IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
alcojoldwograpciw.shop
malicious
incredibleextedwj.shop
malicious
liabilitynighstjsko.shop
malicious
https://shatterbreathepsw.shop/api
104.21.95.19
malicious
https://management.azure.comINVALID
unknown
http://html4/loose.dtd
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://shatterbreathepsw.shop:443/api-release/key4.dbPK
unknown
https://duckduckgo.com/ac/?q=
unknown
https://shatterbreathepsw.shop:443/api
unknown
https://shatterbreathepsw.shop/w6
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://shatterbreathepsw.shop/apii
unknown
https://shatterbreathepsw.shop:443/apirosoft
unknown
http://.css
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://shatterbreathepsw.shop/0
unknown
https://shatterbreathepsw.shop/apiar
unknown
https://shatterbreathepsw.shop/apihort
unknown
https://shatterbreathepsw.shop/&6
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://manage.windowsazure.us/publishsettings/indexMaximum
unknown
https://management.chinacloudapi.cntoo
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://shatterbreathepsw.shop/apiT
unknown
http://.jpg
unknown
https://www.mozilla.or
unknown
https://datalake.azure.net/https://api.loganalytics.iohttps://graph.microsoft.us/https://api.loganal
unknown
https://manage.windowsazure.com/publishsettings/indexnon-CONNECT
unknown
https://shatterbreathepsw.shop/D7
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://shatterbreathepsw.shop/?6a
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://shatterbreathepsw.shop/~6
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://shatterbreathepsw.shop/y7
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://gallery.azure.com/https://graph.windows.net/mariadb.database.azure.comhttps://storage.azure.
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://vault.azure.net/mysql.database.azure.comhttps://cosmos.azure.comjson:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://management.core.usgovcloudapi.net/https://dev.azuresynapse.usgovcloudapi.netbad
unknown
https://shatterbreathepsw.shop/
unknown
https://database.usgovcloudapi.net/unsupported
unknown
https://shatterbreathepsw.shop/apizen
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictLZMA
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://manage.chinacloudapi.com/publishsettings/indexhttps://manage.microsoftazure.de/publishsettin
unknown
https://management.azure.com/https://managedhsm.azure.net/https://servicebus.azure.net/https://datab
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
shatterbreathepsw.shop
104.21.95.19
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.19
shatterbreathepsw.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C00047C000
direct allocation
page read and write
malicious
2F2E000
heap
page read and write
321F000
stack
page read and write
2F3F000
heap
page read and write
510F000
stack
page read and write
2F1D000
heap
page read and write
5265000
trusted library allocation
page read and write
52AD000
trusted library allocation
page read and write
C0000BA000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
2F03000
heap
page read and write
529B000
trusted library allocation
page read and write
5299000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
2F07000
heap
page read and write
2F16000
heap
page read and write
2F07000
heap
page read and write
C0000A6000
direct allocation
page read and write
528B000
trusted library allocation
page read and write
52E2000
trusted library allocation
page read and write
C000098000
direct allocation
page read and write
C000130000
direct allocation
page read and write
2CF0000
remote allocation
page execute and read and write
5261000
trusted library allocation
page read and write
7FF679C38000
unkown
page read and write
528F000
trusted library allocation
page read and write
52D9000
trusted library allocation
page read and write
2F32000
heap
page read and write
52B0000
trusted library allocation
page read and write
2E58000
heap
page read and write
2F41000
heap
page read and write
C0001AC000
direct allocation
page read and write
2F2B000
heap
page read and write
2F32000
heap
page read and write
C0000E6000
direct allocation
page read and write
C000108000
direct allocation
page read and write
2F1F000
heap
page read and write
C000128000
direct allocation
page read and write
52E2000
trusted library allocation
page read and write
5268000
trusted library allocation
page read and write
C0000FE000
direct allocation
page read and write
C0000EC000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
2F3A000
heap
page read and write
C00004B000
direct allocation
page read and write
52E2000
trusted library allocation
page read and write
4C60000
remote allocation
page read and write
2F24000
heap
page read and write
2F2E000
heap
page read and write
2EE8000
heap
page read and write
2F3E000
heap
page read and write
7FF679C31000
unkown
page read and write
7FF679BB7000
unkown
page write copy
5268000
trusted library allocation
page read and write
C000126000
direct allocation
page read and write
2E20000
heap
page read and write
5297000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
1E6D4DD0000
heap
page read and write
C000190000
direct allocation
page read and write
2F3B000
heap
page read and write
2F3A000
heap
page read and write
2F27000
heap
page read and write
C0001C8000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
2F3B000
heap
page read and write
5B64000
trusted library allocation
page read and write
2F27000
heap
page read and write
C0001CA000
direct allocation
page read and write
C000158000
direct allocation
page read and write
C000192000
direct allocation
page read and write
2F25000
heap
page read and write
5291000
trusted library allocation
page read and write
2F0C000
heap
page read and write
7FF67A12F000
unkown
page read and write
54D5000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
AD1A5FF000
stack
page read and write
2F0E000
heap
page read and write
5299000
trusted library allocation
page read and write
1E6D5039000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C000118000
direct allocation
page read and write
5268000
trusted library allocation
page read and write
2F49000
heap
page read and write
C00015C000
direct allocation
page read and write
2F3D000
heap
page read and write
2F2A000
heap
page read and write
2F19000
heap
page read and write
7FF679BBE000
unkown
page read and write
7FF67A133000
unkown
page write copy
7FF679C1B000
unkown
page read and write
2F3B000
heap
page read and write
2F19000
heap
page read and write
2F27000
heap
page read and write
52C1000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
AD1A3FE000
stack
page read and write
2F0A000
heap
page read and write
2E93000
heap
page read and write
C000057000
direct allocation
page read and write
500E000
stack
page read and write
7FF679C2E000
unkown
page write copy
C000112000
direct allocation
page read and write
1E6D4ED8000
direct allocation
page read and write
2F27000
heap
page read and write
52DB000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
2F3E000
heap
page read and write
C0002EC000
direct allocation
page read and write
5280000
trusted library allocation
page read and write
C0000FA000
direct allocation
page read and write
2F35000
heap
page read and write
2F27000
heap
page read and write
2F1A000
heap
page read and write
4C3D000
stack
page read and write
C00001C000
direct allocation
page read and write
311E000
stack
page read and write
5385000
trusted library allocation
page read and write
2F16000
heap
page read and write
C000104000
direct allocation
page read and write
5291000
trusted library allocation
page read and write
2F3B000
heap
page read and write
2E76000
heap
page read and write
C000064000
direct allocation
page read and write
C000124000
direct allocation
page read and write
C000084000
direct allocation
page read and write
2F32000
heap
page read and write
2F24000
heap
page read and write
2D70000
heap
page read and write
52B1000
trusted library allocation
page read and write
2F05000
heap
page read and write
2F2B000
heap
page read and write
5268000
trusted library allocation
page read and write
514D000
stack
page read and write
AD19FFE000
stack
page read and write
C00001E000
direct allocation
page read and write
5299000
trusted library allocation
page read and write
2F0F000
heap
page read and write
2F43000
heap
page read and write
C0001C0000
direct allocation
page read and write
2F20000
heap
page read and write
5263000
trusted library allocation
page read and write
2F32000
heap
page read and write
2E93000
heap
page read and write
529F000
trusted library allocation
page read and write
7FF67A130000
unkown
page write copy
2F05000
heap
page read and write
52A0000
trusted library allocation
page read and write
C0000D4000
direct allocation
page read and write
C000094000
direct allocation
page read and write
2F3F000
heap
page read and write
5268000
trusted library allocation
page read and write
52AD000
trusted library allocation
page read and write
5268000
trusted library allocation
page read and write
1E6D4D80000
heap
page read and write
1E6D5020000
direct allocation
page read and write
C0001D7000
direct allocation
page read and write
2E90000
heap
page read and write
C000142000
direct allocation
page read and write
2E7B000
heap
page read and write
C000400000
direct allocation
page read and write
1E6D5030000
direct allocation
page read and write
7FF679810000
unkown
page readonly
C00003D000
direct allocation
page read and write
529C000
trusted library allocation
page read and write
5279000
trusted library allocation
page read and write
2F0B000
heap
page read and write
7FF67A098000
unkown
page read and write
2E1E000
stack
page read and write
C000110000
direct allocation
page read and write
2F32000
heap
page read and write
52C0000
trusted library allocation
page read and write
2E76000
heap
page read and write
2F43000
heap
page read and write
1E6D4D60000
heap
page read and write
2F4B000
heap
page read and write
C000114000
direct allocation
page read and write
52ED000
trusted library allocation
page read and write
2E90000
heap
page read and write
C000156000
direct allocation
page read and write
5279000
trusted library allocation
page read and write
2EE8000
heap
page read and write
2F27000
heap
page read and write
2F0E000
heap
page read and write
2F2E000
heap
page read and write
C000022000
direct allocation
page read and write
2F27000
heap
page read and write
C000068000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
5268000
trusted library allocation
page read and write
2F3F000
heap
page read and write
C000165000
direct allocation
page read and write
2F23000
heap
page read and write
C0000CE000
direct allocation
page read and write
2F46000
heap
page read and write
C0001C2000
direct allocation
page read and write
5268000
trusted library allocation
page read and write
2F23000
heap
page read and write
2F27000
heap
page read and write
2F23000
heap
page read and write
2F27000
heap
page read and write
4B3D000
stack
page read and write
2F41000
heap
page read and write
5268000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
2E93000
heap
page read and write
52DB000
trusted library allocation
page read and write
7FF679C3A000
unkown
page readonly
C000086000
direct allocation
page read and write
AD19DFF000
stack
page read and write
C00001A000
direct allocation
page read and write
2F16000
heap
page read and write
7FF679BC2000
unkown
page write copy
2F1B000
heap
page read and write
C000046000
direct allocation
page read and write
C000212000
direct allocation
page read and write
C00042C000
direct allocation
page read and write
2F0C000
heap
page read and write
5299000
trusted library allocation
page read and write
C00042A000
direct allocation
page read and write
C000150000
direct allocation
page read and write
C0000C1000
direct allocation
page read and write
C000154000
direct allocation
page read and write
C000096000
direct allocation
page read and write
1E6D50C0000
heap
page read and write
C0000BC000
direct allocation
page read and write
7FF679811000
unkown
page execute read
2E82000
heap
page read and write
52B1000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
C00014E000
direct allocation
page read and write
5267000
trusted library allocation
page read and write
2EE8000
heap
page read and write
2F3A000
heap
page read and write
7FF679C34000
unkown
page write copy
52A8000
trusted library allocation
page read and write
C00018C000
direct allocation
page read and write
2F32000
heap
page read and write
AD197FF000
stack
page read and write
C00010E000
direct allocation
page read and write
7FF679C18000
unkown
page read and write
1E6D5045000
direct allocation
page read and write
1E6FB970000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
2F32000
heap
page read and write
2F3E000
heap
page read and write
C0005AB000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
5291000
trusted library allocation
page read and write
7FF679BBC000
unkown
page write copy
C000052000
direct allocation
page read and write
5660000
trusted library allocation
page read and write
5261000
trusted library allocation
page read and write
7FF67A133000
unkown
page write copy
5294000
trusted library allocation
page read and write
528F000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
5299000
trusted library allocation
page read and write
7FF67A127000
unkown
page read and write
C0001D1000
direct allocation
page read and write
2F16000
heap
page read and write
C000038000
direct allocation
page read and write
52E0000
trusted library allocation
page read and write
2EAF000
heap
page read and write
C000004000
direct allocation
page read and write
2F23000
heap
page read and write
7FF67A122000
unkown
page read and write
5279000
trusted library allocation
page read and write
7FF679BC1000
unkown
page read and write
5261000
trusted library allocation
page read and write
2F3B000
heap
page read and write
AD195FD000
stack
page read and write
5279000
trusted library allocation
page read and write
7FF67A12F000
unkown
page write copy
2F03000
heap
page read and write
C0001A6000
direct allocation
page read and write
2F41000
heap
page read and write
2E50000
heap
page read and write
2D97000
heap
page read and write
C0000DE000
direct allocation
page read and write
2F11000
heap
page read and write
7FF679C3A000
unkown
page readonly
C79000
stack
page read and write
536C000
trusted library allocation
page read and write
C000092000
direct allocation
page read and write
5289000
trusted library allocation
page read and write
2F11000
heap
page read and write
5435000
trusted library allocation
page read and write
C0000A0000
direct allocation
page read and write
1E6D4DD8000
heap
page read and write
7FF679BB7000
unkown
page read and write
2F3A000
heap
page read and write
4C60000
remote allocation
page read and write
5299000
trusted library allocation
page read and write
C000480000
direct allocation
page read and write
C000020000
direct allocation
page read and write
1E6FBA50000
direct allocation
page read and write
2F29000
heap
page read and write
52AD000
trusted library allocation
page read and write
2F13000
heap
page read and write
52DB000
trusted library allocation
page read and write
2F32000
heap
page read and write
2F17000
heap
page read and write
2F2E000
heap
page read and write
528A000
trusted library allocation
page read and write
5268000
trusted library allocation
page read and write
2F04000
heap
page read and write
2F0E000
heap
page read and write
5262000
trusted library allocation
page read and write
2EAE000
heap
page read and write
52DB000
trusted library allocation
page read and write
2F17000
heap
page read and write
C000198000
direct allocation
page read and write
1E6D4C80000
heap
page read and write
2F3D000
heap
page read and write
C0001D5000
direct allocation
page read and write
5294000
trusted library allocation
page read and write
5279000
trusted library allocation
page read and write
5279000
trusted library allocation
page read and write
2F0E000
heap
page read and write
2F3A000
heap
page read and write
C3B000
stack
page read and write
553C000
trusted library allocation
page read and write
C00040A000
direct allocation
page read and write
7FF67A138000
unkown
page readonly
539D000
trusted library allocation
page read and write
C000116000
direct allocation
page read and write
2F0E000
heap
page read and write
C000167000
direct allocation
page read and write
2F0C000
heap
page read and write
2E40000
heap
page read and write
2E90000
heap
page read and write
5297000
trusted library allocation
page read and write
2F0B000
heap
page read and write
2F39000
heap
page read and write
5261000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
5299000
trusted library allocation
page read and write
2F27000
heap
page read and write
528F000
trusted library allocation
page read and write
2EAF000
heap
page read and write
AD199FE000
stack
page read and write
526D000
trusted library allocation
page read and write
C0000BE000
direct allocation
page read and write
2F3D000
heap
page read and write
2F27000
heap
page read and write
2F35000
heap
page read and write
4C60000
remote allocation
page read and write
C0000E0000
direct allocation
page read and write
2F41000
heap
page read and write
C0005AB000
direct allocation
page read and write
5279000
trusted library allocation
page read and write
2F3B000
heap
page read and write
2D90000
heap
page read and write
C000196000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
2F32000
heap
page read and write
C00014C000
direct allocation
page read and write
2F16000
heap
page read and write
2F32000
heap
page read and write
C0001A4000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
526C000
trusted library allocation
page read and write
C0000CC000
direct allocation
page read and write
7FF679BBF000
unkown
page write copy
5299000
trusted library allocation
page read and write
52B4000
trusted library allocation
page read and write
2F3D000
heap
page read and write
1E6FBAA0000
direct allocation
page read and write
2F0E000
heap
page read and write
543D000
trusted library allocation
page read and write
52E2000
trusted library allocation
page read and write
C000031000
direct allocation
page read and write
2F2E000
heap
page read and write
C0000D0000
direct allocation
page read and write
2F23000
heap
page read and write
2F34000
heap
page read and write
5289000
trusted library allocation
page read and write
524E000
stack
page read and write
2F11000
heap
page read and write
2F41000
heap
page read and write
C000326000
direct allocation
page read and write
52AE000
trusted library allocation
page read and write
C000194000
direct allocation
page read and write
2F2E000
heap
page read and write
2F0E000
heap
page read and write
7FF679C1A000
unkown
page write copy
1E6D50C5000
heap
page read and write
5268000
trusted library allocation
page read and write
C00004D000
direct allocation
page read and write
C000090000
direct allocation
page read and write
2F41000
heap
page read and write
1E6D4EDD000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
2F49000
heap
page read and write
2F23000
heap
page read and write
2F41000
heap
page read and write
1E6FBB00000
direct allocation
page read and write
C000106000
direct allocation
page read and write
2F08000
heap
page read and write
2F23000
heap
page read and write
5289000
trusted library allocation
page read and write
2F32000
heap
page read and write
2F27000
heap
page read and write
2F24000
heap
page read and write
2F25000
heap
page read and write
2F23000
heap
page read and write
5267000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
1E6FBAF5000
direct allocation
page read and write
2E7B000
heap
page read and write
C00010A000
direct allocation
page read and write
2EE8000
heap
page read and write
2F32000
heap
page read and write
526A000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
C000006000
direct allocation
page read and write
2DDE000
stack
page read and write
C000026000
direct allocation
page read and write
1E6D5010000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
49FD000
stack
page read and write
C000182000
direct allocation
page read and write
5361000
heap
page read and write
C000088000
direct allocation
page read and write
2D95000
heap
page read and write
7FF679C14000
unkown
page read and write
5294000
trusted library allocation
page read and write
C00009E000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
C0001AA000
direct allocation
page read and write
2F05000
heap
page read and write
52B1000
trusted library allocation
page read and write
2F01000
heap
page read and write
2F19000
heap
page read and write
5360000
heap
page read and write
52BE000
trusted library allocation
page read and write
2F01000
heap
page read and write
7FF67A138000
unkown
page readonly
5261000
trusted library allocation
page read and write
5650000
heap
page read and write
1E6D4ED0000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
4AFD000
stack
page read and write
52CD000
trusted library allocation
page read and write
C0001A8000
direct allocation
page read and write
C000024000
direct allocation
page read and write
54BE000
stack
page read and write
2F32000
heap
page read and write
527F000
trusted library allocation
page read and write
2D60000
heap
page read and write
2EE8000
heap
page read and write
C000184000
direct allocation
page read and write
7FF67A0B3000
unkown
page read and write
52AE000
trusted library allocation
page read and write
1E6D5033000
direct allocation
page read and write
2F29000
heap
page read and write
C000080000
direct allocation
page read and write
2F09000
heap
page read and write
2F27000
heap
page read and write
2F1A000
heap
page read and write
AD1A1FE000
stack
page read and write
2F43000
heap
page read and write
5445000
trusted library allocation
page read and write
2F41000
heap
page read and write
2F11000
heap
page read and write
2F0A000
heap
page read and write
2E7B000
heap
page read and write
1E6FBA50000
direct allocation
page read and write
7FF67A0BA000
unkown
page read and write
2F11000
heap
page read and write
528B000
trusted library allocation
page read and write
2F0A000
heap
page read and write
528C000
trusted library allocation
page read and write
C00018E000
direct allocation
page read and write
5261000
trusted library allocation
page read and write
54FF000
stack
page read and write
C000100000
direct allocation
page read and write
2F43000
heap
page read and write
2EAE000
heap
page read and write
2F14000
heap
page read and write
2F0F000
heap
page read and write
5537000
trusted library allocation
page read and write
7FF679C17000
unkown
page write copy
7FF67A080000
unkown
page readonly
7FF679810000
unkown
page readonly
1E6D4ED4000
direct allocation
page read and write
52BC000
trusted library allocation
page read and write
2F30000
heap
page read and write
7FF679811000
unkown
page execute read
2F32000
heap
page read and write
C000160000
direct allocation
page read and write
2F32000
heap
page read and write
2F1A000
heap
page read and write
2F2E000
heap
page read and write
C0001BC000
direct allocation
page read and write
2D45000
remote allocation
page execute and read and write
AD19BFC000
stack
page read and write
2F0E000
heap
page read and write
2F35000
heap
page read and write
C0000A8000
direct allocation
page read and write
2F23000
heap
page read and write
7FF67A080000
unkown
page readonly
5278000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
5279000
trusted library allocation
page read and write
2F3A000
heap
page read and write
C000000000
direct allocation
page read and write
5267000
trusted library allocation
page read and write
There are 503 hidden memdumps, click here to show them.