IOC Report
StudioDemo.exe

loading gif

Files

File Path
Type
Category
Malicious
StudioDemo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\jsii-runtime.1178202491\bin\jsii-runtime.js
C++ source, ASCII text, with very long lines (324), with escape sequences
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.1178202491\bin\jsii-runtime.js.map
JSON data
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.1178202491\lib\program.js
ASCII text, with very long lines (489)
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.1178202491\lib\program.js.map
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\StudioDemo.exe
"C:\Users\user\Desktop\StudioDemo.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
strikebripm.sbs
malicious
ostracizez.sbs
malicious
offybirhtdi.sbs
malicious
mediavelk.sbs
malicious
definitib.sbs
malicious
elaboretib.sbs
malicious
https://armretire.sbs/api
188.114.96.3
malicious
activedomest.sbs
malicious
arenbootk.sbs
malicious
armretire.sbs
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/aws/jsii
unknown
http://json-schema.org/schema
unknown
https://github.com/jprichardson/node-fs-extra/issues/269
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://armretire.sbs/#
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://github.com/zitadel/zitadel/blob/new-eventstore/cmd/zitadel/startup.yaml.
unknown
https://raw.githubusercontent.com/ajv-validator/ajv/master/lib/refs/data.json#
unknown
http://json-schema.org/draft-07/schema
unknown
https://armretire.sbs/v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://armretire.sbs/
unknown
https://armretire.sbs/apis
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://json-schema.org/draft-07/schema#
unknown
https://aws.amazon.com
unknown
https://armretire.sbs/apie0
unknown
https://armretire.sbs/apiAnc
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://armretire.sbs:443/api
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://armretire.sbs/7
unknown
https://github.com/aws/jsii.git
unknown
https://armretire.sbs/6
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://github.com/aws/jsii/issues
unknown
https://armretire.sbs/G
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
armretire.sbs
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
armretire.sbs
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
4DFB000
trusted library allocation
page read and write
297E000
heap
page read and write
B978000
direct allocation
page read and write
4E07000
trusted library allocation
page read and write
46F0000
remote allocation
page read and write
4DF4000
trusted library allocation
page read and write
B48F000
direct allocation
page read and write
B400000
direct allocation
page read and write
4E2C000
trusted library allocation
page read and write
1E86000
unkown
page readonly
4E2C000
trusted library allocation
page read and write
B662000
direct allocation
page read and write
1D6A000
unkown
page readonly
D20000
unkown
page readonly
1E4D000
unkown
page readonly
1ED5000
unkown
page readonly
4DFC000
trusted library allocation
page read and write
B506000
direct allocation
page read and write
4DE3000
trusted library allocation
page read and write
29B0000
heap
page read and write
1D21000
unkown
page readonly
296E000
heap
page read and write
4E04000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
4DF3000
trusted library allocation
page read and write
4E13000
trusted library allocation
page read and write
B442000
direct allocation
page read and write
1D90000
unkown
page readonly
4DF1000
trusted library allocation
page read and write
29C3000
heap
page read and write
4FBB000
trusted library allocation
page read and write
B456000
direct allocation
page read and write
B42C000
direct allocation
page read and write
2996000
heap
page read and write
4E04000
trusted library allocation
page read and write
1D16000
unkown
page readonly
4DF4000
trusted library allocation
page read and write
4DE3000
trusted library allocation
page read and write
298A000
heap
page read and write
299D000
heap
page read and write
2925000
heap
page read and write
4DF4000
trusted library allocation
page read and write
29BD000
heap
page read and write
4E27000
trusted library allocation
page read and write
1EDB000
unkown
page readonly
28E7000
heap
page read and write
1D44000
unkown
page readonly
1ED3000
unkown
page readonly
4ED1000
heap
page read and write
2999000
heap
page read and write
B97C000
direct allocation
page read and write
4E54000
trusted library allocation
page read and write
2CEF000
stack
page read and write
1D6F000
unkown
page readonly
1DE4000
unkown
page readonly
2922000
heap
page read and write
4DD1000
trusted library allocation
page read and write
B5A6000
direct allocation
page read and write
D00000
heap
page read and write
4E44000
trusted library allocation
page read and write
165D000
unkown
page readonly
1D85000
unkown
page readonly
B5B0000
direct allocation
page read and write
1D21000
unkown
page readonly
4DE3000
trusted library allocation
page read and write
29B0000
heap
page read and write
4DFC000
trusted library allocation
page read and write
1EAB000
unkown
page readonly
4DE3000
trusted library allocation
page read and write
B532000
direct allocation
page read and write
4DF1000
trusted library allocation
page read and write
B412000
direct allocation
page read and write
B516000
direct allocation
page read and write
1D8C000
unkown
page readonly
4DF5000
trusted library allocation
page read and write
B572000
direct allocation
page read and write
1D11000
unkown
page readonly
1D74000
unkown
page readonly
4DF4000
trusted library allocation
page read and write
4DFB000
trusted library allocation
page read and write
B530000
direct allocation
page read and write
29BB000
heap
page read and write
4E2B000
trusted library allocation
page read and write
1EDB000
unkown
page readonly
4E2C000
trusted library allocation
page read and write
29B0000
heap
page read and write
1E70000
unkown
page readonly
4E04000
trusted library allocation
page read and write
2922000
heap
page read and write
1DCD000
unkown
page readonly
1ECD000
unkown
page readonly
1EDF000
unkown
page readonly
4E04000
trusted library allocation
page read and write
1D60000
unkown
page readonly
B91E000
direct allocation
page read and write
B672000
direct allocation
page read and write
B5AE000
direct allocation
page read and write
1CD5000
unkown
page readonly
4E09000
trusted library allocation
page read and write
4DF3000
trusted library allocation
page read and write
B90D000
direct allocation
page read and write
4DF3000
trusted library allocation
page read and write
2977000
heap
page read and write
2D97000
direct allocation
page read and write
1EC9000
unkown
page readonly
B4D6000
direct allocation
page read and write
1D40000
unkown
page readonly
4DDC000
trusted library allocation
page read and write
297E000
heap
page read and write
28FC000
heap
page read and write
29AC000
heap
page read and write
4DE3000
trusted library allocation
page read and write
B65A000
direct allocation
page read and write
4E13000
trusted library allocation
page read and write
4E19000
trusted library allocation
page read and write
B526000
direct allocation
page read and write
D21000
unkown
page execute read
1D65000
unkown
page readonly
D21000
unkown
page execute read
4E04000
trusted library allocation
page read and write
29B0000
heap
page read and write
4DFB000
trusted library allocation
page read and write
2A3E000
stack
page read and write
2B5FF000
stack
page read and write
1D74000
unkown
page readonly
4FAB000
trusted library allocation
page read and write
B622000
direct allocation
page read and write
1D0C000
unkown
page readonly
B408000
direct allocation
page read and write
B52E000
direct allocation
page read and write
1D6A000
unkown
page readonly
4E1B000
trusted library allocation
page read and write
1D90000
unkown
page readonly
B3ED000
stack
page read and write
1ED3000
unkown
page readonly
B51C000
direct allocation
page read and write
1DA2000
unkown
page readonly
B5EF000
direct allocation
page read and write
1CE4000
unkown
page readonly
4DE7000
trusted library allocation
page read and write
1CF7000
unkown
page readonly
4E22000
trusted library allocation
page read and write
B906000
direct allocation
page read and write
4E6B000
trusted library allocation
page read and write
4DE9000
trusted library allocation
page read and write
29CB000
heap
page read and write
B582000
direct allocation
page read and write
B578000
direct allocation
page read and write
1EB5000
unkown
page readonly
1CD0000
unkown
page readonly
2D90000
direct allocation
page read and write
4DD8000
trusted library allocation
page read and write
1D06000
unkown
page readonly
4DDC000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page read and write
B48A000
direct allocation
page read and write
29C7000
heap
page read and write
4DF3000
trusted library allocation
page read and write
4E2A000
trusted library allocation
page read and write
4E3B000
trusted library allocation
page read and write
1E60000
unkown
page readonly
1CD9000
unkown
page readonly
1DAD000
unkown
page readonly
4E1D000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
1D26000
unkown
page readonly
B50A000
direct allocation
page read and write
4E04000
trusted library allocation
page read and write
4F13000
trusted library allocation
page read and write
29A3000
heap
page read and write
29B0000
heap
page read and write
1E02000
unkown
page readonly
4DE7000
trusted library allocation
page read and write
B626000
direct allocation
page read and write
4E04000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page read and write
46DD000
stack
page read and write
1CE0000
unkown
page readonly
1E5C000
unkown
page readonly
298C000
heap
page read and write
2926000
heap
page read and write
1E0C000
unkown
page readonly
29C5000
heap
page read and write
2D60000
heap
page read and write
4DEB000
trusted library allocation
page read and write
4DEB000
trusted library allocation
page read and write
B534000
direct allocation
page read and write
1EC1000
unkown
page readonly
29C3000
heap
page read and write
298C000
heap
page read and write
29A0000
heap
page read and write
B9C000
stack
page read and write
B460000
direct allocation
page read and write
B978000
direct allocation
page read and write
4DF3000
trusted library allocation
page read and write
290D000
heap
page read and write
25F0000
heap
page read and write
4E0C000
trusted library allocation
page read and write
2986000
heap
page read and write
2654000
unkown
page read and write
2999000
heap
page read and write
4BE0000
heap
page read and write
4DE3000
trusted library allocation
page read and write
2997000
heap
page read and write
2BBBF000
stack
page read and write
4E4B000
trusted library allocation
page read and write
2992000
heap
page read and write
29CE000
heap
page read and write
4DF4000
trusted library allocation
page read and write
29C2000
heap
page read and write
B590000
direct allocation
page read and write
4DFD000
trusted library allocation
page read and write
4DFB000
trusted library allocation
page read and write
2653000
unkown
page write copy
4E04000
trusted library allocation
page read and write
1D2C000
unkown
page readonly
2918000
heap
page read and write
2922000
heap
page read and write
2611000
unkown
page write copy
2BE5000
heap
page read and write
B970000
direct allocation
page read and write
29AE000
heap
page read and write
29B0000
heap
page read and write
B444000
direct allocation
page read and write
297E000
heap
page read and write
4E06000
trusted library allocation
page read and write
45DD000
stack
page read and write
29AC000
heap
page read and write
4DD2000
trusted library allocation
page read and write
4DE8000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
B8F6000
direct allocation
page read and write
1D40000
unkown
page readonly
4E24000
trusted library allocation
page read and write
29B0000
heap
page read and write
4EDC000
trusted library allocation
page read and write
4DF4000
trusted library allocation
page read and write
1E49000
unkown
page readonly
29C3000
heap
page read and write
B4C2000
direct allocation
page read and write
4E1B000
trusted library allocation
page read and write
260A000
unkown
page write copy
4DE3000
trusted library allocation
page read and write
1D60000
unkown
page readonly
1DD2000
unkown
page readonly
1E49000
unkown
page readonly
4DFB000
trusted library allocation
page read and write
4B9F000
stack
page read and write
4E0C000
trusted library allocation
page read and write
1D6F000
unkown
page readonly
2BBC0000
direct allocation
page read and write
B3F0000
direct allocation
page read and write
2B63D000
stack
page read and write
B5A4000
direct allocation
page read and write
B638000
direct allocation
page read and write
292A000
heap
page read and write
1EC5000
unkown
page readonly
B45A000
direct allocation
page read and write
2DB2000
direct allocation
page read and write
1C9F000
unkown
page readonly
4DFC000
trusted library allocation
page read and write
4E44000
trusted library allocation
page read and write
B482000
direct allocation
page read and write
29CB000
heap
page read and write
4E17000
trusted library allocation
page read and write
1DAD000
unkown
page readonly
1CD5000
unkown
page readonly
1D3B000
unkown
page readonly
4DF3000
trusted library allocation
page read and write
4EE2000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
B466000
direct allocation
page read and write
4DDC000
trusted library allocation
page read and write
4DEB000
trusted library allocation
page read and write
B958000
direct allocation
page read and write
29BE000
heap
page read and write
28BD000
stack
page read and write
4E23000
trusted library allocation
page read and write
4DDA000
trusted library allocation
page read and write
2992000
heap
page read and write
4DF4000
trusted library allocation
page read and write
1CE4000
unkown
page readonly
B620000
direct allocation
page read and write
4DCE000
stack
page read and write
B540000
direct allocation
page read and write
B958000
direct allocation
page read and write
B580000
direct allocation
page read and write
2877000
heap
page read and write
B5A0000
direct allocation
page read and write
4DF3000
trusted library allocation
page read and write
2650000
unkown
page write copy
4DD1000
trusted library allocation
page read and write
2BC0E000
direct allocation
page read and write
29B0000
heap
page read and write
1EC1000
unkown
page readonly
28C0000
heap
page read and write
29C5000
heap
page read and write
4E60000
trusted library allocation
page read and write
29A1000
heap
page read and write
1D16000
unkown
page readonly
2B884000
direct allocation
page read and write
29C7000
heap
page read and write
292A000
heap
page read and write
4E1C000
trusted library allocation
page read and write
2999000
heap
page read and write
B500000
direct allocation
page read and write
1CBC000
unkown
page readonly
4DEB000
trusted library allocation
page read and write
4DDC000
trusted library allocation
page read and write
29A0000
heap
page read and write
4E1C000
trusted library allocation
page read and write
1E70000
unkown
page readonly
298C000
heap
page read and write
B59E000
direct allocation
page read and write
4DF4000
trusted library allocation
page read and write
1E65000
unkown
page readonly
4E1C000
trusted library allocation
page read and write
1D49000
unkown
page readonly
1EB5000
unkown
page readonly
1E40000
unkown
page readonly
4E1F000
trusted library allocation
page read and write
4E33000
trusted library allocation
page read and write
271A000
unkown
page readonly
1D02000
unkown
page readonly
1E32000
unkown
page readonly
4DF4000
trusted library allocation
page read and write
4E19000
trusted library allocation
page read and write
29BD000
heap
page read and write
1CEB000
unkown
page readonly
29A0000
heap
page read and write
2A7C000
heap
page read and write
265C000
unkown
page read and write
2646000
unkown
page read and write
B97E000
direct allocation
page read and write
4C2E000
stack
page read and write
2686000
unkown
page write copy
29BB000
heap
page read and write
298A000
heap
page read and write
B50C000
direct allocation
page read and write
1CF3000
unkown
page readonly
2A70000
heap
page read and write
B66A000
direct allocation
page read and write
1ED5000
unkown
page readonly
4DDC000
trusted library allocation
page read and write
4DE3000
trusted library allocation
page read and write
B8D0000
direct allocation
page read and write
299D000
heap
page read and write
1DC6000
unkown
page readonly
4E04000
trusted library allocation
page read and write
B95C000
direct allocation
page read and write
B600000
direct allocation
page read and write
4E04000
trusted library allocation
page read and write
271A000
unkown
page readonly
2614000
unkown
page write copy
B56E000
direct allocation
page read and write
4E04000
trusted library allocation
page read and write
258B000
stack
page read and write
1D7E000
unkown
page readonly
B660000
direct allocation
page read and write
28E0000
heap
page read and write
4590000
heap
page read and write
B944000
direct allocation
page read and write
B8E8000
direct allocation
page read and write
1E91000
unkown
page readonly
29A1000
heap
page read and write
1E69000
unkown
page readonly
4E41000
trusted library allocation
page read and write
B4E8000
direct allocation
page read and write
297E000
heap
page read and write
1D9E000
unkown
page readonly
B903000
direct allocation
page read and write
2D50000
direct allocation
page read and write
1CA2000
unkown
page readonly
299D000
heap
page read and write
4E04000
trusted library allocation
page read and write
1CEE000
unkown
page readonly
2687000
unkown
page readonly
448D000
stack
page read and write
4E04000
trusted library allocation
page read and write
4DFB000
trusted library allocation
page read and write
4E08000
trusted library allocation
page read and write
2687000
unkown
page readonly
4E01000
trusted library allocation
page read and write
46F0000
remote allocation
page read and write
1D52000
unkown
page readonly
4E04000
trusted library allocation
page read and write
B67A000
direct allocation
page read and write
4DF1000
trusted library allocation
page read and write
B402000
direct allocation
page read and write
2875000
heap
page read and write
4DD1000
trusted library allocation
page read and write
2BAE000
stack
page read and write
4E3A000
trusted library allocation
page read and write
45A000
remote allocation
page execute and read and write
2B78000
direct allocation
page read and write
1E44000
unkown
page readonly
B5A8000
direct allocation
page read and write
B47C000
direct allocation
page read and write
B54C000
direct allocation
page read and write
B60A000
direct allocation
page read and write
4DF4000
trusted library allocation
page read and write
458D000
stack
page read and write
4DEC000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
4DDC000
trusted library allocation
page read and write
1DED000
unkown
page readonly
1D26000
unkown
page readonly
29B6000
heap
page read and write
1E60000
unkown
page readonly
1D85000
unkown
page readonly
165D000
unkown
page readonly
29BF000
heap
page read and write
4E32000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
2B73F000
stack
page read and write
B67E000
direct allocation
page read and write
B636000
direct allocation
page read and write
4E6C000
trusted library allocation
page read and write
B544000
direct allocation
page read and write
B97C000
direct allocation
page read and write
4DE3000
trusted library allocation
page read and write
B608000
direct allocation
page read and write
29C5000
heap
page read and write
2BABD000
stack
page read and write
4E1D000
trusted library allocation
page read and write
1DF8000
unkown
page readonly
1D78000
unkown
page readonly
1EE3000
unkown
page readonly
B610000
direct allocation
page read and write
1EDF000
unkown
page readonly
4E18000
trusted library allocation
page read and write
283E000
stack
page read and write
4E2A000
trusted library allocation
page read and write
4DEB000
trusted library allocation
page read and write
260B000
unkown
page read and write
1EAB000
unkown
page readonly
4DDC000
trusted library allocation
page read and write
4E2A000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
2D2D000
stack
page read and write
B630000
direct allocation
page read and write
1D1C000
unkown
page readonly
29CF000
heap
page read and write
B61E000
direct allocation
page read and write
1D8C000
unkown
page readonly
4E0A000
trusted library allocation
page read and write
4DDC000
trusted library allocation
page read and write
1D34000
unkown
page readonly
4DF4000
trusted library allocation
page read and write
1D5C000
unkown
page readonly
B93E000
direct allocation
page read and write
4FB3000
trusted library allocation
page read and write
1CE9000
unkown
page readonly
B54A000
direct allocation
page read and write
4E33000
trusted library allocation
page read and write
1CE9000
unkown
page readonly
4DE3000
trusted library allocation
page read and write
4DF4000
trusted library allocation
page read and write
B484000
direct allocation
page read and write
1E06000
unkown
page readonly
1E69000
unkown
page readonly
1CEB000
unkown
page readonly
2BD0000
heap
page read and write
2BB0000
direct allocation
page read and write
1D3B000
unkown
page readonly
4E04000
trusted library allocation
page read and write
1E44000
unkown
page readonly
1E65000
unkown
page readonly
1E91000
unkown
page readonly
1D11000
unkown
page readonly
1CBC000
unkown
page readonly
1E23000
unkown
page readonly
297E000
heap
page read and write
2D80000
direct allocation
page read and write
4DF0000
trusted library allocation
page read and write
4E1C000
trusted library allocation
page read and write
B652000
direct allocation
page read and write
298F000
heap
page read and write
4E04000
trusted library allocation
page read and write
296E000
heap
page read and write
29BB000
heap
page read and write
2BC12000
direct allocation
page read and write
1CD9000
unkown
page readonly
4E04000
trusted library allocation
page read and write
1CEE000
unkown
page readonly
2D70000
direct allocation
page read and write
B474000
direct allocation
page read and write
B472000
direct allocation
page read and write
B66C000
direct allocation
page read and write
4DEA000
trusted library allocation
page read and write
4DF4000
trusted library allocation
page read and write
B62E000
direct allocation
page read and write
1E06000
unkown
page readonly
D20000
unkown
page readonly
1DBD000
unkown
page readonly
1E86000
unkown
page readonly
B60E000
direct allocation
page read and write
267C000
unkown
page read and write
1E7B000
unkown
page readonly
4DE4000
trusted library allocation
page read and write
254B000
stack
page read and write
4DFC000
trusted library allocation
page read and write
4DF1000
trusted library allocation
page read and write
1E4D000
unkown
page readonly
2D30000
heap
page read and write
504B000
trusted library allocation
page read and write
1D1C000
unkown
page readonly
2999000
heap
page read and write
4DE7000
trusted library allocation
page read and write
2B77D000
stack
page read and write
4E01000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
4DDC000
trusted library allocation
page read and write
292A000
heap
page read and write
2610000
unkown
page read and write
2988000
heap
page read and write
29D0000
heap
page read and write
4DF3000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
1D99000
unkown
page readonly
29B0000
heap
page read and write
2686000
unkown
page write copy
2683000
unkown
page read and write
4E06000
trusted library allocation
page read and write
2BE0000
heap
page read and write
4E04000
trusted library allocation
page read and write
B968000
direct allocation
page read and write
1DED000
unkown
page readonly
B44F000
direct allocation
page read and write
B4D2000
direct allocation
page read and write
29BF000
heap
page read and write
1ECD000
unkown
page readonly
1DD2000
unkown
page readonly
4DF1000
trusted library allocation
page read and write
1D7E000
unkown
page readonly
2918000
heap
page read and write
29A0000
heap
page read and write
1DF8000
unkown
page readonly
4E2C000
trusted library allocation
page read and write
2999000
heap
page read and write
298C000
heap
page read and write
4DDA000
trusted library allocation
page read and write
B478000
direct allocation
page read and write
B564000
direct allocation
page read and write
4ED0000
heap
page read and write
4DDC000
trusted library allocation
page read and write
B430000
direct allocation
page read and write
296C000
heap
page read and write
1E5C000
unkown
page readonly
1EC5000
unkown
page readonly
1DC6000
unkown
page readonly
29B6000
heap
page read and write
4E04000
trusted library allocation
page read and write
29A0000
heap
page read and write
1D4E000
unkown
page readonly
2BA00000
direct allocation
page read and write
2613000
unkown
page read and write
29AC000
heap
page read and write
B8EC000
direct allocation
page read and write
B938000
direct allocation
page read and write
298C000
heap
page read and write
B632000
direct allocation
page read and write
4E27000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
1E0C000
unkown
page readonly
4E04000
trusted library allocation
page read and write
1C9F000
unkown
page readonly
1EC9000
unkown
page readonly
298C000
heap
page read and write
B62C000
direct allocation
page read and write
4DE0000
trusted library allocation
page read and write
29B0000
heap
page read and write
B592000
direct allocation
page read and write
B614000
direct allocation
page read and write
260A000
unkown
page write copy
2B87F000
stack
page read and write
1D44000
unkown
page readonly
1D06000
unkown
page readonly
4E74000
trusted library allocation
page read and write
B43A000
direct allocation
page read and write
4E18000
trusted library allocation
page read and write
4EFB000
trusted library allocation
page read and write
4DE3000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
4E0C000
trusted library allocation
page read and write
B970000
direct allocation
page read and write
4DD1000
trusted library allocation
page read and write
B8C6000
direct allocation
page read and write
1CE0000
unkown
page readonly
29B4000
heap
page read and write
4DD8000
trusted library allocation
page read and write
299D000
heap
page read and write
28FC000
heap
page read and write
4E23000
trusted library allocation
page read and write
1EE3000
unkown
page readonly
B944000
direct allocation
page read and write
B5EA000
direct allocation
page read and write
4E04000
trusted library allocation
page read and write
1EA5000
unkown
page readonly
4DE9000
trusted library allocation
page read and write
29AC000
heap
page read and write
2B70000
direct allocation
page read and write
4E1B000
trusted library allocation
page read and write
28F7000
heap
page read and write
1E40000
unkown
page readonly
1D49000
unkown
page readonly
290D000
heap
page read and write
2B880000
direct allocation
page read and write
B536000
direct allocation
page read and write
29AE000
heap
page read and write
4CCE000
stack
page read and write
B598000
direct allocation
page read and write
1D0C000
unkown
page readonly
1D34000
unkown
page readonly
2CAF000
stack
page read and write
2922000
heap
page read and write
298A000
heap
page read and write
B59A000
direct allocation
page read and write
4E04000
trusted library allocation
page read and write
1D9E000
unkown
page readonly
4DD6000
trusted library allocation
page read and write
1D99000
unkown
page readonly
1CF7000
unkown
page readonly
297A000
heap
page read and write
2B4FF000
stack
page read and write
4DE7000
trusted library allocation
page read and write
1D2C000
unkown
page readonly
298A000
heap
page read and write
1DBD000
unkown
page readonly
2651000
unkown
page read and write
299E000
heap
page read and write
1D78000
unkown
page readonly
29A3000
heap
page read and write
4E1A000
trusted library allocation
page read and write
4E05000
trusted library allocation
page read and write
4E0C000
trusted library allocation
page read and write
260F000
unkown
page write copy
1E02000
unkown
page readonly
2986000
heap
page read and write
2840000
heap
page read and write
299D000
heap
page read and write
1E23000
unkown
page readonly
299F000
heap
page read and write
4A9E000
stack
page read and write
2977000
heap
page read and write
298C000
heap
page read and write
1CF3000
unkown
page readonly
29BB000
heap
page read and write
4E13000
trusted library allocation
page read and write
1DCD000
unkown
page readonly
2870000
heap
page read and write
1E7B000
unkown
page readonly
B62A000
direct allocation
page read and write
1D4E000
unkown
page readonly
B420000
direct allocation
page read and write
B454000
direct allocation
page read and write
29CB000
heap
page read and write
B554000
direct allocation
page read and write
1D5C000
unkown
page readonly
B54E000
direct allocation
page read and write
B94C000
direct allocation
page read and write
1D65000
unkown
page readonly
4DD1000
trusted library allocation
page read and write
1E32000
unkown
page readonly
4E2C000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
4E0C000
trusted library allocation
page read and write
4DD2000
trusted library allocation
page read and write
4E01000
trusted library allocation
page read and write
4DE3000
trusted library allocation
page read and write
4C6F000
stack
page read and write
4F33000
trusted library allocation
page read and write
B584000
direct allocation
page read and write
296E000
heap
page read and write
4DE3000
trusted library allocation
page read and write
1D52000
unkown
page readonly
1D02000
unkown
page readonly
B63A000
direct allocation
page read and write
4DE7000
trusted library allocation
page read and write
1CFE000
unkown
page readonly
4E1A000
trusted library allocation
page read and write
1EA5000
unkown
page readonly
46F0000
remote allocation
page read and write
4E06000
trusted library allocation
page read and write
29C7000
heap
page read and write
4E0D000
trusted library allocation
page read and write
296C000
heap
page read and write
4E02000
trusted library allocation
page read and write
1DA2000
unkown
page readonly
292A000
heap
page read and write
B548000
direct allocation
page read and write
1DE4000
unkown
page readonly
4E2F000
trusted library allocation
page read and write
1CD0000
unkown
page readonly
299D000
heap
page read and write
C9D000
stack
page read and write
B4B8000
direct allocation
page read and write
296C000
heap
page read and write
1CFE000
unkown
page readonly
4E3B000
trusted library allocation
page read and write
1CA2000
unkown
page readonly
There are 692 hidden memdumps, click here to show them.