IOC Report
313e4225be01a2f968dd52e4e8c0b9fd08c906289779b.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\313e4225be01a2f968dd52e4e8c0b9fd08c906289779b.exe
"C:\Users\user\Desktop\313e4225be01a2f968dd52e4e8c0b9fd08c906289779b.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://tools.ietf.org/html/rfc6455#section-1.3
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRangesNoDash
unknown
https://www.ecma-international.org/ecma-262/8.0/#sec-atomescape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Atom
unknown
https://gist.github.com/XVilka/8346728#gistcomment-2823421
unknown
https://github.com/nodejs/node-v0.x-archive/issues/2876.
unknown
https://www.ecma-international.org/ecma-262/#sec-timeclip
unknown
https://bugs.chromium.org/p/v8/issues/detail?id=10704
unknown
https://console.spec.whatwg.org/#table
unknown
https://www.iana.org/assignments/tls-extensiontype-values
unknown
https://github.com/nodejs/node/issues/35475
unknown
https://github.com/chalk/ansi-regex/blob/HEAD/index.js
unknown
http://repository.swisssign.com/:
unknown
https://console.spec.whatwg.org/#console-namespace
unknown
https://url.spec.whatwg.org/#url
unknown
http://crl.securetrust.com/STCA.crlgm
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
https://github.com/nodejs/node/issues/13435
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtomNoDash
unknown
https://github.com/tc39/proposal-weakrefs
unknown
https://goo.gl/t5IS6M).
unknown
https://tools.ietf.org/html/rfc7230#section-3.2.2
unknown
https://github.com/nodejs/node/commit/f7620fb96d339f704932f9bb9a0dceb9952df2d4
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtom
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-Assertion
unknown
https://github.com/google/caja/blob/HEAD/src/com/google/caja/ses/repairES5.js
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
https://nodejs.org/download/release/v14.20.0/win-x64/node.libQ
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
https://nodejs.org/api/fs.html
unknown
https://github.com/nodejs/node/pull/21313
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassRanges
unknown
https://nodejs.org/download/release/v14.20.0/node-v14.20.0.tar.gzhttps://nodejs.org/download/release
unknown
https://github.com/mysticatea/abort-controller
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRanges
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlEscape
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Hex4Digits
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-DecimalEscape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ClassControlLetter
unknown
https://stackoverflow.com/a/5501711/3561
unknown
https://github.com/vercel/pkg/issues/1589
unknown
https://github.com/nodejs/node/pull/33661
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-CharacterClassEscape
unknown
http://narwhaljs.org)
unknown
https://www.ecma-international.org/ecma-262/#sec-promise.all
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
https://v8.dev/blog/v8-release-89
unknown
https://github.com/nodejs/node/issues/39707
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://github.com/nodejs/node/pull/12607
unknown
https://tc39.es/ecma262/#sec-IsHTMLDDA-internal-slot
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
unknown
http://www.accv.es00
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Pattern
unknown
http://html4/loose.dtd
unknown
https://sourcemaps.info/spec.html
unknown
https://invisible-island.net/xterm/ctlseqs/ctlseqs.html
unknown
https://github.com/nodejs/node/pull/12342
unknown
https://bugs.chromium.org/p/v8/issues/detail?id=6593
unknown
http://www.unicode.org/copyright.html
unknown
http://www.firmaprofesional.com/cps0
unknown
https://github.com/nodejs/node/pull/34375
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ExtendedAtom
unknown
http://.css
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://github.com/nodejs/node/pull/34010
unknown
https://heycam.github.io/webidl/#dfn-default-iterator-object
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque
unknown
http://www.quovadisglobal.com/cps6
unknown
https://github.com/da-x/rxvt-unicode/tree/v9.22-with-24bit-color
unknown
https://github.com/nodejs/node/issues
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-HexDigits
unknown
http://www.quovadisglobal.com/cps0
unknown
https://tc39.github.io/ecma262/#sec-object.prototype.tostring
unknown
https://url.spec.whatwg.org/#urlsearchparams
unknown
https://crbug.com/v8/8520
unknown
https://github.com/chalk/supports-color
unknown
https://t.me/DeusWinbot
unknown
https://github.com/nodejs/node/pull/30380#issuecomment-552948364
unknown
https://nodejs.org/download/release/v14.20.0/node-v14.20.0.tar.gzt
unknown
https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-setinterval
unknown
https://heycam.github.io/webidl/#dfn-class-string
unknown
https://heycam.github.io/webidl/#dfn-iterator-prototype-object
unknown
http://.jpg
unknown
https://nodejs.org/api/cli.html#cli_unhandled_rejections_mode).
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlLetter
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
104.26.13.205
api.ipify.org
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
15D4EA15000
heap
page read and write
15D4D02D000
heap
page read and write
22949C00000
heap
page read and write
15D4E92D000
heap
page read and write
15D4EB7C000
heap
page read and write
15D4E91F000
heap
page read and write
25234780000
direct allocation
page read and write
387B7B00000
direct allocation
page read and write
A21A57E000
unkown
page readonly
15D4D041000
heap
page read and write
15D4E93D000
heap
page read and write
15D4E9FF000
heap
page read and write
15D4D037000
heap
page read and write
15D4E928000
heap
page read and write
15D4D002000
heap
page read and write
15D4D057000
heap
page read and write
15D4E9EC000
heap
page read and write
1BE5FFE000
stack
page read and write
15D4D041000
heap
page read and write
15D4D032000
heap
page read and write
7FF6C561A000
unkown
page read and write
15D4E9AA000
heap
page read and write
15D4E958000
heap
page read and write
15D4E937000
heap
page read and write
15D4E9E0000
heap
page read and write
15D4D02B000
heap
page read and write
2294BFB0000
unkown
page readonly
137AA9C0000
direct allocation
page read and write
120B3A80000
direct allocation
page read and write
15D4E9B8000
heap
page read and write
A21A4FB000
unkown
page read and write
15D4E9B2000
heap
page read and write
15D4E96C000
heap
page read and write
15D4D008000
heap
page read and write
15D4EB7B000
heap
page read and write
15D4E961000
heap
page read and write
15D4EAF7000
heap
page read and write
15D4D05D000
heap
page read and write
229481B1000
unkown
page readonly
15D4EB77000
heap
page read and write
3614CF00000
direct allocation
page read and write
252347AC000
direct allocation
page read and write
15D4E9E2000
heap
page read and write
15D4CF9E000
heap
page read and write
15D4E9D2000
heap
page read and write
15D4E94E000
heap
page read and write
15D4CFBB000
heap
page read and write
229481D0000
unkown
page read and write
15D4CF90000
heap
page read and write
15D4E980000
heap
page read and write
A21A47E000
unkown
page readonly
1BE5EFC000
stack
page read and write
15D4E9E1000
heap
page read and write
15D4EA0C000
heap
page read and write
A7F1240000
direct allocation
page read and write
A21A106000
unkown
page read and write
15D4E93F000
heap
page read and write
15D4EA90000
heap
page read and write
15D4E92D000
heap
page read and write
15D4EA4F000
heap
page read and write
64A13C0000
direct allocation
page read and write
15D4D054000
heap
page read and write
15D4E98E000
heap
page read and write
15D4D052000
heap
page read and write
15D4D05D000
heap
page read and write
15D4EA4C000
heap
page read and write
15D4E9DD000
heap
page read and write
15D4D052000
heap
page read and write
15D4EA01000
heap
page read and write
15D4EB24000
heap
page read and write
22949BF0000
unkown
page readonly
15D4CFA6000
heap
page read and write
1BE54FE000
stack
page read and write
15D4D055000
heap
page read and write
15D4E924000
heap
page read and write
2294C0C0000
unkown
page read and write
15D4CF40000
heap
page read and write
15D4E9D2000
heap
page read and write
15D4EA4E000
heap
page read and write
3BF44640000
direct allocation
page read and write
15D4CFE3000
heap
page read and write
15D4D048000
heap
page read and write
15D4E937000
heap
page read and write
22949C03000
heap
page read and write
15D4E9B7000
heap
page read and write
15D4E93E000
heap
page read and write
15D4D052000
heap
page read and write
15D4E937000
heap
page read and write
15D4D053000
heap
page read and write
22948070000
unkown
page readonly
15D4CFD7000
heap
page read and write
15D4EA09000
heap
page read and write
2294A076000
unkown
page read and write
15D4E9AA000
heap
page read and write
15D4CFE0000
heap
page read and write
15D4EB7B000
heap
page read and write
15D4D01F000
heap
page read and write
15D4E955000
heap
page read and write
7FF6C5366000
unkown
page write copy
15D4E9AA000
heap
page read and write
15D4EA75000
heap
page read and write
15D4E955000
heap
page read and write
15D4E964000
heap
page read and write
15D4E992000
heap
page read and write
15D4EA48000
heap
page read and write
15D4E930000
heap
page read and write
15D4E928000
heap
page read and write
2294A150000
unkown
page read and write
15D4E994000
heap
page read and write
58070C0000
direct allocation
page read and write
7FF6C5380000
unkown
page read and write
7FF6C5637000
unkown
page readonly
15D4E91F000
heap
page read and write
15D4EAF7000
heap
page read and write
A21A0FE000
unkown
page read and write
15D4EB3E000
heap
page read and write
15D4D023000
heap
page read and write
A21A3FC000
unkown
page read and write
A21A2FE000
unkown
page read and write
15D4D008000
heap
page read and write
15D4EB7B000
heap
page read and write
7FF6C5637000
unkown
page readonly
22948160000
unkown
page read and write
15D4D01E000
heap
page read and write
22949BA0000
unkown
page readonly
15D4D020000
heap
page read and write
15D4E937000
heap
page read and write
CD3B4C0000
direct allocation
page read and write
22949F50000
unkown
page read and write
15D4E967000
heap
page read and write
15D4CFF3000
heap
page read and write
15D4E937000
heap
page read and write
15D4CFE7000
heap
page read and write
15D4CF97000
heap
page read and write
2294A214000
unkown
page read and write
15D4E91F000
heap
page read and write
15D4EA0C000
heap
page read and write
15D4EB77000
heap
page read and write
15D4D017000
heap
page read and write
15D4E971000
heap
page read and write
15D4E94C000
heap
page read and write
15D4CF9A000
heap
page read and write
15D4E93E000
heap
page read and write
26F8CD10000
direct allocation
page read and write
15D4EB4F000
heap
page read and write
2410980000
direct allocation
page read and write
A219F8E000
unkown
page read and write
15D4E96C000
heap
page read and write
15D4E9AA000
heap
page read and write
2294A0C0000
unkown
page read and write
15D4E9AA000
heap
page read and write
15D4E952000
heap
page read and write
15D4E930000
heap
page read and write
15D4CFC1000
heap
page read and write
15D4E955000
heap
page read and write
15D4EA02000
heap
page read and write
15D4E9E8000
heap
page read and write
15D4E930000
heap
page read and write
15D4EB67000
heap
page read and write
15D4CFCA000
heap
page read and write
15D4D02E000
heap
page read and write
15D4D001000
heap
page read and write
15D4EA05000
heap
page read and write
15D4EA1A000
heap
page read and write
15D4EA80000
heap
page read and write
15D4E955000
heap
page read and write
7FF6C5371000
unkown
page write copy
15D4CFA5000
heap
page read and write
15D4D052000
heap
page read and write
2294A14A000
unkown
page read and write
7FF6C3691000
unkown
page execute read
7FF6C4091000
unkown
page execute read
15D4CFD7000
heap
page read and write
15D4E92C000
heap
page read and write
15D4EA3E000
heap
page read and write
15D4CE40000
heap
page read and write
15D4E92C000
heap
page read and write
15D4D05B000
heap
page read and write
15D4E945000
heap
page read and write
15D4E9B4000
heap
page read and write
15D4D032000
heap
page read and write
A219E8E000
stack
page read and write
15D4E9AA000
heap
page read and write
7FF6C536D000
unkown
page write copy
15D4E92C000
heap
page read and write
3BF44644000
direct allocation
page read and write
26F8CD00000
direct allocation
page read and write
15D4D034000
heap
page read and write
15D4E9B2000
heap
page read and write
1BE58FF000
stack
page read and write
15D4E924000
heap
page read and write
15D4D002000
heap
page read and write
1BE56FF000
stack
page read and write
15D4E9F1000
heap
page read and write
1BE51C7000
stack
page read and write
15D4EAF7000
heap
page read and write
15D4CFAD000
heap
page read and write
15D4CFBA000
heap
page read and write
15D4E9D9000
heap
page read and write
15D4E93E000
heap
page read and write
15D4EA54000
heap
page read and write
15D4E9DE000
heap
page read and write
15D4D043000
heap
page read and write
15D4EAE7000
heap
page read and write
15D4D00A000
heap
page read and write
15D4E9AA000
heap
page read and write
15D4D008000
heap
page read and write
15D4E9D0000
heap
page read and write
15D4CF60000
heap
page read and write
15D4E99A000
heap
page read and write
15D4E9F0000
heap
page read and write
15D4E9AA000
heap
page read and write
1E29ADA4000
direct allocation
page read and write
15D4EB2D000
heap
page read and write
31C5AE80000
direct allocation
page read and write
15D4E9E7000
heap
page read and write
15D4E9AA000
heap
page read and write
15D4E937000
heap
page read and write
15D4D032000
heap
page read and write
2216D500000
direct allocation
page read and write
7FF6C3691000
unkown
page execute read
15D4E9FE000
heap
page read and write
15D4E930000
heap
page read and write
15D4E9D5000
heap
page read and write
15D4D046000
heap
page read and write
15D4EB67000
heap
page read and write
7FF6C50E2000
unkown
page readonly
3959FC8000
direct allocation
page read and write
15D4D009000
heap
page read and write
1BE5AFE000
stack
page read and write
15D4CFC3000
heap
page read and write
15D4E9AA000
heap
page read and write
15D4D05D000
heap
page read and write
15D4EB7E000
heap
page read and write
15D4E953000
heap
page read and write
15D4E930000
heap
page read and write
15D4D054000
heap
page read and write
15D4D030000
heap
page read and write
1E29AD80000
direct allocation
page read and write
15D4D040000
heap
page read and write
15D4E938000
heap
page read and write
2294BFC0000
unkown
page read and write
15D4E995000
heap
page read and write
15D4E9AA000
heap
page read and write
15D4EA3E000
heap
page read and write
2294A24D000
unkown
page read and write
25EEA280000
direct allocation
page read and write
15D4E9F3000
heap
page read and write
15D4EA89000
heap
page read and write
15D4E969000
heap
page read and write
15D4E97D000
heap
page read and write
15D4E979000
heap
page read and write
15D4E9EA000
heap
page read and write
15E4A7C2000
direct allocation
page execute read
15D4CFCC000
heap
page read and write
15D4E90C000
heap
page read and write
15D4E930000
heap
page read and write
1BE60FF000
stack
page read and write
2294C8C0000
unkown
page read and write
15D4EA3E000
heap
page read and write
15D4EB67000
heap
page read and write
22948208000
heap
page read and write
15D4D046000
heap
page read and write
15D4E9BD000
heap
page read and write
15D4D054000
heap
page read and write
7FF6C4091000
unkown
page execute read
7FF6C538B000
unkown
page read and write
15D4E955000
heap
page read and write
15D4CF20000
heap
page read and write
15D4E92C000
heap
page read and write
22949B97000
unkown
page read and write
15D4E9AA000
heap
page read and write
15D4EAE7000
heap
page read and write
15D4D008000
heap
page read and write
15D4E96C000
heap
page read and write
15D4D008000
heap
page read and write
15D4CF8F000
heap
page read and write
15D4D041000
heap
page read and write
3A466800000
direct allocation
page read and write
15D4E98D000
heap
page read and write
15D4E938000
heap
page read and write
15D4CFFF000
heap
page read and write
15D4EB4F000
heap
page read and write
15D4D05D000
heap
page read and write
15D4CFC4000
heap
page read and write
15D4E9AA000
heap
page read and write
15D4E971000
heap
page read and write
7FF6C5615000
unkown
page read and write
15D4EA3E000
heap
page read and write
15D4EB24000
heap
page read and write
15D4E9AA000
heap
page read and write
3509B000000
direct allocation
page read and write
15D4E8E0000
heap
page read and write
A21A67E000
unkown
page readonly
1BE51C5000
stack
page read and write
15D4E9AA000
heap
page read and write
15D4D032000
heap
page read and write
229481AB000
heap
page read and write
15E4A802000
direct allocation
page execute read
15D4EB23000
heap
page read and write
2294A263000
unkown
page read and write
15D4D02E000
heap
page read and write
2294A236000
unkown
page read and write
15D4EAE7000
heap
page read and write
2294A1B2000
unkown
page read and write
15D4E96C000
heap
page read and write
7FF6C5378000
unkown
page write copy
15D4D005000
heap
page read and write
15D4EB4F000
heap
page read and write
15D4D05D000
heap
page read and write
15D4E971000
heap
page read and write
15D4EB3E000
heap
page read and write
15D4E97A000
heap
page read and write
A21A37E000
unkown
page readonly
15D4E970000
heap
page read and write
15D4D052000
heap
page read and write
7FF6C536E000
unkown
page read and write
15D4EA3E000
heap
page read and write
15D4E92C000
heap
page read and write
15D4D045000
heap
page read and write
15D4E9B0000
heap
page read and write
15D4D032000
heap
page read and write
15D4EB1F000
heap
page read and write
2294A014000
unkown
page read and write
229481A0000
heap
page read and write
22948080000
heap
page read and write
3959FC0000
direct allocation
page read and write
15D4EAE7000
heap
page read and write
15D4E8FE000
heap
page read and write
15D4E9F1000
heap
page read and write
15D4E91F000
heap
page read and write
15D4E955000
heap
page read and write
15D4E937000
heap
page read and write
15D4D035000
heap
page read and write
15D4E905000
heap
page read and write
15D4EB19000
heap
page read and write
15D4D00C000
heap
page read and write
15D4E9B5000
heap
page read and write
15D4E987000
heap
page read and write
15D4D047000
heap
page read and write
15D4CF92000
heap
page read and write
15D4E9FA000
heap
page read and write
A21A5FE000
unkown
page read and write
15D4EA1D000
heap
page read and write
15D4E8E1000
heap
page read and write
7FF6C5634000
unkown
page read and write
15D4D001000
heap
page read and write
15D4D054000
heap
page read and write
15D4D054000
heap
page read and write
15D4D120000
heap
page read and write
15D4EA04000
heap
page read and write
15D4E98D000
heap
page read and write
15D4E938000
heap
page read and write
15D4EA03000
heap
page read and write
298B17C0000
direct allocation
page read and write
15D4EB6C000
heap
page read and write
15D4EAF7000
heap
page read and write
2294A27C000
unkown
page read and write
15D4D130000
heap
page read and write
7FF6C5384000
unkown
page write copy
15D4D05D000
heap
page read and write
15D4E974000
heap
page read and write
15D4EA80000
heap
page read and write
15D4CFA2000
heap
page read and write
1BE55FE000
stack
page read and write
15D4E9AA000
heap
page read and write
15D4CF9F000
heap
page read and write
7FF6C5366000
unkown
page read and write
15D4EA74000
heap
page read and write
2294A144000
unkown
page read and write
15D4E9C0000
heap
page read and write
15D4EAE7000
heap
page read and write
15D4D135000
heap
page read and write
2452A840000
direct allocation
page read and write
15D4D046000
heap
page read and write
15D4EB2B000
heap
page read and write
7FF6C5377000
unkown
page write copy
15D4EAF7000
heap
page read and write
2B3A7C00000
direct allocation
page read and write
2294A278000
unkown
page read and write
2294A1F4000
unkown
page read and write
22948180000
unkown
page read and write
15D4EA0D000
heap
page read and write
15D4E9AA000
heap
page read and write
15D4E955000
heap
page read and write
15D4D01E000
heap
page read and write
15D4D05D000
heap
page read and write
15D4E953000
heap
page read and write
7FF6C3690000
unkown
page readonly
15D4E97A000
heap
page read and write
2294A12A000
unkown
page read and write
15D4E953000
heap
page read and write
1BE61FF000
stack
page read and write
37273B80000
direct allocation
page read and write
2294A275000
unkown
page read and write
15D4E962000
heap
page read and write
7FF6C5372000
unkown
page read and write
15D4E941000
heap
page read and write
15D4E930000
heap
page read and write
15D4E955000
heap
page read and write
15D4E95C000
heap
page read and write
15D4E930000
heap
page read and write
15D4EA0B000
heap
page read and write
A21A27E000
unkown
page readonly
15D4D052000
heap
page read and write
15D4E93F000
heap
page read and write
E65B8C0000
direct allocation
page read and write
A21A104000
unkown
page read and write
15D4E92D000
heap
page read and write
143EC280000
direct allocation
page read and write
15D4E8EF000
heap
page read and write
7FF6C3690000
unkown
page readonly
15D4CFA9000
heap
page read and write
229481A5000
heap
page read and write
15D4D00D000
heap
page read and write
15D4D008000
heap
page read and write
F647080000
direct allocation
page read and write
15D4E9E1000
heap
page read and write
22949FB2000
unkown
page read and write
15D4E981000
heap
page read and write
15D4CFC0000
heap
page read and write
22949BC0000
unkown
page read and write
36825740000
direct allocation
page read and write
15D4E989000
heap
page read and write
15D4EA55000
heap
page read and write
15D4E9D4000
heap
page read and write
15D4E9DA000
heap
page read and write
15D4E981000
heap
page read and write
15D4EA74000
heap
page read and write
7FF6C46E2000
unkown
page readonly
15D4E938000
heap
page read and write
15D4E955000
heap
page read and write
15D4E930000
heap
page read and write
22949AA0000
unkown
page read and write
15D4E942000
heap
page read and write
15D4CFBF000
heap
page read and write
15D4E955000
heap
page read and write
15D4D05D000
heap
page read and write
15D4E991000
heap
page read and write
15D4D05D000
heap
page read and write
15D4CFFF000
heap
page read and write
7FF6C50E2000
unkown
page readonly
15D4E93F000
heap
page read and write
D3F9640000
direct allocation
page read and write
15D4E953000
heap
page read and write
15D4E9B3000
heap
page read and write
15D4D02B000
heap
page read and write
2294A550000
unkown
page readonly
7FF6C5621000
unkown
page read and write
15D4CFC8000
heap
page read and write
15D4E993000
heap
page read and write
7FF6C561E000
unkown
page read and write
22948200000
heap
page read and write
15D4E94A000
heap
page read and write
22949B8E000
unkown
page read and write
15D4E9F4000
heap
page read and write
7FF6C46E2000
unkown
page readonly
15D4E967000
heap
page read and write
There are 448 hidden memdumps, click here to show them.