IOC Report
WolferVPN.exe

loading gif

Files

File Path
Type
Category
Malicious
WolferVPN.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data.bby
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies.bby
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data.bby
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data.bby
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
malicious
C:\Users\user\AppData\Local\Programs\WolferVPN\WolferVPN.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\b1c3f10e-540e-46f8-9bee-83879b20c9f6.tmp.node
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\WolferVPN.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\ffmpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\vk_swiftshader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\vulkan-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
(copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies.bby
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data.bby
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\LICENSE.electron.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\ffmpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\resources.pak
data
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\vk_swiftshader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\WolferVPN\vulkan-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\8aa2ec43-5e03-40f0-b44b-d7dcf4df059c.tmp.node
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\LICENSE.electron.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\af.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\ur.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\resources.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\resources\app.asar
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\resources\elevate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\7z-out\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\SpiderBanner.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\StdUtils.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\app-64.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\installerHeaderico.ico
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\nsr97EA.tmp\nsis7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\WolferVPN\70a796c8-78d6-49f5-8289-083fe8def8a7.tmp
JSON data
modified
There are 98 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WolferVPN.exe
C:\Users\user\Desktop\WolferVPN.exe
malicious
C:\Users\user\AppData\Local\Programs\WolferVPN\WolferVPN.exe
"C:\Users\user\AppData\Local\Programs\WolferVPN\WolferVPN.exe"
malicious
C:\Users\user\AppData\Local\Programs\WolferVPN\WolferVPN.exe
"C:\Users\user\AppData\Local\Programs\WolferVPN\WolferVPN.exe" --type=gpu-process --user-data-dir="C:\Users\user\AppData\Roaming\WolferVPN" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1680 --field-trial-handle=1684,i,1620382105047154044,16004179749874181730,262144 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Users\user\AppData\Local\Programs\WolferVPN\WolferVPN.exe
"C:\Users\user\AppData\Local\Programs\WolferVPN\WolferVPN.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Roaming\WolferVPN" --mojo-platform-channel-handle=2204 --field-trial-handle=1684,i,1620382105047154044,16004179749874181730,262144 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Updater.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Updater.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.netdealing.com
unknown
https://v8docs.nodesource.com/node-8.16/dc/d0a/classv8_1_1_value.html#a08fba1d776a59bbf6864b25f9152c
unknown
https://github.com/TooTallNate
unknown
https://github.com/nodejs/node/blob/v10.8.0/lib/internal/errors.js
unknown
https://github.com/mafintosh/mkdirp-classic.git
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#a6f76b2ed605cb8f9185b92de0033
unknown
https://v8docs.nodesource.com/node-8.16/d5/d54/classv8_1_1_function.html#a9c3d0e4e13ddd7721fce238aa5
unknown
https://v8docs.nodesource.com/node-8.16/d9/d28/classv8_1_1_message.html#adbe46c10a88a6565f2732a2d2ad
unknown
http://seclists.org/fulldisclosure/2009/Sep/394
unknown
https://github.com/PeculiarVentures/webcrypto-core.git
unknown
https://github.com/v8/v8/wiki/Embedder%27s%20Guide#handles-and-garbage-collection).
unknown
https://v8docs.nodesource.com/node-8.16/de/d73/classv8_1_1_non_copyable_persistent_traits.html)
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#ab7b7245442ca6de1e1c145ea3fd6
unknown
http://www.rsa.com/rsalabs/node.asp?id=2125
unknown
https://github.com/nodejs/string_decoder
unknown
https://v8.dev/docs/embed#interceptors).
unknown
https://github.com/PeculiarVentures/webcrypto-core#readme
unknown
https://v8docs.nodesource.com/node-8.16/da/da5/classv8_1_1_script_compiler.html#a93f5072a0db55d881b9
unknown
https://tools.ietf.org/html/rfc8410#section-10.3
unknown
https://www.patreon.com/feross
unknown
https://github.com/TooTallNate/util-deprecate
unknown
https://github.com/crypto-browserify/md5.js.git
unknown
https://github.com/digitalbazaar/forge
unknown
https://sqlite.org/wal.html#ckpt
unknown
https://v8docs.nodesource.com/node-8.16/d5/dda/classv8_1_1_isolate.html#aabd223436bc1100a787dadaa024
unknown
https://github.com/dchest/tweetnacl-js
unknown
https://github.com/kkoopa
unknown
https://v8docs.nodesource.com/node-8.16/d5/dda/classv8_1_1_isolate.html#a542d67e85089cb3f92aadf032f9
unknown
https://v8docs.nodesource.com/node-8.16/db/d5f/classv8_1_1_object_template.html#a5e9612fc80bf6db8f2d
unknown
https://semver.org/
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#af743b7ea132b89f84d34d164d066
unknown
https://v8docs.nodesource.com/node-8.16/d5/d54/classv8_1_1_function.html#ae477558b10c14b76ed00e8dbab
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#a2565f03e736694f6b1e1cf22a0b4
unknown
https://v8docs.nodesource.com/node-8.16/d5/dda/classv8_1_1_isolate.html#ad6a2a02657f5425ad460060652a
unknown
https://v8docs.nodesource.com/node-8.16/da/d6a/classv8_1_1_exception.html)
unknown
https://github.com/electron/node-abi#readme
unknown
http://digitalbazaar.com/
unknown
https://datatracker.ietf.org/doc/html/rfc7468#section-7
unknown
https://nodejs.org/api/addons.html#addons_wrapping_c_objects)
unknown
https://v8docs.nodesource.com/node-8.16/d3/d95/classv8_1_1_handle_scope.html).
unknown
https://v8docs.nodesource.com/node-8.16/d8/d06/classv8_1_1_weak_callback_info.html)
unknown
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/String/endsWith
unknown
https://github.com/dominictarr/varstruct.git
unknown
https://v8docs.nodesource.com/node-8.16/d5/dda/classv8_1_1_isolate.html#a045d7754e62fa0ec72ae6c259b2
unknown
https://sqlite.org/lang_savepoint.html
unknown
http://stackoverflow.com/a/1068308/13216
unknown
https://v8docs.nodesource.com/node-8.16/d4/dca/classv8_1_1_persistent_base.html)
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#ab7a92b4dcf822bef72f6c0ac6fea
unknown
https://github.com/fanatid)
unknown
https://github.com/digitalbazaar/forge/blob/master/lib/asn1.js#L542
unknown
https://v8docs.nodesource.com/node-0.12/db/d85/classv8_1_1_object.html#acfbdfd7427b516ebdb5c47c4df5e
unknown
https://developer.mozilla.org/en-US/docs/JavaScript/Reference/Operators/Bitwise_Operators
unknown
https://github.com/kjur/jsjws/blob/master/rsa.js:
unknown
http://www.openssl.org
unknown
https://github.com/mkrufky
unknown
https://v8docs.nodesource.com/node-8.16/d9/db3/classv8_1_1_string_1_1_external_one_byte_string_resou
unknown
https://aka.ms/opensource/security/bounty)
unknown
https://github.com/RyanZim/universalify#readme
unknown
https://v8docs.nodesource.com/node-8.16/db/d5f/classv8_1_1_object_template.html#a33b3ebd7de641f6cc64
unknown
https://github.com/trevnorris
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#a8700b1862e6b4783716964ba4d5e
unknown
http://www.unicode.org/copyright.html
unknown
https://developer.mozilla.org/en-US/docs/Web/API/window.crypto.getRandomValues
unknown
https://github.com/cryptocoinjs/base-x
unknown
https://github.com/RyanZim/universalify.git
unknown
http://stuartk.com/jszip
unknown
https://v8.dev/docs/embed#exceptions)
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#ace1769b0f3b86bfe9fda10109163
unknown
https://v8docs.nodesource.com/node-8.16/d2/db3/classv8_1_1_string.html#a5264d50b96d2c896ce525a734dc1
unknown
https://v8docs.nodesource.com/node-8.16/d4/dc6/classv8_1_1_try_catch.html)
unknown
https://v8docs.nodesource.com/node-8.16/da/d6f/classv8_1_1_j_s_o_n.html#a936310d2540fb630ed37d3ee3ff
unknown
https://github.com/agnat
unknown
https://github.com/nodejs/nan#wg-members--collaborators
unknown
https://v8docs.nodesource.com/node-8.16/d5/dda/classv8_1_1_isolate.html#aeb420b690bc2c216882d6fdd00d
unknown
http://pajhome.org.uk/crypt/md5
unknown
https://github.com/inspiredware/napi-build-utils#readme
unknown
http://unicode.org/reports/tr15/
unknown
http://www.joyent.com
unknown
https://v8docs.nodesource.com/node-8.16/db/d5f/classv8_1_1_object_template.html#ad605a7543cfbc5dab54
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#ad8b80a59c9eb3c1e6c3cd6c84571
unknown
https://v8docs.nodesource.com/node-8.16/d2/d78/classv8_1_1_persistent.html)
unknown
https://v8docs.nodesource.com/node-8.16/d5/dda/classv8_1_1_isolate.html#a5f72c7cda21415ce062bbe5c58a
unknown
https://v8docs.nodesource.com/node-8.16/d9/d28/classv8_1_1_message.html#a60ede616ba3822d712e44c7a744
unknown
https://github.com/sponsors/feross
unknown
https://github.com/rvagg
unknown
https://github.com/xamarin)
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#a50d571de50d0b0dfb28795619d07
unknown
https://github.com/crypto-browserify/md5.js
unknown
http://www.info-zip.org/FAQ.html#backslashes
unknown
https://hackage.haskell.org/package/base/docs/Data-Maybe.html.
unknown
https://github.com/mafintosh/pump
unknown
https://sindresorhus.com
unknown
http://www.gnu.org/licenses/gpl-2.0-standalone.html
unknown
https://github.com/mafintosh/tar-stream.git
unknown
https://v8docs.nodesource.com/node-4.8/d3/d32/classv8_1_1_array.html#a1d3a878d4c1c7cae974dd50a163924
unknown
https://v8docs.nodesource.com/node-8.16/dd/d0d/classv8_1_1_function_callback_info.html)
unknown
https://v8docs.nodesource.com/node-8.16/d7/dc5/classv8_1_1_property_callback_info.html)
unknown
https://v8docs.nodesource.com/node-8.16/db/d85/classv8_1_1_object.html#a169f2da506acbec34deadd9149a1
unknown
https://github.com/mafintosh/end-of-stream
unknown
https://github.com/inspiredware/napi-build-utils#napi-build-utils).
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rufflesrefined.com
172.67.218.203
chrome.cloudflare-dns.com
172.64.41.3

IPs

IP
Domain
Country
Malicious
172.67.218.203
rufflesrefined.com
United States
172.64.41.3
chrome.cloudflare-dns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
KeepShortcuts
HKEY_CURRENT_USER\SOFTWARE\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9c1054f2-f2ad-5af7-8c3f-0bca1902f573
EstimatedSize
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
910000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
1C045C1D000
heap
page read and write
910000
heap
page read and write
2568FD7F000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
919000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
1C045C07000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
1C045C08000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
7FF6B7E01000
unkown
page execute read
8E4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
1C045C33000
heap
page read and write
5961000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
3061000
heap
page read and write
2DB1000
heap
page read and write
90B000
heap
page read and write
5250000
direct allocation
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
2DB5000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
59F000
unkown
page readonly
8E4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
908000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
1C045BD0000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
1C045C1D000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
2568FD7F000
heap
page read and write
2568FD7F000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
5011000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
7FF6BC401000
unkown
page execute read
7FF661831000
unkown
page execute read
8E8000
heap
page read and write
7FF664031000
unkown
page execute read
8E4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
1C045A30000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
58E0000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
5010000
heap
page read and write
8E4000
heap
page read and write
7FF664031000
unkown
page execute read
90B000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8F8000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
1C045C0F000
heap
page read and write
909000
heap
page read and write
8F5000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
7FF6BB001000
unkown
page execute read
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
4E51000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
1C045B10000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
4F90000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
5960000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
4F51000
heap
page read and write
8F4000
heap
page read and write
2EB0000
direct allocation
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
5A61000
heap
page read and write
8E8000
heap
page read and write
7FF65FA31000
unkown
page execute read
8E8000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
7FF663631000
unkown
page execute read
910000
heap
page read and write
5110000
heap
page read and write
8EC000
heap
page read and write
25690025000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
7FF6B7400000
unkown
page readonly
8E4000
heap
page read and write
2F61000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
2DBC000
heap
page read and write
8E8000
heap
page read and write
2568FE50000
heap
page read and write
2568FD8D000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
9466D7E000
stack
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
7FF662231000
unkown
page execute read
8E8000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
7FF6BCE01000
unkown
page execute read
8E4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
7FF665431000
unkown
page execute read
4E51000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
7FF6B7401000
unkown
page execute read
8E4000
heap
page read and write
8E8000
heap
page read and write
2568FD5B000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
40A000
unkown
page write copy
8E4000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
2568FD66000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
2DB1000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
25690020000
heap
page read and write
4ED0000
heap
page read and write
8E8000
heap
page read and write
5650000
direct allocation
page read and write
8F4000
heap
page read and write
4FD1000
heap
page read and write
4DF0000
direct allocation
page read and write
2568FD8D000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
7FF662C31000
unkown
page execute read
8F4000
heap
page read and write
8F4000
heap
page read and write
1C045C01000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
2568FD66000
heap
page read and write
8E3000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
2DB1000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
2E34000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
2DBC000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
4E90000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8C9000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
7FF662231000
unkown
page execute read
910000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
59A0000
heap
page read and write
8E8000
heap
page read and write
2568FD87000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8CD000
heap
page read and write
78A9FEC000
stack
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
2EE1000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
3060000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
7FF6BA601000
unkown
page execute read
8E8000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
920000
heap
page read and write
1C045C25000
heap
page read and write
2568FD7F000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
58E1000
heap
page read and write
8E8000
heap
page read and write
4ED0000
heap
page read and write
8E4000
heap
page read and write
2568FE30000
heap
page read and write
1C045C25000
heap
page read and write
408000
unkown
page readonly
8E4000
heap
page read and write
90B000
heap
page read and write
8E3000
heap
page read and write
8E4000
heap
page read and write
5150000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
7FF664031000
unkown
page execute read
8E8000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
7FF660431000
unkown
page execute read
8F4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
5111000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
1C045B30000
heap
page read and write
2568FD55000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
2568FD66000
heap
page read and write
4950000
direct allocation
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
3060000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
3060000
heap
page read and write
2569002A000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
920000
heap
page read and write
90B000
heap
page read and write
4ED1000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
5921000
heap
page read and write
8E4000
heap
page read and write
401000
unkown
page execute read
3020000
heap
page read and write
1C045C34000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
7FF65FA31000
unkown
page execute read
90B000
heap
page read and write
8E4000
heap
page read and write
5961000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
919000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
7FF660E31000
unkown
page execute read
90B000
heap
page read and write
920000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
7FF664A31000
unkown
page execute read
8E4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
4790000
direct allocation
page read and write
8E4000
heap
page read and write
8E3000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
59E1000
heap
page read and write
8E4000
heap
page read and write
5112000
heap
page read and write
8F4000
heap
page read and write
2FE1000
heap
page read and write
1F49A310000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
6460000
direct allocation
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
58E0000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
2568FD4E000
heap
page read and write
8EC000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
2568FD88000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
9466E7F000
stack
page read and write
910000
heap
page read and write
58A0000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
1C045C1D000
heap
page read and write
9466C7E000
stack
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
88D000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8F5000
heap
page read and write
8CF000
heap
page read and write
90B000
heap
page read and write
3061000
heap
page read and write
5961000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
1C045BD8000
heap
page read and write
2DC5000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
50D0000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
3061000
heap
page read and write
4750000
trusted library allocation
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
920000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
4FA44FF000
stack
page read and write
946694B000
stack
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
2F61000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
5920000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
3060000
heap
page read and write
910000
heap
page read and write
2F20000
heap
page read and write
3021000
heap
page read and write
2568FD81000
heap
page read and write
4A50000
direct allocation
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
2FE2000
heap
page read and write
910000
heap
page read and write
3060000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
9466CFE000
stack
page read and write
8E4000
heap
page read and write
8DB000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
1C045C1D000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
5090000
heap
page read and write
910000
heap
page read and write
89C000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
7FF65FA30000
unkown
page readonly
2FA1000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
5190000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
4F90000
heap
page read and write
8CC000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
2F60000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
2DB1000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
2568FC40000
heap
page read and write
7FF6BBA01000
unkown
page execute read
4FD1000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
5A20000
heap
page read and write
919000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
5010000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
88E000
heap
page read and write
9466DFE000
stack
page read and write
1C045D70000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
58A0000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
7FF664A31000
unkown
page execute read
8F4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
4FA43FE000
stack
page read and write
1C045C0F000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
1C045BFC000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
7FF661831000
unkown
page execute read
8E8000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
59E0000
heap
page read and write
6060000
direct allocation
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
1C045C2D000
heap
page read and write
1C045BF6000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
2568FD56000
heap
page read and write
5091000
heap
page read and write
5961000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
4F50000
heap
page read and write
8C8000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
2568FD55000
heap
page read and write
8E8000
heap
page read and write
61C6000
direct allocation
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
3061000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
7FF660431000
unkown
page execute read
8E8000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
1C045D7A000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
49D0000
direct allocation
page read and write
8E8000
heap
page read and write
1C045C2E000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
7FF660E31000
unkown
page execute read
3061000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
919000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
4F90000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
4F10000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
3060000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
1C045C01000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
2FA0000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
1F49A2E0000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
5861000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
1F49A340000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
1F49A34B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
2568FD8D000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
7FF665431000
unkown
page execute read
8E4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
78AA3FF000
stack
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
7FF660431000
unkown
page execute read
910000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
911000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
7FF6B9C01000
unkown
page execute read
2FE0000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
2568FD8D000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
1F49A366000
heap
page read and write
90B000
heap
page read and write
1C045C0F000
heap
page read and write
8F4000
heap
page read and write
2DF4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
5191000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
2EB0000
direct allocation
page read and write
2EBF000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
2F60000
heap
page read and write
58E0000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
400000
unkown
page readonly
4F10000
heap
page read and write
90B000
heap
page read and write
7FF665431000
unkown
page execute read
90B000
heap
page read and write
2568FD69000
heap
page read and write
7FF660E31000
unkown
page execute read
8E8000
heap
page read and write
7FF65FA30000
unkown
page readonly
8F4000
heap
page read and write
1C045BF6000
heap
page read and write
8F4000
heap
page read and write
920000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
4F52000
heap
page read and write
90B000
heap
page read and write
2EE1000
heap
page read and write
7FF663631000
unkown
page execute read
8F4000
heap
page read and write
61A0000
direct allocation
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
2568FD88000
heap
page read and write
61A0000
direct allocation
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
4ED1000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
7FF6B9201000
unkown
page execute read
90B000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
7FF662C31000
unkown
page execute read
910000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
2568FD8D000
heap
page read and write
8E8000
heap
page read and write
1F49A200000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
4D70000
direct allocation
page read and write
1C045C1B000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
7FF663631000
unkown
page execute read
8E4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
899000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
7FF662C31000
unkown
page execute read
8E4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8E3000
heap
page read and write
1C045C24000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
4F90000
heap
page read and write
8F4000
heap
page read and write
2568FD5B000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
2FE1000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
2568FD86000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8C9000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
4FA427B000
stack
page read and write
2DF4000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
1F49A440000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
2568FD8D000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
2568FD5B000
heap
page read and write
5861000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
3061000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
901000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
2568FD55000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
919000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
1C045C21000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
2568FD84000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
4FA447F000
stack
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
51D0000
heap
page read and write
88E000
heap
page read and write
8E4000
heap
page read and write
3062000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
4FA42FE000
stack
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
67E4000
direct allocation
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
7FF65FA30000
unkown
page readonly
8E8000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
2568FD30000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
90B000
heap
page read and write
94669CE000
stack
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
7FF664A31000
unkown
page execute read
5192000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
7FF65FA31000
unkown
page execute read
8E8000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
5921000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8F4000
heap
page read and write
1C045C28000
heap
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
2568FD66000
heap
page read and write
90B000
heap
page read and write
4FA437E000
stack
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
5922000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
1C045C2D000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E4000
heap
page read and write
90B000
heap
page read and write
7FF661831000
unkown
page execute read
910000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
78AA2FF000
unkown
page read and write
910000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
4F90000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
1F49A300000
heap
page read and write
8E8000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
2568FD88000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
7FF6B8801000
unkown
page execute read
90B000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
1C045BF7000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
7FF662231000
unkown
page execute read
8E4000
heap
page read and write
910000
heap
page read and write
59E1000
heap
page read and write
8E8000
heap
page read and write
90B000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
1C045C29000
heap
page read and write
1C045D75000
heap
page read and write
910000
heap
page read and write
2568FD37000
heap
page read and write
8E8000
heap
page read and write
2568FD68000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
8E4000
heap
page read and write
8F5000
heap
page read and write
8E8000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
90B000
heap
page read and write
8E4000
heap
page read and write
8F4000
heap
page read and write
8E8000
heap
page read and write
8F4000
heap
page read and write
910000
heap
page read and write
910000
heap
page read and write
90B000
heap
page read and write
8E8000
heap
page read and write
8E4000
heap
page read and write
There are 1333 hidden memdumps, click here to show them.