IOC Report
launcher.exe

loading gif

Files

File Path
Type
Category
Malicious
launcher.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hd0yau0w.tqx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nsoljp4p.al5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qfzsiwe3.iw4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ttdlpfsq.vft.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\launcher.exe
"C:\Users\user\Desktop\launcher.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData'; Add-MpPreference -ExclusionPath 'C:\ProgramData'""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\AppData'; Add-MpPreference -ExclusionPath 'C:\ProgramData'"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
https://github.com/nodejs/node/pull/36061#discussion_r533718029
unknown
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://tools.ietf.org/html/rfc6455#section-1.3
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRangesNoDash
unknown
https://github.com/chromium/chromium/blob/HEAD/third_party/blink/public/platform/web_crypto_algorith
unknown
https://www.ecma-international.org/ecma-262/8.0/#sec-atomescape
unknown
http://crl.securetrust.com/STCA.crl$t
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Atom
unknown
https://gist.github.com/XVilka/8346728#gistcomment-2823421
unknown
https://github.com/nodejs/node-v0.x-archive/issues/2876.
unknown
https://www.ecma-international.org/ecma-262/#sec-timeclip
unknown
https://console.spec.whatwg.org/#table
unknown
https://www.iana.org/assignments/tls-extensiontype-values
unknown
https://github.com/nodejs/node/issues/35475
unknown
https://github.com/chalk/ansi-regex/blob/HEAD/index.js
unknown
https://console.spec.whatwg.org/#console-namespace
unknown
https://nodejs.org/api/fs.html#fs_stat_time_values)
unknown
https://url.spec.whatwg.org/#url
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
https://github.com/nodejs/node/issues/13435
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtomNoDash
unknown
https://github.com/tc39/proposal-weakrefs
unknown
https://goo.gl/t5IS6M).
unknown
https://tools.ietf.org/html/rfc7230#section-3.2.2
unknown
https://github.com/nodejs/node/commit/f7620fb96d339f704932f9bb9a0dceb9952df2d4
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtom
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-Assertion
unknown
https://github.com/google/caja/blob/HEAD/src/com/google/caja/ses/repairES5.js
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
http://www.quovadisglobal.com/cpsR5
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
https://nodejs.org/api/fs.html
unknown
http://ocsp.accv.esb.c?I
unknown
https://github.com/nodejs/node/pull/21313
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassRanges
unknown
https://nodejs.org/download/release/v18.5.0/win-x64/node.lib1q4
unknown
https://github.com/mysticatea/abort-controller
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRanges
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlEscape
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Hex4Digits
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-DecimalEscape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ClassControlLetter
unknown
https://stackoverflow.com/a/5501711/3561
unknown
https://github.com/vercel/pkg/issues/1589
unknown
https://github.com/nodejs/node/pull/33661
unknown
https://github.com/heycam/webidl/pull/946.
unknown
https://github.com/nodejs/node/issues/35452
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-CharacterClassEscape
unknown
http://narwhaljs.org)
unknown
https://github.com/WICG/scheduling-apis
unknown
https://www.ecma-international.org/ecma-262/#sec-promise.all
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
https://fetch.spec.whatwg.org/#fetch-timing-info
unknown
https://github.com/tc39/proposal-iterator-helpers/issues/169
unknown
https://v8.dev/blog/v8-release-89
unknown
https://webassembly.github.io/spec/web-api
unknown
https://github.com/nodejs/node/issues/39707
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://github.com/nodejs/node/pull/12607
unknown
https://tc39.es/ecma262/#sec-IsHTMLDDA-internal-slot
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
unknown
http://www.accv.es00
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Pattern
unknown
https://sourcemaps.info/spec.html
unknown
https://github.com/nodejs/node/pull/12342
unknown
https://nodejs.org/download/release/v18.5.0/node-v18.5.0.tar.gz-H
unknown
https://github.com/nodejs/node/issues/39758
unknown
https://github.com/lolkekdumped228/escapefromeurope/releases/download/1/keyforleave.exe
unknown
http://www.firmaprofesional.com/cps0
unknown
https://github.com/nodejs/node/pull/34375
unknown
https://nodejs.org/download/release/v18.5.0/node-v18.5.0.tar.gzhttps://nodejs.org/download/release/v
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ExtendedAtom
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://github.com/nodejs/node/pull/34010
unknown
https://heycam.github.io/webidl/#dfn-default-iterator-object
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque
unknown
https://github.com/da-x/rxvt-unicode/tree/v9.22-with-24bit-color
unknown
https://github.com/nodejs/node/issues
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-HexDigits
unknown
https://github.com/addaleax/eventemitter-asyncresource
unknown
http://www.quovadisglobal.com/cps0
unknown
https://tc39.github.io/ecma262/#sec-object.prototype.tostring
unknown
https://url.spec.whatwg.org/#urlsearchparams
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://github.com/chalk/supports-color
unknown
http://www.cert.fnmt.es/dpcs/BCb
unknown
https://heycam.github.io/webidl/#Replaceable
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.4

IPs

IP
Domain
Country
Malicious
140.82.121.4
github.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
9475D7E000
unkown
page readonly
7FF6093E9000
unkown
page write copy
2C338E41000
direct allocation
page read and write
1A36FB2B000
heap
page read and write
1A371824000
unkown
page read and write
1A73365F000
heap
page read and write
189F8A5B000
heap
page read and write
1A735161000
heap
page read and write
189F8A25000
heap
page read and write
1A7351AF000
heap
page read and write
1A7354BF000
heap
page read and write
7FF6093E1000
unkown
page write copy
7FF607150000
unkown
page readonly
1A73556C000
heap
page read and write
1A73508E000
heap
page read and write
1A733539000
heap
page read and write
1A735120000
heap
page read and write
1A73543B000
heap
page read and write
1A733503000
heap
page read and write
1A733609000
heap
page read and write
7FF5E7A83000
direct allocation
page execute read
1A7336C0000
heap
page read and write
1A733609000
heap
page read and write
52794FE000
stack
page read and write
1A733548000
heap
page read and write
1A733541000
heap
page read and write
1A735161000
heap
page read and write
1A735161000
heap
page read and write
1A735161000
heap
page read and write
1A735597000
heap
page read and write
1A73354E000
heap
page read and write
1A73542B000
heap
page read and write
1A7354A9000
heap
page read and write
1A735476000
heap
page read and write
1A371313000
heap
page read and write
19E0A3C1000
direct allocation
page read and write
1A7354CB000
heap
page read and write
1A7354D4000
heap
page read and write
B781BC0000
direct allocation
page read and write
1A7334FB000
heap
page read and write
1A7334F6000
heap
page read and write
1A735449000
heap
page read and write
1A735539000
heap
page read and write
1A733578000
heap
page read and write
1A735494000
heap
page read and write
1A7335F3000
heap
page read and write
527912E000
stack
page read and write
1A7354CB000
heap
page read and write
1A735470000
heap
page read and write
1A735470000
heap
page read and write
1A73513E000
heap
page read and write
1A73518E000
heap
page read and write
1A73553A000
heap
page read and write
1A735559000
heap
page read and write
189F8DC0000
heap
page read and write
1A7334D5000
heap
page read and write
1A7354EB000
heap
page read and write
1A735446000
heap
page read and write
1A371660000
unkown
page read and write
1A7335C3000
heap
page read and write
1A7335C6000
heap
page read and write
1A735569000
heap
page read and write
1A735508000
heap
page read and write
1A7334E6000
heap
page read and write
1A7351A0000
heap
page read and write
1A73354F000
heap
page read and write
1A735172000
heap
page read and write
1A7334FE000
heap
page read and write
1A7354EB000
heap
page read and write
1A73360C000
heap
page read and write
1A7354CB000
heap
page read and write
1A7354DA000
heap
page read and write
1A733624000
heap
page read and write
7FF5E7A40000
direct allocation
page read and write
1A735539000
heap
page read and write
1A73365A000
heap
page read and write
1A73560C000
heap
page read and write
7FF607151000
unkown
page execute read
1A73352D000
heap
page read and write
1A371760000
unkown
page read and write
1A7335DB000
heap
page read and write
1A735119000
heap
page read and write
1A735105000
heap
page read and write
1A73360F000
heap
page read and write
1A7350F9000
heap
page read and write
1A7335A1000
heap
page read and write
197F4ED000
stack
page read and write
189F8A4A000
heap
page read and write
1A73354E000
heap
page read and write
1A3719C2000
unkown
page read and write
1A7334EB000
heap
page read and write
1A735505000
heap
page read and write
1A735401000
heap
page read and write
2C08FF85000
direct allocation
page read and write
1A733609000
heap
page read and write
1A73501E000
heap
page read and write
1A735587000
heap
page read and write
1A7334CD000
heap
page read and write
1A7350C0000
heap
page read and write
1A733529000
heap
page read and write
189F8A4C000
heap
page read and write
1A735559000
heap
page read and write
1A733610000
heap
page read and write
1A73360B000
heap
page read and write
1A7354AF000
heap
page read and write
11DD9609000
direct allocation
page read and write
1A7335FC000
heap
page read and write
1A7334F2000
heap
page read and write
7FF6096BA000
unkown
page readonly
1A735472000
heap
page read and write
1A73356D000
heap
page read and write
9475E7E000
unkown
page readonly
1A7334E0000
heap
page read and write
1A73510B000
heap
page read and write
7FF5E7A80000
direct allocation
page read and write
1A735192000
heap
page read and write
189F8A2B000
heap
page read and write
1A73543B000
heap
page read and write
1A73356E000
heap
page read and write
1A3737D0000
unkown
page readonly
1A733541000
heap
page read and write
1A371960000
unkown
page read and write
1A7355B0000
heap
page read and write
1A7351A1000
heap
page read and write
1A733607000
heap
page read and write
224E4601000
direct allocation
page read and write
1A7334F4000
heap
page read and write
1A733578000
heap
page read and write
1A371D60000
unkown
page readonly
1A7354A9000
heap
page read and write
1A37193A000
unkown
page read and write
1A73516C000
heap
page read and write
1A733609000
heap
page read and write
9475C7E000
unkown
page readonly
30CFCD00000
direct allocation
page read and write
1A733550000
heap
page read and write
1A7354D3000
heap
page read and write
1A735441000
heap
page read and write
1A735477000
heap
page read and write
7FF6093EF000
unkown
page write copy
1A7335F6000
heap
page read and write
1A7351F6000
heap
page read and write
7FF6096BA000
unkown
page readonly
94756CE000
stack
page read and write
1A7351AF000
heap
page read and write
1A7335E8000
heap
page read and write
189F8A4A000
heap
page read and write
1A7351EB000
heap
page read and write
1A7351FD000
heap
page read and write
1A371A88000
unkown
page read and write
189F8A3F000
heap
page read and write
25FA99E4000
direct allocation
page read and write
1A735567000
heap
page read and write
1A73360B000
heap
page read and write
1A733543000
heap
page read and write
7FF6093EA000
unkown
page read and write
1A73353F000
heap
page read and write
1A7351E1000
heap
page read and write
1A36F8E8000
heap
page read and write
1A73358D000
heap
page read and write
9475DFE000
unkown
page read and write
1A733607000
heap
page read and write
1A7354BB000
heap
page read and write
189F8A5B000
heap
page read and write
1A7334FD000
heap
page read and write
1A7334DA000
heap
page read and write
1A7335CB000
heap
page read and write
1A735168000
heap
page read and write
1A735471000
heap
page read and write
1667E340000
direct allocation
page read and write
1A73549C000
heap
page read and write
1A733548000
heap
page read and write
1A73365D000
heap
page read and write
1A735154000
heap
page read and write
1A73556C000
heap
page read and write
18893840000
direct allocation
page read and write
1A735535000
heap
page read and write
1A36FAB0000
unkown
page read and write
1A733531000
heap
page read and write
189F8A08000
heap
page read and write
1A7351B0000
heap
page read and write
1A7354EB000
heap
page read and write
1A73352B000
heap
page read and write
1A735030000
heap
page read and write
1A735001000
heap
page read and write
1A7351B0000
heap
page read and write
1A7335FE000
heap
page read and write
11DD9600000
direct allocation
page read and write
1A735440000
heap
page read and write
1A735520000
heap
page read and write
1A7351DF000
heap
page read and write
189F8A5E000
heap
page read and write
1F858580000
direct allocation
page read and write
1A73354E000
heap
page read and write
1A7354E4000
heap
page read and write
1A371A04000
unkown
page read and write
197F6FE000
stack
page read and write
1A733610000
heap
page read and write
2761AF80000
direct allocation
page read and write
1A735149000
heap
page read and write
1A73542A000
heap
page read and write
1A733609000
heap
page read and write
1A7354BD000
heap
page read and write
1A7354AF000
heap
page read and write
1A7351D2000
heap
page read and write
1A735470000
heap
page read and write
1A735161000
heap
page read and write
7FF6093EB000
unkown
page write copy
1A733548000
heap
page read and write
1A7355E9000
heap
page read and write
1A7354A1000
heap
page read and write
94757CE000
unkown
page read and write
1A7335CE000
heap
page read and write
1A733583000
heap
page read and write
1A7354E3000
heap
page read and write
1A733607000
heap
page read and write
1A7353FA000
heap
page read and write
1A7351AF000
heap
page read and write
39F7E340000
direct allocation
page read and write
1A371954000
unkown
page read and write
1A733604000
heap
page read and write
1A733517000
heap
page read and write
1A7353F0000
heap
page read and write
1A735000000
heap
page read and write
7FF6093EE000
unkown
page read and write
1A7335DD000
heap
page read and write
1A735494000
heap
page read and write
1A73559A000
heap
page read and write
1A73351E000
heap
page read and write
1A7354CB000
heap
page read and write
1A7334F3000
heap
page read and write
1A7335E9000
heap
page read and write
1A371A24000
unkown
page read and write
1A73366E000
heap
page read and write
1A733563000
heap
page read and write
1A733609000
heap
page read and write
36031D80000
direct allocation
page read and write
1A733588000
heap
page read and write
1A73357F000
heap
page read and write
1A733470000
heap
page read and write
1A735470000
heap
page read and write
1A7334E0000
heap
page read and write
1A7354D9000
heap
page read and write
1A733610000
heap
page read and write
1A7351E7000
heap
page read and write
1A733607000
heap
page read and write
1A73556C000
heap
page read and write
1A7355B0000
heap
page read and write
1A73365F000
heap
page read and write
1A36FB00000
unkown
page read and write
1A7335CA000
heap
page read and write
1A73516F000
heap
page read and write
1A733511000
heap
page read and write
7FF608DFB000
unkown
page readonly
1A735154000
heap
page read and write
1A733551000
heap
page read and write
197F8FF000
stack
page read and write
1A733607000
heap
page read and write
7FF607150000
unkown
page readonly
498E540000
direct allocation
page read and write
1A735442000
heap
page read and write
1A7335D8000
heap
page read and write
1A7350FA000
heap
page read and write
1A7354BD000
heap
page read and write
1A735473000
heap
page read and write
1A7351EA000
heap
page read and write
1A735538000
heap
page read and write
1A7354E6000
heap
page read and write
1A733430000
heap
page read and write
1A73356E000
heap
page read and write
9475CFB000
unkown
page read and write
1A7350C3000
heap
page read and write
1A7354DC000
heap
page read and write
1A7335DA000
heap
page read and write
1A733605000
heap
page read and write
1A73552C000
heap
page read and write
1A7335DF000
heap
page read and write
1A733561000
heap
page read and write
1A3712E0000
unkown
page readonly
1A735577000
heap
page read and write
19C3D640000
direct allocation
page read and write
22E07CF7000
direct allocation
page read and write
1A73543B000
heap
page read and write
189F8A00000
heap
page read and write
1A733532000
heap
page read and write
1A733571000
heap
page read and write
1A735442000
heap
page read and write
1A7335EC000
heap
page read and write
1A36F8B0000
unkown
page readonly
1A7334FD000
heap
page read and write
1A36F8E0000
heap
page read and write
1A733515000
heap
page read and write
7FF6083FB000
unkown
page readonly
1A37195A000
unkown
page read and write
94759A2000
unkown
page read and write
1A735184000
heap
page read and write
9475B7E000
unkown
page readonly
1A735580000
heap
page read and write
1A73352F000
heap
page read and write
1A73501E000
heap
page read and write
1A735204000
heap
page read and write
1A73356E000
heap
page read and write
1A7355DE000
heap
page read and write
189F8B10000
heap
page read and write
1A733607000
heap
page read and write
1A7354AF000
heap
page read and write
52791AE000
stack
page read and write
1A3717C2000
unkown
page read and write
1A733604000
heap
page read and write
197F9FF000
stack
page read and write
1A7354E6000
heap
page read and write
189F8C10000
heap
page read and write
1A735142000
heap
page read and write
1A733607000
heap
page read and write
1A735163000
heap
page read and write
2761AFBE000
direct allocation
page read and write
1A371886000
unkown
page read and write
1A73547E000
heap
page read and write
1A733548000
heap
page read and write
189F8A4A000
heap
page read and write
1A733610000
heap
page read and write
25FA99C1000
direct allocation
page read and write
2C08FF81000
direct allocation
page read and write
1A371A8C000
unkown
page read and write
1A73354E000
heap
page read and write
1A73542B000
heap
page read and write
1A735161000
heap
page read and write
1A735161000
heap
page read and write
1A7354BF000
heap
page read and write
7FF6083FB000
unkown
page readonly
1A73359E000
heap
page read and write
1A7353FC000
heap
page read and write
1A7351D9000
heap
page read and write
1A7354E4000
heap
page read and write
1A73354E000
heap
page read and write
8E66100000
direct allocation
page read and write
7FF6093FB000
unkown
page write copy
1A733514000
heap
page read and write
7FF607151000
unkown
page execute read
7FF6093F6000
unkown
page write copy
1A7334CC000
heap
page read and write
1A735120000
heap
page read and write
1A733503000
heap
page read and write
1A733607000
heap
page read and write
1A7335CB000
heap
page read and write
1A73353D000
heap
page read and write
52790AB000
stack
page read and write
1A735569000
heap
page read and write
1A733604000
heap
page read and write
1A73544B000
heap
page read and write
1A73358F000
heap
page read and write
1A735031000
heap
page read and write
1A36FB20000
heap
page read and write
1A73510C000
heap
page read and write
1A7354C7000
heap
page read and write
1A73350A000
heap
page read and write
1A7350E5000
heap
page read and write
1A7353F2000
heap
page read and write
1A73353E000
heap
page read and write
15ED8F40000
direct allocation
page read and write
1A73354E000
heap
page read and write
1A7335CE000
heap
page read and write
1A7351FC000
heap
page read and write
1A37174E000
unkown
page read and write
3FD02EC0000
direct allocation
page read and write
1A735407000
heap
page read and write
1A7354BF000
heap
page read and write
1A7335B0000
heap
page read and write
1A733570000
heap
page read and write
1A733588000
heap
page read and write
1A735567000
heap
page read and write
1A7335F2000
heap
page read and write
1A733542000
heap
page read and write
1A73543B000
heap
page read and write
1A733660000
heap
page read and write
7FF609695000
unkown
page read and write
1A73357A000
heap
page read and write
1A7335C8000
heap
page read and write
527957F000
stack
page read and write
7FF6093F2000
unkown
page read and write
189F8A40000
heap
page read and write
1A7353E0000
heap
page read and write
1A733548000
heap
page read and write
7FF608DFB000
unkown
page readonly
1A7335A6000
heap
page read and write
1A735501000
heap
page read and write
1A735601000
heap
page read and write
2C08FFB1000
direct allocation
page read and write
1A735418000
heap
page read and write
1A73518D000
heap
page read and write
7FF60968D000
unkown
page read and write
197FFFF000
stack
page read and write
1A7335C9000
heap
page read and write
1A371A78000
unkown
page read and write
1A733546000
heap
page read and write
1A7354F4000
heap
page read and write
28557A41000
direct allocation
page read and write
7FF607B51000
unkown
page execute read
1A7354CB000
heap
page read and write
1A7354A9000
heap
page read and write
1A73354E000
heap
page read and write
9475AFE000
unkown
page read and write
1A73354E000
heap
page read and write
1A374100000
unkown
page read and write
1EBEF881000
direct allocation
page read and write
1A735531000
heap
page read and write
1A7334FC000
heap
page read and write
DFCABC0000
direct allocation
page read and write
1A735494000
heap
page read and write
1A733548000
heap
page read and write
1A733330000
heap
page read and write
1A7354C0000
heap
page read and write
1A7354C7000
heap
page read and write
1A73513E000
heap
page read and write
1A735494000
heap
page read and write
1A73356D000
heap
page read and write
1A36FAD0000
unkown
page read and write
1A735407000
heap
page read and write
1A73359A000
heap
page read and write
1A7351B0000
heap
page read and write
7FF5E7A43000
direct allocation
page execute read
1A7351E4000
heap
page read and write
189F8BF0000
heap
page read and write
3FF2A81000
direct allocation
page read and write
1A7335F0000
heap
page read and write
1A735161000
heap
page read and write
1A7334F9000
heap
page read and write
1A7350AB000
heap
page read and write
1A735567000
heap
page read and write
1A7335B1000
heap
page read and write
1A7334F7000
heap
page read and write
1A735578000
heap
page read and write
189F8A4A000
heap
page read and write
1A7351AF000
heap
page read and write
1A735192000
heap
page read and write
1A7354CB000
heap
page read and write
1A735578000
heap
page read and write
1A373800000
unkown
page read and write
189F8A17000
heap
page read and write
1A733612000
heap
page read and write
1A735151000
heap
page read and write
197F7FF000
stack
page read and write
1A73546F000
heap
page read and write
1A7334DB000
heap
page read and write
2EE62EC0000
direct allocation
page read and write
1A73359F000
heap
page read and write
1A7353FA000
heap
page read and write
1A735587000
heap
page read and write
1A735470000
heap
page read and write
189F8A5C000
heap
page read and write
1A735030000
heap
page read and write
1A7335E1000
heap
page read and write
1A7335A1000
heap
page read and write
1A735108000
heap
page read and write
1A73510D000
heap
page read and write
1A7336C5000
heap
page read and write
1A733607000
heap
page read and write
1A73352A000
heap
page read and write
1A735103000
heap
page read and write
1A735442000
heap
page read and write
1A733609000
heap
page read and write
1A733555000
heap
page read and write
1A73359D000
heap
page read and write
1A735122000
heap
page read and write
1A735470000
heap
page read and write
189F8A35000
heap
page read and write
1A372050000
unkown
page read and write
1F0F8341000
direct allocation
page readonly
1A73351C000
heap
page read and write
1A733609000
heap
page read and write
1B6C8741000
direct allocation
page read and write
1A7351F1000
heap
page read and write
1A733603000
heap
page read and write
1A735587000
heap
page read and write
1A371A46000
unkown
page read and write
1A733548000
heap
page read and write
1A735577000
heap
page read and write
1A7354CB000
heap
page read and write
9475BFC000
unkown
page read and write
1A73358B000
heap
page read and write
1A733589000
heap
page read and write
7FF609403000
unkown
page read and write
1A7353FA000
heap
page read and write
314BB981000
direct allocation
page read and write
1A7354D3000
heap
page read and write
1A73554B000
heap
page read and write
1A735102000
heap
page read and write
1A73352C000
heap
page read and write
1A371757000
unkown
page read and write
28B78D40000
direct allocation
page read and write
1A7354BB000
heap
page read and write
1A73500F000
heap
page read and write
7FF6093E1000
unkown
page read and write
1A7354D0000
heap
page read and write
947599A000
unkown
page read and write
1A73541E000
heap
page read and write
9475A7E000
unkown
page readonly
1A7335A1000
heap
page read and write
22E07CC0000
direct allocation
page read and write
1A73360B000
heap
page read and write
1A373900000
unkown
page read and write
1A7351A1000
heap
page read and write
1A733410000
heap
page read and write
1A7335A6000
heap
page read and write
1A735494000
heap
page read and write
1A735035000
heap
page read and write
189F8DC5000
heap
page read and write
189F8A37000
heap
page read and write
1A733609000
heap
page read and write
1A735577000
heap
page read and write
197F5FE000
stack
page read and write
7FF607B51000
unkown
page execute read
1A7335CB000
heap
page read and write
1A733513000
heap
page read and write
1A73543C000
heap
page read and write
1A735107000
heap
page read and write
1A733548000
heap
page read and write
1A7334FB000
heap
page read and write
1A7354BD000
heap
page read and write
189F8A50000
heap
page read and write
1A7335F0000
heap
page read and write
1A73357B000
heap
page read and write
1A36FB25000
heap
page read and write
1A7334F2000
heap
page read and write
1A7350B0000
heap
page read and write
1A36F8D1000
unkown
page readonly
1A73557F000
heap
page read and write
1A735161000
heap
page read and write
1A735140000
heap
page read and write
1A733535000
heap
page read and write
1A7355F8000
heap
page read and write
1A73517D000
heap
page read and write
189F8A5B000
heap
page read and write
1A733604000
heap
page read and write
1A734FF0000
heap
page read and write
1A735161000
heap
page read and write
1A7351F0000
heap
page read and write
1A73513E000
heap
page read and write
1A73365B000
heap
page read and write
1A371310000
heap
page read and write
2F5EC940000
direct allocation
page read and write
1A73354E000
heap
page read and write
1A735557000
heap
page read and write
825681000
direct allocation
page read and write
1A733597000
heap
page read and write
1A733577000
heap
page read and write
94759A0000
unkown
page read and write
252A7480000
direct allocation
page read and write
1A73360A000
heap
page read and write
1A7353F0000
heap
page read and write
1A36F8C0000
heap
page read and write
1A73553E000
heap
page read and write
1A3718D0000
unkown
page read and write
1A73354E000
heap
page read and write
1A73543B000
heap
page read and write
1A7351F7000
heap
page read and write
1A735161000
heap
page read and write
1A733548000
heap
page read and write
2761AFAF000
direct allocation
page read and write
527947E000
stack
page read and write
1A3737F0000
unkown
page readonly
1A735501000
heap
page read and write
1A733548000
heap
page read and write
There are 553 hidden memdumps, click here to show them.