IOC Report
5Setup.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5Setup.exe
"C:\Users\user\Desktop\5Setup.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
fashionablei.sbs
malicious
strikebripm.sbs
malicious
ostracizez.sbs
malicious
offybirhtdi.sbs
malicious
mediavelk.sbs
malicious
definitib.sbs
malicious
elaboretib.sbs
malicious
activedomest.sbs
malicious
https://fashionablei.sbs/api
188.114.96.3
malicious
arenbootk.sbs
malicious
http://html4/loose.dtd
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://fashionablei.sbs/api4
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resourcesKind
unknown
https://fashionablei.sbs:443/api
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://.css
unknown
https://golang.org/pkg/unicode/#IsPrint.
unknown
https://fashionablei.sbs/
unknown
https://fashionablei.sbs/apiO
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://fashionablei.sbs/apiH
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://fashionablei.sbs/apib
unknown
https://fashionablei.sbs/api_
unknown
https://fashionablei.sbs/apid
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://.jpg
unknown
https://fashionablei.sbs/apiq
unknown
https://fashionablei.sbs/..
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types
unknown
https://fashionablei.sbs/apiob
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://fashionablei.sbs/re
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://fashionablei.sbs/apibuo
unknown
https://www.ecosia.org/newtab/
unknown
https://fashionablei.sbs/ay
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://fashionablei.sbs/n
unknown
https://golang.org/pkg/unicode/#IsPrint.values
unknown
https://fashionablei.sbs/apiopK
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kindsThe
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-cont
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 44 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fashionablei.sbs
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
fashionablei.sbs
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
20AE000
direct allocation
page read and write
malicious
2058000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2002000
direct allocation
page read and write
malicious
5493000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
54C9000
trusted library allocation
page read and write
1730000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
1144000
unkown
page readonly
54CA000
trusted library allocation
page read and write
321D000
heap
page read and write
56E8000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
1C2E000
direct allocation
page read and write
9C0000
unkown
page readonly
547E000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
BEB000
stack
page read and write
322B000
heap
page read and write
1D24000
direct allocation
page read and write
547A000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
31FA000
heap
page read and write
1D2E000
direct allocation
page read and write
5483000
trusted library allocation
page read and write
21CFF000
stack
page read and write
54BE000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5450000
heap
page read and write
549E000
trusted library allocation
page read and write
316D000
heap
page read and write
4B40000
remote allocation
page read and write
322B000
heap
page read and write
549A000
trusted library allocation
page read and write
319D000
heap
page read and write
5514000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
322C000
heap
page read and write
3213000
heap
page read and write
5579000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
10F3000
unkown
page write copy
31EB000
heap
page read and write
54A9000
trusted library allocation
page read and write
2158000
direct allocation
page read and write
5471000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
1D18000
direct allocation
page read and write
322C000
heap
page read and write
54B3000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
54C9000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
1C30000
direct allocation
page read and write
E9E000
stack
page read and write
3158000
heap
page read and write
171D000
stack
page read and write
3203000
heap
page read and write
1DCC000
direct allocation
page read and write
5493000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
4B40000
remote allocation
page read and write
54BE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
3246000
heap
page read and write
54A3000
trusted library allocation
page read and write
3209000
heap
page read and write
10AC000
unkown
page read and write
54C9000
trusted library allocation
page read and write
1DC8000
direct allocation
page read and write
5470000
trusted library allocation
page read and write
320F000
heap
page read and write
547E000
trusted library allocation
page read and write
1C82000
direct allocation
page read and write
322B000
heap
page read and write
5493000
trusted library allocation
page read and write
3204000
heap
page read and write
548F000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
1D12000
direct allocation
page read and write
4B40000
remote allocation
page read and write
1C8C000
direct allocation
page read and write
547A000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
3200000
heap
page read and write
54C9000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
1E00000
direct allocation
page read and write
5492000
trusted library allocation
page read and write
320B000
heap
page read and write
1029000
unkown
page write copy
54BC000
trusted library allocation
page read and write
1C08000
direct allocation
page read and write
5493000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
10E4000
unkown
page read and write
54BE000
trusted library allocation
page read and write
1DC4000
direct allocation
page read and write
322B000
heap
page read and write
54BC000
trusted library allocation
page read and write
1DC6000
direct allocation
page read and write
31FB000
heap
page read and write
54B7000
trusted library allocation
page read and write
321F000
heap
page read and write
5483000
trusted library allocation
page read and write
1D29000
direct allocation
page read and write
3204000
heap
page read and write
1C91000
direct allocation
page read and write
45B000
remote allocation
page execute and read and write
1DBE000
direct allocation
page read and write
547C000
trusted library allocation
page read and write
334F000
stack
page read and write
320C000
heap
page read and write
5493000
trusted library allocation
page read and write
1720000
heap
page read and write
10F4000
unkown
page readonly
5493000
trusted library allocation
page read and write
54CE000
trusted library allocation
page read and write
3245000
heap
page read and write
54A6000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
3223000
heap
page read and write
3202000
heap
page read and write
54A3000
trusted library allocation
page read and write
3223000
heap
page read and write
5483000
trusted library allocation
page read and write
1DB0000
direct allocation
page read and write
5570000
heap
page read and write
2C1000
unkown
page execute read
5475000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
3204000
heap
page read and write
2213F000
stack
page read and write
3207000
heap
page read and write
549C000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
3239000
heap
page read and write
14FD000
stack
page read and write
31F7000
heap
page read and write
2237F000
stack
page read and write
221B0000
direct allocation
page read and write
54AC000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
1D0C000
direct allocation
page read and write
5491000
trusted library allocation
page read and write
1C40000
direct allocation
page read and write
15D0000
heap
page read and write
1EFC000
direct allocation
page read and write
5488000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
1033000
unkown
page write copy
549A000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
31FB000
heap
page read and write
1C59000
direct allocation
page read and write
1D20000
direct allocation
page read and write
169E000
stack
page read and write
31F7000
heap
page read and write
54A3000
trusted library allocation
page read and write
537E000
stack
page read and write
1DCE000
direct allocation
page read and write
5483000
trusted library allocation
page read and write
322B000
heap
page read and write
3218000
heap
page read and write
54C3000
trusted library allocation
page read and write
4C5D000
stack
page read and write
5483000
trusted library allocation
page read and write
3245000
heap
page read and write
54A3000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
31FC000
heap
page read and write
5648000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
3204000
heap
page read and write
5493000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
2C0000
unkown
page readonly
3202000
heap
page read and write
5493000
trusted library allocation
page read and write
3204000
heap
page read and write
9C0000
unkown
page readonly
5471000
trusted library allocation
page read and write
1DE4000
direct allocation
page read and write
F10000
heap
page read and write
5492000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
322B000
heap
page read and write
54A5000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
11C0000
heap
page read and write
1028000
unkown
page read and write
5493000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
5494000
trusted library allocation
page read and write
1047000
unkown
page read and write
1C8E000
direct allocation
page read and write
54D2000
trusted library allocation
page read and write
3209000
heap
page read and write
54A3000
trusted library allocation
page read and write
2C0000
unkown
page readonly
22180000
heap
page read and write
549F000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
31FC000
heap
page read and write
54B1000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
322B000
heap
page read and write
54A3000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
320D000
heap
page read and write
54A3000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
54CF000
trusted library allocation
page read and write
322C000
heap
page read and write
547E000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
31EB000
heap
page read and write
10B0000
unkown
page read and write
5493000
trusted library allocation
page read and write
1C00000
direct allocation
page read and write
54A3000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
320A000
heap
page read and write
54A3000
trusted library allocation
page read and write
322B000
heap
page read and write
5483000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
1D2C000
direct allocation
page read and write
10F3000
unkown
page write copy
54A6000
trusted library allocation
page read and write
3245000
heap
page read and write
31A0000
heap
page read and write
5487000
trusted library allocation
page read and write
3209000
heap
page read and write
5492000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
1E06000
direct allocation
page read and write
1C86000
direct allocation
page read and write
101A000
unkown
page read and write
1BBD000
stack
page read and write
4B2D000
stack
page read and write
54E4000
trusted library allocation
page read and write
323D000
heap
page read and write
5480000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
2214D000
direct allocation
page read and write
15D5000
heap
page read and write
5480000
trusted library allocation
page read and write
54F4000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
1DCA000
direct allocation
page read and write
54A3000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
322B000
heap
page read and write
31A0000
heap
page read and write
5492000
trusted library allocation
page read and write
1049000
unkown
page write copy
54BC000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
4D9D000
stack
page read and write
5471000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
1740000
heap
page read and write
EE0000
heap
page read and write
10F4000
unkown
page readonly
54AC000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
3241000
heap
page read and write
E50000
heap
page read and write
1650000
direct allocation
page read and write
EE5000
heap
page read and write
54A3000
trusted library allocation
page read and write
323F000
heap
page read and write
3209000
heap
page read and write
54CA000
trusted library allocation
page read and write
54C9000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
3204000
heap
page read and write
5493000
trusted library allocation
page read and write
1B7F000
stack
page read and write
10AE000
unkown
page write copy
22151000
direct allocation
page read and write
1DAE000
direct allocation
page read and write
1F56000
direct allocation
page read and write
3204000
heap
page read and write
2104000
direct allocation
page read and write
1D9C000
direct allocation
page read and write
54A3000
trusted library allocation
page read and write
54AC000
trusted library allocation
page read and write
3240000
heap
page read and write
5493000
trusted library allocation
page read and write
527E000
stack
page read and write
54A3000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
1DB2000
direct allocation
page read and write
54BE000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
319D000
heap
page read and write
54BD000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
3192000
heap
page read and write
3221000
heap
page read and write
320B000
heap
page read and write
31F0000
heap
page read and write
EE7000
heap
page read and write
1BFD000
stack
page read and write
31FB000
heap
page read and write
21FFF000
stack
page read and write
5471000
trusted library allocation
page read and write
1DEF000
direct allocation
page read and write
1030000
unkown
page read and write
322B000
heap
page read and write
1D14000
direct allocation
page read and write
1D34000
direct allocation
page read and write
547E000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
1C5E000
direct allocation
page read and write
3200000
heap
page read and write
5493000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
54BC000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
550C000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
BAB000
stack
page read and write
3221000
heap
page read and write
3224000
heap
page read and write
1E08000
direct allocation
page read and write
31F0000
heap
page read and write
54CF000
trusted library allocation
page read and write
5488000
trusted library allocation
page read and write
1023000
unkown
page write copy
54C9000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
550E000
trusted library allocation
page read and write
5501000
trusted library allocation
page read and write
1D90000
direct allocation
page read and write
1D8A000
direct allocation
page read and write
54A3000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
1C66000
direct allocation
page read and write
5493000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
54AC000
trusted library allocation
page read and write
314E000
stack
page read and write
54A3000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
317E000
heap
page read and write
16DE000
stack
page read and write
15EC000
direct allocation
page read and write
53EE000
stack
page read and write
5471000
trusted library allocation
page read and write
1C72000
direct allocation
page read and write
1019000
unkown
page write copy
319C000
heap
page read and write
1DE6000
direct allocation
page read and write
1DC2000
direct allocation
page read and write
549E000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
54BC000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
3244000
heap
page read and write
5475000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
10CC000
unkown
page read and write
54D5000
trusted library allocation
page read and write
1C70000
direct allocation
page read and write
EF0000
heap
page read and write
54AD000
trusted library allocation
page read and write
5571000
heap
page read and write
5480000
trusted library allocation
page read and write
1027000
unkown
page write copy
5484000
trusted library allocation
page read and write
3204000
heap
page read and write
15E0000
direct allocation
page read and write
1D08000
direct allocation
page read and write
3150000
heap
page read and write
54E1000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
2203D000
stack
page read and write
1C44000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
1DE8000
direct allocation
page read and write
5493000
trusted library allocation
page read and write
2C1000
unkown
page execute read
5478000
trusted library allocation
page read and write
54BC000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
22144000
direct allocation
page read and write
1C4E000
direct allocation
page read and write
549B000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
4C9D000
stack
page read and write
5493000
trusted library allocation
page read and write
31FB000
heap
page read and write
5493000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
2227D000
stack
page read and write
321C000
heap
page read and write
5491000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
542F000
stack
page read and write
547C000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
1D98000
direct allocation
page read and write
549B000
trusted library allocation
page read and write
5598000
trusted library allocation
page read and write
321F000
heap
page read and write
1840000
direct allocation
page read and write
22155000
direct allocation
page read and write
54CC000
trusted library allocation
page read and write
1C20000
direct allocation
page read and write
54CC000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
174C000
heap
page read and write
54C9000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
1DBC000
direct allocation
page read and write
5471000
trusted library allocation
page read and write
1DA0000
direct allocation
page read and write
54BC000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
15E8000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
54BC000
trusted library allocation
page read and write
323C000
heap
page read and write
3245000
heap
page read and write
54BC000
trusted library allocation
page read and write
54AC000
trusted library allocation
page read and write
523F000
stack
page read and write
54A3000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
54BC000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
118C000
stack
page read and write
54C9000
trusted library allocation
page read and write
3209000
heap
page read and write
54A0000
trusted library allocation
page read and write
3237000
heap
page read and write
547E000
trusted library allocation
page read and write
3237000
heap
page read and write
31A0000
heap
page read and write
5474000
trusted library allocation
page read and write
1C12000
direct allocation
page read and write
54A3000
trusted library allocation
page read and write
2241000
direct allocation
page read and write
320F000
heap
page read and write
5492000
trusted library allocation
page read and write
1E42000
direct allocation
page read and write
54CC000
trusted library allocation
page read and write
322B000
heap
page read and write
5471000
trusted library allocation
page read and write
EDE000
stack
page read and write
5483000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
221C0000
direct allocation
page read and write
22140000
direct allocation
page read and write
54EE000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
54C2000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
1640000
direct allocation
page read and write
5483000
trusted library allocation
page read and write
221E0000
direct allocation
page read and write
4B50000
heap
page read and write
1144000
unkown
page readonly
1025000
unkown
page read and write
5483000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
21DFF000
stack
page read and write
10EB000
unkown
page read and write
5493000
trusted library allocation
page read and write
2C1000
unkown
page execute read
513E000
stack
page read and write
21EFE000
stack
page read and write
5479000
trusted library allocation
page read and write
31FB000
heap
page read and write
1D36000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
1DD2000
direct allocation
page read and write
5658000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
1D96000
direct allocation
page read and write
5480000
trusted library allocation
page read and write
1D00000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
3205000
heap
page read and write
1D1E000
direct allocation
page read and write
1019000
unkown
page write copy
There are 549 hidden memdumps, click here to show them.