Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
github_softwares_v1.18.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
\Device\Mup\user-PC\PIPE\samr
|
GLS_BINARY_LSB_FIRST
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\github_softwares_v1.18.exe
|
"C:\Users\user\Desktop\github_softwares_v1.18.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bravedreacisopm.shop
|
|||
stimultaionsppzv.shop
|
|||
horizonvxjis.shop
|
|||
weaknessmznxo.shop
|
|||
broccoltisop.shop
|
|||
grassytaisol.shop
|
|||
parntorpkxzlp.shop
|
|||
effectivedoxzj.shop
|
|||
shellfyyousdjz.shop
|
|||
http://html4/loose.dtd
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://weaknessmznxo.shop/api-L
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://weaknessmznxo.shop/GHd
|
unknown
|
||
https://weaknessmznxo.shop/api
|
172.67.159.243
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://.css
|
unknown
|
||
https://weaknessmznxo.shop/H
|
unknown
|
||
https://weaknessmznxo.shop:443/api
|
unknown
|
||
https://weaknessmznxo.shop/22
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://weaknessmznxo.shop/api0fB?
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://weaknessmznxo.shop/
|
unknown
|
||
https://gorm.io/docs/hooks.htmlWarning:
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://weaknessmznxo.shop/((
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://weaknessmznxo.shop/h
|
unknown
|
||
https://weaknessmznxo.shop:443/api6
|
unknown
|
||
https://weaknessmznxo.shop/apiBU
|
unknown
|
There are 42 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
weaknessmznxo.shop
|
172.67.159.243
|
||
18.31.95.13.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.159.243
|
weaknessmznxo.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000618000
|
direct allocation
|
page read and write
|
||
7FF764F18000
|
unkown
|
page readonly
|
||
7FF764F18000
|
unkown
|
page readonly
|
||
2F10000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
5025000
|
trusted library allocation
|
page read and write
|
||
50DB000
|
trusted library allocation
|
page read and write
|
||
5045000
|
trusted library allocation
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
4FD7000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
2EEF000
|
heap
|
page read and write
|
||
2EE1000
|
heap
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
2F2D000
|
heap
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
14A796E3000
|
direct allocation
|
page read and write
|
||
500F000
|
trusted library allocation
|
page read and write
|
||
14A796D0000
|
direct allocation
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
525D000
|
trusted library allocation
|
page read and write
|
||
C000244000
|
direct allocation
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
2EF1000
|
heap
|
page read and write
|
||
14A79710000
|
direct allocation
|
page read and write
|
||
2F07000
|
heap
|
page read and write
|
||
C000316000
|
direct allocation
|
page read and write
|
||
7845FF000
|
stack
|
page read and write
|
||
C000212000
|
direct allocation
|
page read and write
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
2EE5000
|
heap
|
page read and write
|
||
2EF9000
|
heap
|
page read and write
|
||
5018000
|
trusted library allocation
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
7FF765D56000
|
unkown
|
page write copy
|
||
5039000
|
trusted library allocation
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
2F06000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
14A544C0000
|
heap
|
page read and write
|
||
2E6F000
|
heap
|
page read and write
|
||
5055000
|
trusted library allocation
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
2F02000
|
heap
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
2F02000
|
heap
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
7FF764E23000
|
unkown
|
page read and write
|
||
2EE5000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
7FF764EE7000
|
unkown
|
page read and write
|
||
C000340000
|
direct allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
C000580000
|
direct allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
2E9F000
|
heap
|
page read and write
|
||
2F02000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
2EE1000
|
heap
|
page read and write
|
||
14A543F0000
|
heap
|
page read and write
|
||
7FF765D4E000
|
unkown
|
page write copy
|
||
C00018B000
|
direct allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
7FF765D62000
|
unkown
|
page write copy
|
||
C000170000
|
direct allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
7FF765D64000
|
unkown
|
page readonly
|
||
2E3E000
|
stack
|
page read and write
|
||
5004000
|
trusted library allocation
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
5049000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2EF9000
|
heap
|
page read and write
|
||
7FF764E2B000
|
unkown
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
510C000
|
trusted library allocation
|
page read and write
|
||
C000250000
|
direct allocation
|
page read and write
|
||
2EEF000
|
heap
|
page read and write
|
||
14A79740000
|
direct allocation
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
7FF765D3E000
|
unkown
|
page read and write
|
||
C00021C000
|
direct allocation
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
4A8D000
|
stack
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
7843FE000
|
stack
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
C00027C000
|
direct allocation
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
2F22000
|
heap
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
7FF764E21000
|
unkown
|
page write copy
|
||
7FF764A31000
|
unkown
|
page execute read
|
||
2F29000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
C00008B000
|
direct allocation
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
2F21000
|
heap
|
page read and write
|
||
4FDA000
|
trusted library allocation
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
C000524000
|
direct allocation
|
page read and write
|
||
7847FE000
|
stack
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
2F02000
|
heap
|
page read and write
|
||
5945000
|
trusted library allocation
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
4FF6000
|
trusted library allocation
|
page read and write
|
||
14A54444000
|
direct allocation
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
50F4000
|
trusted library allocation
|
page read and write
|
||
5244000
|
trusted library allocation
|
page read and write
|
||
2F1E000
|
heap
|
page read and write
|
||
7FF765D39000
|
unkown
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
14A79900000
|
direct allocation
|
page read and write
|
||
2E89000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
14A54234000
|
heap
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
2EA8000
|
heap
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
7FF764E32000
|
unkown
|
page read and write
|
||
2A00000
|
remote allocation
|
page execute and read and write
|
||
7FF764E20000
|
unkown
|
page write copy
|
||
C000482000
|
direct allocation
|
page read and write
|
||
2F02000
|
heap
|
page read and write
|
||
2E6F000
|
heap
|
page read and write
|
||
7FF764F0C000
|
unkown
|
page write copy
|
||
2F19000
|
heap
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
C0006DC000
|
direct allocation
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
2E5B000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
7FF765D56000
|
unkown
|
page write copy
|
||
2E89000
|
heap
|
page read and write
|
||
14A79748000
|
direct allocation
|
page read and write
|
||
2EF1000
|
heap
|
page read and write
|
||
2EEF000
|
heap
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
7FF764F05000
|
unkown
|
page read and write
|
||
14A54448000
|
direct allocation
|
page read and write
|
||
C000538000
|
direct allocation
|
page read and write
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
47DF000
|
stack
|
page read and write
|
||
7FF764030000
|
unkown
|
page readonly
|
||
2C40000
|
remote allocation
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
C000230000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
500C000
|
trusted library allocation
|
page read and write
|
||
14A799A1000
|
direct allocation
|
page read and write
|
||
2F2D000
|
heap
|
page read and write
|
||
C000470000
|
direct allocation
|
page read and write
|
||
4FD7000
|
trusted library allocation
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
7FF764E2A000
|
unkown
|
page write copy
|
||
C000242000
|
direct allocation
|
page read and write
|
||
2EF9000
|
heap
|
page read and write
|
||
524F000
|
stack
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
501D000
|
trusted library allocation
|
page read and write
|
||
5051000
|
trusted library allocation
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
C000222000
|
direct allocation
|
page read and write
|
||
14A54220000
|
heap
|
page read and write
|
||
2C40000
|
remote allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
14A54229000
|
heap
|
page read and write
|
||
14A797C6000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
2EDD000
|
heap
|
page read and write
|
||
14A7971D000
|
direct allocation
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
2EE9000
|
heap
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
2E8B000
|
heap
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
4FEF000
|
trusted library allocation
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
783FFE000
|
stack
|
page read and write
|
||
C000218000
|
direct allocation
|
page read and write
|
||
4FFD000
|
trusted library allocation
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
2F1B000
|
heap
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
2E89000
|
heap
|
page read and write
|
||
5009000
|
trusted library allocation
|
page read and write
|
||
C00031A000
|
direct allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
7FF765918000
|
unkown
|
page readonly
|
||
C000052000
|
direct allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
5067000
|
trusted library allocation
|
page read and write
|
||
4FF7000
|
trusted library allocation
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
2F1F000
|
heap
|
page read and write
|
||
2F1E000
|
heap
|
page read and write
|
||
5007000
|
trusted library allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
2EF1000
|
heap
|
page read and write
|
||
4FD5000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
2EF1000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
7FF764EBC000
|
unkown
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
7FF764EC1000
|
unkown
|
page write copy
|
||
4FD2000
|
trusted library allocation
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
C000091000
|
direct allocation
|
page read and write
|
||
14A79750000
|
direct allocation
|
page read and write
|
||
5009000
|
trusted library allocation
|
page read and write
|
||
503D000
|
trusted library allocation
|
page read and write
|
||
14A544A0000
|
direct allocation
|
page read and write
|
||
7FF764E30000
|
unkown
|
page read and write
|
||
2EF3000
|
heap
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
2F1E000
|
heap
|
page read and write
|
||
7FF764F16000
|
unkown
|
page write copy
|
||
C00024C000
|
direct allocation
|
page read and write
|
||
2F22000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
7FF764F07000
|
unkown
|
page write copy
|
||
7841FF000
|
stack
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
51AC000
|
trusted library allocation
|
page read and write
|
||
5055000
|
trusted library allocation
|
page read and write
|
||
7FF764EF0000
|
unkown
|
page read and write
|
||
2E9F000
|
heap
|
page read and write
|
||
14A5422C000
|
heap
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
7FF764A31000
|
unkown
|
page execute read
|
||
517C000
|
trusted library allocation
|
page read and write
|
||
783DFF000
|
stack
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
491E000
|
stack
|
page read and write
|
||
C0000FC000
|
direct allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
2E89000
|
heap
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
2F08000
|
heap
|
page read and write
|
||
C00044E000
|
direct allocation
|
page read and write
|
||
512C000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
C000314000
|
direct allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
C00025A000
|
direct allocation
|
page read and write
|
||
2E48000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
14A79950000
|
direct allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
4FD7000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
2D9D000
|
stack
|
page read and write
|
||
4FFF000
|
trusted library allocation
|
page read and write
|
||
14A54210000
|
heap
|
page read and write
|
||
2E89000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
2EE3000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
7FF765D4F000
|
unkown
|
page write copy
|
||
2F22000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
4FF9000
|
trusted library allocation
|
page read and write
|
||
14A797D0000
|
direct allocation
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
7FF764E20000
|
unkown
|
page read and write
|
||
C000248000
|
direct allocation
|
page read and write
|
||
14A79723000
|
direct allocation
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
14A79797000
|
direct allocation
|
page read and write
|
||
51A4000
|
trusted library allocation
|
page read and write
|
||
C0000ED000
|
direct allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
4FDD000
|
trusted library allocation
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
C000216000
|
direct allocation
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
C000308000
|
direct allocation
|
page read and write
|
||
2EE5000
|
heap
|
page read and write
|
||
4FD4000
|
trusted library allocation
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
5007000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
50D5000
|
trusted library allocation
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
501D000
|
trusted library allocation
|
page read and write
|
||
2F06000
|
heap
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
C00007C000
|
direct allocation
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
C0000FA000
|
direct allocation
|
page read and write
|
||
7FF764031000
|
unkown
|
page execute read
|
||
7FF765D62000
|
unkown
|
page write copy
|
||
2F14000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
14A54410000
|
heap
|
page read and write
|
||
C0001F7000
|
direct allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
5254000
|
trusted library allocation
|
page read and write
|
||
503D000
|
trusted library allocation
|
page read and write
|
||
48DD000
|
stack
|
page read and write
|
||
2F0D000
|
heap
|
page read and write
|
||
5009000
|
trusted library allocation
|
page read and write
|
||
783BFD000
|
stack
|
page read and write
|
||
C00048C000
|
direct allocation
|
page read and write
|
||
C00008F000
|
direct allocation
|
page read and write
|
||
C00030C000
|
direct allocation
|
page read and write
|
||
7FF765D64000
|
unkown
|
page readonly
|
||
7FF765918000
|
unkown
|
page readonly
|
||
14A7978D000
|
direct allocation
|
page read and write
|
||
2F2D000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
2F06000
|
heap
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
C000372000
|
direct allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
2F1F000
|
heap
|
page read and write
|
||
5001000
|
trusted library allocation
|
page read and write
|
||
C00026A000
|
direct allocation
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
C000189000
|
direct allocation
|
page read and write
|
||
7FF764E2D000
|
unkown
|
page write copy
|
||
7FF765D4E000
|
unkown
|
page read and write
|
||
277B000
|
stack
|
page read and write
|
||
2F1F000
|
heap
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
2F26000
|
heap
|
page read and write
|
||
2F2B000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
7FF764F14000
|
unkown
|
page read and write
|
||
7FF764F16000
|
unkown
|
page write copy
|
||
2C55000
|
heap
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
2E89000
|
heap
|
page read and write
|
||
C000042000
|
direct allocation
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
C00051E000
|
direct allocation
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
14A798F0000
|
direct allocation
|
page read and write
|
||
2E8B000
|
heap
|
page read and write
|
||
4FFA000
|
trusted library allocation
|
page read and write
|
||
7FF764E31000
|
unkown
|
page write copy
|
||
7FF764030000
|
unkown
|
page readonly
|
||
7849FF000
|
stack
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
C000040000
|
direct allocation
|
page read and write
|
||
7FF764E33000
|
unkown
|
page write copy
|
||
C000067000
|
direct allocation
|
page read and write
|
||
C000500000
|
direct allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
5001000
|
trusted library allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
C00051C000
|
direct allocation
|
page read and write
|
||
7FF764F02000
|
unkown
|
page write copy
|
||
2EE3000
|
heap
|
page read and write
|
||
7FF765CA9000
|
unkown
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
2F1F000
|
heap
|
page read and write
|
||
5E5A000
|
trusted library allocation
|
page read and write
|
||
2F38000
|
heap
|
page read and write
|
||
4FE8000
|
trusted library allocation
|
page read and write
|
||
C00008D000
|
direct allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
2C57000
|
heap
|
page read and write
|
||
14A798B0000
|
direct allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
4FE3000
|
trusted library allocation
|
page read and write
|
||
14A54440000
|
direct allocation
|
page read and write
|
||
C000069000
|
direct allocation
|
page read and write
|
||
7FF765CCA000
|
unkown
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
C00026C000
|
direct allocation
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
C000187000
|
direct allocation
|
page read and write
|
||
2C40000
|
remote allocation
|
page read and write
|
||
7FF764F09000
|
unkown
|
page read and write
|
||
51B4000
|
trusted library allocation
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
C0006A1000
|
direct allocation
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
2EEC000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
501E000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
2EFB000
|
heap
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
4FEE000
|
trusted library allocation
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
4FFA000
|
trusted library allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C0005F4000
|
direct allocation
|
page read and write
|
||
14A79726000
|
direct allocation
|
page read and write
|
||
2EE9000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
2EE3000
|
heap
|
page read and write
|
||
7FF764031000
|
unkown
|
page execute read
|
||
2EE1000
|
heap
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
C000185000
|
direct allocation
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
7FF764EED000
|
unkown
|
page write copy
|
||
2EF4000
|
heap
|
page read and write
|
||
14A79728000
|
direct allocation
|
page read and write
|
||
14A79820000
|
direct allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
14A544C5000
|
heap
|
page read and write
|
||
2F1F000
|
heap
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
2A51000
|
remote allocation
|
page execute and read and write
|
||
4FFF000
|
trusted library allocation
|
page read and write
|
||
C00053C000
|
direct allocation
|
page read and write
|
||
27BB000
|
stack
|
page read and write
|
||
C000536000
|
direct allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
There are 533 hidden memdumps, click here to show them.