IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\jsii-runtime.2235995355\bin\jsii-runtime.js
C++ source, ASCII text, with very long lines (324), with escape sequences
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.2235995355\bin\jsii-runtime.js.map
JSON data
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.2235995355\lib\program.js
ASCII text, with very long lines (489)
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.2235995355\lib\program.js.map
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
fashionablei.sbs
malicious
mediavelk.sbs
malicious
definitib.sbs
malicious
strikebripm.sbs
malicious
elaboretib.sbs
malicious
activedomest.sbs
malicious
ostracizez.sbs
malicious
https://fashionablei.sbs/api
188.114.97.3
malicious
offybirhtdi.sbs
malicious
arenbootk.sbs
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://fashionablei.sbs/apiu
unknown
https://github.com/aws/jsii
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://json-schema.org/draft-07/schema#
unknown
https://aws.amazon.com
unknown
http://json-schema.org/schema
unknown
https://fashionablei.sbs:443/api
unknown
https://github.com/jprichardson/node-fs-extra/issues/269
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://raw.githubusercontent.com/ajv-validator/ajv/master/lib/refs/data.json#
unknown
http://json-schema.org/draft-07/schema
unknown
https://fashionablei.sbs/
unknown
https://fashionablei.sbs/x
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/aws/jsii.git
unknown
https://fashionablei.sbs/e
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
https://fashionablei.sbs:443/apiB
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://github.com/aws/jsii/issues
unknown
https://fashionablei.sbs:443/apiZ
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fashionablei.sbs
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
fashionablei.sbs
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B580000
direct allocation
page read and write
malicious
B62C000
direct allocation
page read and write
malicious
B580000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
119F000
unkown
page read and write
47A0000
remote allocation
page read and write
4EF3000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
29A9000
heap
page read and write
29A6000
heap
page read and write
B484000
direct allocation
page read and write
29AE000
heap
page read and write
4E8F000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
4EC8000
trusted library allocation
page read and write
4E98000
trusted library allocation
page read and write
2987000
heap
page read and write
4E89000
trusted library allocation
page read and write
1175000
unkown
page write copy
4E82000
trusted library allocation
page read and write
6F0000
direct allocation
page read and write
2C1D000
stack
page read and write
B41E000
direct allocation
page read and write
4E91000
trusted library allocation
page read and write
B682000
direct allocation
page read and write
4E90000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
B72C000
direct allocation
page read and write
4EA7000
trusted library allocation
page read and write
45B000
remote allocation
page execute and read and write
49C000
direct allocation
page read and write
B470000
direct allocation
page read and write
B502000
direct allocation
page read and write
4E8D000
trusted library allocation
page read and write
4B4E000
stack
page read and write
4EC7000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
29A9000
heap
page read and write
B452000
direct allocation
page read and write
B406000
direct allocation
page read and write
1EC000
stack
page read and write
29BA000
heap
page read and write
B724000
direct allocation
page read and write
83D000
stack
page read and write
4EC3000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
B56E000
direct allocation
page read and write
B360000
direct allocation
page read and write
B464000
direct allocation
page read and write
B55E000
direct allocation
page read and write
28D0000
heap
page read and write
4EEF000
trusted library allocation
page read and write
4ED1000
trusted library allocation
page read and write
2999000
heap
page read and write
5032000
trusted library allocation
page read and write
298B000
heap
page read and write
B956000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
B566000
direct allocation
page read and write
B814000
direct allocation
page read and write
4E91000
trusted library allocation
page read and write
B468000
direct allocation
page read and write
B522000
direct allocation
page read and write
B400000
direct allocation
page read and write
4ED5000
trusted library allocation
page read and write
B7E3000
direct allocation
page read and write
B530000
direct allocation
page read and write
4EC2000
trusted library allocation
page read and write
B53A000
direct allocation
page read and write
2AD0000
heap
page read and write
25FB000
stack
page read and write
2ADE000
stack
page read and write
B47C000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
29B6000
heap
page read and write
B426000
direct allocation
page read and write
B998000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
50FA000
trusted library allocation
page read and write
B57E000
direct allocation
page read and write
29B9000
heap
page read and write
2981000
heap
page read and write
2995000
heap
page read and write
750000
heap
page read and write
B4DE000
direct allocation
page read and write
2B83F000
stack
page read and write
B62C000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
B50C000
direct allocation
page read and write
B51A000
direct allocation
page read and write
B21F000
stack
page read and write
1206000
unkown
page readonly
B684000
direct allocation
page read and write
4E91000
trusted library allocation
page read and write
29A6000
heap
page read and write
11DB000
unkown
page readonly
4EDC000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
B976000
direct allocation
page read and write
4EC9000
trusted library allocation
page read and write
B448000
direct allocation
page read and write
B522000
direct allocation
page read and write
29A6000
heap
page read and write
B462000
direct allocation
page read and write
47A0000
remote allocation
page read and write
4EA1000
trusted library allocation
page read and write
B7A4000
direct allocation
page read and write
2981000
heap
page read and write
2980000
heap
page read and write
4E90000
trusted library allocation
page read and write
4E9F000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
479E000
stack
page read and write
2984000
heap
page read and write
4EC4000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
4EC7000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
B52A000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
B518000
direct allocation
page read and write
860000
unkown
page readonly
4E90000
trusted library allocation
page read and write
4E0000
heap
page read and write
4C4F000
stack
page read and write
B56E000
direct allocation
page read and write
4ED6000
trusted library allocation
page read and write
4E98000
trusted library allocation
page read and write
B486000
direct allocation
page read and write
B542000
direct allocation
page read and write
4EF1000
trusted library allocation
page read and write
4E2E000
stack
page read and write
B794000
direct allocation
page read and write
B834000
direct allocation
page read and write
2AE0000
direct allocation
page read and write
11DB000
unkown
page readonly
B369000
direct allocation
page read and write
B824000
direct allocation
page read and write
4E98000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
B51A000
direct allocation
page read and write
B986000
direct allocation
page read and write
1170000
unkown
page write copy
4E90000
trusted library allocation
page read and write
B89A000
direct allocation
page read and write
2982000
heap
page read and write
B4C4000
direct allocation
page read and write
7BD000
stack
page read and write
4EA1000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
B766000
direct allocation
page read and write
B514000
direct allocation
page read and write
B416000
direct allocation
page read and write
29B0000
heap
page read and write
2992000
heap
page read and write
B46A000
direct allocation
page read and write
4E8A000
trusted library allocation
page read and write
B8E8000
direct allocation
page read and write
4E91000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
B56C000
direct allocation
page read and write
2988000
heap
page read and write
B654000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
B564000
direct allocation
page read and write
29B4000
heap
page read and write
4ED8000
trusted library allocation
page read and write
4F13000
trusted library allocation
page read and write
297E000
heap
page read and write
4EA1000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
B800000
direct allocation
page read and write
2912000
heap
page read and write
1206000
unkown
page readonly
B6B4000
direct allocation
page read and write
4E86000
trusted library allocation
page read and write
4E8F000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
770000
heap
page read and write
4EC7000
trusted library allocation
page read and write
116E000
unkown
page read and write
297F000
heap
page read and write
4EA1000
trusted library allocation
page read and write
4EC3000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
BBE000
unkown
page readonly
4EE1000
trusted library allocation
page read and write
861000
unkown
page execute read
4EC7000
trusted library allocation
page read and write
4EE2000
trusted library allocation
page read and write
4EA4000
trusted library allocation
page read and write
4EDE000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
506A000
trusted library allocation
page read and write
29A9000
heap
page read and write
B57C000
direct allocation
page read and write
B6A4000
direct allocation
page read and write
4E98000
trusted library allocation
page read and write
B634000
direct allocation
page read and write
4C8E000
stack
page read and write
4E9A000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
B6D4000
direct allocation
page read and write
B55A000
direct allocation
page read and write
2B4FF000
stack
page read and write
2981000
heap
page read and write
4E88000
trusted library allocation
page read and write
29B6000
heap
page read and write
B560000
direct allocation
page read and write
4EE1000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
4D8E000
stack
page read and write
29A6000
heap
page read and write
4E9F000
trusted library allocation
page read and write
11D1000
unkown
page read and write
4EB0000
trusted library allocation
page read and write
2922000
heap
page read and write
B412000
direct allocation
page read and write
4EB9000
trusted library allocation
page read and write
B566000
direct allocation
page read and write
B53A000
direct allocation
page read and write
B488000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
29A8000
heap
page read and write
2987000
heap
page read and write
4EA1000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
4E98000
trusted library allocation
page read and write
B441000
direct allocation
page read and write
29B8000
heap
page read and write
28B0000
heap
page read and write
28C0000
heap
page read and write
505A000
trusted library allocation
page read and write
11D7000
unkown
page read and write
B8CA000
direct allocation
page read and write
4E99000
trusted library allocation
page read and write
4ED1000
trusted library allocation
page read and write
B502000
direct allocation
page read and write
B504000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
11DA000
unkown
page write copy
4E81000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
B996000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
2988000
heap
page read and write
B564000
direct allocation
page read and write
4F80000
heap
page read and write
4E9A000
trusted library allocation
page read and write
B528000
direct allocation
page read and write
469D000
stack
page read and write
4E90000
trusted library allocation
page read and write
B562000
direct allocation
page read and write
11B5000
unkown
page read and write
4E9F000
trusted library allocation
page read and write
B8BA000
direct allocation
page read and write
B6F4000
direct allocation
page read and write
B7C4000
direct allocation
page read and write
B430000
direct allocation
page read and write
4E90000
trusted library allocation
page read and write
2B22000
direct allocation
page read and write
297F000
heap
page read and write
4EA1000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
4ECF000
trusted library allocation
page read and write
B754000
direct allocation
page read and write
283A000
stack
page read and write
4ED1000
trusted library allocation
page read and write
B8DA000
direct allocation
page read and write
4E89000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
4E89000
trusted library allocation
page read and write
B93F000
direct allocation
page read and write
4E91000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
B424000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
29B2000
heap
page read and write
B528000
direct allocation
page read and write
29A6000
heap
page read and write
B644000
direct allocation
page read and write
B544000
direct allocation
page read and write
452E000
stack
page read and write
4E91000
trusted library allocation
page read and write
B44E000
direct allocation
page read and write
4E81000
trusted library allocation
page read and write
B514000
direct allocation
page read and write
299E000
heap
page read and write
B560000
direct allocation
page read and write
4E98000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
4EB3000
trusted library allocation
page read and write
28ED000
heap
page read and write
4EA1000
trusted library allocation
page read and write
B714000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
1172000
unkown
page write copy
11A8000
unkown
page read and write
B784000
direct allocation
page read and write
B44C000
direct allocation
page read and write
2D1F000
stack
page read and write
29B2000
heap
page read and write
29B9000
heap
page read and write
4EA1000
trusted library allocation
page read and write
4E9F000
trusted library allocation
page read and write
29AE000
heap
page read and write
4FE2000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
29BA000
heap
page read and write
B88E000
direct allocation
page read and write
B506000
direct allocation
page read and write
4E92000
trusted library allocation
page read and write
47A0000
remote allocation
page read and write
B428000
direct allocation
page read and write
B41C000
direct allocation
page read and write
4F91000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
2870000
heap
page read and write
B526000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
4EA9000
trusted library allocation
page read and write
B674000
direct allocation
page read and write
4EC1000
trusted library allocation
page read and write
B568000
direct allocation
page read and write
2983000
heap
page read and write
B47A000
direct allocation
page read and write
4E91000
trusted library allocation
page read and write
B966000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
B472000
direct allocation
page read and write
4EDB000
trusted library allocation
page read and write
B436000
direct allocation
page read and write
B52E000
direct allocation
page read and write
B764000
direct allocation
page read and write
2AE8000
direct allocation
page read and write
29B0000
heap
page read and write
4EB3000
trusted library allocation
page read and write
4E8B000
trusted library allocation
page read and write
B456000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
2969000
heap
page read and write
B548000
direct allocation
page read and write
52A000
heap
page read and write
29A9000
heap
page read and write
4E91000
trusted library allocation
page read and write
29A8000
heap
page read and write
1171000
unkown
page read and write
450000
heap
page read and write
860000
unkown
page readonly
4EB6000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
116D000
unkown
page write copy
2BDF000
stack
page read and write
116D000
unkown
page write copy
4E91000
trusted library allocation
page read and write
B548000
direct allocation
page read and write
B804000
direct allocation
page read and write
B3DD000
stack
page read and write
4E88000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
4ECD000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
700000
direct allocation
page read and write
B40A000
direct allocation
page read and write
4E98000
trusted library allocation
page read and write
4E6F000
stack
page read and write
4EC2000
trusted library allocation
page read and write
EC000
stack
page read and write
4ED1000
trusted library allocation
page read and write
539000
heap
page read and write
29A6000
heap
page read and write
B31F000
stack
page read and write
4E91000
trusted library allocation
page read and write
4EE1000
trusted library allocation
page read and write
4E9D000
trusted library allocation
page read and write
29AE000
heap
page read and write
28D8000
heap
page read and write
4E92000
trusted library allocation
page read and write
29B0000
heap
page read and write
4FC2000
trusted library allocation
page read and write
460000
heap
page read and write
B52E000
direct allocation
page read and write
11A7000
unkown
page write copy
29BA000
heap
page read and write
B474000
direct allocation
page read and write
4EC8000
trusted library allocation
page read and write
4F0A000
trusted library allocation
page read and write
4590000
heap
page read and write
11B1000
unkown
page read and write
4F11000
trusted library allocation
page read and write
B42C000
direct allocation
page read and write
B6C4000
direct allocation
page read and write
B404000
direct allocation
page read and write
4ED0000
trusted library allocation
page read and write
29A6000
heap
page read and write
490000
direct allocation
page read and write
4ED8000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
B6E4000
direct allocation
page read and write
B466000
direct allocation
page read and write
B476000
direct allocation
page read and write
2B5FF000
stack
page read and write
44D0000
heap
page read and write
B367000
direct allocation
page read and write
B558000
direct allocation
page read and write
7FD000
stack
page read and write
4E91000
trusted library allocation
page read and write
B50C000
direct allocation
page read and write
4EAF000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4E98000
trusted library allocation
page read and write
B946000
direct allocation
page read and write
297E000
heap
page read and write
4EA1000
trusted library allocation
page read and write
4F08000
trusted library allocation
page read and write
2AAF000
stack
page read and write
29A8000
heap
page read and write
B408000
direct allocation
page read and write
B52A000
direct allocation
page read and write
4E5000
heap
page read and write
4E8D000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
297E000
heap
page read and write
B568000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
29B2000
heap
page read and write
2877000
heap
page read and write
B4D6000
direct allocation
page read and write
5062000
trusted library allocation
page read and write
B530000
direct allocation
page read and write
4EC2000
trusted library allocation
page read and write
B562000
direct allocation
page read and write
298B000
heap
page read and write
B48E000
direct allocation
page read and write
B744000
direct allocation
page read and write
4E88000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
B8AA000
direct allocation
page read and write
29A9000
heap
page read and write
861000
unkown
page execute read
4E90000
trusted library allocation
page read and write
498000
direct allocation
page read and write
4E90000
trusted library allocation
page read and write
B506000
direct allocation
page read and write
B422000
direct allocation
page read and write
456D000
stack
page read and write
29A9000
heap
page read and write
298E000
heap
page read and write
4E91000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
B838000
direct allocation
page read and write
4DE0000
heap
page read and write
B7D4000
direct allocation
page read and write
4E9F000
trusted library allocation
page read and write
4E86000
trusted library allocation
page read and write
4E88000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
B57E000
direct allocation
page read and write
B56C000
direct allocation
page read and write
B7F6000
direct allocation
page read and write
B996000
direct allocation
page read and write
B500000
direct allocation
page read and write
4E86000
trusted library allocation
page read and write
74E000
stack
page read and write
4E90000
trusted library allocation
page read and write
B7AE000
direct allocation
page read and write
2875000
heap
page read and write
BBE000
unkown
page readonly
B7B4000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
4F81000
heap
page read and write
4EA1000
trusted library allocation
page read and write
B734000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
4EBA000
trusted library allocation
page read and write
29AE000
heap
page read and write
4EC9000
trusted library allocation
page read and write
B488000
direct allocation
page read and write
4EA0000
trusted library allocation
page read and write
2B00000
direct allocation
page read and write
4E91000
trusted library allocation
page read and write
B774000
direct allocation
page read and write
4EB7000
trusted library allocation
page read and write
B482000
direct allocation
page read and write
B55C000
direct allocation
page read and write
B664000
direct allocation
page read and write
B694000
direct allocation
page read and write
4FAA000
trusted library allocation
page read and write
B402000
direct allocation
page read and write
B998000
direct allocation
page read and write
B45A000
direct allocation
page read and write
4E98000
trusted library allocation
page read and write
4EAF000
trusted library allocation
page read and write
B446000
direct allocation
page read and write
840000
direct allocation
page read and write
4EA1000
trusted library allocation
page read and write
29A9000
heap
page read and write
B35D000
stack
page read and write
B544000
direct allocation
page read and write
B494000
direct allocation
page read and write
4ECF000
trusted library allocation
page read and write
28FF000
heap
page read and write
4EBA000
trusted library allocation
page read and write
1008000
unkown
page readonly
4EB8000
trusted library allocation
page read and write
1174000
unkown
page read and write
29A7000
heap
page read and write
520000
heap
page read and write
4EC1000
trusted library allocation
page read and write
1008000
unkown
page readonly
4E9E000
trusted library allocation
page read and write
4EC8000
trusted library allocation
page read and write
29A9000
heap
page read and write
B704000
direct allocation
page read and write
4ED0000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
29B5000
heap
page read and write
29A9000
heap
page read and write
11DA000
unkown
page write copy
B7E3000
direct allocation
page read and write
There are 525 hidden memdumps, click here to show them.