IOC Report
SongOfVikings.exe

loading gif

Files

File Path
Type
Category
Malicious
SongOfVikings.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\passwords.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\webdata.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
malicious
C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\D3DSCache\4f71bded7e2eff50\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\4f71bded7e2eff50\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\D3DSCache\4f71bded7e2eff50\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\passwords.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\webdata.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\LICENSE.electron.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\ffmpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\resources.pak
data
dropped
C:\Users\user\AppData\Local\Programs\SongOfVikings\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Temp\Autofills.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\Passwords.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_00nhm3k0.jd3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_450tslt1.d1s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_stjnkdip.2aw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xyw4kuvx.1rf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\cookies.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\d6298ec28377d406207230300ffe3af0.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\db56a95c-619a-410d-ad51-8448947b0929.tmp.node
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\f1a1d769-375b-46b2-ad93-df5ca2abe3a4.tmp.node
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\LICENSE.electron.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\SongOfVikings.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\ffmpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\af.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\ur.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\resources.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\resources\app.asar
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\resources\elevate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\vk_swiftshader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\7z-out\vulkan-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\SpiderBanner.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\StdUtils.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\app-64.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\nsjF3C0.tmp\nsis7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\SongOfVikings\17188df5-ad26-4f3e-b9c7-9b5079b7749f.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\SongOfVikings\Local State (copy)
JSON data
dropped
There are 101 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SongOfVikings.exe
"C:\Users\user\Desktop\SongOfVikings.exe"
malicious
C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe
"C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe"
malicious
C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe
"C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe" --type=gpu-process --user-data-dir="C:\Users\user\AppData\Roaming\SongOfVikings" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 --field-trial-handle=1932,i,8930845270246626881,144407894186871125,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe
"C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Roaming\SongOfVikings" --mojo-platform-channel-handle=2440 --field-trial-handle=1932,i,8930845270246626881,144407894186871125,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe
"C:\Users\user\AppData\Local\Programs\SongOfVikings\SongOfVikings.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\user\AppData\Roaming\SongOfVikings" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 --field-trial-handle=1932,i,8930845270246626881,144407894186871125,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,236,112,27,63,29,45,147,76,154,28,167,163,109,166,140,139,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,162,223,64,66,67,235,252,176,134,0,234,34,88,190,96,79,120,163,57,223,70,184,59,55,251,103,80,66,213,41,79,203,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,65,3,137,251,132,67,165,117,37,32,77,156,77,25,114,22,240,181,235,103,91,102,117,255,144,36,92,249,151,253,60,75,48,0,0,0,43,225,223,217,151,30,78,184,8,140,233,239,111,191,100,251,188,228,105,81,245,79,114,215,91,96,112,252,70,126,43,40,253,217,123,23,241,100,8,207,153,67,107,184,161,113,210,62,64,0,0,0,16,48,146,16,208,228,76,223,250,118,61,199,169,142,18,65,154,30,229,124,35,149,206,81,42,123,202,212,101,122,75,162,189,113,249,192,143,80,146,46,12,170,101,4,63,156,140,201,97,222,242,144,253,193,232,162,242,114,34,110,102,135,201,250), $null, 'CurrentUser')"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,236,112,27,63,29,45,147,76,154,28,167,163,109,166,140,139,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,162,223,64,66,67,235,252,176,134,0,234,34,88,190,96,79,120,163,57,223,70,184,59,55,251,103,80,66,213,41,79,203,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,65,3,137,251,132,67,165,117,37,32,77,156,77,25,114,22,240,181,235,103,91,102,117,255,144,36,92,249,151,253,60,75,48,0,0,0,43,225,223,217,151,30,78,184,8,140,233,239,111,191,100,251,188,228,105,81,245,79,114,215,91,96,112,252,70,126,43,40,253,217,123,23,241,100,8,207,153,67,107,184,161,113,210,62,64,0,0,0,16,48,146,16,208,228,76,223,250,118,61,199,169,142,18,65,154,30,229,124,35,149,206,81,42,123,202,212,101,122,75,162,189,113,249,192,143,80,146,46,12,170,101,4,63,156,140,201,97,222,242,144,253,193,232,162,242,114,34,110,102,135,201,250), $null, 'CurrentUser')
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,236,112,27,63,29,45,147,76,154,28,167,163,109,166,140,139,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,177,111,46,150,212,157,15,4,228,252,12,0,1,183,251,108,66,54,253,189,23,124,86,207,222,56,201,250,182,152,221,247,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,178,13,225,93,214,215,151,162,72,143,194,133,190,22,214,149,170,149,74,147,55,106,15,180,131,73,196,197,128,118,103,89,48,0,0,0,94,206,242,8,29,35,27,71,101,58,135,55,188,69,108,246,46,232,119,93,65,217,99,7,252,165,33,164,119,40,187,209,190,181,221,12,22,110,211,109,137,129,98,159,150,234,140,244,64,0,0,0,160,185,210,147,25,143,46,73,184,87,79,38,71,228,189,220,249,51,245,132,106,162,213,227,45,47,24,171,45,48,70,50,96,105,2,105,84,9,7,23,200,91,89,93,224,1,154,41,99,254,68,168,144,46,197,126,233,182,158,66,11,216,163,157), $null, 'CurrentUser')"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,236,112,27,63,29,45,147,76,154,28,167,163,109,166,140,139,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,177,111,46,150,212,157,15,4,228,252,12,0,1,183,251,108,66,54,253,189,23,124,86,207,222,56,201,250,182,152,221,247,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,178,13,225,93,214,215,151,162,72,143,194,133,190,22,214,149,170,149,74,147,55,106,15,180,131,73,196,197,128,118,103,89,48,0,0,0,94,206,242,8,29,35,27,71,101,58,135,55,188,69,108,246,46,232,119,93,65,217,99,7,252,165,33,164,119,40,187,209,190,181,221,12,22,110,211,109,137,129,98,159,150,234,140,244,64,0,0,0,160,185,210,147,25,143,46,73,184,87,79,38,71,228,189,220,249,51,245,132,106,162,213,227,45,47,24,171,45,48,70,50,96,105,2,105,84,9,7,23,200,91,89,93,224,1,154,41,99,254,68,168,144,46,197,126,233,182,158,66,11,216,163,157), $null, 'CurrentUser')
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.sqlite.org)
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=310299
unknown
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://tools.ietf.org/html/rfc6455#section-1.3
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://chrome.google.com/webstore?hl=ms&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://doh.familyshield.opendns.com/dns-query
unknown
https://www.bluetooth.com/specifications/gatt/services
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://github.com/WebBluetoothCG/web-bluetooth/blob/main/implementation-status.md
unknown
https://github.com/nodejs/node/pull/35941
unknown
https://console.spec.whatwg.org/#table
unknown
https://chrome.google.com/webstore?hl=fi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://github.com/nodejs/string_decoder
unknown
https://goo.gl/7K7WLuThe
unknown
https://crbug.com/1356053
unknown
https://dns11.quad9.net/dns-query
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
https://goo.gl/7K7WLu
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
unknown
https://github.com/tc39/proposal-weakrefs
unknown
https://goo.gl/t5IS6M).
unknown
http://crbug.com/110263
unknown
https://github.com/google/caja/blob/HEAD/src/com/google/caja/ses/repairES5.js
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
http://anglebug.com/6929
unknown
https://semver.org/
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
https://openjsf.org/
unknown
https://nodejs.org/api/fs.html
unknown
https://chromium.googlesource.com/chromium/src/
unknown
https://github.com/nodejs/node/pull/21313
unknown
https://nextdns.io/privacy
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://crbug.com/593024
unknown
https://w3c.github.io/manifest/#installability-signals
unknown
https://www.gnu.org/software/automake/
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
http://exslt.org/common
unknown
https://github.com/tensorflow/models
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
https://developers.google.com/speed/public-dns/privacyGoogle
unknown
https://github.com/KhronosGroup/SPIRV-Headers.git
unknown
https://doh.opendns.com/dns-query
unknown
https://tc39.es/ecma262/#sec-timeclip
unknown
https://issuetracker.google.com/161903006
unknown
http://127.0.0.1
unknown
https://crbug.com/1300575
unknown
https://github.com/nodejs/node/pull/33661
unknown
http://www.nongnu.org/freebangfont/downloads.html#mukti
unknown
https://crbug.com/710443
unknown
http://narwhaljs.org)
unknown
http://istanbul-js.org/
unknown
https://github.com/tensorflow/tflite-support
unknown
https://github.com/WICG/scheduling-apis
unknown
https://sqlite.org/
unknown
https://crbug.com/1060012
unknown
https://www.gnu.org/software/coreutils/
unknown
http://localhosthttp://127.0.0.1object-src
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
http://anglebug.com/3997
unknown
http://anglebug.com/4722
unknown
http://crbug.com/642605
unknown
http://moztw.org/docs/big5/
unknown
https://fetch.spec.whatwg.org/#fetch-timing-info
unknown
http://anglebug.com/1452
unknown
http://www.ogcio.gov.hk/tc/business/tech_promotion/ccli/terms/doc/hkscs-2008-big5-iso.txt
unknown
https://webassembly.github.io/spec/web-api
unknown
https://github.com/nodejs/node/pull/12607
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
http://www.sqlite.org/
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://crbug.com/650547callClearTwiceUsing
unknown
https://github.com/npm/node-tar/issues/183
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://github.com/facebook/react-native/pull/1632
unknown
https://gitlab.freedesktop.org/xdg/xdgmime
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://www.unicode.org/copyright.html
unknown
https://beacons.gcp.gvt2.com/domainreliability/upload
unknown
http://anglebug.com/2894
unknown
http://www.gnu.org/gethelp/
unknown
http://anglebug.com/3862
unknown
https://dns.google/dns-query
unknown
https://lists.gnu.org/archive/html/automake/2012-07/msg00014.html
unknown
https://github.com/RyanZim/universalify.git
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://github.com/wasdk/wasmparser
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/Cloudflare
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
172.64.41.3
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
40.66.40.211
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\cdf7078b-99f0-53cc-bffc-b945975ddd33
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\cdf7078b-99f0-53cc-bffc-b945975ddd33
KeepShortcuts
HKEY_CURRENT_USER\SOFTWARE\cdf7078b-99f0-53cc-bffc-b945975ddd33
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cdf7078b-99f0-53cc-bffc-b945975ddd33
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD9B1FF000
trusted library allocation
page read and write
270310B0000
heap
page read and write
758000
heap
page read and write
2D71000
heap
page read and write
15AC8C40000
heap
page read and write
6522000
heap
page read and write
5492000
heap
page read and write
5510000
heap
page read and write
2704B050000
heap
page read and write
7FFD9B215000
trusted library allocation
page read and write
8B0C57F000
stack
page read and write
7B3000
heap
page read and write
6611000
heap
page read and write
15AC8CAC000
heap
page read and write
26CE0696000
heap
page read and write
5491000
heap
page read and write
23799A48000
heap
page read and write
237FF71A000
heap
page read and write
7FFD9B07A000
trusted library allocation
page read and write
10E7AFC000
stack
page read and write
637E000
direct allocation
page read and write
651A000
heap
page read and write
750000
heap
page read and write
9082FB9000
stack
page read and write
7FFD9B0C0000
trusted library allocation
page read and write
23799A30000
heap
page read and write
4D92000
heap
page read and write
54D0000
heap
page read and write
7B3000
heap
page read and write
27031120000
heap
page readonly
270346A0000
trusted library allocation
page read and write
7FFD9AEB4000
trusted library allocation
page read and write
2D71000
heap
page read and write
819000
heap
page read and write
1939EA7C000
heap
page read and write
270343DC000
trusted library allocation
page read and write
7FF691F3D000
unkown
page execute read
27034766000
trusted library allocation
page read and write
27042DDC000
trusted library allocation
page read and write
7FFD9B110000
trusted library allocation
page read and write
7FFD9B140000
trusted library allocation
page read and write
6710000
heap
page read and write
6651000
heap
page read and write
7FF68B13D000
unkown
page execute read
C0E058E000
stack
page read and write
651D000
heap
page read and write
7FF69013D000
unkown
page execute read
81B000
heap
page read and write
27042B53000
trusted library allocation
page read and write
54CB000
heap
page read and write
7FFD9B0C0000
trusted library allocation
page read and write
22CC000
stack
page read and write
7FF68BB3D000
unkown
page execute read
5658000
heap
page read and write
27030EEA000
heap
page read and write
54A4000
heap
page read and write
23783130000
trusted library allocation
page read and write
7FF68AC90000
unkown
page readonly
C0DF6FE000
stack
page read and write
7FFD9B190000
trusted library allocation
page read and write
5650000
heap
page read and write
483000
unkown
page read and write
6527000
heap
page read and write
8B0C4FE000
stack
page read and write
82B000
heap
page read and write
DABF7E000
stack
page read and write
400000
unkown
page readonly
55D0000
heap
page read and write
273C3CAA000
heap
page read and write
54D2000
heap
page read and write
15AC8CD8000
heap
page read and write
408000
unkown
page readonly
27032AE1000
trusted library allocation
page read and write
6E10000
direct allocation
page read and write
5510000
heap
page read and write
90830BE000
stack
page read and write
26CE08B0000
heap
page read and write
7FFD9B1F0000
trusted library allocation
page read and write
6010000
direct allocation
page read and write
408000
unkown
page readonly
5658000
heap
page read and write
784000
heap
page read and write
6350000
direct allocation
page read and write
7FF69153D000
unkown
page execute read
24BB6BA9000
heap
page read and write
83B000
heap
page read and write
54CB000
heap
page read and write
54B4000
heap
page read and write
15AC8CA7000
heap
page read and write
27031220000
heap
page read and write
23783066000
trusted library allocation
page read and write
81F000
heap
page read and write
7FFD9AEC2000
trusted library allocation
page read and write
94F000
stack
page read and write
2274000
heap
page read and write
500D000
stack
page read and write
7FF69153D000
unkown
page execute read
40A000
unkown
page read and write
15AC8C88000
heap
page read and write
5A90000
direct allocation
page read and write
23799A20000
heap
page execute and read and write
831000
heap
page read and write
7FFD9B150000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
27030F67000
heap
page read and write
A90E9FE000
unkown
page read and write
7CE000
heap
page read and write
448000
unkown
page read and write
15AC8CDB000
heap
page read and write
2704B130000
heap
page execute and read and write
9083C8E000
stack
page read and write
7FFD9B1D0000
trusted library allocation
page read and write
7FFD9B1E0000
trusted library allocation
page read and write
7FF68C53D000
unkown
page execute read
7FF68E33D000
unkown
page execute read
54D1000
heap
page read and write
2921000
heap
page read and write
7FF68D93D000
unkown
page execute read
6650000
heap
page read and write
237816DD000
trusted library allocation
page read and write
824000
heap
page read and write
5494000
heap
page read and write
23781460000
heap
page execute and read and write
23782BA5000
trusted library allocation
page read and write
15AC8F55000
heap
page read and write
6525000
heap
page read and write
549A000
heap
page read and write
908323B000
stack
page read and write
237914C0000
trusted library allocation
page read and write
1939EA95000
heap
page read and write
237FF6D0000
heap
page read and write
26CE06BB000
heap
page read and write
7FF68ED3D000
unkown
page execute read
54CB000
heap
page read and write
5650000
heap
page read and write
2B60000
heap
page read and write
7DF439C80000
trusted library allocation
page execute and read and write
40A000
unkown
page write copy
C0DF93C000
stack
page read and write
83A000
heap
page read and write
9082F38000
stack
page read and write
23781530000
trusted library allocation
page read and write
7FFD9B090000
trusted library allocation
page execute and read and write
26CE0840000
heap
page read and write
54AF000
heap
page read and write
5391000
heap
page read and write
7FFD9B0D0000
trusted library allocation
page read and write
7FFD9B150000
trusted library allocation
page read and write
51BB000
heap
page read and write
2DF0000
heap
page read and write
15AC8CDB000
heap
page read and write
6110000
direct allocation
page read and write
7FFD9B080000
trusted library allocation
page execute and read and write
7FFD9B0A0000
trusted library allocation
page execute and read and write
7FFD9B110000
trusted library allocation
page read and write
7FFD9B0D0000
trusted library allocation
page read and write
26CE0640000
heap
page read and write
7FFD9AFA6000
trusted library allocation
page execute and read and write
5658000
heap
page read and write
7FFD9B1F9000
trusted library allocation
page read and write
24BB6A55000
heap
page read and write
2CEE000
stack
page read and write
237FF600000
heap
page read and write
4D10000
heap
page read and write
841000
heap
page read and write
9082EBE000
stack
page read and write
5391000
heap
page read and write
15AC8CCE000
heap
page read and write
7FFD9AEDB000
trusted library allocation
page read and write
7FFD9AF7C000
trusted library allocation
page execute and read and write
7BD000
heap
page read and write
54C2000
heap
page read and write
9082B7F000
stack
page read and write
65D0000
heap
page read and write
4D91000
heap
page read and write
241E9CF0000
heap
page read and write
5C10000
direct allocation
page read and write
237917AB000
trusted library allocation
page read and write
15AC8CB8000
heap
page read and write
7FFD9AEC3000
trusted library allocation
page execute and read and write
5658000
heap
page read and write
7FFD9AEBD000
trusted library allocation
page execute and read and write
54BF000
heap
page read and write
273C3B00000
heap
page read and write
2704B014000
heap
page read and write
83A000
heap
page read and write
40E000
unkown
page read and write
2703370D000
trusted library allocation
page read and write
5550000
heap
page read and write
51B4000
heap
page read and write
7FF68BB3D000
unkown
page execute read
27031110000
trusted library allocation
page read and write
5EA6000
direct allocation
page read and write
5658000
heap
page read and write
2378312C000
trusted library allocation
page read and write
27030F40000
heap
page read and write
5351000
heap
page read and write
6521000
heap
page read and write
23799BC0000
heap
page read and write
6010000
direct allocation
page read and write
837000
heap
page read and write
15AC8B40000
heap
page read and write
24BB6BA5000
heap
page read and write
15AC8CB9000
heap
page read and write
54D0000
heap
page read and write
81B000
heap
page read and write
7FFD9B170000
trusted library allocation
page read and write
7FFD9B130000
trusted library allocation
page read and write
5510000
heap
page read and write
237FF756000
heap
page read and write
6590000
heap
page read and write
273C3C00000
heap
page read and write
237FF5F5000
heap
page read and write
26CE06BB000
heap
page read and write
6511000
heap
page read and write
5350000
heap
page read and write
514F000
heap
page read and write
7FF68B13D000
unkown
page execute read
15AC8CDB000
heap
page read and write
6718000
heap
page read and write
7FFD9B180000
trusted library allocation
page read and write
4CD0000
heap
page read and write
26CE06A7000
heap
page read and write
2704AF6E000
heap
page read and write
273C3CC7000
heap
page read and write
2704B191000
heap
page read and write
54D1000
heap
page read and write
C0DF5FE000
stack
page read and write
4B11000
heap
page read and write
1939ED50000
heap
page read and write
241E9A77000
heap
page read and write
DABE7E000
stack
page read and write
5611000
heap
page read and write
1939EA70000
heap
page read and write
7FFD9B160000
trusted library allocation
page read and write
7FFD9B107000
trusted library allocation
page read and write
C0DF4FE000
stack
page read and write
90831BE000
stack
page read and write
7FFD9B1A0000
trusted library allocation
page read and write
7FF68CF3D000
unkown
page execute read
7FF68C53D000
unkown
page execute read
C508F9C000
stack
page read and write
7FFD9B220000
trusted library allocation
page read and write
5450000
heap
page read and write
7FF692ABA000
unkown
page readonly
6591000
heap
page read and write
1939EA40000
heap
page read and write
7FFD9AFE0000
trusted library allocation
page execute and read and write
1939ED59000
heap
page read and write
C0DF8B8000
stack
page read and write
27031163000
trusted library allocation
page read and write
2340000
heap
page read and write
4C13000
heap
page read and write
7A1000
heap
page read and write
6D0000
heap
page read and write
237FF6D9000
heap
page read and write
7FF68D93D000
unkown
page execute read
15AC8C80000
heap
page read and write
7FFD9AECD000
trusted library allocation
page execute and read and write
81C000
heap
page read and write
27032B63000
trusted library allocation
page read and write
23791522000
trusted library allocation
page read and write
288D000
stack
page read and write
5491000
heap
page read and write
2DF1000
heap
page read and write
6511000
heap
page read and write
4B10000
heap
page read and write
6525000
heap
page read and write
27030F26000
heap
page read and write
7DD000
heap
page read and write
5611000
heap
page read and write
6527000
heap
page read and write
7FF68F73D000
unkown
page execute read
15AC8CAC000
heap
page read and write
54C2000
heap
page read and write
7FF68BB3D000
unkown
page execute read
7FF68AC91000
unkown
page execute read
241E9930000
heap
page read and write
7FF690B3D000
unkown
page execute read
5412000
heap
page read and write
27032A47000
heap
page execute and read and write
7FFD9B210000
trusted library allocation
page read and write
7FFD9B170000
trusted library allocation
page read and write
5510000
heap
page read and write
53D0000
heap
page read and write
7E5000
heap
page read and write
6513000
heap
page read and write
6511000
heap
page read and write
98000
stack
page read and write
54BF000
heap
page read and write
7FFD9B070000
trusted library allocation
page execute and read and write
7CF000
heap
page read and write
5510000
heap
page read and write
4CD0000
heap
page read and write
4C90000
heap
page read and write
5510000
heap
page read and write
26CE0697000
heap
page read and write
15AC8CDB000
heap
page read and write
23799CFF000
heap
page read and write
23799B20000
heap
page read and write
7FFD9B1A0000
trusted library allocation
page read and write
5691000
heap
page read and write
24BB6BA0000
heap
page read and write
7FF68CF3D000
unkown
page execute read
5690000
heap
page read and write
23781430000
trusted library allocation
page read and write
7FFD9AED0000
trusted library allocation
page read and write
7FF68F73D000
unkown
page execute read
241E9A10000
heap
page read and write
5658000
heap
page read and write
2D71000
heap
page read and write
908303E000
stack
page read and write
24BB6A3C000
heap
page read and write
7310000
direct allocation
page read and write
66D1000
heap
page read and write
5391000
heap
page read and write
5610000
heap
page read and write
65D1000
heap
page read and write
24BB6BB0000
heap
page read and write
15AC8CCC000
heap
page read and write
820000
heap
page read and write
2D2C000
stack
page read and write
2D76000
heap
page read and write
9082D7F000
stack
page read and write
270311F0000
heap
page read and write
51B0000
heap
page read and write
6610000
heap
page read and write
838000
heap
page read and write
23782D86000
trusted library allocation
page read and write
4C90000
heap
page read and write
6523000
heap
page read and write
5C10000
direct allocation
page read and write
51B7000
heap
page read and write
53D1000
heap
page read and write
27042C95000
trusted library allocation
page read and write
54BA000
heap
page read and write
7FF692ABA000
unkown
page readonly
2704AFE0000
heap
page read and write
7FFD9AEC4000
trusted library allocation
page read and write
603F3FF000
unkown
page read and write
237FF4F0000
heap
page read and write
837000
heap
page read and write
C0DF7BE000
stack
page read and write
241E9A75000
heap
page read and write
278C000
stack
page read and write
27032A40000
heap
page execute and read and write
7FF69013D000
unkown
page execute read
56D0000
heap
page read and write
4C11000
heap
page read and write
2704B530000
heap
page read and write
5510000
heap
page read and write
7FFD9B200000
trusted library allocation
page read and write
838000
heap
page read and write
603F2FB000
stack
page read and write
54B4000
heap
page read and write
19A000
stack
page read and write
15AC8CCC000
heap
page read and write
2D71000
heap
page read and write
23799B19000
heap
page read and write
7FFD9B120000
trusted library allocation
page read and write
26CE0678000
heap
page read and write
6527000
heap
page read and write
26CE06CD000
heap
page read and write
56D0000
heap
page read and write
23799CA0000
heap
page execute and read and write
5658000
heap
page read and write
6521000
heap
page read and write
9082A7E000
stack
page read and write
241E9A50000
heap
page read and write
5392000
heap
page read and write
7FFD9B1D3000
trusted library allocation
page read and write
22E0000
heap
page read and write
59F000
unkown
page readonly
7FFD9B130000
trusted library allocation
page read and write
7FF690B3D000
unkown
page execute read
2704AAE7000
heap
page read and write
23799CD0000
heap
page read and write
5034000
heap
page read and write
23799CE8000
heap
page read and write
7FF68AC91000
unkown
page execute read
226C000
stack
page read and write
26CE069C000
heap
page read and write
7FFD9B230000
trusted library allocation
page read and write
6D7000
heap
page read and write
5659000
heap
page read and write
27030E80000
heap
page read and write
6521000
heap
page read and write
26CE06BB000
heap
page read and write
7FFD9B1F0000
trusted library allocation
page read and write
4D11000
heap
page read and write
4F0F000
stack
page read and write
23799B2A000
heap
page read and write
6D5000
heap
page read and write
273C3BE0000
heap
page read and write
54B6000
heap
page read and write
A4F000
stack
page read and write
C0DF837000
stack
page read and write
237FF72E000
heap
page read and write
7FFD9B120000
trusted library allocation
page read and write
6524000
heap
page read and write
7FFD9B092000
trusted library allocation
page read and write
4D50000
heap
page read and write
5658000
heap
page read and write
15AC8CA6000
heap
page read and write
720000
heap
page read and write
23799A72000
heap
page read and write
7FFD9B220000
trusted library allocation
page read and write
5451000
heap
page read and write
5490000
heap
page read and write
23781470000
heap
page readonly
23799A81000
heap
page read and write
4F2C000
heap
page read and write
27033E78000
trusted library allocation
page read and write
71E000
stack
page read and write
1939EA20000
heap
page read and write
C0DFBBB000
stack
page read and write
270341D9000
trusted library allocation
page read and write
6525000
heap
page read and write
7FFD9B1D0000
trusted library allocation
page read and write
23781450000
trusted library allocation
page read and write
237FF5D0000
heap
page read and write
83A000
heap
page read and write
2704AF9C000
heap
page read and write
51AD000
stack
page read and write
7A7000
heap
page read and write
5658000
heap
page read and write
529E000
stack
page read and write
1939EA10000
heap
page read and write
590F000
stack
page read and write
4D10000
heap
page read and write
7FFD9B1C0000
trusted library allocation
page read and write
273C3E80000
heap
page read and write
26CE0696000
heap
page read and write
6525000
heap
page read and write
C5092FE000
unkown
page read and write
27030F69000
heap
page read and write
23782DE2000
trusted library allocation
page read and write
81B000
heap
page read and write
5658000
heap
page read and write
2DF1000
heap
page read and write
2D71000
heap
page read and write
23782D5B000
trusted library allocation
page read and write
9082CFE000
stack
page read and write
27030EA0000
heap
page read and write
7FFD9B0E0000
trusted library allocation
page read and write
C0DF779000
stack
page read and write
5499000
heap
page read and write
C0DF67F000
stack
page read and write
7D7000
heap
page read and write
24BB69C0000
heap
page read and write
7B3000
heap
page read and write
27034392000
trusted library allocation
page read and write
54B5000
heap
page read and write
6550000
heap
page read and write
270311A0000
trusted library allocation
page read and write
66D1000
heap
page read and write
7FFD9B100000
trusted library allocation
page read and write
7FF692ACA000
unkown
page readonly
4FBA000
direct allocation
page read and write
826000
heap
page read and write
2915000
heap
page read and write
23799CF0000
heap
page read and write
5590000
heap
page read and write
90827E3000
stack
page read and write
841000
heap
page read and write
7FFD9B062000
trusted library allocation
page read and write
65D0000
heap
page read and write
6527000
heap
page read and write
27031160000
trusted library allocation
page read and write
7FFD9AF70000
trusted library allocation
page execute and read and write
27030F2E000
heap
page read and write
8B0C18B000
stack
page read and write
7FFD9B210000
trusted library allocation
page read and write
6718000
heap
page read and write
5511000
heap
page read and write
3030000
direct allocation
page read and write
6521000
heap
page read and write
51B1000
heap
page read and write
5710000
direct allocation
page read and write
DABFFF000
stack
page read and write
C0DF9BE000
stack
page read and write
23799AA0000
heap
page read and write
5390000
heap
page read and write
6510000
heap
page read and write
7FFD9AF70000
trusted library allocation
page read and write
401000
unkown
page execute read
237FF758000
heap
page read and write
6591000
heap
page read and write
27032AC0000
heap
page execute and read and write
C0DF57D000
stack
page read and write
270343BD000
trusted library allocation
page read and write
5350000
heap
page read and write
5EA0000
direct allocation
page read and write
A90EAFF000
stack
page read and write
23799BA0000
heap
page read and write
4E1E000
heap
page read and write
2348000
heap
page read and write
7E1000
heap
page read and write
C0DF1DF000
stack
page read and write
4FB000
unkown
page read and write
7FFD9B060000
trusted library allocation
page read and write
2704B030000
heap
page read and write
81B000
heap
page read and write
6526000
heap
page read and write
82E000
heap
page read and write
9082EB7000
stack
page read and write
7FFD9B0A2000
trusted library allocation
page read and write
841000
heap
page read and write
2D70000
heap
page read and write
549F000
heap
page read and write
7FF69293D000
unkown
page execute read
8B0C5FE000
stack
page read and write
4E10000
direct allocation
page read and write
1939ED55000
heap
page read and write
23781480000
trusted library allocation
page read and write
4C10000
heap
page read and write
7FFD9AEB2000
trusted library allocation
page read and write
6010000
direct allocation
page read and write
2910000
heap
page read and write
841000
heap
page read and write
54AE000
heap
page read and write
401000
unkown
page execute read
2703476A000
trusted library allocation
page read and write
7A3000
heap
page read and write
26CE06A9000
heap
page read and write
9082E3F000
stack
page read and write
5510000
heap
page read and write
7FFD9AECB000
trusted library allocation
page read and write
23799A26000
heap
page execute and read and write
603F4FF000
stack
page read and write
27030E70000
heap
page read and write
5260000
direct allocation
page read and write
C0DF47E000
stack
page read and write
56D0000
heap
page read and write
54B3000
heap
page read and write
7DF000
heap
page read and write
2D71000
heap
page read and write
9082C7E000
stack
page read and write
273C3CA7000
heap
page read and write
5658000
heap
page read and write
4D11000
heap
page read and write
6511000
heap
page read and write
549E000
heap
page read and write
54A4000
heap
page read and write
DABBBE000
stack
page read and write
27031225000
heap
page read and write
270341E3000
trusted library allocation
page read and write
83A000
heap
page read and write
27042AF0000
trusted library allocation
page read and write
56D1000
heap
page read and write
2CB0000
direct allocation
page read and write
15AC8C20000
heap
page read and write
6525000
heap
page read and write
7FFD9B071000
trusted library allocation
page read and write
237994E3000
trusted library allocation
page read and write
7FFD9B0F0000
trusted library allocation
page read and write
51B2000
heap
page read and write
C0DFB3E000
stack
page read and write
C0DFA3E000
stack
page read and write
7FFD9B1B0000
trusted library allocation
page read and write
829000
heap
page read and write
24BB68E0000
heap
page read and write
522D000
heap
page read and write
5A10000
direct allocation
page read and write
23799D20000
heap
page read and write
81F000
heap
page read and write
7FFD9AF76000
trusted library allocation
page read and write
6718000
heap
page read and write
27030F6D000
heap
page read and write
5411000
heap
page read and write
54B9000
heap
page read and write
5410000
heap
page read and write
5391000
heap
page read and write
4D91000
heap
page read and write
5658000
heap
page read and write
2704B150000
heap
page read and write
6522000
heap
page read and write
237FF5F0000
heap
page read and write
6527000
heap
page read and write
270311FA000
heap
page read and write
7FF691F3D000
unkown
page execute read
54CB000
heap
page read and write
2D71000
heap
page read and write
2704AF30000
heap
page read and write
27030F20000
heap
page read and write
237814A0000
heap
page read and write
7FFD9B160000
trusted library allocation
page read and write
7FF69293D000
unkown
page execute read
23799A7F000
heap
page read and write
241E9B50000
heap
page read and write
7FFD9B205000
trusted library allocation
page read and write
54AA000
heap
page read and write
7FFD9AF6C000
trusted library allocation
page execute and read and write
7FFD9B080000
trusted library allocation
page execute and read and write
7FFD9B100000
trusted library allocation
page read and write
6CE000
stack
page read and write
10E7BFF000
unkown
page read and write
5B0000
heap
page read and write
15AC8CD1000
heap
page read and write
81B000
heap
page read and write
7FF68CF3D000
unkown
page execute read
23782BA3000
trusted library allocation
page read and write
24BB6A30000
heap
page read and write
51B3000
heap
page read and write
5552000
heap
page read and write
54B2000
heap
page read and write
C0DF153000
stack
page read and write
7FFD9AEB3000
trusted library allocation
page execute and read and write
9082AFE000
stack
page read and write
7A7000
heap
page read and write
841000
heap
page read and write
4C50000
heap
page read and write
237994E0000
trusted library allocation
page read and write
10E7CFF000
stack
page read and write
273C3CC9000
heap
page read and write
23791664000
trusted library allocation
page read and write
1939EC40000
heap
page read and write
4CD0000
heap
page read and write
27030F2C000
heap
page read and write
7FF68AC90000
unkown
page readonly
7F5000
heap
page read and write
7FFD9B209000
trusted library allocation
page read and write
273C3E90000
heap
page read and write
23799A4A000
heap
page read and write
23799EE0000
heap
page read and write
7FFD9B0E0000
trusted library allocation
page read and write
5591000
heap
page read and write
6521000
heap
page read and write
23782ADD000
trusted library allocation
page read and write
15AC8CA6000
heap
page read and write
2703450A000
trusted library allocation
page read and write
26CE08B5000
heap
page read and write
6690000
heap
page read and write
8B0C47E000
stack
page read and write
7FFD9B1E0000
trusted library allocation
page read and write
54AF000
heap
page read and write
7FF68E33D000
unkown
page execute read
7FF68AC91000
unkown
page execute read
7FFD9B190000
trusted library allocation
page read and write
54CB000
heap
page read and write
237FF712000
heap
page read and write
2FB0000
direct allocation
page read and write
4FF000
unkown
page read and write
54CB000
heap
page read and write
7FF68AC90000
unkown
page readonly
4C11000
heap
page read and write
5310000
heap
page read and write
26CE0630000
heap
page read and write
2703441A000
trusted library allocation
page read and write
7FFD9AF60000
trusted library allocation
page read and write
54A0000
heap
page read and write
237820DD000
trusted library allocation
page read and write
7FFD9B06A000
trusted library allocation
page read and write
553000
unkown
page read and write
2D71000
heap
page read and write
841000
heap
page read and write
2CB0000
trusted library allocation
page read and write
2704B176000
heap
page read and write
7FFD9AF96000
trusted library allocation
page execute and read and write
7FFD9B050000
trusted library allocation
page read and write
6527000
heap
page read and write
23799524000
heap
page read and write
237814B1000
trusted library allocation
page read and write
7FFD9B1C0000
trusted library allocation
page read and write
15AC8CCC000
heap
page read and write
7AF000
heap
page read and write
7FF68ED3D000
unkown
page execute read
2270000
heap
page read and write
5658000
heap
page read and write
6511000
heap
page read and write
5658000
heap
page read and write
7FFD9B0F0000
trusted library allocation
page read and write
7DF000
heap
page read and write
83A000
heap
page read and write
237FF680000
heap
page read and write
2210000
heap
page read and write
15AC8F50000
heap
page read and write
9082DF9000
stack
page read and write
241E9A30000
heap
page read and write
2704AF6C000
heap
page read and write
400000
unkown
page readonly
7FF68C53D000
unkown
page execute read
A90E8FC000
stack
page read and write
27030EE0000
heap
page read and write
7FFD9B0B0000
trusted library allocation
page read and write
7FF68B13D000
unkown
page execute read
5411000
heap
page read and write
59F000
unkown
page readonly
7FFD9B0B0000
trusted library allocation
page execute and read and write
838000
heap
page read and write
7FFD9B061000
trusted library allocation
page read and write
5690000
heap
page read and write
6036000
direct allocation
page read and write
5391000
heap
page read and write
5311000
heap
page read and write
241E9A5B000
heap
page read and write
270310F0000
trusted library allocation
page read and write
237914B1000
trusted library allocation
page read and write
838000
heap
page read and write
237FF70E000
heap
page read and write
2D71000
heap
page read and write
237FF640000
heap
page read and write
7FFD9AEC0000
trusted library allocation
page read and write
823000
heap
page read and write
2D71000
heap
page read and write
651E000
heap
page read and write
54B1000
heap
page read and write
5511000
heap
page read and write
66D0000
heap
page read and write
7FFD9B1F5000
trusted library allocation
page read and write
2CB0000
direct allocation
page read and write
7FFD9B140000
trusted library allocation
page read and write
26CE0670000
heap
page read and write
4C50000
heap
page read and write
4D50000
heap
page read and write
5311000
heap
page read and write
9082BFC000
stack
page read and write
7FF692AB1000
unkown
page readonly
237FF686000
heap
page read and write
27042AE1000
trusted library allocation
page read and write
9083C0E000
stack
page read and write
C5093FF000
stack
page read and write
51B4000
heap
page read and write
DABEFE000
stack
page read and write
7FFD9B180000
trusted library allocation
page read and write
27032AD0000
heap
page read and write
7FFD9B200000
trusted library allocation
page read and write
41E000
unkown
page read and write
6527000
heap
page read and write
469000
unkown
page read and write
5AD0000
direct allocation
page read and write
24BB69E0000
heap
page read and write
15AC8CCF000
heap
page read and write
6650000
heap
page read and write
8B0C67F000
stack
page read and write
7FFD9AFD0000
trusted library allocation
page execute and read and write
6511000
heap
page read and write
DABB3B000
stack
page read and write
7FF692ACA000
unkown
page readonly
5510000
heap
page read and write
303C000
stack
page read and write
15AC8CD6000
heap
page read and write
6527000
heap
page read and write
273C3CA0000
heap
page read and write
15AC8CDB000
heap
page read and write
2D71000
heap
page read and write
51BE000
heap
page read and write
7BA000
heap
page read and write
54B4000
heap
page read and write
7FFD9AF66000
trusted library allocation
page read and write
56D0000
heap
page read and write
7FFD9AF80000
trusted library allocation
page execute and read and write
412000
unkown
page read and write
237FF710000
heap
page read and write
4E61000
direct allocation
page read and write
7FFD9B1B0000
trusted library allocation
page read and write
270311F6000
heap
page read and write
51BD000
heap
page read and write
27032D0D000
trusted library allocation
page read and write
6529000
heap
page read and write
7FF692AB1000
unkown
page readonly
There are 751 hidden memdumps, click here to show them.