\msbuild.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\msecache.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\msecache.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\reference assemblies.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\reference assemblies.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\uyihfjjsbovlcbxlcojsmqtzznevrdoctnxfvfrajmemtqlbiqoohtfay.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\uyihfjjsbovlcbxlcojsmqtzznevrdoctnxfvfrajmemtqlbiqoohtfay.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\windows defender.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\windows defender.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\windows mail.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\windows mail.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\OneDrive\windows media player.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\windows multimedia platform.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\windows nt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\windows photo viewer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\windows portable devices.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\windows sidebar.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\OneDrive\windowspowershell.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3u8A2xjbBT.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 5 06:54:39 2023, mtime=Wed Oct 30 10:22:06 2024, atime=Wed Oct 30 10:22:02 2024, length=213832, window=hide
dropped
C:\Users\user\OneDrive\windows media player.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\OneDrive\windows multimedia platform.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\OneDrive\windows nt.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\OneDrive\windows photo viewer.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\OneDrive\windows portable devices.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\OneDrive\windows sidebar.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\OneDrive\windowspowershell.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3u8A2xjbBT.exe
"C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks" /Query /TN "3u8A2xjbBT"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /sc onlogon /tn "3u8A2xjbBT" /tr "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Users\user\Desktop\3u8A2xjbBT.exe
C:\Users\user\Desktop\3u8A2xjbBT.exe
malicious
C:\Users\user\Desktop\3u8A2xjbBT.exe
"C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks" /Query /TN "3u8A2xjbBT"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks" /Query /TN "3u8A2xjbBT"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\SysWOW64\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\3u8A2xjbBT.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://87.120.126.5/VmCetSC7/page.php
87.120.126.5
malicious
http://87.120.126.5
unknown
http://87.120.126.5/VmCetSC7/page.phpy
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.120.126.5/VmCetSC7/page.phpP
unknown

IPs

IP
Domain
Country
Malicious
87.120.126.5
unknown
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\3u8A2xjbBT_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3638000
trusted library allocation
page read and write
malicious
3524000
trusted library allocation
page read and write
malicious
2D3A000
trusted library allocation
page read and write
malicious
3536000
trusted library allocation
page read and write
malicious
2D22000
trusted library allocation
page read and write
malicious
34F1000
trusted library allocation
page read and write
malicious
3037000
trusted library allocation
page read and write
malicious
3660000
trusted library allocation
page read and write
malicious
33B3000
trusted library allocation
page read and write
malicious
347E000
trusted library allocation
page read and write
malicious
3554000
trusted library allocation
page read and write
malicious
316D000
trusted library allocation
page read and write
malicious
3089000
trusted library allocation
page read and write
malicious
2D0A000
trusted library allocation
page read and write
malicious
3688000
trusted library allocation
page read and write
malicious
3132000
trusted library allocation
page read and write
malicious
36B2000
trusted library allocation
page read and write
malicious
2C11000
trusted library allocation
page read and write
malicious
2D72000
trusted library allocation
page read and write
malicious
15A7000
trusted library allocation
page execute and read and write
2F9E000
stack
page read and write
2940000
heap
page read and write
BB9A000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
2D1A000
trusted library allocation
page read and write
2D68000
trusted library allocation
page read and write
27CD000
stack
page read and write
2AFF000
unkown
page read and write
2E5D000
unkown
page read and write
AA0000
heap
page read and write
43A1000
trusted library allocation
page read and write
B07E000
stack
page read and write
32CD000
unkown
page read and write
5E7E000
stack
page read and write
F82000
unkown
page readonly
23EF000
unkown
page read and write
62DD000
stack
page read and write
1420000
trusted library allocation
page read and write
3020000
heap
page read and write
36AB000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
2C6F000
stack
page read and write
2BBC000
stack
page read and write
1E0000
heap
page read and write
7F5E0000
trusted library allocation
page execute and read and write
1423000
trusted library allocation
page execute and read and write
196E000
stack
page read and write
347F000
stack
page read and write
A4B0000
trusted library allocation
page read and write
6F50000
heap
page read and write
303A000
heap
page read and write
2FC0000
heap
page read and write
1670000
heap
page read and write
3380000
heap
page read and write
3320000
heap
page read and write
19E0000
trusted library allocation
page read and write
2F6C000
stack
page read and write
668E000
stack
page read and write
1160000
trusted library allocation
page read and write
A10000
heap
page read and write
9FAE000
stack
page read and write
29CD000
stack
page read and write
A529000
stack
page read and write
29FE000
unkown
page read and write
A43B000
stack
page read and write
2D5A000
trusted library allocation
page read and write
506E000
stack
page read and write
2CAC000
stack
page read and write
29D7000
heap
page read and write
A207000
heap
page read and write
1510000
heap
page read and write
2E4E000
stack
page read and write
5560000
heap
page execute and read and write
2F20000
heap
page read and write
2DE0000
heap
page read and write
549E000
stack
page read and write
A28E000
heap
page read and write
BA50000
heap
page read and write
AABB000
stack
page read and write
9AC000
stack
page read and write
1458000
heap
page read and write
160E000
stack
page read and write
2DD0000
heap
page read and write
329E000
stack
page read and write
2F40000
heap
page read and write
14AD000
heap
page read and write
1830000
heap
page read and write
2A67000
heap
page read and write
2BC0000
heap
page read and write
2800000
heap
page read and write
2D10000
heap
page read and write
1EA000
heap
page read and write
1424000
trusted library allocation
page read and write
611E000
stack
page read and write
5149000
stack
page read and write
A271000
heap
page read and write
CC1D000
stack
page read and write
2BC0000
heap
page read and write
BB0D000
heap
page read and write
33A0000
heap
page read and write
CD9D000
stack
page read and write
35E000
unkown
page read and write
A14B000
stack
page read and write
FFE000
stack
page read and write
2A10000
trusted library allocation
page execute and read and write
DA0000
trusted library allocation
page read and write
9E6E000
stack
page read and write
23EE000
stack
page read and write
5980000
trusted library allocation
page read and write
2C9F000
stack
page read and write
19E4000
trusted library allocation
page read and write
2B2A000
heap
page read and write
B0BE000
stack
page read and write
2A30000
heap
page read and write
2CD0000
heap
page read and write
301F000
stack
page read and write
586D000
stack
page read and write
29CA000
heap
page read and write
28ED000
stack
page read and write
2BF0000
heap
page read and write
2870000
heap
page read and write
2C6D000
stack
page read and write
51CE000
stack
page read and write
5919000
stack
page read and write
1490000
heap
page read and write
1165000
trusted library allocation
page execute and read and write
293E000
unkown
page read and write
1479000
heap
page read and write
3246000
trusted library allocation
page read and write
5C9D000
stack
page read and write
5FC0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
56AC000
stack
page read and write
338E000
stack
page read and write
2A37000
heap
page read and write
311D000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
A298000
heap
page read and write
3031000
trusted library allocation
page read and write
2E67000
heap
page read and write
1837000
heap
page read and write
34CC000
trusted library allocation
page read and write
29CE000
stack
page read and write
1450000
heap
page read and write
5BB0000
heap
page read and write
2890000
heap
page read and write
C9DE000
stack
page read and write
10D000
stack
page read and write
1442000
trusted library allocation
page read and write
151E000
heap
page read and write
3487000
heap
page read and write
8AC000
stack
page read and write
26AD000
stack
page read and write
605E000
stack
page read and write
1810000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
A1F2000
heap
page read and write
B1FE000
stack
page read and write
3700000
heap
page read and write
2BBD000
unkown
page read and write
296E000
stack
page read and write
615E000
stack
page read and write
27FD000
stack
page read and write
2DFF000
stack
page read and write
2D5C000
trusted library allocation
page read and write
A150000
trusted library allocation
page read and write
7F9D0000
trusted library allocation
page execute and read and write
1E0000
heap
page read and write
255D000
stack
page read and write
1610000
heap
page read and write
5B9D000
stack
page read and write
3120000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
59A0000
trusted library allocation
page execute and read and write
A159000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
330D000
unkown
page read and write
2F2D000
stack
page read and write
116B000
trusted library allocation
page execute and read and write
14C000
stack
page read and write
27F0000
heap
page read and write
2EB7000
heap
page read and write
4BA5000
trusted library allocation
page read and write
A810000
heap
page read and write
28CE000
stack
page read and write
2BD0000
heap
page read and write
61DD000
stack
page read and write
33B0000
heap
page read and write
2B2F000
stack
page read and write
7900000
trusted library allocation
page read and write
33EF000
trusted library allocation
page read and write
2E9F000
stack
page read and write
CB1E000
stack
page read and write
2CE6000
trusted library allocation
page read and write
2900000
heap
page read and write
2C00000
heap
page read and write
143D000
trusted library allocation
page execute and read and write
B9A0000
trusted library allocation
page read and write
ED7000
heap
page read and write
27F0000
heap
page read and write
29FA000
heap
page read and write
32F0000
heap
page read and write
1574000
trusted library allocation
page read and write
298E000
stack
page read and write
704A0000
unkown
page readonly
BB8B000
unkown
page read and write
2B70000
heap
page read and write
5A5E000
stack
page read and write
BDC0000
heap
page read and write
2D4E000
trusted library allocation
page read and write
991F000
stack
page read and write
159A000
trusted library allocation
page execute and read and write
552E000
stack
page read and write
2A3C000
stack
page read and write
33E6000
trusted library allocation
page read and write
343D000
unkown
page read and write
B94E000
stack
page read and write
7C6E000
stack
page read and write
FB0000
heap
page read and write
167E000
heap
page read and write
19C000
stack
page read and write
300000
heap
page read and write
2C3C000
stack
page read and write
96D000
stack
page read and write
96DD000
stack
page read and write
2D6A000
trusted library allocation
page read and write
29B0000
heap
page read and write
33A1000
trusted library allocation
page read and write
15D000
stack
page read and write
2D58000
trusted library allocation
page read and write
1C0000
heap
page read and write
25B0000
heap
page read and write
2DA0000
heap
page read and write
B0E000
stack
page read and write
334E000
unkown
page read and write
2D77000
heap
page read and write
7CFE000
stack
page read and write
A100000
trusted library allocation
page execute and read and write
2B20000
heap
page read and write
14B1000
heap
page read and write
A5FC000
stack
page read and write
1162000
trusted library allocation
page read and write
5F1C000
stack
page read and write
587E000
stack
page read and write
9B9E000
stack
page read and write
2C1E000
unkown
page read and write
6D0E000
stack
page read and write
2CE0000
trusted library allocation
page read and write
31D000
unkown
page read and write
2D5F000
stack
page read and write
343E000
stack
page read and write
3280000
heap
page read and write
B90C000
stack
page read and write
6E0E000
stack
page read and write
3480000
heap
page read and write
5990000
trusted library allocation
page read and write
5514000
trusted library allocation
page read and write
1A17000
heap
page read and write
5920000
heap
page read and write
2BDF000
unkown
page read and write
A86C000
heap
page read and write
2DBE000
stack
page read and write
5300000
trusted library allocation
page execute and read and write
AF3D000
stack
page read and write
FB8000
heap
page read and write
2E60000
heap
page read and write
920000
heap
page read and write
2E50000
heap
page read and write
66CE000
stack
page read and write
9A9E000
stack
page read and write
1573000
trusted library allocation
page execute and read and write
B8B000
stack
page read and write
1177000
heap
page read and write
2C00000
heap
page execute and read and write
BBA0000
trusted library allocation
page execute and read and write
2CDA000
heap
page read and write
2C5F000
stack
page read and write
A3E000
unkown
page read and write
5510000
trusted library allocation
page read and write
EC6000
trusted library allocation
page execute and read and write
7B6E000
stack
page read and write
B8CD000
unkown
page read and write
25BD000
stack
page read and write
27C0000
heap
page read and write
19B0000
trusted library section
page read and write
86D000
stack
page read and write
37B0000
heap
page read and write
2A20000
heap
page read and write
2EBA000
heap
page read and write
2B30000
heap
page read and write
158D000
trusted library allocation
page execute and read and write
6A8E000
stack
page read and write
3620000
heap
page read and write
2CF7000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
2E30000
heap
page read and write
33EF000
stack
page read and write
A60000
heap
page read and write
257D000
stack
page read and write
7DFE000
stack
page read and write
2D64000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
29DA000
heap
page read and write
694E000
stack
page read and write
2A7C000
stack
page read and write
A440000
trusted library allocation
page read and write
B4CD000
stack
page read and write
2AE0000
heap
page read and write
BA67000
heap
page read and write
2FDC000
stack
page read and write
2D00000
heap
page read and write
B2FE000
stack
page read and write
50B0000
trusted library allocation
page read and write
39E000
stack
page read and write
2D80000
heap
page read and write
5910000
trusted library allocation
page execute and read and write
27AE000
unkown
page read and write
362A000
heap
page read and write
157D000
trusted library allocation
page execute and read and write
D57000
heap
page read and write
680E000
stack
page read and write
60DE000
stack
page read and write
F80000
unkown
page readonly
2B74000
trusted library allocation
page read and write
2A60000
heap
page read and write
348A000
heap
page read and write
3242000
trusted library allocation
page read and write
2BFE000
stack
page read and write
165B000
trusted library allocation
page execute and read and write
581C000
stack
page read and write
CADC000
stack
page read and write
1670000
heap
page read and write
3310000
heap
page read and write
2F8E000
unkown
page read and write
1617000
heap
page read and write
165D000
stack
page read and write
B1BE000
stack
page read and write
AF7E000
stack
page read and write
52B0000
trusted library allocation
page read and write
F8E000
heap
page read and write
2CF2000
trusted library allocation
page read and write
16A5000
heap
page read and write
34C0000
heap
page read and write
2B30000
heap
page read and write
ABB9000
stack
page read and write
981E000
stack
page read and write
A6A000
heap
page read and write
AE3E000
stack
page read and write
1970000
heap
page read and write
2FE0000
trusted library allocation
page read and write
D93000
trusted library allocation
page execute and read and write
2CE3000
trusted library allocation
page read and write
27CE000
stack
page read and write
D9D000
trusted library allocation
page execute and read and write
28E0000
heap
page read and write
13E0000
heap
page read and write
16DC000
heap
page read and write
2B37000
heap
page read and write
9D6E000
stack
page read and write
2D60000
heap
page read and write
AC0000
heap
page read and write
5F5E000
stack
page read and write
2CD7000
heap
page read and write
2B27000
heap
page read and write
A9F000
unkown
page read and write
19C000
stack
page read and write
32BC000
stack
page read and write
1532000
heap
page read and write
4D0E000
stack
page read and write
1446000
trusted library allocation
page execute and read and write
2FFD000
stack
page read and write
270E000
stack
page read and write
52F0000
heap
page read and write
A4FD000
stack
page read and write
2D06000
trusted library allocation
page read and write
34DB000
trusted library allocation
page read and write
19C0000
heap
page execute and read and write
9C2D000
stack
page read and write
32B0000
heap
page read and write
29C0000
trusted library allocation
page read and write
32A0000
heap
page read and write
2E6F000
stack
page read and write
29A0000
heap
page read and write
9C6F000
stack
page read and write
1730000
heap
page read and write
33E9000
trusted library allocation
page read and write
F34000
heap
page read and write
1820000
trusted library allocation
page execute and read and write
158E000
stack
page read and write
358F000
stack
page read and write
A1F0000
heap
page read and write
A282000
heap
page read and write
34E0000
heap
page read and write
3658000
trusted library allocation
page read and write
29A0000
heap
page read and write
2A3C000
stack
page read and write
3410000
heap
page read and write
F80000
heap
page read and write
2FD0000
heap
page read and write
619D000
stack
page read and write
3240000
trusted library allocation
page read and write
FB5000
heap
page read and write
3590000
heap
page read and write
6A4E000
stack
page read and write
29AE000
stack
page read and write
5900000
trusted library allocation
page read and write
23EF000
stack
page read and write
EF9000
heap
page read and write
A8C000
stack
page read and write
B690000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
2AA0000
heap
page read and write
347E000
unkown
page read and write
1430000
trusted library allocation
page read and write
597E000
stack
page read and write
3238000
trusted library allocation
page read and write
AD50000
heap
page read and write
250D000
stack
page read and write
BA62000
heap
page read and write
A700000
heap
page read and write
1990000
trusted library allocation
page read and write
3037000
heap
page read and write
350F000
unkown
page read and write
16B5000
heap
page read and write
34E000
unkown
page read and write
5150000
heap
page execute and read and write
CC5D000
stack
page read and write
658E000
stack
page read and write
A803000
heap
page read and write
316F000
stack
page read and write
2980000
heap
page read and write
A2AB000
heap
page read and write
15D000
stack
page read and write
1652000
trusted library allocation
page read and write
1764000
heap
page read and write
C6DD000
stack
page read and write
34D8000
trusted library allocation
page read and write
5FBE000
stack
page read and write
2DE0000
heap
page read and write
29D0000
heap
page read and write
144A000
trusted library allocation
page execute and read and write
2D3E000
unkown
page read and write
9E20000
trusted library allocation
page read and write
572E000
stack
page read and write
A0EE000
stack
page read and write
2BBD000
unkown
page read and write
F07000
heap
page read and write
B6A0000
trusted library allocation
page read and write
5EBE000
stack
page read and write
3150000
heap
page read and write
32DF000
stack
page read and write
135B000
stack
page read and write
2CEF000
trusted library allocation
page read and write
582F000
stack
page read and write
3810000
heap
page read and write
6B8D000
stack
page read and write
A5E000
unkown
page read and write
6F4C000
stack
page read and write
2A6A000
heap
page read and write
300E000
stack
page read and write
354E000
stack
page read and write
2A0F000
stack
page read and write
2C1E000
stack
page read and write
BF10000
heap
page read and write
2CDE000
unkown
page read and write
58F0000
trusted library allocation
page read and write
A800000
heap
page read and write
292E000
stack
page read and write
519E000
stack
page read and write
2E6A000
heap
page read and write
125C000
stack
page read and write
34BE000
stack
page read and write
648E000
stack
page read and write
292C000
stack
page read and write
57A9000
stack
page read and write
2D1E000
stack
page read and write
704BD000
unkown
page read and write
2AF0000
heap
page read and write
29CF000
stack
page read and write
609D000
stack
page read and write
BC2E000
stack
page read and write
2C20000
heap
page read and write
2D7E000
unkown
page read and write
27EE000
unkown
page read and write
2BDC000
stack
page read and write
C120000
heap
page read and write
3010000
heap
page read and write
2E8E000
stack
page read and write
155E000
stack
page read and write
DB0000
heap
page read and write
1660000
trusted library allocation
page execute and read and write
15A5000
trusted library allocation
page execute and read and write
32E000
unkown
page read and write
2910000
heap
page read and write
172C000
heap
page read and write
2D1D000
stack
page read and write
FA4000
heap
page read and write
1170000
heap
page read and write
3050000
heap
page read and write
34CF000
trusted library allocation
page read and write
704BD000
unkown
page read and write
A490000
trusted library allocation
page execute and read and write
34D0000
heap
page read and write
6E4E000
stack
page read and write
32BF000
stack
page read and write
C5D9000
stack
page read and write
1592000
trusted library allocation
page read and write
5830000
trusted library allocation
page execute and read and write
2FDE000
stack
page read and write
2D7A000
heap
page read and write
1440000
trusted library allocation
page read and write
2FE0000
heap
page read and write
690E000
stack
page read and write
167A000
heap
page read and write
33EC000
trusted library allocation
page read and write
F1C000
stack
page read and write
52B9000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
1E7000
heap
page read and write
297F000
unkown
page read and write
A33C000
stack
page read and write
B4E000
stack
page read and write
2D5C000
stack
page read and write
2990000
heap
page read and write
8F0000
heap
page read and write
2D8E000
unkown
page read and write
2C5E000
stack
page read and write
3020000
heap
page read and write
32B7000
heap
page read and write
2E0000
heap
page read and write
E3E000
stack
page read and write
2D70000
heap
page read and write
704BD000
unkown
page read and write
323E000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
1410000
trusted library allocation
page read and write
352F000
stack
page read and write
321E000
unkown
page read and write
D10000
heap
page read and write
3030000
heap
page read and write
2760000
heap
page read and write
529F000
stack
page read and write
14DE000
stack
page read and write
2E90000
heap
page execute and read and write
2BA0000
heap
page read and write
ED0000
heap
page read and write
325F000
unkown
page read and write
63DD000
stack
page read and write
D90000
trusted library allocation
page read and write
EED000
heap
page read and write
34D7000
heap
page read and write
312E000
trusted library allocation
page read and write
301B000
heap
page read and write
3150000
heap
page read and write
2990000
heap
page read and write
26EC000
stack
page read and write
75DE000
stack
page read and write
EC2000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1A10000
heap
page read and write
4031000
trusted library allocation
page read and write
5D7D000
stack
page read and write
1560000
trusted library allocation
page read and write
A690000
heap
page read and write
15CE000
stack
page read and write
67CE000
stack
page read and write
3610000
heap
page read and write
2D40000
heap
page read and write
34CE000
unkown
page read and write
A222000
heap
page read and write
2EB0000
heap
page read and write
A2FF000
stack
page read and write
2B9D000
stack
page read and write
330E000
unkown
page read and write
117C000
heap
page read and write
27B0000
heap
page read and write
1580000
trusted library allocation
page read and write
2B3A000
heap
page read and write
1657000
trusted library allocation
page execute and read and write
DB5000
heap
page read and write
1485000
heap
page read and write
BF20000
heap
page read and write
B990000
trusted library allocation
page execute and read and write
360000
heap
page read and write
1746000
heap
page read and write
2C70000
heap
page read and write
4835000
trusted library allocation
page read and write
BB90000
trusted library allocation
page read and write
12FB000
stack
page read and write
2B10000
heap
page read and write
2D20000
trusted library allocation
page read and write
704BF000
unkown
page readonly
29C0000
heap
page read and write
3C11000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
36F000
unkown
page read and write
D94000
trusted library allocation
page read and write
2E0F000
unkown
page read and write
2A3D000
stack
page read and write
3627000
heap
page read and write
BBE0000
trusted library allocation
page execute and read and write
CE9D000
stack
page read and write
34C9000
trusted library allocation
page read and write
B989000
trusted library allocation
page read and write
1E7000
heap
page read and write
2FCF000
unkown
page read and write
A44B000
trusted library allocation
page read and write
32BA000
heap
page read and write
A268000
heap
page read and write
A40000
heap
page read and write
3114000
trusted library allocation
page read and write
259C000
stack
page read and write
2E2E000
stack
page read and write
5B5E000
stack
page read and write
25FC000
stack
page read and write
2B30000
trusted library allocation
page read and write
327D000
stack
page read and write
97DE000
stack
page read and write
274F000
stack
page read and write
186E000
stack
page read and write
2B0E000
stack
page read and write
146D000
heap
page read and write
298F000
unkown
page read and write
33A7000
trusted library allocation
page read and write
23F0000
heap
page read and write
323C000
stack
page read and write
294E000
unkown
page read and write
6CCE000
stack
page read and write
2BA7000
heap
page read and write
25BC000
stack
page read and write
3390000
heap
page read and write
142D000
trusted library allocation
page execute and read and write
2B70000
trusted library allocation
page read and write
270F000
stack
page read and write
2E38000
heap
page read and write
5E1E000
stack
page read and write
A2BE000
stack
page read and write
BF0000
heap
page read and write
33B8000
trusted library allocation
page read and write
6BCE000
stack
page read and write
B980000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
2A3A000
heap
page read and write
1EA000
heap
page read and write
D60000
heap
page read and write
2FDD000
stack
page read and write
7F170000
trusted library allocation
page execute and read and write
5D30000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
34DA000
heap
page read and write
9FEE000
stack
page read and write
2A0C000
stack
page read and write
5570000
heap
page read and write
1677000
heap
page read and write
9EAE000
stack
page read and write
1650000
trusted library allocation
page read and write
704B6000
unkown
page readonly
25FD000
unkown
page read and write
1515000
heap
page read and write
5930000
heap
page execute and read and write
29F7000
heap
page read and write
5DDE000
stack
page read and write
2E40000
heap
page read and write
2720000
heap
page read and write
3370000
trusted library allocation
page read and write
704A1000
unkown
page execute read
1655000
trusted library allocation
page execute and read and write
13B0000
heap
page read and write
2F9E000
unkown
page read and write
A295000
heap
page read and write
CD5C000
stack
page read and write
29C7000
heap
page read and write
200000
heap
page read and write
323C000
stack
page read and write
B50E000
stack
page read and write
2D48000
trusted library allocation
page read and write
1596000
trusted library allocation
page execute and read and write
3320000
heap
page read and write
350000
heap
page read and write
B6B0000
trusted library allocation
page execute and read and write
50AE000
stack
page read and write
19F0000
trusted library allocation
page read and write
B68D000
stack
page read and write
15A0000
trusted library allocation
page read and write
29F0000
heap
page read and write
298E000
unkown
page read and write
2BAA000
heap
page read and write
566E000
stack
page read and write
5CDE000
stack
page read and write
2DD0000
heap
page read and write
2D20000
heap
page read and write
2DCF000
unkown
page read and write
1B0000
heap
page read and write
34D5000
trusted library allocation
page read and write
A856000
heap
page read and write
254C000
stack
page read and write
290F000
unkown
page read and write
DAD000
trusted library allocation
page execute and read and write
2D70000
heap
page read and write
F90000
heap
page read and write
ECA000
trusted library allocation
page execute and read and write
15AB000
trusted library allocation
page execute and read and write
3109000
trusted library allocation
page read and write
2820000
heap
page read and write
2860000
heap
page read and write
There are 695 hidden memdumps, click here to show them.