IOC Report
user.exe

loading gif

Files

File Path
Type
Category
Malicious
user.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI24482\Pythonwin\mfc140u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\Pythonwin\win32ui.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_cffi_backend.cp313-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\charset_normalizer\md.cp313-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\charset_normalizer\md__mypyc.cp313-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\cryptography-43.0.3.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\cryptography-43.0.3.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\cryptography-43.0.3.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\cryptography-43.0.3.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\cryptography-43.0.3.dist-info\license_files\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\cryptography-43.0.3.dist-info\license_files\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\cryptography-43.0.3.dist-info\license_files\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\python313.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\pywin32_system32\pythoncom313.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\pywin32_system32\pywintypes313.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\win32\_win32sysloader.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI24482\win32\win32trace.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\gen_py\3.13\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\gen_py\3.13\dicts.dat
data
dropped
C:\Users\user\Desktop\errors.log
ASCII text, with very long lines (387), with CRLF line terminators
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\user.exe
"C:\Users\user\Desktop\user.exe"
malicious
C:\Users\user\Desktop\user.exe
"C:\Users\user\Desktop\user.exe"
malicious

URLs

Name
IP
Malicious
https://github.com/asweigart/pyperclip/issues/55
unknown
https://github.com/pyca/cryptography/issues/8996
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot8198088572:AAHwnTyia_2pAX94h0pkYLAjGks3YjPwP0M/sendMessage
unknown
https://github.com/mhammond/pywin32
unknown
http://repository.swisssign.com/0
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/pyca/cryptography/actions?query=workflow%3ACI
unknown
https://packaging.python.org/en/latest/specifications/recording-installed-packages/#the-record-file
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://www.apache.org/licenses/LICENSE-2.0
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://packaging.python.org/en/latest/specifications/entry-points/#file-format
unknown
http://crl.dhimyotis.com/certignarootca.crlI
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
http://cacerts.digi
unknown
http://repository.swisssign.com/L
unknown
http://crl.xrampsecurity.com/XGCA.crlR
unknown
https://peps.python.org/pep-0205/
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://ocsp.accv.es
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://httpbin.org/get
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://httpbin.org/
unknown
https://www.apache.org/licenses/
unknown
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
unknown
https://wwww.certigna.fr/autorites/
unknown
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://cryptography.io/en/latest/installation/
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://packaging.python.org/en/latest/specifications/core-metadata/#core-metadata
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://wwwsearch.sf.net/):
unknown
https://github.com/python/importlib_metadata/wiki/Development-Methodology
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.accv.es/legislacion_c.htm
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://cryptography.io/en/latest/security/
unknown
https://cffi.readthedocs.io/en/latest/using.html#callbacks
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://google.com/mail
unknown
https://packaging.python.org/specifications/entry-points/
unknown
http://www.accv.es00
unknown
https://www.python.org/psf/license/)
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://github.com/pyca/cryptography/issues
unknown
https://readthedocs.org/projects/cryptography/badge/?version=latest
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
http://ocsp.accv.est
unknown
https://mahler:8092/site-updates.py
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://.../back.jpeg
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://github.com/pyca/cryptography
unknown
https://cryptography.io/
unknown
https://httpbin.org/post
unknown
https://pyperclip.readthedocs.io/en/latest/index.html#not-implemented-error
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
https://github.com/pyca/cryptography/
unknown
https://github.com/Ousret/charset_normalizer
unknown
http://www.firmaprofesional.com/cps0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://yahoo.com/
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://html.spec.whatwg.org/multipage/
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
unknown
https://cryptography.io/en/latest/changelog/
unknown
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
unknown
https://github.com/pyca/cryptography/issues/9253
unknown
https://mail.python.org/mailman/listinfo/cryptography-dev
unknown
https://requests.readthedocs.io
unknown
http://repository.swisssign.com/
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://www.python.org
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
http://crl.dhimyotis.com/certignarootca.crlh
unknown
http://www.accv.es/legislacion_c.htm0U
unknown
http://ocsp.accv.es0
unknown
https://www.python.org/
unknown
https://json.org
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
1E957750000
heap
page read and write
7FFDA4637000
unkown
page read and write
1F847394000
heap
page read and write
1F8483DC000
heap
page read and write
7FFD94250000
unkown
page readonly
7FFDA3FD5000
unkown
page readonly
1F8476D3000
heap
page read and write
1F847EE6000
heap
page read and write
1F84778E000
heap
page read and write
1F847244000
heap
page read and write
1F84770C000
heap
page read and write
7FF71577B000
unkown
page readonly
7FFDA3671000
unkown
page execute read
7FFD9479E000
unkown
page write copy
7FFD948B0000
unkown
page readonly
1F847BF5000
heap
page read and write
1F847D16000
heap
page read and write
1F8476EA000
heap
page read and write
1F84743E000
heap
page read and write
1F847404000
heap
page read and write
7FFDA36E3000
unkown
page readonly
1F84740C000
heap
page read and write
7FFD93D60000
unkown
page readonly
1F84741D000
heap
page read and write
7FFD9F3DE000
unkown
page read and write
1F847442000
heap
page read and write
7FFDA4330000
unkown
page readonly
7FFDA54B6000
unkown
page readonly
1F847C78000
heap
page read and write
1F845728000
heap
page read and write
1F8473F4000
heap
page read and write
1F84740C000
heap
page read and write
1F8476CB000
heap
page read and write
1F84741C000
heap
page read and write
1F847D26000
heap
page read and write
1F84740C000
heap
page read and write
1F8476D1000
heap
page read and write
1F848C10000
direct allocation
page read and write
7FFD9421E000
unkown
page read and write
1E955DF1000
heap
page read and write
1E955DE4000
heap
page read and write
7FFDA5B81000
unkown
page execute read
1E955DE9000
heap
page read and write
1F8476F8000
heap
page read and write
7FFDA4638000
unkown
page readonly
1F847EC9000
heap
page read and write
7FFD947C6000
unkown
page read and write
7FF715750000
unkown
page readonly
7FFD9479D000
unkown
page read and write
1F8477A6000
heap
page read and write
7FFD94270000
unkown
page readonly
7FFD94555000
unkown
page readonly
1E955DE3000
heap
page read and write
7FFD94796000
unkown
page write copy
7FFD9F3E1000
unkown
page readonly
1E955DE4000
heap
page read and write
1F847C88000
heap
page read and write
7FFDA4DA1000
unkown
page execute read
7FFD94525000
unkown
page readonly
7FFD93D57000
unkown
page readonly
1F847CA7000
heap
page read and write
1E955DE4000
heap
page read and write
1F84741B000
heap
page read and write
1E955DE4000
heap
page read and write
7FFDA3625000
unkown
page readonly
1E955DF1000
heap
page read and write
1F847398000
heap
page read and write
7FFD93D82000
unkown
page execute read
1E955DE9000
heap
page read and write
7FFDA5B89000
unkown
page readonly
7FFDA36EB000
unkown
page read and write
1E955DEB000
heap
page read and write
7FFDA5B80000
unkown
page readonly
1F847E6B000
heap
page read and write
7FFDA36B7000
unkown
page readonly
7FFD9486B000
unkown
page read and write
7FF715750000
unkown
page readonly
1F84776D000
heap
page read and write
7FFDA4DA3000
unkown
page readonly
7FFD93CB1000
unkown
page execute read
7FF715751000
unkown
page execute read
7FF71577B000
unkown
page readonly
7FFD94882000
unkown
page read and write
7FFD93D72000
unkown
page execute read
7FFD945A1000
unkown
page readonly
1F847403000
heap
page read and write
7FFDA46D0000
unkown
page readonly
1F847411000
heap
page read and write
7FFDA36A0000
unkown
page readonly
1E955DC8000
heap
page read and write
1F847B90000
heap
page read and write
7FFD93FEE000
unkown
page execute read
1F8481A0000
direct allocation
page read and write
1F847CCA000
heap
page read and write
1F847413000
heap
page read and write
7FFDA5461000
unkown
page execute read
1F84736E000
heap
page read and write
1F8473D8000
heap
page read and write
7FFDA3541000
unkown
page execute read
1F847F36000
heap
page read and write
1F848D78000
direct allocation
page read and write
7FFD93CB0000
unkown
page readonly
1F84770C000
heap
page read and write
7FFD93D08000
unkown
page readonly
1E955DE4000
heap
page read and write
1E955DF1000
heap
page read and write
7FFDA3658000
unkown
page readonly
1F847990000
direct allocation
page read and write
1F848D28000
direct allocation
page read and write
1E955DE0000
heap
page read and write
1F84772E000
heap
page read and write
1F847411000
heap
page read and write
836ADAF000
stack
page read and write
1F8477B8000
heap
page read and write
1F847CB9000
heap
page read and write
1F847403000
heap
page read and write
1F8476AE000
heap
page read and write
1F8473DE000
heap
page read and write
7FFDA36BB000
unkown
page readonly
1F847D46000
heap
page read and write
7FFDA5490000
unkown
page readonly
1E955DF2000
heap
page read and write
1F847ED6000
heap
page read and write
7FFDA3FD1000
unkown
page execute read
7FFDA5479000
unkown
page read and write
1F847A90000
direct allocation
page read and write
7FFDA36C3000
unkown
page readonly
1E955DEB000
heap
page read and write
1F847C6F000
heap
page read and write
1F848CE0000
direct allocation
page read and write
1F847434000
heap
page read and write
1E955DE4000
heap
page read and write
1F8477FB000
heap
page read and write
7FFDA547A000
unkown
page readonly
1F848CBC000
direct allocation
page read and write
1F847EE6000
heap
page read and write
6FE79BA000
stack
page read and write
7FF715750000
unkown
page readonly
1F8473BC000
heap
page read and write
7FFD94870000
unkown
page read and write
6FE79BD000
stack
page read and write
7FFDA4DA0000
unkown
page readonly
7FF71578E000
unkown
page write copy
1F847124000
direct allocation
page read and write
1F84776D000
heap
page read and write
7FF71578E000
unkown
page read and write
1F847D58000
heap
page read and write
1F8477F8000
heap
page read and write
7FF715794000
unkown
page readonly
7FFD94670000
unkown
page readonly
7FFDA46D4000
unkown
page readonly
1F84741C000
heap
page read and write
7FFDA5496000
unkown
page readonly
1F848D70000
direct allocation
page read and write
1F847403000
heap
page read and write
1F847690000
heap
page read and write
7FFD9F3C1000
unkown
page execute read
1E955DE4000
heap
page read and write
1F847433000
heap
page read and write
1E955DE4000
heap
page read and write
1F8476C5000
heap
page read and write
1E9578B0000
heap
page read and write
6FE73DF000
stack
page read and write
7FFDA3691000
unkown
page read and write
1F8473C0000
heap
page read and write
7FFDA4171000
unkown
page read and write
1F847D8F000
heap
page read and write
1F8471A0000
direct allocation
page read and write
7FFD9486D000
unkown
page read and write
7FFDA4DA5000
unkown
page read and write
1F84573D000
heap
page read and write
1F848474000
heap
page read and write
1E955DA0000
heap
page read and write
7FF715750000
unkown
page readonly
7FFD941AA000
unkown
page readonly
7FFDA54B3000
unkown
page readonly
1F8482A0000
direct allocation
page read and write
1E955DE4000
heap
page read and write
7FFD93E0C000
unkown
page execute read
7FFDA54B5000
unkown
page read and write
1F848D4C000
direct allocation
page read and write
1F8476BF000
heap
page read and write
7FFD93CB6000
unkown
page readonly
1F84740C000
heap
page read and write
1E955DE4000
heap
page read and write
7FFD93DD2000
unkown
page execute read
1E955DE4000
heap
page read and write
1F848D74000
direct allocation
page read and write
7FFD93DFE000
unkown
page execute read
1F84741B000
heap
page read and write
1F847795000
heap
page read and write
7FFDA369A000
unkown
page readonly
1F8473F4000
heap
page read and write
1F8476CF000
heap
page read and write
7FFDA3585000
unkown
page readonly
7FFD9479B000
unkown
page read and write
7FFDA3571000
unkown
page execute read
1F8476FF000
heap
page read and write
1F847719000
heap
page read and write
1F84783C000
heap
page read and write
1F84770C000
heap
page read and write
1F847F25000
heap
page read and write
7FFDA364D000
unkown
page read and write
1F8480A0000
direct allocation
page read and write
1F848E40000
direct allocation
page read and write
1F8473F6000
heap
page read and write
7FFD94546000
unkown
page readonly
1E955DE4000
heap
page read and write
1F847378000
heap
page read and write
1F8477A6000
heap
page read and write
1E955DEB000
heap
page read and write
7FFD9477F000
unkown
page read and write
7FFDA355F000
unkown
page read and write
1E955DF2000
heap
page read and write
1F848D40000
direct allocation
page read and write
7FFDA3FD9000
unkown
page readonly
1F848D3C000
direct allocation
page read and write
1F84740C000
heap
page read and write
7FFDA3540000
unkown
page readonly
7FFDA367E000
unkown
page readonly
1F8476CC000
heap
page read and write
1F847412000
heap
page read and write
1F847411000
heap
page read and write
1F8476D4000
heap
page read and write
7FFD93D5C000
unkown
page readonly
1E955DE4000
heap
page read and write
1E955DE4000
heap
page read and write
1F847250000
direct allocation
page read and write
7FF715751000
unkown
page execute read
7FFD93DF7000
unkown
page execute read
1F8473F6000
heap
page read and write
1F847433000
heap
page read and write
1F848405000
heap
page read and write
7FFD9479C000
unkown
page write copy
1F847890000
direct allocation
page read and write
1F847433000
heap
page read and write
1F8477A6000
heap
page read and write
7FFDA3652000
unkown
page readonly
1F848D2C000
direct allocation
page read and write
1F847D46000
heap
page read and write
7FF715791000
unkown
page read and write
1F847D26000
heap
page read and write
1F847852000
heap
page read and write
1F8456B0000
heap
page read and write
7FFDA3FD0000
unkown
page readonly
1F8473A8000
heap
page read and write
1F84741F000
heap
page read and write
1E955DF1000
heap
page read and write
1F8473CB000
heap
page read and write
7FFD9F3C0000
unkown
page readonly
7FFDA4161000
unkown
page execute read
836A5E7000
stack
page read and write
7FF715794000
unkown
page readonly
7FFD93DE7000
unkown
page execute read
7FFD93C8D000
unkown
page read and write
1F848D38000
direct allocation
page read and write
1F84741B000
heap
page read and write
7FFD94112000
unkown
page readonly
1E955DE4000
heap
page read and write
1E955DE4000
heap
page read and write
1F847403000
heap
page read and write
7FFD94843000
unkown
page readonly
7FFD93BF1000
unkown
page execute read
1F847D26000
heap
page read and write
1F847ED6000
heap
page read and write
7FF715794000
unkown
page readonly
1F84741B000
heap
page read and write
1F848D7C000
direct allocation
page read and write
1E955DE7000
heap
page read and write
1F847864000
heap
page read and write
1F847826000
heap
page read and write
7FFD947C4000
unkown
page read and write
7FFDA3FD8000
unkown
page read and write
1F8473F6000
heap
page read and write
1F847BA9000
heap
page read and write
1F84740C000
heap
page read and write
1F8476CF000
heap
page read and write
1E955DE7000
heap
page read and write
1F8473F6000
heap
page read and write
1E955DF2000
heap
page read and write
7FFDA5474000
unkown
page readonly
7FFD93CFA000
unkown
page readonly
1E955DC0000
heap
page read and write
836A5E3000
stack
page read and write
1F847C90000
heap
page read and write
1F8473D8000
heap
page read and write
6FE7D9E000
stack
page read and write
1F847ED6000
heap
page read and write
1F84786A000
heap
page read and write
1F84770C000
heap
page read and write
7FFDA46D2000
unkown
page readonly
1F8456F0000
heap
page read and write
7FF715751000
unkown
page execute read
7FFD94871000
unkown
page write copy
836ABBE000
stack
page read and write
1E955DF1000
heap
page read and write
7FFD9414F000
unkown
page readonly
7FFDA4341000
unkown
page read and write
1F84770C000
heap
page read and write
1F847D38000
heap
page read and write
7FFD9486F000
unkown
page write copy
7FFDA36D0000
unkown
page readonly
1E955DE4000
heap
page read and write
7FFDA35A1000
unkown
page execute read
1F847411000
heap
page read and write
1F847411000
heap
page read and write
1E955DE9000
heap
page read and write
1F84772E000
heap
page read and write
1F848BD0000
direct allocation
page read and write
1F84573B000
heap
page read and write
7FFDA54B1000
unkown
page execute read
1F847D2E000
heap
page read and write
1E955DE4000
heap
page read and write
7FFD93D61000
unkown
page execute read
7FFDA35A0000
unkown
page readonly
1F847433000
heap
page read and write
7FFD9421B000
unkown
page write copy
1F8476B8000
heap
page read and write
1F84779A000
heap
page read and write
1F847EDD000
heap
page read and write
1F8457B7000
heap
page read and write
1E955DE9000
heap
page read and write
1E955DE4000
heap
page read and write
7FFDA4173000
unkown
page readonly
1F847D46000
heap
page read and write
1F847758000
heap
page read and write
7FFD9421D000
unkown
page write copy
1E955DE4000
heap
page read and write
1E955DE5000
heap
page read and write
7FFDA4DA6000
unkown
page readonly
1F8473F6000
heap
page read and write
1E955DE4000
heap
page read and write
1E955DF2000
heap
page read and write
7FFDA433D000
unkown
page readonly
1F8473F6000
heap
page read and write
1F84779A000
heap
page read and write
7FFDA36A1000
unkown
page execute read
7FFD93D88000
unkown
page execute read
7FFD941E9000
unkown
page readonly
1F84840D000
heap
page read and write
7FFD94271000
unkown
page execute read
1F84740C000
heap
page read and write
1F847D2E000
heap
page read and write
1F8473C8000
heap
page read and write
1F84864A000
heap
page read and write
7FFDA36D1000
unkown
page execute read
1F8483D1000
heap
page read and write
1E955DE9000
heap
page read and write
1E955DE4000
heap
page read and write
7FFDA3670000
unkown
page readonly
1F8483E0000
heap
page read and write
1F847403000
heap
page read and write
1F8477E9000
heap
page read and write
7FFDA3562000
unkown
page readonly
1E955DE7000
heap
page read and write
1F8473C6000
heap
page read and write
1F84740C000
heap
page read and write
1F8476A5000
heap
page read and write
1E957770000
heap
page read and write
1F847403000
heap
page read and write
1F8471B0000
unkown
page readonly
1F847D58000
heap
page read and write
7FFDA5460000
unkown
page readonly
1F84770C000
heap
page read and write
7FFDA3698000
unkown
page read and write
7FFD947CE000
unkown
page read and write
1F8456C0000
heap
page read and write
1F847765000
heap
page read and write
7FFDA3660000
unkown
page readonly
1F847407000
heap
page read and write
1F84736B000
heap
page read and write
1E955DE7000
heap
page read and write
1F848405000
heap
page read and write
1F847F36000
heap
page read and write
1F845809000
heap
page read and write
1F847403000
heap
page read and write
7FFDA4160000
unkown
page readonly
1F847411000
heap
page read and write
1F8476CC000
heap
page read and write
1E955DE4000
heap
page read and write
6FE817E000
stack
page read and write
7FFD94873000
unkown
page read and write
1F848513000
heap
page read and write
7FFDA3570000
unkown
page readonly
1F847411000
heap
page read and write
1F8477F8000
heap
page read and write
7FFDA54B0000
unkown
page readonly
7FFD93C8C000
unkown
page write copy
7FFD93BF0000
unkown
page readonly
1F84776D000
heap
page read and write
1F847590000
direct allocation
page read and write
1E955DE4000
heap
page read and write
7FF715794000
unkown
page readonly
1E955DE4000
heap
page read and write
1F8477A6000
heap
page read and write
1E955DE3000
heap
page read and write
7FFDA4631000
unkown
page execute read
1F847D38000
heap
page read and write
1F84740C000
heap
page read and write
1E955DE4000
heap
page read and write
1F847CA2000
heap
page read and write
1F847411000
heap
page read and write
7FFD93D5A000
unkown
page read and write
1F847403000
heap
page read and write
1F8473F6000
heap
page read and write
7FFDA358F000
unkown
page readonly
7FFDA4630000
unkown
page readonly
1F84740C000
heap
page read and write
7FFDA4634000
unkown
page readonly
836A5ED000
stack
page read and write
1F84770C000
heap
page read and write
1F848BDC000
direct allocation
page read and write
1E955DE4000
heap
page read and write
1F84741B000
heap
page read and write
1F848C38000
direct allocation
page read and write
1F847791000
heap
page read and write
7FFD9F3D3000
unkown
page readonly
7FFDA549D000
unkown
page readonly
7FFDA358B000
unkown
page read and write
1F8476A5000
heap
page read and write
1E955DEB000
heap
page read and write
1F8473F6000
heap
page read and write
1F847240000
heap
page read and write
1F84741B000
heap
page read and write
7FFD9480F000
unkown
page read and write
1F847F90000
direct allocation
page read and write
1F84741B000
heap
page read and write
7FF71577B000
unkown
page readonly
1F84741B000
heap
page read and write
1F8473CE000
heap
page read and write
7FFDA3551000
unkown
page readonly
1F845720000
heap
page read and write
1E955DE4000
heap
page read and write
1F848D20000
direct allocation
page read and write
1F847756000
heap
page read and write
1F847D0A000
heap
page read and write
1E955DE3000
heap
page read and write
1F84770C000
heap
page read and write
1F84771D000
heap
page read and write
1F847D07000
heap
page read and write
1F84785A000
heap
page read and write
7FFDA36EE000
unkown
page readonly
7FFD93C81000
unkown
page read and write
1F84770C000
heap
page read and write
7FFD940D9000
unkown
page execute read
1F8477E5000
heap
page read and write
1F8470A0000
direct allocation
page read and write
6FE7F8E000
stack
page read and write
1E955DE4000
heap
page read and write
1F84744A000
heap
page read and write
7FFDA36C2000
unkown
page read and write
1F8473F6000
heap
page read and write
1F847EDD000
heap
page read and write
7FF715792000
unkown
page read and write
7FFDA4331000
unkown
page execute read
1E955F90000
heap
page read and write
1F84741B000
heap
page read and write
7FFD93C96000
unkown
page readonly
1F847EE6000
heap
page read and write
1E955DEB000
heap
page read and write
1F847F12000
heap
page read and write
1E955DE4000
heap
page read and write
7FFDA549B000
unkown
page read and write
7FFD9421C000
unkown
page read and write
1F848C70000
direct allocation
page read and write
1E9578B5000
heap
page read and write
1F848C44000
direct allocation
page read and write
1F84744A000
heap
page read and write
1F847411000
heap
page read and write
1F847691000
heap
page read and write
1F847705000
heap
page read and write
1F847C50000
heap
page read and write
7FFDA4169000
unkown
page readonly
1F848EC0000
heap
page read and write
1F847403000
heap
page read and write
1F847691000
heap
page read and write
7FF71577B000
unkown
page readonly
1F8473EC000
heap
page read and write
7FF715751000
unkown
page execute read
1F847D58000
heap
page read and write
7FFD94678000
unkown
page readonly
1E955DF1000
heap
page read and write
7FF71578E000
unkown
page write copy
7FFD94222000
unkown
page readonly
7FFDA5B86000
unkown
page readonly
7FFDA3623000
unkown
page execute read
7FF71578E000
unkown
page read and write
1F847768000
heap
page read and write
1F847D38000
heap
page read and write
1F8477E0000
heap
page read and write
7FFDA46D1000
unkown
page execute read
1F847769000
heap
page read and write
1E955DE4000
heap
page read and write
1F847D29000
heap
page read and write
7FFDA3692000
unkown
page write copy
1F847D2E000
heap
page read and write
1E955DE3000
heap
page read and write
1F847D7D000
heap
page read and write
1E955DF2000
heap
page read and write
7FFD93C4E000
unkown
page readonly
1F848C6C000
direct allocation
page read and write
7FFDA4342000
unkown
page readonly
1F8483D0000
heap
page read and write
7FFD94254000
unkown
page readonly
1F847434000
heap
page read and write
1F8477BB000
heap
page read and write
1F847CB9000
heap
page read and write
1F847768000
heap
page read and write
1F848D80000
direct allocation
page read and write
1F847350000
heap
page read and write
1F84778E000
heap
page read and write
7FFDA5491000
unkown
page execute read
1F84736B000
heap
page read and write
1F847799000
heap
page read and write
7FFD9455F000
unkown
page readonly
7FFD940DB000
unkown
page readonly
1F848D50000
direct allocation
page read and write
1E955DDF000
heap
page read and write
There are 508 hidden memdumps, click here to show them.