IOC Report
github_softwares_v1.18.exe

loading gif

Files

File Path
Type
Category
Malicious
github_softwares_v1.18.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
\Device\Mup\user-PC\PIPE\samr
GLS_BINARY_LSB_FIRST
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\github_softwares_v1.18.exe
"C:\Users\user\Desktop\github_softwares_v1.18.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
bravedreacisopm.shop
malicious
stimultaionsppzv.shop
malicious
horizonvxjis.shop
malicious
weaknessmznxo.shop
malicious
broccoltisop.shop
malicious
grassytaisol.shop
malicious
parntorpkxzlp.shop
malicious
effectivedoxzj.shop
malicious
shellfyyousdjz.shop
malicious
http://html4/loose.dtd
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://weaknessmznxo.shop/api-L
unknown
https://duckduckgo.com/ac/?q=
unknown
https://weaknessmznxo.shop/GHd
unknown
https://weaknessmznxo.shop/api
172.67.159.243
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://.css
unknown
https://weaknessmznxo.shop/H
unknown
https://weaknessmznxo.shop:443/api
unknown
https://weaknessmznxo.shop/22
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://weaknessmznxo.shop/api0fB?
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://.jpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://weaknessmznxo.shop/
unknown
https://gorm.io/docs/hooks.htmlWarning:
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://weaknessmznxo.shop/((
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://weaknessmznxo.shop/h
unknown
https://weaknessmznxo.shop:443/api6
unknown
https://weaknessmznxo.shop/apiBU
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
weaknessmznxo.shop
172.67.159.243
malicious
18.31.95.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
172.67.159.243
weaknessmznxo.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C000618000
direct allocation
page read and write
malicious
7FF764F18000
unkown
page readonly
malicious
7FF764F18000
unkown
page readonly
malicious
2F10000
heap
page read and write
2E7B000
heap
page read and write
5025000
trusted library allocation
page read and write
50DB000
trusted library allocation
page read and write
5045000
trusted library allocation
page read and write
2F19000
heap
page read and write
2EFB000
heap
page read and write
4FD7000
trusted library allocation
page read and write
2F1A000
heap
page read and write
C000096000
direct allocation
page read and write
4FE9000
trusted library allocation
page read and write
2EEF000
heap
page read and write
2EE1000
heap
page read and write
5014000
trusted library allocation
page read and write
2F2D000
heap
page read and write
4FD1000
trusted library allocation
page read and write
C000080000
direct allocation
page read and write
2EF5000
heap
page read and write
2E70000
heap
page read and write
14A796E3000
direct allocation
page read and write
500F000
trusted library allocation
page read and write
14A796D0000
direct allocation
page read and write
4FD1000
trusted library allocation
page read and write
525D000
trusted library allocation
page read and write
C000244000
direct allocation
page read and write
2EFF000
heap
page read and write
2EF1000
heap
page read and write
14A79710000
direct allocation
page read and write
2F07000
heap
page read and write
C000316000
direct allocation
page read and write
7845FF000
stack
page read and write
C000212000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
2EE5000
heap
page read and write
2EF9000
heap
page read and write
5018000
trusted library allocation
page read and write
504A000
trusted library allocation
page read and write
50D0000
heap
page read and write
2E75000
heap
page read and write
7FF765D56000
unkown
page write copy
5039000
trusted library allocation
page read and write
2F19000
heap
page read and write
2F06000
heap
page read and write
2F2A000
heap
page read and write
14A544C0000
heap
page read and write
2E6F000
heap
page read and write
5055000
trusted library allocation
page read and write
C000036000
direct allocation
page read and write
2E70000
heap
page read and write
2F2A000
heap
page read and write
2EFB000
heap
page read and write
2F02000
heap
page read and write
C000108000
direct allocation
page read and write
2EFE000
heap
page read and write
2EFB000
heap
page read and write
2E7B000
heap
page read and write
2F02000
heap
page read and write
2F29000
heap
page read and write
4FD1000
trusted library allocation
page read and write
2F2A000
heap
page read and write
7FF764E23000
unkown
page read and write
2EE5000
heap
page read and write
2F2A000
heap
page read and write
7FF764EE7000
unkown
page read and write
C000340000
direct allocation
page read and write
2F0C000
heap
page read and write
C000580000
direct allocation
page read and write
2F2A000
heap
page read and write
2E9F000
heap
page read and write
2F02000
heap
page read and write
553E000
stack
page read and write
C0000DE000
direct allocation
page read and write
2EE1000
heap
page read and write
14A543F0000
heap
page read and write
7FF765D4E000
unkown
page write copy
C00018B000
direct allocation
page read and write
2F2A000
heap
page read and write
4FF0000
trusted library allocation
page read and write
2F24000
heap
page read and write
2F1C000
heap
page read and write
2F09000
heap
page read and write
7FF765D62000
unkown
page write copy
C000170000
direct allocation
page read and write
2EF5000
heap
page read and write
5430000
heap
page read and write
7FF765D64000
unkown
page readonly
2E3E000
stack
page read and write
5004000
trusted library allocation
page read and write
2E75000
heap
page read and write
5049000
trusted library allocation
page read and write
2EF5000
heap
page read and write
2EF9000
heap
page read and write
7FF764E2B000
unkown
page read and write
5021000
trusted library allocation
page read and write
4FD1000
trusted library allocation
page read and write
2A80000
heap
page read and write
510C000
trusted library allocation
page read and write
C000250000
direct allocation
page read and write
2EEF000
heap
page read and write
14A79740000
direct allocation
page read and write
2F1A000
heap
page read and write
5031000
trusted library allocation
page read and write
2EF5000
heap
page read and write
2F1A000
heap
page read and write
7FF765D3E000
unkown
page read and write
C00021C000
direct allocation
page read and write
4FD8000
trusted library allocation
page read and write
4A8D000
stack
page read and write
C000094000
direct allocation
page read and write
2F29000
heap
page read and write
520E000
stack
page read and write
2B9E000
stack
page read and write
7843FE000
stack
page read and write
2F1C000
heap
page read and write
C00027C000
direct allocation
page read and write
2F09000
heap
page read and write
4FD8000
trusted library allocation
page read and write
2F22000
heap
page read and write
2F04000
heap
page read and write
2F29000
heap
page read and write
7FF764E21000
unkown
page write copy
7FF764A31000
unkown
page execute read
2F29000
heap
page read and write
2E7B000
heap
page read and write
C00008B000
direct allocation
page read and write
2F1D000
heap
page read and write
2F21000
heap
page read and write
4FDA000
trusted library allocation
page read and write
2F19000
heap
page read and write
C000524000
direct allocation
page read and write
7847FE000
stack
page read and write
2EFE000
heap
page read and write
2F0E000
heap
page read and write
2F29000
heap
page read and write
2F02000
heap
page read and write
5945000
trusted library allocation
page read and write
2F19000
heap
page read and write
4FF6000
trusted library allocation
page read and write
14A54444000
direct allocation
page read and write
5021000
trusted library allocation
page read and write
2F2A000
heap
page read and write
2F1C000
heap
page read and write
C000074000
direct allocation
page read and write
2F20000
heap
page read and write
50F4000
trusted library allocation
page read and write
5244000
trusted library allocation
page read and write
2F1E000
heap
page read and write
7FF765D39000
unkown
page read and write
2BFE000
stack
page read and write
14A79900000
direct allocation
page read and write
2E89000
heap
page read and write
2F09000
heap
page read and write
14A54234000
heap
page read and write
C000172000
direct allocation
page read and write
2F2A000
heap
page read and write
C0000A4000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
2EA8000
heap
page read and write
4FD1000
trusted library allocation
page read and write
2F10000
heap
page read and write
2F04000
heap
page read and write
2F03000
heap
page read and write
7FF764E32000
unkown
page read and write
2A00000
remote allocation
page execute and read and write
7FF764E20000
unkown
page write copy
C000482000
direct allocation
page read and write
2F02000
heap
page read and write
2E6F000
heap
page read and write
7FF764F0C000
unkown
page write copy
2F19000
heap
page read and write
C0000B6000
direct allocation
page read and write
C0006DC000
direct allocation
page read and write
2F23000
heap
page read and write
2E5B000
heap
page read and write
2F2A000
heap
page read and write
C000158000
direct allocation
page read and write
7FF765D56000
unkown
page write copy
2E89000
heap
page read and write
14A79748000
direct allocation
page read and write
2EF1000
heap
page read and write
2EEF000
heap
page read and write
C000010000
direct allocation
page read and write
4FD1000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
7FF764F05000
unkown
page read and write
14A54448000
direct allocation
page read and write
C000538000
direct allocation
page read and write
C0000EA000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
47DF000
stack
page read and write
7FF764030000
unkown
page readonly
2C40000
remote allocation
page read and write
2F2E000
heap
page read and write
C000200000
direct allocation
page read and write
C000230000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
504A000
trusted library allocation
page read and write
500C000
trusted library allocation
page read and write
14A799A1000
direct allocation
page read and write
2F2D000
heap
page read and write
C000470000
direct allocation
page read and write
4FD7000
trusted library allocation
page read and write
2F19000
heap
page read and write
2F10000
heap
page read and write
2EF7000
heap
page read and write
2DDE000
stack
page read and write
2F19000
heap
page read and write
7FF764E2A000
unkown
page write copy
C000242000
direct allocation
page read and write
2EF9000
heap
page read and write
524F000
stack
page read and write
2F23000
heap
page read and write
501D000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
2F19000
heap
page read and write
2F1D000
heap
page read and write
2F09000
heap
page read and write
2F1A000
heap
page read and write
2F04000
heap
page read and write
C000222000
direct allocation
page read and write
14A54220000
heap
page read and write
2C40000
remote allocation
page read and write
C000062000
direct allocation
page read and write
14A54229000
heap
page read and write
14A797C6000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
2EDD000
heap
page read and write
14A7971D000
direct allocation
page read and write
2F04000
heap
page read and write
C00009A000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
2EE9000
heap
page read and write
4FD8000
trusted library allocation
page read and write
2F29000
heap
page read and write
2E8B000
heap
page read and write
4FE9000
trusted library allocation
page read and write
4FEF000
trusted library allocation
page read and write
504A000
trusted library allocation
page read and write
783FFE000
stack
page read and write
C000218000
direct allocation
page read and write
4FFD000
trusted library allocation
page read and write
2F09000
heap
page read and write
2F1D000
heap
page read and write
528E000
stack
page read and write
2F19000
heap
page read and write
2F24000
heap
page read and write
2F1B000
heap
page read and write
2F29000
heap
page read and write
2E89000
heap
page read and write
5009000
trusted library allocation
page read and write
C00031A000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
7FF765918000
unkown
page readonly
C000052000
direct allocation
page read and write
2F20000
heap
page read and write
2EFB000
heap
page read and write
2F19000
heap
page read and write
2F10000
heap
page read and write
5067000
trusted library allocation
page read and write
4FF7000
trusted library allocation
page read and write
4FE9000
trusted library allocation
page read and write
2F04000
heap
page read and write
2F1C000
heap
page read and write
2F1F000
heap
page read and write
2F1E000
heap
page read and write
5007000
trusted library allocation
page read and write
C00006E000
direct allocation
page read and write
2EF1000
heap
page read and write
4FD5000
trusted library allocation
page read and write
2F1A000
heap
page read and write
2EF1000
heap
page read and write
4ECF000
stack
page read and write
7FF764EBC000
unkown
page read and write
2C50000
heap
page read and write
2E40000
heap
page read and write
2F1A000
heap
page read and write
7FF764EC1000
unkown
page write copy
4FD2000
trusted library allocation
page read and write
2E7B000
heap
page read and write
C000091000
direct allocation
page read and write
14A79750000
direct allocation
page read and write
5009000
trusted library allocation
page read and write
503D000
trusted library allocation
page read and write
14A544A0000
direct allocation
page read and write
7FF764E30000
unkown
page read and write
2EF3000
heap
page read and write
2F29000
heap
page read and write
2F1E000
heap
page read and write
7FF764F16000
unkown
page write copy
C00024C000
direct allocation
page read and write
2F22000
heap
page read and write
2EF6000
heap
page read and write
2F19000
heap
page read and write
7FF764F07000
unkown
page write copy
7841FF000
stack
page read and write
C000134000
direct allocation
page read and write
C000150000
direct allocation
page read and write
5021000
trusted library allocation
page read and write
2EF5000
heap
page read and write
51AC000
trusted library allocation
page read and write
5055000
trusted library allocation
page read and write
7FF764EF0000
unkown
page read and write
2E9F000
heap
page read and write
14A5422C000
heap
page read and write
C0000B4000
direct allocation
page read and write
7FF764A31000
unkown
page execute read
517C000
trusted library allocation
page read and write
783DFF000
stack
page read and write
C000252000
direct allocation
page read and write
491E000
stack
page read and write
C0000FC000
direct allocation
page read and write
50D1000
heap
page read and write
2EFB000
heap
page read and write
C00012E000
direct allocation
page read and write
C000044000
direct allocation
page read and write
2F0C000
heap
page read and write
2E89000
heap
page read and write
2F1D000
heap
page read and write
2F08000
heap
page read and write
C00044E000
direct allocation
page read and write
512C000
trusted library allocation
page read and write
2F04000
heap
page read and write
C000314000
direct allocation
page read and write
2F2A000
heap
page read and write
C00025A000
direct allocation
page read and write
2E48000
heap
page read and write
2F1A000
heap
page read and write
14A79950000
direct allocation
page read and write
2F0C000
heap
page read and write
2F1A000
heap
page read and write
C000152000
direct allocation
page read and write
4FD7000
trusted library allocation
page read and write
2F1A000
heap
page read and write
2D9D000
stack
page read and write
4FFF000
trusted library allocation
page read and write
14A54210000
heap
page read and write
2E89000
heap
page read and write
2E70000
heap
page read and write
C00007E000
direct allocation
page read and write
4FE9000
trusted library allocation
page read and write
2EFF000
heap
page read and write
504A000
trusted library allocation
page read and write
4980000
heap
page read and write
2F2A000
heap
page read and write
2EE3000
heap
page read and write
2F2E000
heap
page read and write
C00015C000
direct allocation
page read and write
C000400000
direct allocation
page read and write
4FD8000
trusted library allocation
page read and write
5021000
trusted library allocation
page read and write
7FF765D4F000
unkown
page write copy
2F22000
heap
page read and write
2E7B000
heap
page read and write
2F09000
heap
page read and write
4FF9000
trusted library allocation
page read and write
14A797D0000
direct allocation
page read and write
2E75000
heap
page read and write
2C00000
heap
page read and write
4FD0000
trusted library allocation
page read and write
C000008000
direct allocation
page read and write
2EF0000
heap
page read and write
C000254000
direct allocation
page read and write
7FF764E20000
unkown
page read and write
C000248000
direct allocation
page read and write
14A79723000
direct allocation
page read and write
2F04000
heap
page read and write
2F1A000
heap
page read and write
14A79797000
direct allocation
page read and write
51A4000
trusted library allocation
page read and write
C0000ED000
direct allocation
page read and write
5020000
trusted library allocation
page read and write
2BA0000
heap
page read and write
2F1C000
heap
page read and write
2E75000
heap
page read and write
4FDD000
trusted library allocation
page read and write
C000182000
direct allocation
page read and write
2F29000
heap
page read and write
C000216000
direct allocation
page read and write
C000240000
direct allocation
page read and write
4FE9000
trusted library allocation
page read and write
C000308000
direct allocation
page read and write
2EE5000
heap
page read and write
4FD4000
trusted library allocation
page read and write
2EFB000
heap
page read and write
5007000
trusted library allocation
page read and write
2E70000
heap
page read and write
50D5000
trusted library allocation
page read and write
2F1D000
heap
page read and write
501D000
trusted library allocation
page read and write
2F06000
heap
page read and write
C00004D000
direct allocation
page read and write
C000128000
direct allocation
page read and write
2F09000
heap
page read and write
C00007C000
direct allocation
page read and write
2E75000
heap
page read and write
C0000FA000
direct allocation
page read and write
7FF764031000
unkown
page execute read
7FF765D62000
unkown
page write copy
2F14000
heap
page read and write
2EFB000
heap
page read and write
14A54410000
heap
page read and write
C0001F7000
direct allocation
page read and write
2F0C000
heap
page read and write
2F04000
heap
page read and write
5254000
trusted library allocation
page read and write
503D000
trusted library allocation
page read and write
48DD000
stack
page read and write
2F0D000
heap
page read and write
5009000
trusted library allocation
page read and write
783BFD000
stack
page read and write
C00048C000
direct allocation
page read and write
C00008F000
direct allocation
page read and write
C00030C000
direct allocation
page read and write
7FF765D64000
unkown
page readonly
7FF765918000
unkown
page readonly
14A7978D000
direct allocation
page read and write
2F2D000
heap
page read and write
2EFB000
heap
page read and write
2F06000
heap
page read and write
2F0C000
heap
page read and write
C000372000
direct allocation
page read and write
2F10000
heap
page read and write
2F1F000
heap
page read and write
5001000
trusted library allocation
page read and write
C00026A000
direct allocation
page read and write
2EF8000
heap
page read and write
4FCE000
stack
page read and write
C0000D2000
direct allocation
page read and write
C000189000
direct allocation
page read and write
7FF764E2D000
unkown
page write copy
7FF765D4E000
unkown
page read and write
277B000
stack
page read and write
2F1F000
heap
page read and write
C000162000
direct allocation
page read and write
2F1D000
heap
page read and write
2ED5000
heap
page read and write
5021000
trusted library allocation
page read and write
2F26000
heap
page read and write
2F2B000
heap
page read and write
2EA0000
heap
page read and write
C000106000
direct allocation
page read and write
2EF8000
heap
page read and write
7FF764F14000
unkown
page read and write
7FF764F16000
unkown
page write copy
2C55000
heap
page read and write
2F24000
heap
page read and write
C00002C000
direct allocation
page read and write
2E89000
heap
page read and write
C000042000
direct allocation
page read and write
2EFF000
heap
page read and write
C00051E000
direct allocation
page read and write
2E75000
heap
page read and write
14A798F0000
direct allocation
page read and write
2E8B000
heap
page read and write
4FFA000
trusted library allocation
page read and write
7FF764E31000
unkown
page write copy
7FF764030000
unkown
page readonly
7849FF000
stack
page read and write
C000000000
direct allocation
page read and write
C000018000
direct allocation
page read and write
2EF5000
heap
page read and write
C000040000
direct allocation
page read and write
7FF764E33000
unkown
page write copy
C000067000
direct allocation
page read and write
C000500000
direct allocation
page read and write
5010000
trusted library allocation
page read and write
5001000
trusted library allocation
page read and write
2F25000
heap
page read and write
C00051C000
direct allocation
page read and write
7FF764F02000
unkown
page write copy
2EE3000
heap
page read and write
7FF765CA9000
unkown
page read and write
5021000
trusted library allocation
page read and write
C000098000
direct allocation
page read and write
2F1F000
heap
page read and write
5E5A000
trusted library allocation
page read and write
2F38000
heap
page read and write
4FE8000
trusted library allocation
page read and write
C00008D000
direct allocation
page read and write
C000086000
direct allocation
page read and write
2C57000
heap
page read and write
14A798B0000
direct allocation
page read and write
52E0000
trusted library allocation
page read and write
4FD8000
trusted library allocation
page read and write
4FE3000
trusted library allocation
page read and write
14A54440000
direct allocation
page read and write
C000069000
direct allocation
page read and write
7FF765CCA000
unkown
page read and write
2EF0000
heap
page read and write
C00026C000
direct allocation
page read and write
2F19000
heap
page read and write
2F0C000
heap
page read and write
2F09000
heap
page read and write
4FE9000
trusted library allocation
page read and write
2F2A000
heap
page read and write
C00013A000
direct allocation
page read and write
2F09000
heap
page read and write
C000187000
direct allocation
page read and write
2C40000
remote allocation
page read and write
7FF764F09000
unkown
page read and write
51B4000
trusted library allocation
page read and write
2F03000
heap
page read and write
C0006A1000
direct allocation
page read and write
C00006C000
direct allocation
page read and write
2EEC000
heap
page read and write
2D5E000
stack
page read and write
501E000
trusted library allocation
page read and write
2EFF000
heap
page read and write
2EFB000
heap
page read and write
4FD1000
trusted library allocation
page read and write
4FEE000
trusted library allocation
page read and write
2F1D000
heap
page read and write
4FFA000
trusted library allocation
page read and write
C0000B8000
direct allocation
page read and write
C0005F4000
direct allocation
page read and write
14A79726000
direct allocation
page read and write
2EE9000
heap
page read and write
2E7B000
heap
page read and write
2EE3000
heap
page read and write
7FF764031000
unkown
page execute read
2EE1000
heap
page read and write
C0000A6000
direct allocation
page read and write
C000185000
direct allocation
page read and write
2F19000
heap
page read and write
7FF764EED000
unkown
page write copy
2EF4000
heap
page read and write
14A79728000
direct allocation
page read and write
14A79820000
direct allocation
page read and write
2F25000
heap
page read and write
C00012C000
direct allocation
page read and write
14A544C5000
heap
page read and write
2F1F000
heap
page read and write
C0000B2000
direct allocation
page read and write
2A51000
remote allocation
page execute and read and write
4FFF000
trusted library allocation
page read and write
C00053C000
direct allocation
page read and write
27BB000
stack
page read and write
C000536000
direct allocation
page read and write
2F32000
heap
page read and write
There are 533 hidden memdumps, click here to show them.