IOC Report
SecuriteInfo.com.Gen.Variant.Lazy.564550.16803.23255.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Gen.Variant.Lazy.564550.16803.23255.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\phylum-ci.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\vcruntime140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\zstandard\_cffi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\zstandard\backend_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_cffi_backend.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_ruamel_yaml.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\charset_normalizer\md.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\charset_normalizer\md__mypyc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\phylum\exts\ci\PhylumExt.toml
ASCII text
dropped
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\phylum\exts\ci\main.ts
Java source, ASCII text
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Lazy.564550.16803.23255.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Lazy.564550.16803.23255.exe"
malicious
C:\Users\user\AppData\Local\phylum-ci\0.51.0-122\phylum-ci.exe
C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Lazy.564550.16803.23255.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"

URLs

Name
IP
Malicious
https://python-poetry.org/
unknown
https://github.com/jack1142
unknown
https://github.com/pyca/cryptography/issues/8996
unknown
https://img.shields.io/badge/code%20style-black-000000.svg)
unknown
https://example.org?foo=bar#header
unknown
https://github.com/bzakdd
unknown
https://docs.phylum.io/phylum-ci/git_precommit
unknown
https://github.com/highb
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
https://httpwg.org/specs/rfc9113.html#n-field-validity)
unknown
https://github.com/029xue
unknown
https://github.com/urllib3/urllib3/issues/2168
unknown
https://bitbucket.org/davidfraser/pyyaml/commits/d81df6eb95f20cac4a79eed95ae553b5c6f77b8c
unknown
https://requests.readthedocs.io$
unknown
https://support.atlassian.com/bitbucket-cloud/docs/git-clone-behavior/uFind
unknown
https://developer.atlassian.com/cloud/bitbucket/rest/intro/#repository-object-and-uuid
unknown
https://pygments.org/styles/
unknown
https://github.com/primer/primitives
unknown
https://api.staging.phylum.io
unknown
https://www.jenkins.io/doc/
unknown
https://github.com/phylum-dev/phylum-ci/releases/latest/download/phylum-ci.zip
unknown
https://requests.readthedocs.ioa__url__u2.32.3a__version__l
unknown
https://docs.github.com/developers/apps/building-oauth-apps/scopes-for-oauth-apps#available-scopes
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://github.com/pypa/packaging
unknown
https://raw.githubusercontent.com/phylum-dev/cli/main/scripts/signing-key.pub
unknown
https://refspecs.linuxfoundation.org/elf/gabi4
unknown
https://docs.python.org/X.Y/library/
unknown
https://docs.phylum.io/phylum-ci/azure_pipelines
unknown
https://docs.python.org/
unknown
https://github.com/phylum-dev/phylum-ci/issues
unknown
https://github.com/oprypin
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://github.com/WPDOrdina
unknown
https://docs.github.com/rest/overview/permissions-required-for-fine-grained-personal-access-tokens
unknown
https://github.com/phylum-dev/phylum-ci
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://speleotrove.com/decimal/decarith.html
unknown
http://repository.swisssign.com/S
unknown
https://atom.io/themes/one-dark-ui).
unknown
https://phylum.io/
unknown
https://github.com/urllib3/urllib3/issues/3020
unknown
https://pre-commit.com/index.html#creating-new-hooks
unknown
https://docs.phylum.io/cli/lockfile_generationaDepfileaDepfileTypeaLOCKIFESTuProvided
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#socks-proxies
unknown
http://yaml.org/type/merge.html
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/actions/checkout/issues/766
unknown
https://github.com/ghickman
unknown
https://phylum.io/pricing
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://docs.phylum.io/phylum-ci/jenkins
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://www.jenkins.io/doc/book/pipeline/multibranch/#supporting-pull-requests
unknown
https://api.github.com/repos/phylum-dev/cli/releases/tags/
unknown
https://httpbin.org/
unknown
https://github.com/KOLANICH
unknown
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
unknown
https://github.com/material-theme/vsc-material-theme
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
https://github.com/actions/checkoutadepfilesuPredicate
unknown
https://github.com/pypa/packagingz
unknown
https://example.org/a__doc__a__file__a__spec__aoriginahas_locationa__cached__areastate_inlineT
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://www.jenkins.io/doc/pipeline/steps/credentials-binding/adepfilesuPredicate
unknown
https://api.github.com/repos/phylum-dev/cli/releases/latestuGet
unknown
https://git-scm.com/docs/gitignore#_pattern_format
unknown
http://crl.securetrust.com/STCA.crl
unknown
https://api.github.com/repos/phylum-dev/cli/releases/tags/aassetsT
unknown
https://docs.github.com/authentication/keeping-your-account-and-data-secure/creating-a-personal-acce
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
https://github.com/jdufresne
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://github.com/kloczek
unknown
http://www.cert.fnmt.es/dpcs/
unknown
http://pyyaml.org/wiki/YAMLColonInFlowContext
unknown
https://developer.atlassian.com/cloud/bitbucket/rest/intro/#pullrequest
unknown
https://img.shields.io/github/issues/phylum-dev/phylum-ci)
unknown
https://google.com/mail
unknown
http://www.accv.es00
unknown
https://www.willmcgugan.com
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
https://github.com/pyca/cryptography/issues
unknown
https://rich.readthedocs.io/en/latest/group.html
unknown
http://repository.swisssign.com/?)
unknown
https://developer.atlassian.com/cloud/bitbucket/rest/intro/#filtering
unknown
https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-a
unknown
https://git-scm.com/docs/git-show-ref
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
https://developer.atlassian.com/cloud/bitbucket/rest/intro/#access-tokens
unknown
https://mahler:8092/site-updates.py
unknown
http://127.0.0.1:8080z
unknown
https://github.com/adrienverge
unknown
https://semver.org/spec/v2.0.0.html).
unknown
https://cdnjs.cloudflare.com/ajax/libs/firacode/6.2.0/woff/FiraCode-Regular.woff
unknown
https://img.shields.io/discord/1070071012353376387?logo=discord)
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://github.com/phylum-dev/phylum-ci/actions
unknown
http://www.firmaprofesional.com/cps0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.github.com
140.82.121.5

IPs

IP
Domain
Country
Malicious
140.82.121.5
api.github.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
260FEB30000
heap
page read and write
277CF85C000
heap
page read and write
277D18E3000
heap
page read and write
277D265C000
direct allocation
page read and write
7FF66EF6B000
unkown
page read and write
277D2130000
direct allocation
page read and write
277CF776000
heap
page read and write
277CF172000
heap
page read and write
22A5284D000
heap
page read and write
7FFDFACCC000
unkown
page execute read
277D1A2F000
heap
page read and write
277CF7E6000
heap
page read and write
7FF66EF76000
unkown
page readonly
807569F000
stack
page read and write
22A52422000
heap
page read and write
277D17D9000
heap
page read and write
277D2678000
direct allocation
page read and write
277D1720000
heap
page read and write
277CEA62000
heap
page read and write
277CF85C000
heap
page read and write
7FF66EF6D000
unkown
page read and write
7FF66F976000
unkown
page readonly
7FFDFAC21000
unkown
page execute read
7FFDFAC20000
unkown
page readonly
7FFE126E1000
unkown
page execute read
277CF66C000
heap
page read and write
277D1ADD000
heap
page read and write
7FFDFAEAE000
unkown
page execute read
277CEA62000
heap
page read and write
22A520AF000
heap
page read and write
277CF7A2000
heap
page read and write
7FFE10301000
unkown
page execute read
7FFDFAC14000
unkown
page readonly
7FFE0E180000
unkown
page read and write
277D17B3000
heap
page read and write
277CF779000
heap
page read and write
277D2340000
direct allocation
page read and write
277D187F000
heap
page read and write
277CEA6B000
heap
page read and write
7FFE0CFB0000
unkown
page readonly
277D186E000
heap
page read and write
7FFDFB0DE000
unkown
page read and write
277CF7F5000
heap
page read and write
7FFDFACBE000
unkown
page execute read
7FFE012D0000
unkown
page readonly
277CF5DD000
heap
page read and write
277D1758000
heap
page read and write
7FFE1030E000
unkown
page readonly
277CF7A4000
heap
page read and write
277D18AB000
heap
page read and write
277D1A0F000
heap
page read and write
277CF077000
heap
page read and write
277D172E000
heap
page read and write
7FFDFB764000
unkown
page write copy
7FFE0EB30000
unkown
page readonly
277CF7E3000
heap
page read and write
277D2388000
direct allocation
page read and write
7FFDFB7F9000
unkown
page readonly
7FFDFB0DD000
unkown
page write copy
7FFDFB762000
unkown
page read and write
7FFDFB0E2000
unkown
page readonly
277CF528000
heap
page read and write
277D1AC4000
heap
page read and write
277CF03E000
heap
page read and write
22A5027A000
heap
page read and write
7FFE11EE4000
unkown
page readonly
7FFE101D0000
unkown
page readonly
7FFE1030C000
unkown
page read and write
277D254C000
direct allocation
page read and write
277D19E7000
heap
page read and write
7FFDFB114000
unkown
page readonly
7FFDFB823000
unkown
page read and write
277D1AE3000
heap
page read and write
7FF66EF67000
unkown
page read and write
22A4E60B000
heap
page read and write
22A4E5A0000
heap
page read and write
277D17C1000
heap
page read and write
7FFDFB525000
unkown
page readonly
277CF8B3000
heap
page read and write
277CF697000
heap
page read and write
277D1A35000
heap
page read and write
7FF66EF20000
unkown
page readonly
7FF66EF42000
unkown
page readonly
277CF899000
heap
page read and write
7FFE0134E000
unkown
page readonly
277CF777000
heap
page read and write
7FF66EF51000
unkown
page write copy
807275D000
stack
page read and write
277D1A82000
heap
page read and write
7FFDFAB00000
unkown
page readonly
277D17B3000
heap
page read and write
22A51BBC000
heap
page read and write
7FFE11527000
unkown
page read and write
277CECD5000
heap
page read and write
7FFE12E16000
unkown
page readonly
277D19E4000
heap
page read and write
277D1620000
direct allocation
page read and write
22A528AD000
heap
page read and write
7FFDFA370000
unkown
page readonly
277CF60A000
heap
page read and write
7FFDFACA7000
unkown
page execute read
22A4E5C5000
heap
page read and write
277CF8B6000
heap
page read and write
277D175C000
heap
page read and write
22A51BAC000
heap
page read and write
277D1745000
heap
page read and write
7FFE0134B000
unkown
page read and write
277D26B4000
direct allocation
page read and write
277CF6BC000
heap
page read and write
277D1A82000
heap
page read and write
277CF6BC000
heap
page read and write
277D1A33000
heap
page read and write
7FFDFAB01000
unkown
page execute read
7FF66EF20000
unkown
page readonly
277CEA6E000
heap
page read and write
277CECC0000
heap
page read and write
277CF033000
heap
page read and write
7FFDFB88E000
unkown
page readonly
22A50C7A000
heap
page read and write
7FFE126D1000
unkown
page read and write
277D25F4000
direct allocation
page read and write
7FFE101D1000
unkown
page execute read
277D1873000
heap
page read and write
277CF0C0000
heap
page read and write
277CE940000
heap
page read and write
7FFE0EB5A000
unkown
page readonly
277D2584000
direct allocation
page read and write
277CF690000
heap
page read and write
277D176C000
heap
page read and write
277D269C000
direct allocation
page read and write
277CED74000
heap
page read and write
277CF749000
heap
page read and write
7FFDFB7EF000
unkown
page read and write
260FE94A000
heap
page read and write
7FFE0E183000
unkown
page readonly
7FF7E417A000
unkown
page read and write
7FFDFA917000
unkown
page readonly
277CF60A000
heap
page read and write
7FF7E40E2000
unkown
page readonly
7FFE10255000
unkown
page readonly
7FFDFAC92000
unkown
page execute read
7FFE11BB1000
unkown
page execute read
7FFDFB5F0000
unkown
page readonly
277D2694000
direct allocation
page read and write
277CF60E000
heap
page read and write
7FFE10241000
unkown
page execute read
277CEA62000
heap
page read and write
277D1721000
heap
page read and write
7FFDFB88D000
unkown
page read and write
277D187D000
heap
page read and write
277CECB4000
heap
page read and write
7FFE11501000
unkown
page execute read
277CF16D000
heap
page read and write
277CEA29000
heap
page read and write
7FFE126FA000
unkown
page readonly
277D18C1000
heap
page read and write
277CF6BC000
heap
page read and write
22A4E5AE000
heap
page read and write
277D19D6000
heap
page read and write
277D1A2F000
heap
page read and write
7FF7E4135000
unkown
page read and write
D6704FF000
stack
page read and write
277D19D4000
heap
page read and write
22A52801000
heap
page read and write
277D1745000
heap
page read and write
7FFDFAC12000
unkown
page read and write
7FFE11BB9000
unkown
page readonly
277D176A000
heap
page read and write
7FF7E417F000
unkown
page readonly
7FFDFB200000
unkown
page readonly
7FFE126F4000
unkown
page readonly
277CE960000
direct allocation
page read and write
277CF74E000
heap
page read and write
277D2288000
direct allocation
page read and write
277D2810000
heap
page read and write
7FFE11521000
unkown
page write copy
277CEA00000
heap
page read and write
277CF7C8000
heap
page read and write
7FFE11ED7000
unkown
page readonly
277D2030000
direct allocation
page read and write
277D22BC000
direct allocation
page read and write
277CF7FE000
heap
page read and write
7FF7E3261000
unkown
page execute read
277D186F000
heap
page read and write
22A523AD000
heap
page read and write
277CEA32000
heap
page read and write
7FFE0133F000
unkown
page readonly
7FFE148E5000
unkown
page read and write
277D174C000
heap
page read and write
7FFDFAA9D000
unkown
page read and write
277CF60B000
heap
page read and write
277CF7B6000
heap
page read and write
22A51B37000
heap
page read and write
277D2450000
direct allocation
page read and write
22A51FAE000
heap
page read and write
7FFDFB1DD000
unkown
page read and write
807697F000
stack
page read and write
7FFE12E11000
unkown
page execute read
7FFE0E141000
unkown
page execute read
7FF7E3C61000
unkown
page execute read
277CF801000
heap
page read and write
277D18AA000
heap
page read and write
277D1ACC000
heap
page read and write
277CF529000
heap
page read and write
22A51B97000
heap
page read and write
7FF7E3C61000
unkown
page execute read
277CF74B000
heap
page read and write
7FF66EF63000
unkown
page read and write
277CF077000
heap
page read and write
277CF5AD000
heap
page read and write
277CF1C0000
direct allocation
page read and write
277D17A8000
heap
page read and write
277CF54D000
heap
page read and write
7FFE130C9000
unkown
page readonly
277CF505000
heap
page read and write
277CF6B6000
heap
page read and write
7FFE0EB69000
unkown
page write copy
277D173A000
heap
page read and write
807600E000
stack
page read and write
277D17FF000
heap
page read and write
7FFE11EDB000
unkown
page readonly
277CF755000
heap
page read and write
7FFE0E140000
unkown
page readonly
7FFDFA371000
unkown
page execute read
277D173A000
heap
page read and write
277D1808000
heap
page read and write
277D1A1B000
heap
page read and write
277CF79A000
heap
page read and write
277D18C6000
heap
page read and write
22A51F14000
heap
page read and write
277D2780000
direct allocation
page read and write
277D17E6000
heap
page read and write
7FFE1025F000
unkown
page readonly
277D25FC000
direct allocation
page read and write
7FFDFB00F000
unkown
page readonly
277D19E4000
heap
page read and write
277CF6AE000
heap
page read and write
7FFE126C1000
unkown
page execute read
277D2690000
direct allocation
page read and write
7FF66F976000
unkown
page readonly
277D176A000
heap
page read and write
7FF7E4156000
unkown
page read and write
277D1A33000
heap
page read and write
277CF752000
heap
page read and write
7FFE130C8000
unkown
page read and write
277D1A3A000
heap
page read and write
22A4E60B000
heap
page read and write
277D176C000
heap
page read and write
7FFDFB1E2000
unkown
page readonly
277CF05C000
heap
page read and write
7FFE10240000
unkown
page readonly
7FFE130C0000
unkown
page readonly
7FFE13300000
unkown
page readonly
277D18A4000
heap
page read and write
277D19E7000
heap
page read and write
277D187F000
heap
page read and write
7FFE12E10000
unkown
page readonly
277CF7D4000
heap
page read and write
7FF66EF69000
unkown
page read and write
277D17FE000
heap
page read and write
7FFDFB4AF000
unkown
page readonly
7FFDFAF9B000
unkown
page readonly
277D22A4000
direct allocation
page read and write
277CF786000
heap
page read and write
277CF6BC000
heap
page read and write
277CED93000
heap
page read and write
22A4E550000
heap
page read and write
22A52850000
heap
page read and write
277D1520000
direct allocation
page read and write
7FFE126F9000
unkown
page read and write
7FFDFABAE000
unkown
page readonly
7FFDFB7EA000
unkown
page write copy
277CF74D000
heap
page read and write
7FFDFAF99000
unkown
page execute read
277CF753000
heap
page read and write
277D19CD000
heap
page read and write
277D1A1B000
heap
page read and write
7FFE012D1000
unkown
page execute read
277D174C000
heap
page read and write
277D1A2B000
heap
page read and write
277CF009000
heap
page read and write
277CF7D0000
heap
page read and write
7FFE148E0000
unkown
page readonly
7FFE120C1000
unkown
page execute read
277CEA28000
heap
page read and write
D6703FF000
unkown
page read and write
7FFE0EB31000
unkown
page execute read
7FF66EF76000
unkown
page readonly
277CF0C0000
heap
page read and write
277D1ADD000
heap
page read and write
277CEDB1000
heap
page read and write
7FFDFB7E9000
unkown
page read and write
7FFDFB480000
unkown
page readonly
7FFE11EC0000
unkown
page readonly
277CF6E6000
heap
page read and write
7FFE11520000
unkown
page read and write
7FF7E4118000
unkown
page write copy
7FFE0EB6A000
unkown
page read and write
277CEA39000
heap
page read and write
7FFDFAC32000
unkown
page execute read
277D19D4000
heap
page read and write
22A5277E000
heap
page read and write
277CEA53000
heap
page read and write
7FFE10307000
unkown
page readonly
7FFE12E13000
unkown
page readonly
7FFDFB822000
unkown
page write copy
277CECCA000
heap
page read and write
277CF749000
heap
page read and write
277D17A8000
heap
page read and write
277D1A2B000
heap
page read and write
277CF3C0000
direct allocation
page read and write
277CEA50000
heap
page read and write
22A4E510000
heap
page read and write
277CF16D000
heap
page read and write
277CF852000
heap
page read and write
277CF7F4000
heap
page read and write
7FFDFAAAC000
unkown
page read and write
277CF6E6000
heap
page read and write
7FFDFAFD2000
unkown
page readonly
22A4E500000
heap
page read and write
277CF6E6000
heap
page read and write
277D19DA000
heap
page read and write
7FFE0EB68000
unkown
page read and write
277CF725000
heap
page read and write
7FFDFACB7000
unkown
page execute read
277CF696000
heap
page read and write
277D176A000
heap
page read and write
277D175C000
heap
page read and write
7FFDFB1F0000
unkown
page readonly
7FFDFAAB0000
unkown
page readonly
277CE99F000
heap
page read and write
7FFDFB783000
unkown
page read and write
277D19D6000
heap
page read and write
277CF078000
heap
page read and write
277D1758000
heap
page read and write
277D175F000
heap
page read and write
277D24F8000
direct allocation
page read and write
277D25DC000
direct allocation
page read and write
277CF564000
heap
page read and write
7FFE11EA9000
unkown
page readonly
7FFDFB201000
unkown
page execute read
277CF2C0000
direct allocation
page read and write
277CF83D000
heap
page read and write
277CF16D000
heap
page read and write
260FE940000
heap
page read and write
7FFDFAB05000
unkown
page readonly
7FFDFB0DB000
unkown
page write copy
7FFDFB761000
unkown
page write copy
277D19E7000
heap
page read and write
277D19D4000
heap
page read and write
7FFE11EA0000
unkown
page readonly
277D175F000
heap
page read and write
277D1758000
heap
page read and write
277CF564000
heap
page read and write
277D1873000
heap
page read and write
7FFDFB765000
unkown
page read and write
277D17E0000
heap
page read and write
80730DD000
stack
page read and write
7FFDFB0DC000
unkown
page read and write
22A520B1000
heap
page read and write
277D17B3000
heap
page read and write
7FFE130C5000
unkown
page readonly
7FFDFB130000
unkown
page readonly
277D174C000
heap
page read and write
7FFDFB7ED000
unkown
page read and write
7FFDFAC48000
unkown
page execute read
277CF80A000
heap
page read and write
277CF0C0000
heap
page read and write
277D26A8000
direct allocation
page read and write
277CF00A000
heap
page read and write
277D1886000
heap
page read and write
277CF725000
heap
page read and write
7FFDFB4A0000
unkown
page readonly
277CF564000
heap
page read and write
277CF7C7000
heap
page read and write
277CECCC000
heap
page read and write
7FFE11529000
unkown
page readonly
7FFDFAAA7000
unkown
page write copy
22A4E60B000
heap
page read and write
7FFDFB6F4000
unkown
page read and write
7FFDFB06A000
unkown
page readonly
277D2680000
direct allocation
page read and write
7FFE0134C000
unkown
page write copy
7FFE120C2000
unkown
page readonly
7FF7E3260000
unkown
page readonly
277CF6AE000
heap
page read and write
277CF726000
heap
page read and write
7FFE130C1000
unkown
page execute read
277CEEC0000
direct allocation
page read and write
277D17C1000
heap
page read and write
277CF5AF000
heap
page read and write
22A51BC9000
heap
page read and write
277D24E4000
direct allocation
page read and write
7FFE101E8000
unkown
page read and write
7FFE13307000
unkown
page read and write
277CE970000
heap
page read and write
277D1886000
heap
page read and write
7FFE12E15000
unkown
page read and write
277CEB60000
direct allocation
page read and write
277D181A000
heap
page read and write
7FFDFB81E000
unkown
page read and write
277D2580000
direct allocation
page read and write
22A51EA0000
heap
page read and write
8073A4E000
stack
page read and write
277CEFC0000
heap
page read and write
277D21C0000
direct allocation
page read and write
277CF894000
heap
page read and write
277CECD4000
heap
page read and write
277D188E000
heap
page read and write
277CF6B6000
heap
page read and write
277D17A8000
heap
page read and write
7FF7E3260000
unkown
page readonly
277CF68E000
heap
page read and write
7FFE11BB6000
unkown
page readonly
277CEA3A000
heap
page read and write
277D18A4000
heap
page read and write
277CF5DE000
heap
page read and write
22A51FDE000
heap
page read and write
7FFDFB1E8000
unkown
page readonly
277D26B0000
direct allocation
page read and write
277CED9A000
heap
page read and write
7FFE11EB1000
unkown
page read and write
277D181A000
heap
page read and write
277CF7C5000
heap
page read and write
277CF8C0000
direct allocation
page read and write
7FF7E417F000
unkown
page readonly
277CF811000
heap
page read and write
277CED9A000
heap
page read and write
7FFE11500000
unkown
page readonly
277D1808000
heap
page read and write
7FFE148E1000
unkown
page execute read
260FEB10000
heap
page read and write
277D19CD000
heap
page read and write
277D176C000
heap
page read and write
277CEA5C000
heap
page read and write
7FFE11EC1000
unkown
page execute read
7FFE148E6000
unkown
page readonly
277CF853000
heap
page read and write
277D2550000
unkown
page readonly
22A523A0000
heap
page read and write
7FFE101E1000
unkown
page readonly
277CEA2F000
heap
page read and write
7FFDFB7E6000
unkown
page write copy
277CEA62000
heap
page read and write
7FF66EF42000
unkown
page readonly
277CF076000
heap
page read and write
277CECB0000
heap
page read and write
277D26A4000
direct allocation
page read and write
277CF725000
heap
page read and write
277CF7D1000
heap
page read and write
7FFE0134D000
unkown
page read and write
7FFE0EB6B000
unkown
page readonly
260FE920000
heap
page read and write
7FFDFB1B3000
unkown
page execute read
277CEA00000
heap
page read and write
7FFE1150D000
unkown
page readonly
73808FE000
stack
page read and write
7FFE10300000
unkown
page readonly
277D181A000
heap
page read and write
7FFDFABB7000
unkown
page readonly
22A52020000
heap
page read and write
7FFE13308000
unkown
page readonly
7FFDFAC0F000
unkown
page readonly
277CF650000
heap
page read and write
277CF6B2000
heap
page read and write
277CF6B6000
heap
page read and write
277CF6AE000
heap
page read and write
277D1745000
heap
page read and write
7FFE11EA1000
unkown
page execute read
73806F3000
stack
page read and write
22A51E9E000
heap
page read and write
277CF66D000
heap
page read and write
7FFE13301000
unkown
page execute read
277CECCC000
heap
page read and write
277CEB40000
heap
page read and write
277D19DA000
heap
page read and write
7FFDFB110000
unkown
page readonly
277CF725000
heap
page read and write
7FF7E40E2000
unkown
page readonly
277CF6B2000
heap
page read and write
277D19CD000
heap
page read and write
277CEBDC000
direct allocation
page read and write
277D1866000
heap
page read and write
7FFDFABB2000
unkown
page readonly
277CF661000
heap
page read and write
277CEDB3000
heap
page read and write
7FFE0E178000
unkown
page readonly
7FFE101EE000
unkown
page readonly
277CF05E000
heap
page read and write
7FFE11EE3000
unkown
page read and write
277CF74D000
heap
page read and write
80743BF000
stack
page read and write
D6702FD000
stack
page read and write
7FFE0CFB1000
unkown
page execute read
277CF4C4000
heap
page read and write
277CF173000
heap
page read and write
277D13E0000
direct allocation
page read and write
7FFE11BB0000
unkown
page readonly
7FFE11EB3000
unkown
page readonly
277CF16D000
heap
page read and write
22A5167A000
heap
page read and write
277CF6B2000
heap
page read and write
22A524ED000
heap
page read and write
22A51F6F000
heap
page read and write
277D2230000
direct allocation
page read and write
277CF788000
heap
page read and write
277D187D000
heap
page read and write
7FFDFB131000
unkown
page execute read
277CF7C2000
heap
page read and write
7FFDFB1B5000
unkown
page readonly
7FFE0CFDF000
unkown
page readonly
277D175F000
heap
page read and write
277CED81000
heap
page read and write
277CE9A0000
heap
page read and write
277CE920000
heap
page read and write
277CF6E6000
heap
page read and write
260FEBB0000
heap
page read and write
277D19E4000
heap
page read and write
277CF5B8000
heap
page read and write
277CF4C0000
heap
page read and write
7FFE1025B000
unkown
page read and write
277CF502000
heap
page read and write
277D1ACD000
heap
page read and write
277D188E000
heap
page read and write
22A52855000
heap
page read and write
277D1F20000
direct allocation
page read and write
277CF034000
heap
page read and write
277CEA5E000
heap
page read and write
277CF03C000
heap
page read and write
22A4E5A8000
heap
page read and write
7FFE101EC000
unkown
page readonly
7FFDFAC42000
unkown
page execute read
277CFB00000
direct allocation
page read and write
7FFE120C0000
unkown
page readonly
277CF0C0000
heap
page read and write
277D175C000
heap
page read and write
277D1A11000
heap
page read and write
277CF820000
heap
page read and write
277CF6B6000
heap
page read and write
7FF66EF21000
unkown
page execute read
7FFDFB767000
unkown
page write copy
7FF7E4118000
unkown
page read and write
277D17FE000
heap
page read and write
73807FE000
stack
page read and write
277CF822000
heap
page read and write
7FFE148E3000
unkown
page readonly
7FFE126CD000
unkown
page readonly
277CF897000
heap
page read and write
277CF5B5000
heap
page read and write
7FFE126D2000
unkown
page readonly
277D1A13000
heap
page read and write
7FFE13304000
unkown
page readonly
277CF6B2000
heap
page read and write
7FFDFB871000
unkown
page read and write
7FFE126C0000
unkown
page readonly
22A5200F000
heap
page read and write
277D173A000
heap
page read and write
22A51BD0000
heap
page read and write
7FF7E3261000
unkown
page execute read
277D17C1000
heap
page read and write
277CED75000
heap
page read and write
7FFDFAB62000
unkown
page readonly
277D18C6000
heap
page read and write
7FFE120C4000
unkown
page readonly
277D172C000
heap
page read and write
277CF756000
heap
page read and write
7FFE126E0000
unkown
page readonly
7FF66EF21000
unkown
page execute read
7FFE0CFD9000
unkown
page read and write
7FF66EF51000
unkown
page read and write
260FEBC0000
heap
page read and write
7FFE0CFCC000
unkown
page readonly
7FFDFB0A9000
unkown
page readonly
277CF6AE000
heap
page read and write
277CF74D000
heap
page read and write
277CF784000
heap
page read and write
22A523AA000
heap
page read and write
277D1808000
heap
page read and write
277CF753000
heap
page read and write
22A4E560000
heap
page read and write
277D1AE3000
heap
page read and write
277CEDC0000
direct allocation
page read and write
There are 572 hidden memdumps, click here to show them.