IOC Report
SecuriteInfo.com.FileRepMalware.32346.10249.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepMalware.32346.10249.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI67762\Pythonwin\mfc140u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\Pythonwin\win32ui.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\config-3.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\config.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\cv2.pyd
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\data\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\gapi\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\load_config_py3.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\mat_wrapper\__init__.py
Python script, ASCII text executable, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\misc\__init__.py
Python script, ASCII text executable, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\misc\version.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\opencv_videoio_ffmpeg460_64.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\utils\__init__.py
Python script, ASCII text executable, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\cv2\version.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy.libs\libopenblas64__v0.3.23-293-gc2f4bdbb-gcc_10_3_0-2bde3a66a51006b2b53eb373ff767a3f.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\core\_multiarray_tests.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\core\_multiarray_umath.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\fft\_pocketfft_internal.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\linalg\_umath_linalg.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\_bounded_integers.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\_common.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\_generator.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\_mt19937.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\_pcg64.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\_philox.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\_sfc64.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\bit_generator.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\numpy\random\mtrand.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\psutil\_psutil_windows.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\pywin32_system32\pythoncom312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\pywin32_system32\pywintypes312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\win32\_win32sysloader.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\win32\win32pdh.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67762\win32\win32trace.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\gen_py\3.12\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\gen_py\3.12\dicts.dat
data
dropped
There are 55 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.32346.10249.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.32346.10249.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.32346.10249.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.32346.10249.exe"
malicious

URLs

Name
IP
Malicious
https://github.com/joblib/threadpoolctl
unknown
https://onnx.ai/)
unknown
http://caffe.berkeleyvision.org/)
unknown
https://numpy.org/devdocs/release/1.20.0-notes.html#deprecations
unknown
http://www.scipy.org/not/real/data.txt
unknown
https://github.com/giampaolo/psutil/issues/875.
unknown
https://docs.scipy.org/doc/numpy/user/basics.io.genfromtxt.html
unknown
https://github.com/arogozhnikov/einops
unknown
http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/JUMP/
unknown
https://docs.python.org/library/string.html#format-specification-mini-language
unknown
http://torch.ch/)
unknown
https://github.com/mhammond/pywin32
unknown
https://github.com/opencv/opencv/issues/19634cv::mjpeg::MjpegEncoder::MjpegEncodercv::mjpeg::MotionJ
unknown
https://web.archive.org/web/20090514091424/http://brighton-webs.co.uk:80/distributions/rayleigh.asp
unknown
http://mathworld.wolfram.com/NoncentralF-Distribution.html
unknown
http://www.doi.org/10.1109/IEEESTD.2008.4610935
unknown
http://www.dai.ed.ac.uk/CVonline/LOCAL_COPIES/MANDUCHI1/Bilateral_Filtering.html
unknown
https://gist.github.com/imneme/540829265469e673d045
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/opencv/opencv/issues/6293
unknown
https://github.com/opencv/opencv/issues/16739
unknown
http://goo.gl/zeJZl.
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://dmlc.github.io/dlpack/latest/python_spec.html
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
https://docs.scipy.org/doc/numpy/reference/arrays.interface.html
unknown
https://numpy.org/doc/stable/user/basics.subclassing.html
unknown
https://personal.math.ubc.ca/~cbm/aands/page_379.htm
unknown
https://github.com/torch/nn/blob/master/doc/module.md
unknown
http://mathworld.wolfram.com/LaplaceDistribution.html
unknown
https://github.com/opencv/opencv/issues/20833
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://ipython.org
unknown
https://peps.python.org/pep-0205/
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://torch.ch
unknown
http://www.gdal.org/ogr_formats.html).
unknown
https://github.com/opencv/opencv/issues/18502)
unknown
https://personal.math.ubc.ca/~cbm/aands/page_67.htm
unknown
http://arxiv.org/abs/1805.10941.
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://www.tensorflow.org/)
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://numpy.org/devdocs/user/troubleshooting-importerror.html#c-api-incompatibility
unknown
https://httpbin.org/get
unknown
https://www.itl.nist.gov/div898/handbook/eda/section3/eda3666.htm
unknown
http://mathworld.wolfram.com/NegativeBinomialDistribution.html
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://docs.scipy.org/doc/numpy/user/numpy-for-matlab-users.html).
unknown
https://www.itl.nist.gov/div898/software/dataplot/refman2/auxillar/powpdf.pdf
unknown
http://mail.python.org/pipermail/python-dev/2012-June/120787.html.
unknown
https://httpbin.org/
unknown
http://www.ams.org/journals/mcom/1988-51-184/
unknown
https://numpy.org/doc/stable/reference/random/index.html
unknown
http://www.pcg-random.org/posts/developing-a-seed_seq-alternative.html
unknown
https://metacpan.org/pod/distribution/Math-Cephes/lib/Math/Cephes.pod#i0:-Modified-Bessel-function-o
unknown
http://campar.in.tum.de/Chair/HandEyeCalibration).
unknown
https://github.com/numpy/numpy/issues/4763
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://web.archive.org/web/20090423014010/http://www.brighton-webs.co.uk:80/distributions/wald.asp
unknown
http://mathworld.wolfram.com/CauchyDistribution.html
unknown
http://mathworld.wolfram.com/HypergeometricDistribution.html
unknown
https://docs.python.org/3/library/multiprocessing.html
unknown
http://mathworld.wolfram.com/PoissonDistribution.html
unknown
http://mathworld.wolfram.com/SincFunction.html
unknown
http://wwwsearch.sf.net/):
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
http://homepages.inf.ed.ac.uk/rbf/HIPR2/hough.htm
unknown
https://github.com/NVIDIA/caffe.
unknown
https://github.com/python/cpython/pull/12302
unknown
https://onnx.ai/
unknown
https://software.intel.com/openvino-toolkit)
unknown
https://google.com/mail
unknown
http://caffe.berkeleyvision.org
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://web.archive.org/web/20080221202153/https://www.math.hmc.edu/~benjamin/papers/CombTrig.pdf
unknown
https://github.com/opencv/opencv/issues/19634
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
https://mahler:8092/site-updates.py
unknown
http://www.inference.org.uk/mackay/itila/
unknown
http://mathworld.wolfram.com/BinomialDistribution.html
unknown
https://github.com/opencv/opencv/issues/21326cv::initOpenEXRD:
unknown
https://numpy.org/devdocs/release/1.20.0-notes.html#deprecationsl
unknown
https://numpy.org/neps/nep-0013-ufunc-overrides.html
unknown
http://.../back.jpeg
unknown
https://optimized-einsum.readthedocs.io/en/stable/
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://httpbin.org/post
unknown
https://scipy-cookbook.readthedocs.io/items/Ctypes.html
unknown
https://github.com/Ousret/charset_normalizer
unknown
https://www.mathworks.com/help/techdoc/ref/rank.html
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://yahoo.com/
unknown
http://www.xyz.edu/data
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
vyapar.vaisworks.com
129.154.46.185

IPs

IP
Domain
Country
Malicious
129.154.46.185
vyapar.vaisworks.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
27314591000
heap
page read and write
27314D50000
heap
page read and write
27314888000
heap
page read and write
288841AA000
heap
page read and write
273148EC000
heap
page read and write
2731B702000
heap
page read and write
7FF8A5D93000
unkown
page read and write
2731498C000
heap
page read and write
7FF8A5CA4000
unkown
page read and write
2731B892000
heap
page read and write
7FF8A64A3000
unkown
page write copy
273150EF000
heap
page read and write
2731C780000
direct allocation
page read and write
288841A5000
heap
page read and write
27314857000
heap
page read and write
28884130000
heap
page read and write
288841A5000
heap
page read and write
27314DA2000
heap
page read and write
2731486C000
heap
page read and write
27314584000
heap
page read and write
7FF8A54BB000
unkown
page readonly
27314DA2000
heap
page read and write
2731B733000
heap
page read and write
7FF60F30F000
unkown
page write copy
7FF8A1621000
unkown
page execute read
7FF8A609C000
unkown
page execute read
273145B7000
heap
page read and write
7FF8A16DF000
unkown
page readonly
288841B4000
heap
page read and write
7FF8A64A4000
unkown
page read and write
2731B67F000
heap
page read and write
27314554000
heap
page read and write
288841A4000
heap
page read and write
7FF60F30F000
unkown
page write copy
2731C7B4000
direct allocation
page read and write
288841A5000
heap
page read and write
7FF8A5C9D000
unkown
page write copy
2731C6E0000
direct allocation
page read and write
2731B6AD000
heap
page read and write
273145B8000
heap
page read and write
2731455F000
heap
page read and write
2731B5D6000
heap
page read and write
288841A7000
heap
page read and write
7FF8A64A1000
unkown
page write copy
7FF8A5DAD000
unkown
page read and write
27314561000
heap
page read and write
27314921000
heap
page read and write
2731456C000
heap
page read and write
288841A5000
heap
page read and write
273149AC000
heap
page read and write
27314F10000
heap
page read and write
2731483D000
heap
page read and write
7FF8A5537000
unkown
page readonly
288841A5000
heap
page read and write
28885C10000
heap
page read and write
7FF8A555C000
unkown
page readonly
7FF8A6077000
unkown
page execute read
2731B968000
heap
page read and write
2731C73C000
direct allocation
page read and write
273150EF000
heap
page read and write
288841A5000
heap
page read and write
27314586000
heap
page read and write
27314518000
heap
page read and write
273143B0000
heap
page read and write
288841A5000
heap
page read and write
27314581000
heap
page read and write
7FF8A2581000
unkown
page execute read
7FF60F313000
unkown
page readonly
2731B6BF000
heap
page read and write
288841B3000
heap
page read and write
2731B300000
direct allocation
page read and write
7FF8A5548000
unkown
page readonly
BD8E17E000
stack
page read and write
2731503A000
heap
page read and write
7FF8A5489000
unkown
page readonly
2731509F000
heap
page read and write
288841A8000
heap
page read and write
288841B2000
heap
page read and write
7FF60F313000
unkown
page readonly
2731B6BF000
heap
page read and write
2731455A000
heap
page read and write
7FF60F2D0000
unkown
page readonly
27314D1D000
heap
page read and write
27314D98000
heap
page read and write
7FF8A5CB4000
unkown
page write copy
27312A22000
heap
page read and write
2731485F000
heap
page read and write
27314F10000
heap
page read and write
2731B69E000
heap
page read and write
2731B780000
heap
page read and write
2731457F000
heap
page read and write
2731485F000
heap
page read and write
288841A7000
heap
page read and write
BD8DBAF000
stack
page read and write
7FF8A4D81000
unkown
page execute read
288841A7000
heap
page read and write
2731C75C000
direct allocation
page read and write
7FF60F311000
unkown
page read and write
2731B65D000
heap
page read and write
7FF8A1614000
unkown
page readonly
7FF60F2D1000
unkown
page execute read
27314991000
heap
page read and write
273149CD000
heap
page read and write
2731B540000
heap
page read and write
2731C748000
direct allocation
page read and write
7FF8A16A4000
unkown
page readonly
27314DDF000
heap
page read and write
7FF8A53E2000
unkown
page readonly
2731B5E5000
heap
page read and write
7FF60F2D0000
unkown
page readonly
288841A7000
heap
page read and write
288841A5000
heap
page read and write
2731453E000
heap
page read and write
27314823000
heap
page read and write
27314F35000
heap
page read and write
2731B6F4000
heap
page read and write
27314558000
heap
page read and write
288841AA000
heap
page read and write
27314F0B000
heap
page read and write
288841A6000
heap
page read and write
27314F3A000
heap
page read and write
27314835000
heap
page read and write
7FF8A52F5000
unkown
page readonly
2731B9C7000
heap
page read and write
7FF60F2D1000
unkown
page execute read
288841B4000
heap
page read and write
2731503A000
heap
page read and write
7FF8A549B000
unkown
page readonly
7FF60F313000
unkown
page readonly
27314D3D000
heap
page read and write
7FF8A6399000
unkown
page readonly
288841A7000
heap
page read and write
7FF8A54B8000
unkown
page readonly
273149AC000
heap
page read and write
2731B95A000
heap
page read and write
27314583000
heap
page read and write
273148CB000
heap
page read and write
7FF8A5D02000
unkown
page read and write
2731B65D000
heap
page read and write
288841A5000
heap
page read and write
288841B3000
heap
page read and write
2731B500000
heap
page read and write
273142D0000
direct allocation
page read and write
2731458E000
heap
page read and write
288841A5000
heap
page read and write
2731C660000
direct allocation
page read and write
27314580000
heap
page read and write
2731B692000
heap
page read and write
27314868000
heap
page read and write
2731C568000
direct allocation
page read and write
27314FAC000
heap
page read and write
288841B4000
heap
page read and write
2731C6E8000
direct allocation
page read and write
288841B3000
heap
page read and write
27314D98000
heap
page read and write
7FF8A5FA8000
unkown
page readonly
273150FC000
heap
page read and write
2731C300000
direct allocation
page execute and read and write
288841A5000
heap
page read and write
2731C79C000
direct allocation
page read and write
2731485F000
heap
page read and write
7FF60F2D1000
unkown
page execute read
2731509D000
heap
page read and write
27314E2D000
heap
page read and write
7FF8A526F000
unkown
page readonly
2731485C000
heap
page read and write
27314F3A000
heap
page read and write
27314F27000
heap
page read and write
2731B9C4000
heap
page read and write
2731C7B0000
direct allocation
page read and write
7FF8A15AE000
unkown
page readonly
288841B4000
heap
page read and write
2731B400000
direct allocation
page read and write
273150FC000
heap
page read and write
273128E0000
heap
page readonly
2731488C000
heap
page read and write
27314554000
heap
page read and write
7FF8A5590000
unkown
page readonly
27312A2D000
heap
page read and write
7FF8A1500000
unkown
page readonly
27314F2D000
heap
page read and write
2731485B000
heap
page read and write
7FF8A5FF0000
unkown
page readonly
288841A7000
heap
page read and write
7FF8A5E18000
unkown
page read and write
7FF60F2D1000
unkown
page execute read
2731B66D000
heap
page read and write
27314EC1000
heap
page read and write
288841A7000
heap
page read and write
288841A7000
heap
page read and write
288841AA000
heap
page read and write
27314D72000
heap
page read and write
2731C7A8000
direct allocation
page read and write
27314868000
heap
page read and write
2731457C000
heap
page read and write
273149E8000
heap
page read and write
BD8D9BF000
stack
page read and write
273144ED000
heap
page read and write
27314D82000
heap
page read and write
288841A7000
heap
page read and write
7FF8A2F81000
unkown
page execute read
7FF60F313000
unkown
page readonly
27314871000
heap
page read and write
288841A7000
heap
page read and write
288841AA000
heap
page read and write
273129B5000
heap
page read and write
7FF8A557F000
unkown
page readonly
27314DC6000
heap
page read and write
2731C718000
direct allocation
page read and write
288841A6000
heap
page read and write
2731B63D000
heap
page read and write
2731B961000
heap
page read and write
2731B683000
heap
page read and write
2731C538000
direct allocation
page read and write
288841A6000
heap
page read and write
7FF8A64D6000
unkown
page readonly
27314988000
heap
page read and write
7FF8A15B2000
unkown
page readonly
7FF8A16D0000
unkown
page read and write
273149AC000
heap
page read and write
BD8D3DD000
stack
page read and write
27314544000
heap
page read and write
2731B100000
direct allocation
page read and write
288841A8000
heap
page read and write
27314D00000
heap
page read and write
2731B644000
heap
page read and write
27314FB8000
heap
page read and write
288841A5000
heap
page read and write
7FF60F2FC000
unkown
page readonly
2731C758000
direct allocation
page read and write
2731C140000
direct allocation
page read and write
288841B4000
heap
page read and write
27314841000
heap
page read and write
27314DC4000
heap
page read and write
7FF8A16CC000
unkown
page write copy
27314564000
heap
page read and write
27314505000
heap
page read and write
288841AA000
heap
page read and write
7FF8A5C96000
unkown
page write copy
2731B978000
heap
page read and write
273143B5000
heap
page read and write
273148C7000
heap
page read and write
7FF60F2FC000
unkown
page readonly
7FF8A52B9000
unkown
page readonly
27314878000
heap
page read and write
2731C730000
direct allocation
page read and write
273143C0000
direct allocation
page read and write
27314D12000
heap
page read and write
7FF8A5415000
unkown
page readonly
2731C728000
direct allocation
page read and write
7FF8A556D000
unkown
page readonly
27314591000
heap
page read and write
7FF8A5CAB000
unkown
page write copy
288841A5000
heap
page read and write
27314D82000
heap
page read and write
2731455F000
heap
page read and write
27314995000
heap
page read and write
2731B699000
heap
page read and write
2731458B000
heap
page read and write
288841A7000
heap
page read and write
27314E97000
heap
page read and write
27314F01000
heap
page read and write
27314DE5000
heap
page read and write
27314995000
heap
page read and write
2731458B000
heap
page read and write
7FF8A6431000
unkown
page readonly
27314845000
heap
page read and write
2731B6DF000
heap
page read and write
27314800000
heap
page read and write
27314DD4000
heap
page read and write
7FF8A5437000
unkown
page readonly
288841A5000
heap
page read and write
27314557000
heap
page read and write
2731B793000
heap
page read and write
2731B908000
heap
page read and write
2731498A000
heap
page read and write
288841A8000
heap
page read and write
273128F0000
heap
page read and write
27312930000
heap
page read and write
28884188000
heap
page read and write
288841A5000
heap
page read and write
27314EF0000
heap
page read and write
2731C040000
direct allocation
page read and write
27314540000
heap
page read and write
288841A7000
heap
page read and write
27314586000
heap
page read and write
2731453A000
heap
page read and write
288840E0000
heap
page read and write
273148EC000
heap
page read and write
288841A5000
heap
page read and write
273149AC000
heap
page read and write
2888419F000
heap
page read and write
2731C794000
direct allocation
page read and write
2731C760000
direct allocation
page read and write
7FF8A525F000
unkown
page readonly
7FF8A5FF1000
unkown
page execute read
27314589000
heap
page read and write
288841A8000
heap
page read and write
288841A5000
heap
page read and write
7FF8A5C79000
unkown
page read and write
27314D5B000
heap
page read and write
27314E8F000
heap
page read and write
7FF8A5CB1000
unkown
page write copy
27314581000
heap
page read and write
27314E82000
heap
page read and write
27314ED8000
heap
page read and write
7FF60F2FC000
unkown
page readonly
7FF8A1B80000
unkown
page readonly
2731451A000
heap
page read and write
7FF8A5515000
unkown
page readonly
2731485B000
heap
page read and write
2731B8A8000
heap
page read and write
2731C560000
direct allocation
page read and write
7FF8A16D1000
unkown
page readonly
2731453E000
heap
page read and write
2731458B000
heap
page read and write
2731C790000
direct allocation
page read and write
288841A7000
heap
page read and write
27314584000
heap
page read and write
2731458B000
heap
page read and write
F80BFBF000
stack
page read and write
27314380000
trusted library allocation
page read and write
7FF8A4381000
unkown
page execute read
273145B8000
heap
page read and write
288841A5000
heap
page read and write
2731C7AC000
direct allocation
page read and write
273142A0000
heap
page read and write
273149CC000
heap
page read and write
7FF8A6362000
unkown
page readonly
288841A7000
heap
page read and write
27314991000
heap
page read and write
288841B4000
heap
page read and write
27314390000
trusted library allocation
page read and write
2731B982000
heap
page read and write
BD8DD9F000
stack
page read and write
27314581000
heap
page read and write
288841A5000
heap
page read and write
288841A5000
heap
page read and write
2731B66C000
heap
page read and write
7FF60F2FC000
unkown
page readonly
2731C78C000
direct allocation
page read and write
288841A7000
heap
page read and write
27314581000
heap
page read and write
273144FA000
heap
page read and write
273148CB000
heap
page read and write
7FF8A5D13000
unkown
page read and write
27314868000
heap
page read and write
27314857000
heap
page read and write
2731503A000
heap
page read and write
288841A5000
heap
page read and write
7FF60F311000
unkown
page read and write
2731C460000
direct allocation
page read and write
2731457E000
heap
page read and write
2731458B000
heap
page read and write
27314D01000
heap
page read and write
7FF8A6062000
unkown
page execute read
27314584000
heap
page read and write
288841A8000
heap
page read and write
27314857000
heap
page read and write
F80C1AF000
stack
page read and write
7FF8A5C88000
unkown
page write copy
288841A7000
heap
page read and write
27314868000
heap
page read and write
2731450E000
heap
page read and write
27314554000
heap
page read and write
27314F2D000
heap
page read and write
288841A5000
heap
page read and write
2731455F000
heap
page read and write
273144C0000
heap
page read and write
2731C778000
direct allocation
page read and write
7FF8A5DB1000
unkown
page read and write
7FF8A64F0000
unkown
page readonly
27314931000
heap
page read and write
27314966000
heap
page read and write
7FF8A5CAA000
unkown
page read and write
288841A7000
heap
page read and write
288841A7000
heap
page read and write
27314846000
heap
page read and write
27314E97000
heap
page read and write
7FF60F2D0000
unkown
page readonly
7FF8A16A2000
unkown
page execute read
7FF8A64DA000
unkown
page readonly
2731C74C000
direct allocation
page read and write
7FF8A5CA7000
unkown
page write copy
27314835000
heap
page read and write
27314B00000
direct allocation
page read and write
2731B66C000
heap
page read and write
7FF8A53F2000
unkown
page readonly
288841B4000
heap
page read and write
27314835000
heap
page read and write
27314581000
heap
page read and write
2731458B000
heap
page read and write
288841B4000
heap
page read and write
27314524000
heap
page read and write
288841A5000
heap
page read and write
7FF8A5FA3000
unkown
page write copy
288841A8000
heap
page read and write
7FF60F2D0000
unkown
page readonly
27314DC7000
heap
page read and write
27314572000
heap
page read and write
27314966000
heap
page read and write
288841AA000
heap
page read and write
7FF8A5C99000
unkown
page read and write
288840F0000
heap
page readonly
2731457E000
heap
page read and write
27314C00000
direct allocation
page read and write
27314581000
heap
page read and write
7FF8A1612000
unkown
page read and write
273148CB000
heap
page read and write
27314991000
heap
page read and write
288841A5000
heap
page read and write
7FF8A5CB2000
unkown
page read and write
27314EFB000
heap
page read and write
288841AA000
heap
page read and write
2731C7A4000
direct allocation
page read and write
288841A7000
heap
page read and write
27314928000
heap
page read and write
7FF8A5CB0000
unkown
page read and write
288841A7000
heap
page read and write
27314F27000
heap
page read and write
273149D8000
heap
page read and write
BD8E36F000
stack
page read and write
7FF8A6012000
unkown
page execute read
288841A5000
heap
page read and write
288841A8000
heap
page read and write
288841A7000
heap
page read and write
2731C71C000
direct allocation
page read and write
27314585000
heap
page read and write
2731C360000
direct allocation
page read and write
27314962000
heap
page read and write
288841A5000
heap
page read and write
2731294E000
heap
page read and write
2731458B000
heap
page read and write
7FF8A6018000
unkown
page execute read
27314942000
heap
page read and write
28884100000
heap
page read and write
2731B5D7000
heap
page read and write
288841A7000
heap
page read and write
7FF8A3981000
unkown
page execute read
28884180000
heap
page read and write
27314DDF000
heap
page read and write
288841A7000
heap
page read and write
F80B9E4000
stack
page read and write
288841A5000
heap
page read and write
7FF8A160F000
unkown
page readonly
7FF8A5E16000
unkown
page read and write
2731B697000
heap
page read and write
288841AA000
heap
page read and write
27312938000
heap
page read and write
27314584000
heap
page read and write
288841AA000
heap
page read and write
27314585000
heap
page read and write
7FF60F30F000
unkown
page read and write
7FF8A6470000
unkown
page readonly
2731458B000
heap
page read and write
7FF8A64A2000
unkown
page read and write
288841A8000
heap
page read and write
7FF8A5427000
unkown
page readonly
7FF8A5479000
unkown
page readonly
7FF8A1505000
unkown
page readonly
7FF8A16D7000
unkown
page readonly
7FF8A64F1000
unkown
page execute read
288841A7000
heap
page read and write
27314568000
heap
page read and write
27314D55000
heap
page read and write
2731458B000
heap
page read and write
7FF8A608E000
unkown
page execute read
273142E0000
unkown
page readonly
288841A7000
heap
page read and write
7FF8A52C8000
unkown
page readonly
288841AA000
heap
page read and write
7FF8A5404000
unkown
page readonly
27314DE5000
heap
page read and write
7FF8A6002000
unkown
page execute read
7FF8A6360000
unkown
page execute read
7FF8A1B81000
unkown
page execute read
7FF8A15B7000
unkown
page readonly
2731485B000
heap
page read and write
288841A7000
heap
page read and write
2731C77C000
direct allocation
page read and write
273149CC000
heap
page read and write
27314EA1000
heap
page read and write
2731B95F000
heap
page read and write
7FF8A54AB000
unkown
page readonly
273148A1000
heap
page read and write
2731498D000
heap
page read and write
27314580000
heap
page read and write
27314700000
direct allocation
page read and write
2731453E000
heap
page read and write
7FF8A5364000
unkown
page readonly
7FF8A5E1C000
unkown
page readonly
7FF8A4DF4000
unkown
page readonly
7FF60F30F000
unkown
page read and write
27314561000
heap
page read and write
27314A00000
direct allocation
page read and write
7FF8A5525000
unkown
page readonly
288841A5000
heap
page read and write
2731B501000
heap
page read and write
27314939000
heap
page read and write
27314568000
heap
page read and write
27314572000
heap
page read and write
7FF8A63D6000
unkown
page readonly
2731458B000
heap
page read and write
27314958000
heap
page read and write
7FF8A52D5000
unkown
page readonly
2731B763000
heap
page read and write
288841A6000
heap
page read and write
27314868000
heap
page read and write
27314FD3000
heap
page read and write
7FF8A1562000
unkown
page readonly
273145B8000
heap
page read and write
7FF8A5DB6000
unkown
page read and write
27314D01000
heap
page read and write
27314589000
heap
page read and write
27314561000
heap
page read and write
7FF8A6087000
unkown
page execute read
2731458B000
heap
page read and write
2731B64E000
heap
page read and write
7FF8A5D07000
unkown
page read and write
BD8E55F000
stack
page read and write
27314FD3000
heap
page read and write
288841A5000
heap
page read and write
27314857000
heap
page read and write
7FF8A1620000
unkown
page readonly
2731484B000
heap
page read and write
27314DD7000
heap
page read and write
2731C708000
direct allocation
page read and write
7FF8A64A8000
unkown
page readonly
2731455F000
heap
page read and write
27314FD3000
heap
page read and write
27314835000
heap
page read and write
2731455A000
heap
page read and write
288841A5000
heap
page read and write
7FF8A1501000
unkown
page execute read
27314F35000
heap
page read and write
2731498C000
heap
page read and write
2731C350000
heap
page read and write
2731B789000
heap
page read and write
273128D0000
heap
page read and write
7FF8A5C8E000
unkown
page read and write
27314D46000
heap
page read and write
2731B200000
direct allocation
page read and write
There are 532 hidden memdumps, click here to show them.