IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
JSON data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bijouterie\Mp3tag.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bijouterie\tak_deco_lib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\lcqqpedjyaav
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\umfcpwvoouwjq
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Downloadplugin\Mp3tag.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Downloadplugin\tak_deco_lib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Bijouterie\fgq
data
dropped
C:\Users\user\AppData\Local\Temp\Bijouterie\ymv
data
dropped
C:\Users\user\AppData\Local\Temp\e290fca1
data
modified
C:\Users\user\AppData\Local\Temp\f566faf1
data
modified
C:\Users\user\AppData\Local\Temp\ihcsdpxxtwvodu
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Nov 22 13:48:13 2024, mtime=Fri Nov 22 13:48:14 2024, atime=Fri Nov 22 01:14:50 2024, length=12606192, window=hide
dropped
C:\Users\user\AppData\Local\Temp\tmp14.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp25.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3229.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp323A.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp323B.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp82AF.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp98BC.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmpCE45.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\background.js
ASCII text
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\content.js
ASCII text
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\icon.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\jquery.js
ASCII text, with very long lines (32086)
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\manifest.json
JSON data
dropped
C:\Users\user\AppData\Roaming\Downloadplugin\fgq
data
dropped
C:\Users\user\AppData\Roaming\Downloadplugin\ymv
data
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\Bijouterie\Mp3tag.exe
"C:\Users\user~1\AppData\Local\Temp\Bijouterie\Mp3tag.exe"
malicious
C:\Users\user\AppData\Roaming\Downloadplugin\Mp3tag.exe
C:\Users\user\AppData\Roaming\Downloadplugin\Mp3tag.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\Downloadplugin\Mp3tag.exe
"C:\Users\user\AppData\Roaming\Downloadplugin\Mp3tag.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://45.141.87.55:9000/wbinjget?q=ABEE5D020398559D1CCC81B5F72669AE
45.141.87.55
malicious
https://www.discogs.com/oauth/authorize
unknown
https://community.mp3tag.de/
unknown
https://sectigo.com/CPS0
unknown
http://www.vmware.com/0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://community.mp3tag.de/pStaticSupport
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://api.discogs.com/oauth/identityvwSgWuuGMPKbPEOYNTFNZsDQawYvtlmt?oauth_token=https://api.disco
unknown
https://api.discogs.com/oauth/access_token
unknown
https://www.mp3tag.de/en/privacy.htmlpos
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://www.mp3tag.de/en/donations.html
unknown
http://www.vmware.com/0/
unknown
https://gnudb.org/%s/%s(artistalbum
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://musicbrainz.org
unknown
http://www.symauth.com/cps0(
unknown
http://ns.adob
unknown
https://gnudb.orgErrorFound
unknown
https://pastebin.com/raw/XK7ARdVwPO
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://schemas.datacontract.org/2004/07/d
unknown
https://docs.mp3tag.de/credits/Y:
unknown
http://schemas.datacontract.org/2004/07/h
unknown
https://www.mp3tag.de/en/donations.htmlpStaticDonate
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://www.symauth.com/rpa00
unknown
https://www.mp3tag.de
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://pastebin.com/raw/XK7ARdVw
unknown
http://www.info-zip.org/
unknown
https://docs.mp3tag.de/credits/
unknown
https://community.mp3tag.deCMTMainFrame::OnHelpSupportCMTMainFrame::CheckMailAdressCMTMainFrame::Ref
unknown
http://purl.oent
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://45.141.87.55:9000
unknown
https://api.discogs.com/oauth/identity
unknown
https://download.mp3tag.de/versions.xmlCMTUpdater::HandleLatestVersion
unknown
https://api.discogs.com/oauth/request_token
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
s-part-0035.t-0009.t-msedge.net
13.107.246.63
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
45.141.87.55
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5440000
direct allocation
page read and write
malicious
5800000
direct allocation
page read and write
malicious
1302000
unkown
page readonly
malicious
4A4D000
stack
page read and write
3599000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
2D94000
heap
page read and write
70E000
stack
page read and write
620000
heap
page read and write
BFD000
trusted library allocation
page execute and read and write
4D0000
unkown
page readonly
155E000
heap
page read and write
62E000
heap
page read and write
4980000
trusted library allocation
page read and write
7530000
heap
page read and write
5439000
direct allocation
page read and write
63F0000
heap
page read and write
66D000
heap
page read and write
865000
unkown
page readonly
530000
heap
page read and write
5775000
trusted library allocation
page read and write
140BEB000
unkown
page readonly
7FF7390C0000
unkown
page readonly
570000
heap
page read and write
2735000
heap
page read and write
3250000
heap
page read and write
2200000
heap
page read and write
350D000
trusted library allocation
page read and write
2CFA000
stack
page read and write
54AE000
direct allocation
page read and write
6A5C000
stack
page read and write
140B6A000
unkown
page readonly
5530000
unkown
page read and write
52FD000
stack
page read and write
14DE000
stack
page read and write
32E2000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2411000
trusted library allocation
page read and write
1DFD3584000
heap
page read and write
3570000
unkown
page read and write
1DFD35E2000
heap
page read and write
521000
unkown
page read and write
63EE000
stack
page read and write
14E0000
heap
page read and write
1DFD6CB0000
trusted library allocation
page read and write
1D0000
heap
page read and write
2734000
heap
page read and write
32C1000
trusted library allocation
page read and write
56C1000
unkown
page read and write
34C9000
unkown
page read and write
3270000
heap
page read and write
140BA0000
unkown
page readonly
50C000
unkown
page execute read
29C7000
trusted library allocation
page read and write
4CFE000
direct allocation
page read and write
35C7000
unkown
page read and write
1DFD3567000
heap
page read and write
4DC0000
trusted library allocation
page execute and read and write
218C000
direct allocation
page read and write
2BE2000
heap
page read and write
3561000
unkown
page read and write
537BAFE000
stack
page read and write
3170000
trusted library allocation
page read and write
525000
unkown
page readonly
32B0000
heap
page execute and read and write
23CF000
stack
page read and write
1DFD53AA000
trusted library allocation
page read and write
537B190000
stack
page read and write
32AB000
trusted library allocation
page read and write
5062000
trusted library allocation
page read and write
2D94000
heap
page read and write
5078000
trusted library allocation
page read and write
2183000
direct allocation
page read and write
6A7000
heap
page read and write
FFE000
stack
page read and write
5ACE000
stack
page read and write
537BBFB000
stack
page read and write
523000
unkown
page readonly
2734000
heap
page read and write
15C000
stack
page read and write
1DFD36F0000
heap
page read and write
6850000
trusted library allocation
page execute and read and write
957000
heap
page read and write
507A000
trusted library allocation
page read and write
1DFD3710000
heap
page read and write
64CF000
heap
page read and write
2734000
heap
page read and write
1DFD38A5000
heap
page read and write
1A0000
heap
page read and write
1780000
trusted library allocation
page read and write
2734000
heap
page read and write
377E000
unkown
page read and write
85B000
unkown
page read and write
49C3000
trusted library allocation
page read and write
1E0000
direct allocation
page read and write
140BEB000
unkown
page readonly
29D1000
heap
page read and write
5085000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
140B87000
unkown
page readonly
1D0000
heap
page read and write
1409F1000
unkown
page read and write
1407FC000
unkown
page readonly
4B60000
direct allocation
page read and write
2918000
trusted library allocation
page read and write
2BF4000
heap
page read and write
810000
unkown
page readonly
3596000
trusted library allocation
page read and write
140BD2000
unkown
page readonly
645D000
heap
page read and write
140C10000
unkown
page readonly
2734000
heap
page read and write
2168000
direct allocation
page read and write
2D70000
heap
page read and write
7FF7390FE000
unkown
page read and write
4E2D000
stack
page read and write
355C000
trusted library allocation
page read and write
1DFD355D000
heap
page read and write
6FDE000
stack
page read and write
256A000
stack
page read and write
2153000
direct allocation
page read and write
31E0000
trusted library allocation
page read and write
215A000
direct allocation
page read and write
82E000
stack
page read and write
140B6A000
unkown
page readonly
2A34000
heap
page read and write
2D94000
heap
page read and write
861000
unkown
page read and write
68B000
heap
page read and write
584D000
stack
page read and write
140BEB000
unkown
page readonly
5D6E000
stack
page read and write
7FF7390C1000
unkown
page execute read
29EC000
stack
page read and write
68D000
heap
page read and write
278B000
trusted library allocation
page read and write
2734000
heap
page read and write
C22000
trusted library allocation
page read and write
64E9000
heap
page read and write
A10000
heap
page read and write
1409F1000
unkown
page write copy
2734000
heap
page read and write
5D60000
trusted library allocation
page read and write
2734000
heap
page read and write
6670000
trusted library allocation
page read and write
140BD2000
unkown
page readonly
140BA0000
unkown
page readonly
C27000
trusted library allocation
page execute and read and write
363A000
trusted library allocation
page read and write
54A000
heap
page read and write
50C000
unkown
page execute read
1DFD35E2000
heap
page read and write
59EE000
stack
page read and write
17B0000
trusted library allocation
page execute and read and write
2734000
heap
page read and write
29C2000
trusted library allocation
page read and write
1DFD38AE000
heap
page read and write
1DFD359B000
heap
page read and write
213D000
direct allocation
page read and write
3593000
trusted library allocation
page read and write
1DFD35A0000
heap
page read and write
721D000
stack
page read and write
64C5000
heap
page read and write
2A0F000
stack
page read and write
1DFD3730000
heap
page read and write
C40000
heap
page read and write
3583000
trusted library allocation
page read and write
537B8FD000
stack
page read and write
643E000
heap
page read and write
49E9000
trusted library allocation
page read and write
7FF739135000
unkown
page readonly
270D000
trusted library allocation
page read and write
314E000
unkown
page read and write
17C0000
trusted library allocation
page read and write
518D000
stack
page read and write
693000
heap
page read and write
5A70000
trusted library allocation
page execute and read and write
140C10000
unkown
page readonly
3346000
trusted library allocation
page read and write
574C000
stack
page read and write
5C2F000
stack
page read and write
7FF7390C1000
unkown
page execute read
2A30000
heap
page read and write
65C000
heap
page read and write
5761000
trusted library allocation
page read and write
1DFD3539000
heap
page read and write
2734000
heap
page read and write
5A00000
trusted library allocation
page execute and read and write
259C000
heap
page read and write
17A0000
trusted library allocation
page read and write
13B000
stack
page read and write
2961000
heap
page read and write
140000000
unkown
page readonly
6690000
trusted library allocation
page execute and read and write
4C50000
trusted library allocation
page read and write
36E0000
unkown
page read and write
2A8C000
trusted library allocation
page read and write
537B182000
stack
page read and write
290E000
trusted library allocation
page read and write
4A31000
trusted library allocation
page read and write
1C0000
heap
page read and write
7430000
heap
page read and write
1A0000
heap
page read and write
A50000
heap
page read and write
1409F2000
unkown
page write copy
2734000
heap
page read and write
1DFD3539000
heap
page read and write
2734000
heap
page read and write
190000
heap
page read and write
1407FC000
unkown
page readonly
1DFD3567000
heap
page read and write
1DFD35BE000
heap
page read and write
1DFD3520000
heap
page read and write
FF960000
trusted library allocation
page execute and read and write
4990000
trusted library allocation
page read and write
5290000
unkown
page read and write
35A1000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
2734000
heap
page read and write
140C10000
unkown
page readonly
256B000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
5B2E000
stack
page read and write
140001000
unkown
page execute read
5090000
trusted library allocation
page read and write
15C0000
heap
page read and write
140C10000
unkown
page readonly
4C0E000
stack
page read and write
2A24000
heap
page read and write
493B000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
2734000
heap
page read and write
356C000
trusted library allocation
page read and write
25A5000
heap
page read and write
140BA0000
unkown
page readonly
140A21000
unkown
page readonly
2734000
heap
page read and write
5800000
heap
page read and write
28F5000
trusted library allocation
page read and write
14B000
stack
page read and write
2EF7000
heap
page read and write
49DB000
trusted library allocation
page read and write
863000
unkown
page readonly
2734000
heap
page read and write
51B000
unkown
page read and write
140B87000
unkown
page readonly
140A21000
unkown
page readonly
2161000
direct allocation
page read and write
6B00000
trusted library allocation
page read and write
78CE000
stack
page read and write
66F000
heap
page read and write
575000
heap
page read and write
C20000
trusted library allocation
page read and write
140A21000
unkown
page readonly
4E74000
trusted library allocation
page read and write
29BD000
trusted library allocation
page read and write
2734000
heap
page read and write
BF4000
trusted library allocation
page read and write
1E0000
heap
page read and write
3374000
unkown
page read and write
2F64000
heap
page read and write
22C0000
heap
page read and write
2734000
heap
page read and write
5AEE000
stack
page read and write
5B40000
trusted library allocation
page execute and read and write
493E000
trusted library allocation
page read and write
4E4000
unkown
page execute read
519C000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
2734000
heap
page read and write
1409F1000
unkown
page write copy
279E000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
950000
heap
page read and write
1DFD355B000
heap
page read and write
5B8000
heap
page read and write
2734000
heap
page read and write
3522000
unkown
page read and write
23F0000
trusted library allocation
page read and write
51E4000
trusted library allocation
page read and write
525000
unkown
page readonly
824000
unkown
page execute read
2590000
heap
page read and write
2B11000
heap
page read and write
2EC0000
heap
page read and write
1DFD35BE000
heap
page read and write
7FF739138000
unkown
page write copy
2A72000
trusted library allocation
page read and write
64D5000
heap
page read and write
6B10000
trusted library allocation
page execute and read and write
353E000
unkown
page read and write
49E0000
trusted library allocation
page read and write
73DE000
stack
page read and write
628000
heap
page read and write
1B0000
heap
page read and write
508F000
trusted library allocation
page read and write
140B6A000
unkown
page readonly
8EE000
stack
page read and write
28FC000
trusted library allocation
page read and write
F96000
heap
page read and write
2735000
heap
page read and write
7410000
trusted library allocation
page execute and read and write
264C000
trusted library allocation
page read and write
19E0000
heap
page read and write
49E5000
trusted library allocation
page read and write
35ED000
unkown
page read and write
79F000
stack
page read and write
29A7000
trusted library allocation
page read and write
2F50000
heap
page read and write
543D000
direct allocation
page read and write
4D1000
unkown
page execute read
4962000
trusted library allocation
page read and write
140C10000
unkown
page readonly
1500000
heap
page read and write
1C0000
heap
page read and write
28CF000
trusted library allocation
page read and write
2734000
heap
page read and write
7FF739139000
unkown
page readonly
140A21000
unkown
page readonly
73C3D000
unkown
page read and write
140A21000
unkown
page readonly
140B6A000
unkown
page readonly
3515000
trusted library allocation
page read and write
6F9D000
stack
page read and write
2EAE000
unkown
page read and write
2A34000
heap
page read and write
2144000
direct allocation
page read and write
628000
heap
page read and write
3545000
trusted library allocation
page read and write
1DFD356B000
heap
page read and write
1407FC000
unkown
page readonly
140001000
unkown
page execute read
4F11000
unkown
page read and write
3038000
heap
page read and write
4C89000
direct allocation
page read and write
4D1000
unkown
page execute read
140BA0000
unkown
page readonly
7420000
trusted library allocation
page execute and read and write
537B5FE000
stack
page read and write
77CE000
stack
page read and write
2702000
trusted library allocation
page read and write
514E000
stack
page read and write
2A74000
trusted library allocation
page read and write
1409F1000
unkown
page read and write
140001000
unkown
page execute read
2CAF000
heap
page read and write
C25000
trusted library allocation
page execute and read and write
2D94000
heap
page read and write
22AE000
stack
page read and write
2735000
heap
page read and write
140B87000
unkown
page readonly
4E35000
heap
page read and write
8B0000
heap
page read and write
6D70000
heap
page read and write
21F0000
heap
page read and write
5E5000
heap
page read and write
37E1000
unkown
page read and write
A54000
heap
page read and write
140B6A000
unkown
page readonly
73EE000
trusted library section
page read and write
2734000
heap
page read and write
2F5B000
heap
page read and write
7542000
heap
page read and write
4C80000
trusted library allocation
page read and write
FB0000
heap
page read and write
6940000
heap
page read and write
4970000
trusted library allocation
page read and write
1DFD74B0000
heap
page read and write
3589000
unkown
page read and write
5A80000
trusted library allocation
page read and write
4C8D000
direct allocation
page read and write
3366000
trusted library allocation
page read and write
2734000
heap
page read and write
2734000
heap
page read and write
15A6000
heap
page read and write
2193000
direct allocation
page read and write
2505000
trusted library allocation
page read and write
5065000
trusted library allocation
page read and write
F3B000
stack
page read and write
140BD2000
unkown
page readonly
2734000
heap
page read and write
5A61000
trusted library allocation
page read and write
27AA000
trusted library allocation
page read and write
2735000
heap
page read and write
5D4E000
stack
page read and write
537B1BA000
stack
page read and write
1DFD3591000
heap
page read and write
2734000
heap
page read and write
1DFD35E2000
heap
page read and write
140BD2000
unkown
page readonly
5B0E000
stack
page read and write
2D80000
direct allocation
page read and write
648C000
heap
page read and write
643B000
heap
page read and write
140BEB000
unkown
page readonly
37C6000
unkown
page read and write
14B000
stack
page read and write
5790000
trusted library allocation
page read and write
494A000
trusted library allocation
page read and write
190000
heap
page read and write
42C1000
trusted library allocation
page read and write
66E0000
trusted library allocation
page execute and read and write
59AE000
stack
page read and write
3426000
trusted library allocation
page read and write
4410000
trusted library allocation
page read and write
140001000
unkown
page execute read
1540000
heap
page read and write
28DB000
trusted library allocation
page read and write
2734000
heap
page read and write
2734000
heap
page read and write
56C1000
unkown
page read and write
2198000
direct allocation
page read and write
6450000
heap
page read and write
21C1000
heap
page read and write
1764000
trusted library allocation
page read and write
27B7000
trusted library allocation
page read and write
1DFD35DC000
heap
page read and write
7FF7390EE000
unkown
page readonly
4B70000
trusted library allocation
page execute and read and write
64B3000
heap
page read and write
3557000
unkown
page read and write
711E000
stack
page read and write
2D36000
heap
page read and write
6410000
heap
page read and write
3518000
trusted library allocation
page read and write
4979000
trusted library allocation
page read and write
2734000
heap
page read and write
3270000
heap
page read and write
140B87000
unkown
page readonly
12F8000
stack
page read and write
F90000
heap
page read and write
140BEB000
unkown
page readonly
1DFD35A7000
heap
page read and write
3576000
trusted library allocation
page read and write
4685000
heap
page read and write
2734000
heap
page read and write
140001000
unkown
page execute read
57DE000
stack
page read and write
35E0000
unkown
page read and write
35A3000
unkown
page read and write
1DFD5510000
trusted library allocation
page read and write
3829000
unkown
page read and write
2907000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
2734000
heap
page read and write
365D000
unkown
page read and write
537B9FE000
stack
page read and write
44EC000
stack
page read and write
1A0000
heap
page read and write
217C000
direct allocation
page read and write
2D7F000
heap
page read and write
6B5A000
stack
page read and write
18EF000
stack
page read and write
3670000
unkown
page read and write
5751000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
28E8000
trusted library allocation
page read and write
726C000
stack
page read and write
BF3000
trusted library allocation
page execute and read and write
1DFD356F000
heap
page read and write
2C38000
heap
page read and write
26CE000
unkown
page read and write
45ED000
stack
page read and write
7FF7390EE000
unkown
page readonly
53FE000
stack
page read and write
1DFD54D0000
heap
page read and write
5990000
trusted library allocation
page read and write
27C4000
trusted library allocation
page read and write
2794000
trusted library allocation
page read and write
73C36000
unkown
page readonly
508A000
trusted library allocation
page read and write
80E000
stack
page read and write
5746000
trusted library allocation
page read and write
2DE3000
heap
page read and write
32F6000
trusted library allocation
page read and write
1DFD3568000
heap
page read and write
C1A000
trusted library allocation
page execute and read and write
361D000
trusted library allocation
page read and write
7280000
heap
page read and write
216D000
direct allocation
page read and write
27E7000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
34B7000
trusted library allocation
page read and write
49A0000
heap
page read and write
1DFD3552000
heap
page read and write
BF0000
trusted library allocation
page read and write
1563000
heap
page read and write
2735000
heap
page read and write
2A22000
heap
page read and write
1DFD3556000
heap
page read and write
4C90000
trusted library allocation
page execute and read and write
C16000
trusted library allocation
page execute and read and write
5A10000
trusted library allocation
page execute and read and write
35EC000
trusted library allocation
page read and write
73EB000
trusted library section
page read and write
140000000
unkown
page readonly
1DFD5500000
heap
page read and write
652B000
stack
page read and write
72B1000
trusted library allocation
page read and write
659000
heap
page read and write
2EEE000
stack
page read and write
156A000
heap
page read and write
2734000
heap
page read and write
42C5000
trusted library allocation
page read and write
2581000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
33E9000
unkown
page read and write
51B000
unkown
page read and write
7FF739135000
unkown
page readonly
5780000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
2734000
heap
page read and write
2D94000
heap
page read and write
1DFD35DE000
heap
page read and write
23E0000
trusted library allocation
page read and write
3260000
heap
page read and write
7A10000
trusted library allocation
page read and write
1409F1000
unkown
page write copy
140BA0000
unkown
page readonly
3290000
trusted library allocation
page read and write
2209000
heap
page read and write
3352000
trusted library allocation
page read and write
2730000
heap
page read and write
1DFD3591000
heap
page read and write
575E000
trusted library allocation
page read and write
3274000
heap
page read and write
19D0000
heap
page read and write
1DFD35DE000
heap
page read and write
790E000
stack
page read and write
32D6000
trusted library allocation
page read and write
2734000
heap
page read and write
510000
heap
page read and write
1754000
trusted library allocation
page read and write
7FF739134000
unkown
page read and write
34EC000
unkown
page read and write
4936000
trusted library allocation
page read and write
140A21000
unkown
page readonly
1DFD3568000
heap
page read and write
6950000
trusted library allocation
page read and write
6C59000
stack
page read and write
4D2E000
stack
page read and write
1DFD359F000
heap
page read and write
5C6E000
stack
page read and write
140BD2000
unkown
page readonly
140C10000
unkown
page readonly
2734000
heap
page read and write
7AE0000
heap
page read and write
1407FC000
unkown
page readonly
1DFD3529000
heap
page read and write
21A1000
direct allocation
page read and write
72D0000
heap
page read and write
17CB000
trusted library allocation
page read and write
218A000
direct allocation
page read and write
2689000
trusted library allocation
page read and write
541F000
stack
page read and write
6800000
trusted library allocation
page read and write
4C60000
trusted library allocation
page execute and read and write
7290000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
21B8000
heap
page read and write
8B5000
heap
page read and write
2260000
trusted library allocation
page read and write
219A000
direct allocation
page read and write
73C20000
unkown
page readonly
2734000
heap
page read and write
2734000
heap
page read and write
217D000
direct allocation
page read and write
63F6000
heap
page read and write
C12000
trusted library allocation
page read and write
5C4F000
stack
page read and write
290E000
unkown
page read and write
1C0000
heap
page read and write
2734000
heap
page read and write
140BA0000
unkown
page readonly
2575000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
1DFD35E2000
heap
page read and write
4951000
trusted library allocation
page read and write
2174000
direct allocation
page read and write
4956000
trusted library allocation
page read and write
140000000
unkown
page readonly
4CA0000
heap
page execute and read and write
6E9E000
stack
page read and write
2734000
heap
page read and write
2D50000
heap
page read and write
1DFD35DC000
heap
page read and write
3557000
trusted library allocation
page read and write
2A10000
heap
page read and write
531E000
stack
page read and write
15D2000
heap
page read and write
140BEB000
unkown
page readonly
328E000
stack
page read and write
1DFD359D000
heap
page read and write
33D7000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
32A9000
trusted library allocation
page read and write
2B9B000
heap
page read and write
C2B000
trusted library allocation
page execute and read and write
27FE000
trusted library allocation
page read and write
178B000
trusted library allocation
page execute and read and write
940000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
192E000
stack
page read and write
C0D000
trusted library allocation
page execute and read and write
2D8C000
heap
page read and write
1DFD3530000
heap
page read and write
27CB000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
1A0000
heap
page read and write
140000000
unkown
page readonly
140001000
unkown
page execute read
28BC000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
358A000
trusted library allocation
page read and write
49A3000
heap
page read and write
2B90000
heap
page read and write
7FF739105000
unkown
page read and write
22B0000
trusted library allocation
page execute and read and write
5BE000
heap
page read and write
2A53000
trusted library allocation
page read and write
4F2A000
unkown
page read and write
27D6000
trusted library allocation
page read and write
7FF7390FE000
unkown
page write copy
2734000
heap
page read and write
2530000
trusted library allocation
page read and write
140000000
unkown
page readonly
1DFD3734000
heap
page read and write
72C0000
trusted library allocation
page execute and read and write
C47000
heap
page read and write
157A000
heap
page read and write
537B4FD000
stack
page read and write
4E70000
trusted library allocation
page read and write
3274000
heap
page read and write
6680000
heap
page read and write
140BD2000
unkown
page readonly
2191000
direct allocation
page read and write
29D2000
trusted library allocation
page read and write
5BD000
heap
page read and write
1548000
heap
page read and write
1DFD3500000
heap
page readonly
517000
heap
page read and write
222F000
heap
page read and write
1407FC000
unkown
page readonly
2D90000
heap
page read and write
505B000
trusted library allocation
page read and write
324F000
stack
page read and write
4D0000
unkown
page readonly
5069000
trusted library allocation
page read and write
1DFD3567000
heap
page read and write
28CD000
trusted library allocation
page read and write
4F58000
heap
page read and write
359B000
trusted library allocation
page read and write
84F000
unkown
page read and write
A14000
heap
page read and write
1DFD34F0000
heap
page read and write
49C6000
trusted library allocation
page read and write
353E000
trusted library allocation
page read and write
1C0000
heap
page read and write
2400000
heap
page execute and read and write
2734000
heap
page read and write
574C000
trusted library allocation
page read and write
2D94000
heap
page read and write
2D94000
heap
page read and write
521000
unkown
page read and write
140B87000
unkown
page readonly
17E0000
heap
page read and write
2734000
heap
page read and write
1300000
unkown
page readonly
4F11000
unkown
page read and write
3432000
trusted library allocation
page read and write
29DE000
trusted library allocation
page read and write
270E000
stack
page read and write
1DFD5391000
trusted library allocation
page read and write
504D000
stack
page read and write
3367000
trusted library allocation
page read and write
50F000
unkown
page read and write
1DFD3556000
heap
page read and write
2C59000
heap
page read and write
3531000
trusted library allocation
page read and write
1409F2000
unkown
page write copy
73C3F000
unkown
page readonly
6ADD000
stack
page read and write
4C52000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
6418000
heap
page read and write
29B8000
trusted library allocation
page read and write
5A0000
heap
page read and write
2D94000
heap
page read and write
49D0000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
1DFD3584000
heap
page read and write
6640000
trusted library allocation
page read and write
2734000
heap
page read and write
214C000
direct allocation
page read and write
5D50000
trusted library allocation
page execute and read and write
537B1AB000
stack
page read and write
73E1000
trusted library section
page read and write
507F000
trusted library allocation
page read and write
2734000
heap
page read and write
4F8000
stack
page read and write
6D60000
heap
page read and write
495D000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
537000
heap
page read and write
537B7FF000
stack
page read and write
62ED000
stack
page read and write
558000
heap
page read and write
1DFD3591000
heap
page read and write
1407FC000
unkown
page readonly
63F4000
heap
page read and write
5BD000
heap
page read and write
3446000
trusted library allocation
page read and write
4988000
trusted library allocation
page read and write
73C21000
unkown
page execute read
494E000
trusted library allocation
page read and write
140B87000
unkown
page readonly
537B1A4000
stack
page read and write
3524000
trusted library allocation
page read and write
5A0000
heap
page read and write
4E4000
unkown
page execute read
49C0000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
190000
heap
page read and write
64DE000
heap
page read and write
1DFD35BE000
heap
page read and write
279C000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
523000
unkown
page readonly
56C0000
unkown
page read and write
6D5C000
stack
page read and write
1409F1000
unkown
page read and write
60E000
stack
page read and write
528E000
stack
page read and write
70DC000
stack
page read and write
1753000
trusted library allocation
page execute and read and write
1DFD3564000
heap
page read and write
2D60000
heap
page read and write
2734000
heap
page read and write
4F11000
unkown
page read and write
4DB0000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
7A0D000
stack
page read and write
2210000
heap
page read and write
662D000
stack
page read and write
5754000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
7FF7390C0000
unkown
page readonly
72E000
stack
page read and write
66F0000
trusted library allocation
page read and write
4E6C000
stack
page read and write
1DFD3567000
heap
page read and write
64B000
heap
page read and write
47A8000
heap
page read and write
1409F2000
unkown
page write copy
14A000
stack
page read and write
2734000
heap
page read and write
252E000
trusted library allocation
page read and write
140000000
unkown
page readonly
537B1A1000
stack
page read and write
140B6A000
unkown
page readonly
5A8000
heap
page read and write
29A0000
heap
page read and write
27E2000
trusted library allocation
page read and write
2184000
direct allocation
page read and write
2734000
heap
page read and write
2AA2000
heap
page read and write
1D6000
heap
page read and write
2735000
heap
page read and write
21A8000
direct allocation
page read and write
1DFD35DE000
heap
page read and write
50F000
unkown
page read and write
811000
unkown
page execute read
2734000
heap
page read and write
2F5C000
heap
page read and write
35A6000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
1DFD38A0000
heap
page read and write
2AAD000
heap
page read and write
6650000
trusted library section
page read and write
2D94000
heap
page read and write
C10000
trusted library allocation
page read and write
2238000
heap
page read and write
84C000
unkown
page execute read
173E000
stack
page read and write
89F000
stack
page read and write
There are 776 hidden memdumps, click here to show them.