IOC Report
NeatReader Setup 8.1.4.exe

loading gif

Files

File Path
Type
Category
Malicious
NeatReader Setup 8.1.4.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files (x86)\NeatReader\LICENSE.electron.txt
ASCII text
dropped
C:\Program Files (x86)\NeatReader\LICENSES.chromium.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\NeatReader\NeatReader.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\Uninstall NeatReader.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Program Files (x86)\NeatReader\chrome_100_percent.pak
data
dropped
C:\Program Files (x86)\NeatReader\chrome_200_percent.pak
data
dropped
C:\Program Files (x86)\NeatReader\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\ffmpeg.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\icudtl.dat
data
dropped
C:\Program Files (x86)\NeatReader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\locales\am.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ar.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\bg.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\bn.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ca.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\cs.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\da.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\de.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\el.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\en-GB.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\en-US.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\es-419.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\es.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\et.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\fa.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\fi.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\fil.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\fr.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\gu.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\he.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\hi.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\hr.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\hu.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\id.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\it.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ja.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\kn.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ko.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\lt.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\lv.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ml.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\mr.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ms.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\nb.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\nl.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\pl.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\pt-BR.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\pt-PT.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ro.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ru.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\sk.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\sl.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\sr.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\sv.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\sw.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\ta.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\te.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\th.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\tr.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\uk.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\vi.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\zh-CN.pak
data
dropped
C:\Program Files (x86)\NeatReader\locales\zh-TW.pak
data
dropped
C:\Program Files (x86)\NeatReader\resources.pak
data
dropped
C:\Program Files (x86)\NeatReader\resources\app-update.yml
Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar
data
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar.unpacked\node_modules\font-list\LICENSE
ASCII text
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar.unpacked\node_modules\font-list\demo.js
ASCII text
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar.unpacked\node_modules\font-list\index.js
ASCII text
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar.unpacked\node_modules\font-list\libs\darwin\fontlist
Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar.unpacked\node_modules\font-list\libs\darwin\index.js
ASCII text
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar.unpacked\node_modules\font-list\libs\win32\fonts.vbs
ASCII text
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar.unpacked\node_modules\font-list\libs\win32\index.js
Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\NeatReader\resources\app.asar.unpacked\node_modules\font-list\package.json
JSON data
dropped
C:\Program Files (x86)\NeatReader\resources\elevate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\snapshot_blob.bin
data
dropped
C:\Program Files (x86)\NeatReader\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\uninstallerIcon.ico
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Program Files (x86)\NeatReader\v8_context_snapshot.bin
data
dropped
C:\Program Files (x86)\NeatReader\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\NeatReader\vk_swiftshader_icd.json
JSON data
dropped
C:\Program Files (x86)\NeatReader\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NeatReader.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Sat Sep 28 17:04:43 2024, mtime=Sat Sep 28 17:04:45 2024, atime=Wed Jul 20 13:35:16 2022, length=117631920, window=hide
dropped
C:\Users\Public\Desktop\NeatReader.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Sat Sep 28 17:04:43 2024, mtime=Sat Sep 28 17:04:52 2024, atime=Wed Jul 20 13:35:16 2022, length=117631920, window=hide
modified
C:\Users\user\AppData\Local\Temp\1a1fcfd8-4426-4b36-9f32-6e1eac32a6f9.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2981845
modified
C:\Users\user\AppData\Local\Temp\60c5374f-7448-42cb-b77f-6372d03f3b9e.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 224205
modified
C:\Users\user\AppData\Local\Temp\nsmD94F.tmp\SpiderBanner.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsmD94F.tmp\StdUtils.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsmD94F.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsmD94F.tmp\WinShell.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsmD94F.tmp\app-32.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\nsmD94F.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsmD94F.tmp\nsis7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\neatreader-updater\installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Users\user\AppData\Local\neatreader-updater\installer.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.acl
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.dic
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.exc
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\NeatReader\1f5a889d-2681-4ebb-a159-f0db51483b1a.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\NeatReader\80fd8e50-000d-414a-a0b3-09d9bdb33977.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Cache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\NeatReader\Cache\data_1
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Cache\data_2
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Cache\data_3
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Cache\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\NeatReader\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Cookies
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\NeatReader\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\NeatReader\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\GPUCache\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\NeatReader\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\NeatReader\Local Storage\leveldb\000003.log
data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\NeatReader\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Roaming\NeatReader\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\NeatReader\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Network Persistent State~RF465ce0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\NeatReader\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\NeatReader\appData
JSON data
dropped
C:\Users\user\AppData\Roaming\NeatReader\d268c016-d213-489e-89a7-0728295cf806.tmp
JSON data
dropped
There are 121 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NeatReader Setup 8.1.4.exe
"C:\Users\user\Desktop\NeatReader Setup 8.1.4.exe"
C:\Program Files (x86)\NeatReader\NeatReader.exe
"C:\Program Files (x86)\NeatReader\NeatReader.exe"
C:\Program Files (x86)\NeatReader\NeatReader.exe
"C:\Program Files (x86)\NeatReader\NeatReader.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Roaming\NeatReader /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Roaming\NeatReader\Crashpad --url=http://localhost:9000 "--annotation=_companyName=Gauzy Tech" "--annotation=_productName=NeatReader Desk App" --annotation=_version=8.1.4 --annotation=prod=Electron --annotation=ver=13.0.1 --initial-client-data=0x47c,0x480,0x484,0x474,0x488,0x6df17c0,0x6df17d0,0x6df17dc
C:\Program Files (x86)\NeatReader\NeatReader.exe
"C:\Program Files (x86)\NeatReader\NeatReader.exe" --type=gpu-process --field-trial-handle=1552,1988588544556221443,12342627507894332772,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1560 /prefetch:2
C:\Program Files (x86)\NeatReader\NeatReader.exe
"C:\Program Files (x86)\NeatReader\NeatReader.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1552,1988588544556221443,12342627507894332772,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:8
C:\Program Files (x86)\NeatReader\NeatReader.exe
"C:\Program Files (x86)\NeatReader\NeatReader.exe" --type=renderer --field-trial-handle=1552,1988588544556221443,12342627507894332772,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-GB --app-path="C:\Program Files (x86)\NeatReader\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2536 /prefetch:1
C:\Program Files (x86)\NeatReader\NeatReader.exe
"C:\Program Files (x86)\NeatReader\NeatReader.exe" --type=renderer --field-trial-handle=1552,1988588544556221443,12342627507894332772,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-compositing --lang=en-GB --app-path="C:\Program Files (x86)\NeatReader\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 /prefetch:1

URLs

Name
IP
Malicious
https://github.com/antelle/node-stream-zip
unknown
https://www.google.com/speech-api/full-duplex/v1
unknown
https://github.com/unshiftio/one-time.git
unknown
http://crbug.com/941620allow_translate_uniform_block_to_structured_bufferThere
unknown
https://github.com/pillarjs/resolve-path#readme
unknown
https://crbug.com/650547call_clear_twiceUsing
unknown
http://wonko.com/post/html-escaping)
unknown
http://github.com/koajs/koa/commit/b968688afe2c727ae141f50aa983d481dbc1dbbf)
unknown
https://github.com/jshttp/mime-types#readme
unknown
http://github.com/koajs/koa/commit/7e46c2058cb5994809eab5f4dbb12f21e937c72b)
unknown
https://github.com/koajs/koa/blob/master/docs/error-handling.md
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
https://github.com/nodejs/string_decoder
unknown
https://html.spec.whatwg.org/multipage/forms.html#concept-fe-disabled
unknown
https://github.com/sindresorhus/path-is-absolute.git
unknown
http://www.ecma-international.org/ecma-262/7.0/#sec-function.prototype.apply).
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
https://github.com/ZJONSSON/node-unzipper#readme
unknown
https://github.com/jrburke/requirejs/wiki/Updating-existing-libraries#wiki-anon
unknown
http://crbug.com/110263
unknown
http://github.com/koajs/koa/commit/00e8f7a1b7603aabdb7fb3567f485cb1c2076702)
unknown
https://mdn.io/clearTimeout).
unknown
https://openjsf.org/
unknown
https://github.com/jshttp/on-finished.git
unknown
http://github.com/koajs/koa/commit/b7bfa7113b8d1af49a57ab767f24a599ed92044f)
unknown
https://crbug.com/593024select_view_in_geometry_shaderThe
unknown
https://html.spec.whatwg.org/multipage/infrastructure.html#space-character
unknown
https://github.com/wesleytodd/setprototypeof
unknown
https://bugs.chromium.org/p/v8/issues/detail?id=90
unknown
https://github.com/substack/node-hashish).
unknown
https://crbug.com/593024
unknown
https://github.com/koajs/koa.git
unknown
https://github.com/jquery/jquery/blob/3.2.1/AUTHORS.txt
unknown
https://guides.github.com/activities/contributing-to-open-source/).MIT
unknown
http://ecma-international.org/ecma-262/7.0/#sec-properties-of-the-map-prototype-object)
unknown
https://jsperf.com/getall-vs-sizzle/2
unknown
https://crbug.com/710443
unknown
https://github.com/winstonjs/winston/blob/2.x/lib/winston/logger.js#L198-L201
unknown
http://underscorejs.org/LICENSE
unknown
http://ecma-international.org/ecma-262/7.0/#sec-ecmascript-function-objects-call-thisargument-argume
unknown
https://chrome-devtools-frontend.appspot.com/serve_rev/%s/%s.html/devtools/page/%s?ws=%s%s%sMalforme
unknown
http://anglebug.com/3997
unknown
http://stackoverflow.com/a/1068308/13216
unknown
http://crbug.com/642605
unknown
https://github.com/pvorb/node-md5#readme
unknown
http://anglebug.com/1452
unknown
http://crbug.com/1165751Disable
unknown
https://github.com/gyson/koa-convert#readme
unknown
https://html.spec.whatwg.org/multipage/infrastructure.html#strip-and-collapse-whitespace
unknown
https://github.com/jshttp/media-typer.git
unknown
https://sizzlejs.com/
unknown
http://github.com/koajs/koa/commit/ad91ce2346cb34e5d5a49d07dd952d15f6c832a3)
unknown
http://ljharb.codes
unknown
https://npms.io/search?q=ponyfill.
unknown
https://certs.starfieldtech.com/repository/0
unknown
https://github.com/facebook/react-native/pull/1632
unknown
https://github.com/jshttp/mime-types.git
unknown
https://bugs.jquery.com/ticket/12359
unknown
https://github.com/visionmedia/debug#readme
unknown
http://www.unicode.org/copyright.html
unknown
http://peter.michaux.ca/articles/lazy-function-definition-pattern)
unknown
https://github.com/RyanZim/universalify.git
unknown
https://registry.npmjs.org
unknown
https://github.com/3rd-Eden/text-hex
unknown
http://ecma-international.org/ecma-262/7.0/#sec-tolength).
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=378607
unknown
https://github.com/qix-/node-simple-swizzle#readme
unknown
http://mths.be/fromcodepoint
unknown
https://github.com/lodash/lodash/blob/4.17.15/dist/lodash.js#L6735-L6744
unknown
https://github.com/crypto-utils/keygrip#readme
unknown
http://anglebug.com/3970
unknown
https://github.com/3rd-Eden/kuler
unknown
https://mdn.io/Number/isFinite).
unknown
https://github.com/koajs/koa/pull/614
unknown
https://github.com/jshttp/on-finished#readme
unknown
https://lodash.com/custom-builds).
unknown
http://stackoverflow.com/a/16459606/376773
unknown
http://github.com/koajs/koa/commit/a007198fa23c19902b1f3ffb81498629e0e9c875)
unknown
https://github.com/jquery/jquery.git
unknown
http://anglebug.com/3859
unknown
https://github.com/jshttp/http-assert
unknown
https://github.com/jshttp/negotiator.git
unknown
http://stackoverflow.com/a/5982798/376773
unknown
http://github.com/koajs/koa/commit/54e8fab3e3d907bbb264caf3e28a24773d0d6fdb)
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=589347
unknown
https://mdn.io/spread_operator).
unknown
https://github.com/winstonjs/logform#readme
unknown
https://github.com/alessioalex/tiny-each-async#readme
unknown
http://anglebug.com/3729
unknown
http://crbug.com/830046
unknown
https://github.com/es-shims/String.prototype.trimStart#readme
unknown
http://anglebug.com/2517
unknown
https://github.com/eslint/eslint/issues/3229
unknown
https://crbug.com/401439).
unknown
https://github.com/jshttp/media-typer#readme
unknown
http://crbug.com/672380
unknown
https://mdn.io/iteration_protocols#iterator).
unknown
http://www.another-d-mention.ro/
unknown
https://mdn.io/Structured_clone_algorithm)
unknown
http://ecma-international.org/ecma-262/7.0/#sec-template-literal-lexical-components).
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
KeepShortcuts
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
ShortcutName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\bbff271c-caf8-5302-b3c6-6d9ee38f27e3
EstimatedSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6158000
heap
page read and write
774000
heap
page read and write
6123000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6158000
heap
page read and write
774000
heap
page read and write
6F31000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6BD0000
direct allocation
page read and write
50E1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5B60000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
1E71000
unkown
page execute read
6127000
unkown
page readonly
2CA0000
heap
page read and write
774000
heap
page read and write
6B50000
direct allocation
page read and write
6010000
heap
page read and write
774000
heap
page read and write
57E1000
heap
page read and write
774000
heap
page read and write
2BA1000
heap
page read and write
B9A3000
heap
page read and write
50BC8000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
6D3D000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4F0E000
stack
page read and write
8ED000
heap
page read and write
6010000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5720000
heap
page read and write
774000
heap
page read and write
6091000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2AE0000
direct allocation
page read and write
29DF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2CA0000
heap
page read and write
6F41000
direct allocation
page read and write
6B50000
direct allocation
page read and write
774000
heap
page read and write
4CD0000
heap
page read and write
775000
heap
page read and write
5096C000
direct allocation
page read and write
10001000
unkown
page execute read
774000
heap
page read and write
5620000
heap
page read and write
2AD0000
heap
page read and write
774000
heap
page read and write
1E71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
50BC8000
direct allocation
page read and write
774000
heap
page read and write
6051000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6D22000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
5F51000
heap
page read and write
774000
heap
page read and write
2E4E000
stack
page read and write
5261000
heap
page read and write
774000
heap
page read and write
62C3000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
720000
heap
page read and write
50B14000
direct allocation
page read and write
90A000
heap
page read and write
774000
heap
page read and write
2CA1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
902000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
50BD0000
direct allocation
page read and write
8CC000
heap
page read and write
5720000
heap
page read and write
6DE000
stack
page read and write
6A33000
unkown
page readonly
775000
heap
page read and write
774000
heap
page read and write
279C000
stack
page read and write
774000
heap
page read and write
8F5000
heap
page read and write
774000
heap
page read and write
6150000
heap
page read and write
56A0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
401000
unkown
page execute read
56A0000
heap
page read and write
6051000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
518B000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5620000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
B9D4000
heap
page read and write
888000
heap
page read and write
A71000
unkown
page execute read
774000
heap
page read and write
10000000
unkown
page readonly
774000
heap
page read and write
5FD1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
70FD000
unkown
page readonly
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2B20000
heap
page read and write
71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
3C71000
unkown
page execute read
774000
heap
page read and write
5660000
heap
page read and write
4E09000
stack
page read and write
774000
heap
page read and write
2D23000
heap
page read and write
5D60000
direct allocation
page read and write
774000
heap
page read and write
50B00000
direct allocation
page read and write
6153000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
8D4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4671000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5167000
heap
page read and write
70000
unkown
page readonly
50BD8000
direct allocation
page read and write
1E71000
unkown
page execute read
774000
heap
page read and write
B9DB000
heap
page read and write
6111000
unkown
page readonly
774000
heap
page read and write
5BE0000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6D2B000
unkown
page write copy
4671000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
5B1000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
50BC0000
direct allocation
page read and write
50A04000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5060000
trusted library allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5F51000
heap
page read and write
774000
heap
page read and write
2298000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
902000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
71000
unkown
page execute read
55A0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
40A000
unkown
page write copy
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6158000
heap
page read and write
57A1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
8F6000
heap
page read and write
774000
heap
page read and write
5FD0000
heap
page read and write
774000
heap
page read and write
3C71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
70FD000
unkown
page readonly
774000
heap
page read and write
87F000
stack
page read and write
50E1000
heap
page read and write
5BE5000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
90A000
heap
page read and write
774000
heap
page read and write
8F8000
heap
page read and write
8D7000
heap
page read and write
774000
heap
page read and write
6D28000
direct allocation
page read and write
775000
heap
page read and write
774000
heap
page read and write
50B04000
direct allocation
page read and write
774000
heap
page read and write
55E0000
heap
page read and write
4F61000
heap
page read and write
50BB4000
direct allocation
page read and write
774000
heap
page read and write
6294000
unkown
page readonly
774000
heap
page read and write
50BA0000
direct allocation
page read and write
5BDB000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
55E1000
heap
page read and write
5821000
heap
page read and write
774000
heap
page read and write
5860000
heap
page read and write
8FB000
heap
page read and write
774000
heap
page read and write
50B34000
direct allocation
page read and write
5F50000
heap
page read and write
BA28000
heap
page read and write
71E000
stack
page read and write
774000
heap
page read and write
6158000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5120000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5820000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4F61000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
70FD000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
50B74000
direct allocation
page read and write
50BA0000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
10004000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
55E1000
heap
page read and write
57A0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2CA1000
heap
page read and write
5960000
direct allocation
page read and write
774000
heap
page read and write
50B14000
direct allocation
page read and write
774000
heap
page read and write
62C3000
unkown
page readonly
40E000
unkown
page read and write
6750000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5BED000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
51D5000
direct allocation
page read and write
774000
heap
page read and write
50B34000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
8F8000
heap
page read and write
774000
heap
page read and write
6050000
heap
page read and write
5C0000
heap
page read and write
5279000
heap
page read and write
50BD8000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6158000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2B21000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2AEC000
heap
page read and write
774000
heap
page read and write
6151000
heap
page read and write
774000
heap
page read and write
57E0000
heap
page read and write
774000
heap
page read and write
6B50000
direct allocation
page read and write
774000
heap
page read and write
55E8000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5FD1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2295000
heap
page read and write
6294000
unkown
page readonly
50BBC000
direct allocation
page read and write
774000
heap
page read and write
5A71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
519E000
direct allocation
page read and write
6090000
heap
page read and write
56E1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
60D0000
heap
page read and write
5060000
heap
page read and write
774000
heap
page read and write
469000
unkown
page read and write
932000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2CA0000
heap
page read and write
6D2B000
unkown
page write copy
2CA0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
56E0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2F8C000
stack
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1471000
unkown
page execute read
98000
stack
page read and write
774000
heap
page read and write
71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2C60000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
57A0000
heap
page read and write
774000
heap
page read and write
970000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
628E000
unkown
page readonly
774000
heap
page read and write
50BAC000
direct allocation
page read and write
408000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
2871000
unkown
page execute read
774000
heap
page read and write
50BBC000
direct allocation
page read and write
774000
heap
page read and write
6127000
unkown
page readonly
60D1000
heap
page read and write
774000
heap
page read and write
50BB4000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
56A0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4CD8000
heap
page read and write
5A71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
50A0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6111000
unkown
page readonly
50BA4000
direct allocation
page read and write
628E000
unkown
page readonly
774000
heap
page read and write
6D26000
unkown
page write copy
8D7000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
932000
heap
page read and write
4671000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
50B34000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
880000
heap
page read and write
774000
heap
page read and write
932000
heap
page read and write
2CA0000
heap
page read and write
BA28000
heap
page read and write
2C21000
heap
page read and write
774000
heap
page read and write
51B0000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
40A000
unkown
page read and write
62C0000
unkown
page readonly
2B21000
heap
page read and write
50BC0000
direct allocation
page read and write
774000
heap
page read and write
62A9000
unkown
page readonly
1471000
unkown
page execute read
7655000
direct allocation
page read and write
5721000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
56A0000
heap
page read and write
42D0000
trusted library allocation
page read and write
400000
unkown
page readonly
774000
heap
page read and write
225C000
stack
page read and write
22DE000
stack
page read and write
50BBC000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
5720000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
932000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5861000
heap
page read and write
774000
heap
page read and write
5560000
heap
page read and write
5BED000
unkown
page readonly
774000
heap
page read and write
A71000
unkown
page execute read
412000
unkown
page read and write
774000
heap
page read and write
5660000
heap
page read and write
58E2000
heap
page read and write
70F9000
unkown
page execute read
932000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
70000
unkown
page readonly
774000
heap
page read and write
51E6000
direct allocation
page read and write
774000
heap
page read and write
28DE000
stack
page read and write
6750000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
50BC8000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5BED000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
55E0000
heap
page read and write
774000
heap
page read and write
50B34000
direct allocation
page read and write
8D8000
heap
page read and write
5061000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
50BD0000
direct allocation
page read and write
775000
heap
page read and write
6091000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
70000
unkown
page readonly
774000
heap
page read and write
71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
A71000
unkown
page execute read
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5AD000
unkown
page readonly
4C20000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
3271000
unkown
page execute read
2FE0000
trusted library allocation
page read and write
774000
heap
page read and write
58A1000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
50BD0000
direct allocation
page read and write
774000
heap
page read and write
50BBC000
direct allocation
page read and write
5620000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
A7F000
stack
page read and write
774000
heap
page read and write
902000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
6158000
heap
page read and write
50BD8000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6010000
heap
page read and write
774000
heap
page read and write
2CA0000
heap
page read and write
5AD000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5071000
unkown
page execute read
774000
heap
page read and write
8CC000
heap
page read and write
774000
heap
page read and write
6AC1000
unkown
page readonly
5500000
direct allocation
page read and write
774000
heap
page read and write
2AE0000
direct allocation
page read and write
5160000
direct allocation
page read and write
6F50000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
B98B000
heap
page read and write
774000
heap
page read and write
2BE0000
heap
page read and write
774000
heap
page read and write
71000
unkown
page execute read
774000
heap
page read and write
2F4F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
902000
heap
page read and write
62C0000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
57E0000
heap
page read and write
774000
heap
page read and write
525D000
stack
page read and write
6123000
unkown
page readonly
774000
heap
page read and write
2BA0000
heap
page read and write
774000
heap
page read and write
2CA0000
heap
page read and write
6AC1000
unkown
page readonly
70000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
5BDB000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
6127000
unkown
page readonly
5FD0000
heap
page read and write
774000
heap
page read and write
8D8000
heap
page read and write
774000
heap
page read and write
5480000
direct allocation
page read and write
774000
heap
page read and write
6158000
heap
page read and write
611C000
unkown
page readonly
50B04000
direct allocation
page read and write
774000
heap
page read and write
50A0000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
5123000
heap
page read and write
774000
heap
page read and write
58A1000
heap
page read and write
774000
heap
page read and write
6BB0000
direct allocation
page read and write
50E0000
heap
page read and write
5760000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
56E1000
heap
page read and write
5621000
heap
page read and write
50B14000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
2C20000
heap
page read and write
5071000
unkown
page execute read
774000
heap
page read and write
520A000
direct allocation
page read and write
774000
heap
page read and write
6D26000
unkown
page write copy
774000
heap
page read and write
774000
heap
page read and write
5620000
heap
page read and write
5BDB000
unkown
page readonly
774000
heap
page read and write
5822000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
8FB000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
62C0000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6147000
unkown
page readonly
628E000
unkown
page readonly
774000
heap
page read and write
5761000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2CA0000
heap
page read and write
774000
heap
page read and write
70F9000
unkown
page execute read
611C000
unkown
page readonly
6D26000
unkown
page write copy
6AC1000
unkown
page readonly
50B34000
direct allocation
page read and write
50B80000
direct allocation
page read and write
6A33000
unkown
page readonly
6147000
unkown
page readonly
2CA0000
heap
page read and write
6131000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
8B4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
90A000
heap
page read and write
774000
heap
page read and write
2290000
heap
page read and write
774000
heap
page read and write
2C60000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6BDB000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
2E3E000
heap
page read and write
6A33000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5821000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
613C000
unkown
page readonly
6D2B000
unkown
page write copy
10002000
unkown
page readonly
774000
heap
page read and write
2C20000
heap
page read and write
289F000
stack
page read and write
58E0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
8F8000
heap
page read and write
774000
heap
page read and write
B9DB000
heap
page read and write
974000
heap
page read and write
5561000
heap
page read and write
6294000
unkown
page readonly
774000
heap
page read and write
50BC8000
direct allocation
page read and write
774000
heap
page read and write
2871000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6010000
heap
page read and write
6111000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
613C000
unkown
page readonly
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
75C6000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
58A0000
heap
page read and write
6D57000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6010000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
3271000
unkown
page execute read
8D5000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
70F9000
unkown
page execute read
2B60000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
50BD0000
direct allocation
page read and write
401000
unkown
page execute read
774000
heap
page read and write
2354000
heap
page read and write
6091000
heap
page read and write
774000
heap
page read and write
2C21000
heap
page read and write
774000
heap
page read and write
2CA0000
heap
page read and write
2CA0000
heap
page read and write
5061000
heap
page read and write
3271000
unkown
page execute read
8D7000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6F09000
direct allocation
page read and write
4F60000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
597000
unkown
page readonly
60D2000
heap
page read and write
613C000
unkown
page readonly
90A000
heap
page read and write
774000
heap
page read and write
5A71000
unkown
page execute read
774000
heap
page read and write
6091000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
A71000
unkown
page execute read
8C9000
heap
page read and write
774000
heap
page read and write
2BA0000
heap
page read and write
774000
heap
page read and write
597000
unkown
page readonly
5BE5000
unkown
page readonly
774000
heap
page read and write
770000
heap
page read and write
5561000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5121000
heap
page read and write
774000
heap
page read and write
62A9000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
56A0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6131000
unkown
page readonly
774000
heap
page read and write
A71000
unkown
page execute read
774000
heap
page read and write
5660000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
448000
unkown
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5F90000
heap
page read and write
932000
heap
page read and write
5061000
heap
page read and write
774000
heap
page read and write
8D8000
heap
page read and write
6BBB000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
1471000
unkown
page execute read
774000
heap
page read and write
42C0000
heap
page read and write
2350000
heap
page read and write
774000
heap
page read and write
6147000
unkown
page readonly
4F61000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
50A54000
direct allocation
page read and write
774000
heap
page read and write
775000
heap
page read and write
50B98000
direct allocation
page read and write
774000
heap
page read and write
55E9000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
611C000
unkown
page readonly
774000
heap
page read and write
62C3000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
62A9000
unkown
page readonly
5661000
heap
page read and write
774000
heap
page read and write
932000
heap
page read and write
7450000
direct allocation
page read and write
51C3000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6131000
unkown
page readonly
774000
heap
page read and write
6BB7000
direct allocation
page read and write
56A0000
heap
page read and write
50A0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2B60000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
A71000
unkown
page execute read
774000
heap
page read and write
6D54000
direct allocation
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
2871000
unkown
page execute read
6091000
heap
page read and write
5120000
heap
page read and write
6158000
heap
page read and write
774000
heap
page read and write
51F8000
direct allocation
page read and write
6158000
heap
page read and write
774000
heap
page read and write
6750000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
5620000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
6123000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5B1000
unkown
page readonly
41E000
unkown
page read and write
50A4C000
direct allocation
page read and write
5BE5000
unkown
page readonly
71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
2CA0000
heap
page read and write
50AF4000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
8E4000
heap
page read and write
5071000
unkown
page execute read
19A000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
3C71000
unkown
page execute read
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
408000
unkown
page readonly
400000
unkown
page readonly
6052000
heap
page read and write
8D7000
heap
page read and write
There are 1033 hidden memdumps, click here to show them.