IOC Report
Wefaceswap.exe

loading gif

Files

File Path
Type
Category
Malicious
Wefaceswap.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
\Device\Null
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Wefaceswap.exe
"C:\Users\user\Desktop\Wefaceswap.exe"

URLs

Name
IP
Malicious
https://nodejs.org/download/release/v18.5.0/node-v18.5.0-headers.tar.gz%
unknown
https://github.com/nodejs/node/pull/36061#discussion_r533718029
unknown
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://tools.ietf.org/html/rfc6455#section-1.3
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRangesNoDash
unknown
https://github.com/chromium/chromium/blob/HEAD/third_party/blink/public/platform/web_crypto_algorith
unknown
https://www.ecma-international.org/ecma-262/8.0/#sec-atomescape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Atom
unknown
https://gist.github.com/XVilka/8346728#gistcomment-2823421
unknown
https://github.com/nodejs/node-v0.x-archive/issues/2876.
unknown
https://www.ecma-international.org/ecma-262/#sec-timeclip
unknown
https://console.spec.whatwg.org/#table
unknown
https://www.iana.org/assignments/tls-extensiontype-values
unknown
https://github.com/nodejs/node/issues/35475
unknown
https://github.com/chalk/ansi-regex/blob/HEAD/index.js
unknown
https://console.spec.whatwg.org/#console-namespace
unknown
https://nodejs.org/api/fs.html#fs_stat_time_values)
unknown
https://url.spec.whatwg.org/#url
unknown
http://crl.dhimyotis.com/certignarootca.crlC
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
https://github.com/nodejs/node/issues/13435
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtomNoDash
unknown
https://github.com/tc39/proposal-weakrefs
unknown
https://goo.gl/t5IS6M).
unknown
https://tools.ietf.org/html/rfc7230#section-3.2.2
unknown
https://github.com/nodejs/node/commit/f7620fb96d339f704932f9bb9a0dceb9952df2d4
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtom
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-Assertion
unknown
https://github.com/google/caja/blob/HEAD/src/com/google/caja/ses/repairES5.js
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
https://nodejs.org/api/fs.html
unknown
https://github.com/nodejs/node/pull/21313
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassRanges
unknown
https://github.com/mysticatea/abort-controller
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRanges
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlEscape
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Hex4Digits
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-DecimalEscape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ClassControlLetter
unknown
https://stackoverflow.com/a/5501711/3561
unknown
https://github.com/vercel/pkg/issues/1589
unknown
https://github.com/nodejs/node/pull/33661
unknown
https://github.com/heycam/webidl/pull/946.
unknown
https://github.com/nodejs/node/issues/35452
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-CharacterClassEscape
unknown
http://narwhaljs.org)
unknown
https://github.com/WICG/scheduling-apis
unknown
https://www.ecma-international.org/ecma-262/#sec-promise.all
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
https://github.com/cthackers/adm-zip.gity
unknown
https://fetch.spec.whatwg.org/#fetch-timing-info
unknown
https://github.com/tc39/proposal-iterator-helpers/issues/169
unknown
https://v8.dev/blog/v8-release-89
unknown
https://webassembly.github.io/spec/web-api
unknown
https://github.com/nodejs/node/issues/39707
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://github.com/nodejs/node/pull/12607
unknown
https://tc39.es/ecma262/#sec-IsHTMLDDA-internal-slot
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
unknown
http://www.accv.es00
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Pattern
unknown
http://html4/loose.dtd
unknown
https://sourcemaps.info/spec.html
unknown
https://github.com/nodejs/node/pull/12342
unknown
http://www.quovadisglobal.com/cpsO
unknown
https://github.com/nodejs/node/issues/39758
unknown
http://www.unicode.org/copyright.html
unknown
https://github.com/cthackers)
unknown
http://www.firmaprofesional.com/cps0
unknown
https://github.com/nodejs/node/pull/34375
unknown
https://nodejs.org/download/release/v18.5.0/node-v18.5.0.tar.gzhttps://nodejs.org/download/release/v
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ExtendedAtom
unknown
http://.css
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://github.com/nodejs/node/pull/34010
unknown
https://heycam.github.io/webidl/#dfn-default-iterator-object
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque
unknown
https://intergenglobal.com/ndfejplsdksuiwnxkahasdnfeqlfeji
unknown
https://github.com/da-x/rxvt-unicode/tree/v9.22-with-24bit-color
unknown
https://github.com/nodejs/node/issues
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-HexDigits
unknown
https://github.com/addaleax/eventemitter-asyncresource
unknown
http://www.quovadisglobal.com/cps0
unknown
https://tc39.github.io/ecma262/#sec-object.prototype.tostring
unknown
https://url.spec.whatwg.org/#urlsearchparams
unknown
https://crbug.com/v8/8520
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
intergenglobal.com
62.204.41.31

IPs

IP
Domain
Country
Malicious
62.204.41.31
intergenglobal.com
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
2A0FF020000
heap
page read and write
104EC81000
direct allocation
page read and write
2A0FE9EB000
heap
page read and write
DFB6B81000
direct allocation
page read and write
7FF7F8CB1000
unkown
page read and write
2BAC401000
direct allocation
page read and write
7FF7F7CCB000
unkown
page readonly
2A0FE7CF000
heap
page read and write
2A0FF1FD000
heap
page read and write
2A0FF5A5000
heap
page read and write
2A0FF1A1000
heap
page read and write
2A0FE79D000
heap
page read and write
2A0FE7D2000
heap
page read and write
2DFC5CC0000
direct allocation
page read and write
2A0FF1A8000
heap
page read and write
2A0FE779000
heap
page read and write
7FF7F6A20000
unkown
page readonly
2A0FF1A1000
heap
page read and write
1C3DBE41000
direct allocation
page read and write
7FF7F8CC6000
unkown
page write copy
2A0FE9D7000
heap
page read and write
410F9C0000
direct allocation
page read and write
2A0FF5AF000
heap
page read and write
7FF7F8CCB000
unkown
page write copy
2A0FE7BE000
heap
page read and write
2A0FF196000
heap
page read and write
2A0FF46B000
heap
page read and write
190A8880000
direct allocation
page read and write
2A0FF101000
heap
page read and write
2A0FF4D4000
heap
page read and write
2A0FF1A0000
heap
page read and write
2A0FEAB0000
heap
page read and write
2A0FE9DC000
heap
page read and write
2A0FF212000
heap
page read and write
2A0FF5C0000
heap
page read and write
2A0FE80E000
heap
page read and write
2A0FF17C000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FE9BA000
heap
page read and write
2A0FE9BA000
heap
page read and write
2A0FF4BC000
heap
page read and write
E408DFE000
stack
page read and write
2A0FF47E000
heap
page read and write
7FF7F8CBE000
unkown
page read and write
2A0FE955000
heap
page read and write
1C770E80000
direct allocation
page read and write
2A0FF10C000
heap
page read and write
D694E01000
direct allocation
page read and write
7FF7F8CB1000
unkown
page write copy
2A0FF10D000
heap
page read and write
2A0FE789000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FE9B7000
heap
page read and write
10AF009000
direct allocation
page read and write
2A0FF212000
heap
page read and write
2A0FF17D000
heap
page read and write
2A0FF495000
heap
page read and write
D401901000
direct allocation
page read and write
2A0FE775000
heap
page read and write
7FF7F7421000
unkown
page execute read
2A0FF21C000
heap
page read and write
2A0FF613000
heap
page read and write
2A0FE7B4000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FE989000
heap
page read and write
2A0FF212000
heap
page read and write
2A0FE9B3000
heap
page read and write
2A0FE9DB000
heap
page read and write
7FF7F7421000
unkown
page execute read
7FF7F8CB9000
unkown
page write copy
2A0FE744000
heap
page read and write
2A0FE760000
heap
page read and write
2A0FF21C000
heap
page read and write
2A0FF52F000
heap
page read and write
2A0FE77A000
heap
page read and write
2A0FF51E000
heap
page read and write
ECDC041000
direct allocation
page read and write
2A0FF4A4000
heap
page read and write
3C983081000
direct allocation
page read and write
2A0FF436000
heap
page read and write
2A0FE770000
heap
page read and write
2A0FE772000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FE73E000
heap
page read and write
348C3DC1000
direct allocation
page read and write
2A0FE7B3000
heap
page read and write
2A0FE9A7000
heap
page read and write
2A0FF1E5000
heap
page read and write
2A0FF467000
heap
page read and write
2A0FE768000
heap
page read and write
2A0FE7AD000
heap
page read and write
2A0FE967000
heap
page read and write
2A0FE9E8000
heap
page read and write
2A0FE7DE000
heap
page read and write
7FF7F8F8A000
unkown
page readonly
2A0FF4BC000
heap
page read and write
2A0FF43E000
heap
page read and write
1FBBFA00000
direct allocation
page read and write
2A0FF1AF000
heap
page read and write
2A0FE8F0000
heap
page read and write
2A0FF572000
heap
page read and write
2A0FF467000
heap
page read and write
2A0FE991000
heap
page read and write
2A0FE97B000
heap
page read and write
2A0FE722000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FF614000
heap
page read and write
2A0FE9BE000
heap
page read and write
2A0FE973000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FE9A6000
heap
page read and write
2A0FF4F4000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FE770000
heap
page read and write
2A0FE967000
heap
page read and write
2A0FF52B000
heap
page read and write
2A0FE910000
heap
page read and write
2A0FE810000
heap
page read and write
2A0FF4DC000
heap
page read and write
2A0FE7B4000
heap
page read and write
2A0FE740000
heap
page read and write
2A0FE7CB000
heap
page read and write
2A0FF212000
heap
page read and write
2A0FF1A0000
heap
page read and write
7FF7F8F5D000
unkown
page read and write
2A0FE748000
heap
page read and write
2A0FF613000
heap
page read and write
2A0FF4BF000
heap
page read and write
2A0FE9FC000
heap
page read and write
2A0FE9BC000
heap
page read and write
2A0FF170000
heap
page read and write
2A0FF10B000
heap
page read and write
2A0FF21C000
heap
page read and write
2A0FF1A0000
heap
page read and write
2A0FF4CF000
heap
page read and write
2A0FE74D000
heap
page read and write
2A0FF21B000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FE987000
heap
page read and write
2A0FEAB5000
heap
page read and write
2A0FE759000
heap
page read and write
2A0FF506000
heap
page read and write
2A0FF5E9000
heap
page read and write
2A0FE75B000
heap
page read and write
2A0FF4A5000
heap
page read and write
2A0FE710000
heap
page read and write
216F6E85000
direct allocation
page read and write
2A0FF1A0000
heap
page read and write
2A0FF476000
heap
page read and write
2A0FF52E000
heap
page read and write
2A0FE975000
heap
page read and write
2A0FF1A0000
heap
page read and write
2A0FE9A6000
heap
page read and write
2A0FE776000
heap
page read and write
2A0FF4AA000
heap
page read and write
2A0FE7F9000
heap
page read and write
2A0FE74F000
heap
page read and write
2A0FE77C000
heap
page read and write
2A0FF109000
heap
page read and write
2DFC5CEF000
direct allocation
page read and write
2A0FF235000
heap
page read and write
2A0FF51E000
heap
page read and write
2A0FF120000
heap
page read and write
2A0FF59A000
heap
page read and write
2A0FF5A5000
heap
page read and write
2A0FE99E000
heap
page read and write
2A0FF212000
heap
page read and write
2A0FE97B000
heap
page read and write
E077881000
direct allocation
page read and write
2A0FE76F000
heap
page read and write
2A0FF4CF000
heap
page read and write
2A0FF1A0000
heap
page read and write
2A0FE7B4000
heap
page read and write
2A0FF1A0000
heap
page read and write
2A0FE7B5000
heap
page read and write
2A0FF16C000
heap
page read and write
2A0FEA4E000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FF1EF000
heap
page read and write
2A0FF089000
heap
page read and write
21383201000
direct allocation
page read and write
2A0FF030000
heap
page read and write
2A0FE7E1000
heap
page read and write
2A0FE97A000
heap
page read and write
2A0FF212000
heap
page read and write
2A0FE987000
heap
page read and write
2A0FE7DE000
heap
page read and write
2A0FE80E000
heap
page read and write
2A0FE804000
heap
page read and write
2A0FE983000
heap
page read and write
2A0FF13D000
heap
page read and write
2A0FF1E8000
heap
page read and write
2A0FF53A000
heap
page read and write
2A0FE9D9000
heap
page read and write
2A0FF212000
heap
page read and write
2A0FF212000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FE80E000
heap
page read and write
2A0FE999000
heap
page read and write
2A0FF212000
heap
page read and write
2A0FE764000
heap
page read and write
2A0FF4BB000
heap
page read and write
2A0FE9B2000
heap
page read and write
2A0FE969000
heap
page read and write
2A0FE963000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FE787000
heap
page read and write
2A0FE7E8000
heap
page read and write
2A0FE7B1000
heap
page read and write
2A0FF495000
heap
page read and write
2A0FF485000
heap
page read and write
2A0FE792000
heap
page read and write
7FF7F8F8A000
unkown
page readonly
2A0FE7CA000
heap
page read and write
2A0FE7B7000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FF50C000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FE7F9000
heap
page read and write
7FF7F8F65000
unkown
page read and write
19F0ECC1000
direct allocation
page read and write
2A0FE80E000
heap
page read and write
2A0FF1AF000
heap
page read and write
7FF7F8CBB000
unkown
page write copy
2A0FE952000
heap
page read and write
2A0FE7BC000
heap
page read and write
2A0FF60B000
heap
page read and write
2A0FF21C000
heap
page read and write
2A0FF1E0000
heap
page read and write
2A0FE7E1000
heap
page read and write
2A0FE770000
heap
page read and write
2A0FE7FA000
heap
page read and write
2A0FF46F000
heap
page read and write
2A0FE7D4000
heap
page read and write
2A0FF1F7000
heap
page read and write
2A0FE9E0000
heap
page read and write
2A0FEA4D000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FE767000
heap
page read and write
2A0FF212000
heap
page read and write
38A138C1000
direct allocation
page read and write
7FF7F6A20000
unkown
page readonly
2A0FF4F5000
heap
page read and write
2A0FF480000
heap
page read and write
2A0FF1DA000
heap
page read and write
2A0FE80E000
heap
page read and write
2A0FE7EA000
heap
page read and write
7FF7F8CBA000
unkown
page read and write
2A0FE9A8000
heap
page read and write
358E86C1000
direct allocation
page read and write
2A0FE770000
heap
page read and write
2A0FF159000
heap
page read and write
2A0FF124000
heap
page read and write
2A0FF51E000
heap
page read and write
2A0FE806000
heap
page read and write
2A0FF4A4000
heap
page read and write
7FF7F86CB000
unkown
page readonly
2A0FE7FB000
heap
page read and write
2A0FF52F000
heap
page read and write
7FF7F7CCB000
unkown
page readonly
2A0FE9C7000
heap
page read and write
2A0FF481000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FF0CB000
heap
page read and write
2A0FE960000
heap
page read and write
2A0FE9CF000
heap
page read and write
2DB75F80000
direct allocation
page read and write
2A0FF1E2000
heap
page read and write
2A0FE7AA000
heap
page read and write
2A0FE9D5000
heap
page read and write
2A0FE96A000
heap
page read and write
2A0FE951000
heap
page read and write
2A0FF13D000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FF515000
heap
page read and write
2A0FE97D000
heap
page read and write
2D269281000
direct allocation
page read and write
2A0FF21C000
heap
page read and write
2A0FF10B000
heap
page read and write
2A0FF43E000
heap
page read and write
2A0FF1A0000
heap
page read and write
2A0FF4D4000
heap
page read and write
2A0FF21C000
heap
page read and write
2A0FE7E5000
heap
page read and write
2A0FE7CF000
heap
page read and write
2A0FF175000
heap
page read and write
2A0FE96D000
heap
page read and write
2A0FF1A8000
heap
page read and write
1E6A3601000
direct allocation
page readonly
2A0FF1A0000
heap
page read and write
2A0FF55A000
heap
page read and write
2A0FE9A6000
heap
page read and write
2A0FF42E000
heap
page read and write
2A0FF45F000
heap
page read and write
2A0FF495000
heap
page read and write
2A0FE9A8000
heap
page read and write
2A0FF52F000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FF52F000
heap
page read and write
2A0FF4E2000
heap
page read and write
2A0FF410000
heap
page read and write
2A0FF1A0000
heap
page read and write
27502FC1000
direct allocation
page read and write
2A0FF038000
heap
page read and write
2A0FF477000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FE9C0000
heap
page read and write
E408CFE000
stack
page read and write
2A0FF46A000
heap
page read and write
2A0FE7DF000
heap
page read and write
2A0FE7D1000
heap
page read and write
2A0FE781000
heap
page read and write
2DFC5CFE000
direct allocation
page read and write
2A0FE776000
heap
page read and write
2A0FF52F000
heap
page read and write
2A0FE9A9000
heap
page read and write
2A0FF0C8000
heap
page read and write
2A0FF478000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FF1D3000
heap
page read and write
20B39C1000
direct allocation
page read and write
2A0FF107000
heap
page read and write
2A0FF527000
heap
page read and write
2A0FF5A7000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FF4E3000
heap
page read and write
2A0FE770000
heap
page read and write
216F6E81000
direct allocation
page read and write
2A0FE9E5000
heap
page read and write
2A0FF0D5000
heap
page read and write
2A0FF480000
heap
page read and write
2A0FE9AC000
heap
page read and write
2A0FE96A000
heap
page read and write
2A0FF613000
heap
page read and write
2A0FF51E000
heap
page read and write
2A0FE776000
heap
page read and write
2A0FF47D000
heap
page read and write
1C250001000
direct allocation
page read and write
2A0FF613000
heap
page read and write
2A0FF4E1000
heap
page read and write
2A0FF102000
heap
page read and write
7FF777840000
direct allocation
page read and write
2A0FE9B4000
heap
page read and write
2A0FF543000
heap
page read and write
2A0FF5FC000
heap
page read and write
2A0FF5AE000
heap
page read and write
2A0FF21C000
heap
page read and write
2A0FE7EC000
heap
page read and write
2A0FE97B000
heap
page read and write
2A0FE7D4000
heap
page read and write
2A0FE9B7000
heap
page read and write
2A0FE9B7000
heap
page read and write
2A0FE751000
heap
page read and write
2A0FEA4E000
heap
page read and write
2A0FF42B000
heap
page read and write
2A0FF1A0000
heap
page read and write
2A0FE9CF000
heap
page read and write
2A0FF5DA000
heap
page read and write
2A0FF1F8000
heap
page read and write
2A0FF51E000
heap
page read and write
2A0FE96B000
heap
page read and write
2A0FE79B000
heap
page read and write
21383237000
direct allocation
page read and write
2A8A25C1000
direct allocation
page read and write
2A0FF031000
heap
page read and write
2A0FE99C000
heap
page read and write
2A0FF1F2000
heap
page read and write
2A0FF551000
heap
page read and write
2A0FE7E3000
heap
page read and write
2A0FF4A2000
heap
page read and write
2A0FE996000
heap
page read and write
2A0FF480000
heap
page read and write
2A0FE9B7000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FF1FE000
heap
page read and write
2A0FF4BC000
heap
page read and write
7FF7F8CD3000
unkown
page read and write
2A0FF562000
heap
page read and write
D957F81000
direct allocation
page read and write
2A0FE7D3000
heap
page read and write
2A0FE7D5000
heap
page read and write
2A0FF4A4000
heap
page read and write
2A0FE996000
heap
page read and write
2A0FF5A5000
heap
page read and write
3C7F5041000
direct allocation
page read and write
2A0FF16E000
heap
page read and write
2A0FF1A0000
heap
page read and write
2A0FE982000
heap
page read and write
2A0FE7D6000
heap
page read and write
2A0FE9DD000
heap
page read and write
2A0FE9B7000
heap
page read and write
2A0FF4A4000
heap
page read and write
2A0FE7E2000
heap
page read and write
2A0FE80E000
heap
page read and write
2A0FE960000
heap
page read and write
2A0FE7C9000
heap
page read and write
2A0FF21C000
heap
page read and write
2A0FF21C000
heap
page read and write
2A0FE9B0000
heap
page read and write
2A0FE7D4000
heap
page read and write
2A0FE790000
heap
page read and write
7FF7F8CBF000
unkown
page write copy
302B8301000
direct allocation
page read and write
1776DB81000
direct allocation
page read and write
2A0FE75C000
heap
page read and write
7FF777883000
direct allocation
page execute read
7FF7F6A21000
unkown
page execute read
7FF7F8CC2000
unkown
page read and write
2A0FE950000
heap
page read and write
7FF777843000
direct allocation
page execute read
2A0FE9D6000
heap
page read and write
2A0FE97B000
heap
page read and write
2A0FE97B000
heap
page read and write
2A0FF106000
heap
page read and write
7FF7F86CB000
unkown
page readonly
10AF001000
direct allocation
page read and write
2A0FE796000
heap
page read and write
2A0FF21C000
heap
page read and write
7FF7F6A21000
unkown
page execute read
2A0FF4BC000
heap
page read and write
2A0FE9DC000
heap
page read and write
21A25800000
direct allocation
page read and write
2A0FE7EE000
heap
page read and write
2A0FF5D7000
heap
page read and write
2A0FE7D4000
heap
page read and write
2A0FF180000
heap
page read and write
2A0FF1A0000
heap
page read and write
E40895D000
stack
page read and write
2A0FE974000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FE957000
heap
page read and write
2A0FF103000
heap
page read and write
2A0FF1AF000
heap
page read and write
2A0FF552000
heap
page read and write
2A0FF1A8000
heap
page read and write
2A0FF5AE000
heap
page read and write
There are 426 hidden memdumps, click here to show them.