IOC Report
Setup.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
mediavelk.sbs
malicious
fashionablei.sbs
malicious
definitib.sbs
malicious
strikebripm.sbs
malicious
elaboretib.sbs
malicious
activedomest.sbs
malicious
ostracizez.sbs
malicious
https://fashionablei.sbs/api
188.114.97.3
malicious
arenbootk.sbs
malicious
offybirhtdi.sbs
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://fashionablei.sbs/ll
unknown
https://fashionablei.sbs/L
unknown
https://duckduckgo.com/ac/?q=
unknown
https://fashionablei.sbs/api3
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://fashionablei.sbs/ult
unknown
https://fashionablei.sbs/ctivp
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
http://crl.mic
unknown
https://fashionablei.sbs:443/api
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://fashionablei.sbs/apin4
unknown
https://github.com/zitadel/zitadel/blob/new-eventstore/cmd/zitadel/startup.yaml.
unknown
https://fashionablei.sbs/apin4E
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://fashionablei.sbs/
unknown
https://fashionablei.sbs/apire1b
unknown
https://fashionablei.sbs/apiDoO
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://fashionablei.sbs/2
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://fashionablei.sbs/c
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://fashionablei.sbs/apiK
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictproto:
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fashionablei.sbs
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
fashionablei.sbs
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
BC86000
direct allocation
page read and write
malicious
55DB000
trusted library allocation
page read and write
32B5000
heap
page read and write
32BF000
heap
page read and write
55D3000
trusted library allocation
page read and write
32BF000
heap
page read and write
55E9000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
114D000
unkown
page write copy
C71000
unkown
page readonly
BD1A000
direct allocation
page read and write
32CD000
heap
page read and write
55BB000
trusted library allocation
page read and write
17C0000
heap
page read and write
55F3000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
318E000
stack
page read and write
32D0000
heap
page read and write
3270000
heap
page read and write
55E4000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
32CD000
heap
page read and write
3295000
heap
page read and write
5604000
trusted library allocation
page read and write
BC22000
direct allocation
page read and write
55BB000
trusted library allocation
page read and write
BC70000
direct allocation
page read and write
BC82000
direct allocation
page read and write
328F000
heap
page read and write
55B7000
trusted library allocation
page read and write
32CD000
heap
page read and write
55BB000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
32B0000
direct allocation
page read and write
BE00000
direct allocation
page read and write
55BB000
trusted library allocation
page read and write
4CBC000
stack
page read and write
55DB000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
32D4000
heap
page read and write
55CD000
trusted library allocation
page read and write
329B000
heap
page read and write
3295000
heap
page read and write
3293000
heap
page read and write
BC12000
direct allocation
page read and write
55CB000
trusted library allocation
page read and write
3295000
heap
page read and write
BC41000
direct allocation
page read and write
328A000
heap
page read and write
3297000
heap
page read and write
5607000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
322F000
stack
page read and write
55F6000
trusted library allocation
page read and write
300E000
stack
page read and write
32CE000
heap
page read and write
BB0F000
stack
page read and write
56AE000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
4E1E000
stack
page read and write
3279000
heap
page read and write
55F5000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
3290000
heap
page read and write
1788000
direct allocation
page read and write
581D000
trusted library allocation
page read and write
548F000
stack
page read and write
55EC000
trusted library allocation
page read and write
BC60000
direct allocation
page read and write
BC30000
direct allocation
page read and write
45A000
remote allocation
page execute and read and write
BC1C000
direct allocation
page read and write
32C3000
heap
page read and write
55F6000
trusted library allocation
page read and write
32BB000
heap
page read and write
56A1000
heap
page read and write
560C000
trusted library allocation
page read and write
BC04000
direct allocation
page read and write
55EB000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
32D4000
heap
page read and write
1191000
unkown
page read and write
BC18000
direct allocation
page read and write
BB94000
direct allocation
page read and write
BC1A000
direct allocation
page read and write
32D0000
direct allocation
page read and write
55F4000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
2EF0000
heap
page read and write
327E000
heap
page read and write
BC0A000
direct allocation
page read and write
BD26000
direct allocation
page read and write
55BB000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
32CD000
heap
page read and write
320D000
heap
page read and write
BC06000
direct allocation
page read and write
55BB000
trusted library allocation
page read and write
32D4000
heap
page read and write
BC2C000
direct allocation
page read and write
119B000
unkown
page read and write
55C3000
trusted library allocation
page read and write
55A8000
trusted library allocation
page read and write
3046000
heap
page read and write
327E000
heap
page read and write
BC1E000
direct allocation
page read and write
55AA000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
3293000
heap
page read and write
11C5000
unkown
page write copy
55CB000
trusted library allocation
page read and write
1980000
heap
page read and write
32B5000
heap
page read and write
55A1000
trusted library allocation
page read and write
1620000
heap
page read and write
55CB000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
32D8000
direct allocation
page read and write
329B000
heap
page read and write
32C3000
heap
page read and write
32D0000
heap
page read and write
55F6000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
55EA000
trusted library allocation
page read and write
560A000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
3010000
heap
page read and write
2E5B000
stack
page read and write
55A1000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
2BFFE000
stack
page read and write
BE26000
direct allocation
page read and write
55DA000
trusted library allocation
page read and write
32D4000
heap
page read and write
7D1000
unkown
page execute read
BCFC000
direct allocation
page read and write
5614000
trusted library allocation
page read and write
55BE000
trusted library allocation
page read and write
BB90000
direct allocation
page read and write
55DB000
trusted library allocation
page read and write
C71000
unkown
page readonly
32CD000
heap
page read and write
3293000
heap
page read and write
BC00000
direct allocation
page read and write
56E5000
trusted library allocation
page read and write
32C3000
heap
page read and write
3295000
heap
page read and write
55EB000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
BC74000
direct allocation
page read and write
55DB000
trusted library allocation
page read and write
BA0F000
stack
page read and write
544E000
stack
page read and write
BD1C000
direct allocation
page read and write
55E6000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
55B8000
trusted library allocation
page read and write
BCD8000
direct allocation
page read and write
55E3000
trusted library allocation
page read and write
BD04000
direct allocation
page read and write
3293000
heap
page read and write
3295000
heap
page read and write
1148000
unkown
page write copy
328F000
heap
page read and write
55BB000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
32D4000
heap
page read and write
55AA000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
328E000
heap
page read and write
32CD000
heap
page read and write
31F7000
heap
page read and write
55CB000
trusted library allocation
page read and write
BD14000
direct allocation
page read and write
5614000
trusted library allocation
page read and write
32BF000
heap
page read and write
2C0FF000
stack
page read and write
114F000
unkown
page read and write
31E8000
heap
page read and write
32A0000
heap
page read and write
328B000
heap
page read and write
3293000
heap
page read and write
55B9000
trusted library allocation
page read and write
3295000
heap
page read and write
55DB000
trusted library allocation
page read and write
55AE000
trusted library allocation
page read and write
327E000
heap
page read and write
3299000
heap
page read and write
7D0000
unkown
page readonly
195D000
stack
page read and write
5607000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
32CD000
heap
page read and write
55DB000
trusted library allocation
page read and write
5613000
trusted library allocation
page read and write
32BA000
heap
page read and write
32A2000
heap
page read and write
55DB000
trusted library allocation
page read and write
BD84000
direct allocation
page read and write
55DB000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
32CD000
heap
page read and write
55B3000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
3270000
heap
page read and write
55C2000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
BD96000
direct allocation
page read and write
55E2000
trusted library allocation
page read and write
32D4000
heap
page read and write
11C6000
unkown
page readonly
55AA000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
BCE6000
direct allocation
page read and write
BB50000
direct allocation
page read and write
55DB000
trusted library allocation
page read and write
3295000
heap
page read and write
55DB000
trusted library allocation
page read and write
BDE4000
direct allocation
page read and write
55CB000
trusted library allocation
page read and write
3297000
heap
page read and write
BC72000
direct allocation
page read and write
32D4000
heap
page read and write
328F000
heap
page read and write
3293000
heap
page read and write
55C2000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
1630000
heap
page read and write
32BF000
heap
page read and write
5616000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
BD86000
direct allocation
page read and write
55B7000
trusted library allocation
page read and write
5625000
trusted library allocation
page read and write
32D0000
heap
page read and write
BD20000
direct allocation
page read and write
32A8000
heap
page read and write
56B4000
trusted library allocation
page read and write
12BC000
stack
page read and write
5614000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
17C5000
heap
page read and write
55DB000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
7D1000
unkown
page execute read
32D0000
heap
page read and write
3287000
heap
page read and write
BD82000
direct allocation
page read and write
529F000
stack
page read and write
31FC000
heap
page read and write
BFFC000
direct allocation
page read and write
5603000
trusted library allocation
page read and write
55BC000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
32CD000
heap
page read and write
BD24000
direct allocation
page read and write
32D1000
heap
page read and write
32D4000
heap
page read and write
55CC000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
32BD000
heap
page read and write
BD8C000
direct allocation
page read and write
329B000
heap
page read and write
3293000
heap
page read and write
55F9000
trusted library allocation
page read and write
5624000
trusted library allocation
page read and write
31C0000
remote allocation
page read and write
55C5000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
3293000
heap
page read and write
55CB000
trusted library allocation
page read and write
32BF000
heap
page read and write
32D4000
heap
page read and write
4CD0000
heap
page read and write
32DC000
direct allocation
page read and write
55E1000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
326D000
stack
page read and write
3290000
heap
page read and write
55BB000
trusted library allocation
page read and write
563C000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
178C000
direct allocation
page read and write
3299000
heap
page read and write
55B8000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
BD88000
direct allocation
page read and write
3290000
heap
page read and write
BC48000
direct allocation
page read and write
BC4A000
direct allocation
page read and write
55D4000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
519E000
stack
page read and write
329F000
heap
page read and write
55DB000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
BC16000
direct allocation
page read and write
32D0000
heap
page read and write
3291000
heap
page read and write
560C000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
BC66000
direct allocation
page read and write
55B4000
trusted library allocation
page read and write
327E000
heap
page read and write
3228000
heap
page read and write
32BF000
heap
page read and write
329B000
heap
page read and write
32BB000
heap
page read and write
53DE000
stack
page read and write
55CB000
trusted library allocation
page read and write
55FB000
trusted library allocation
page read and write
BDDA000
direct allocation
page read and write
55F6000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
32D6000
heap
page read and write
55E3000
trusted library allocation
page read and write
BD08000
direct allocation
page read and write
5604000
trusted library allocation
page read and write
4D1D000
stack
page read and write
55AD000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
31E0000
heap
page read and write
5606000
trusted library allocation
page read and write
32D0000
heap
page read and write
3190000
heap
page read and write
1780000
direct allocation
page read and write
55DB000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
32D0000
heap
page read and write
55C3000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
3279000
heap
page read and write
3270000
heap
page read and write
55CB000
trusted library allocation
page read and write
55C7000
trusted library allocation
page read and write
BE24000
direct allocation
page read and write
32BD000
heap
page read and write
BD16000
direct allocation
page read and write
329A000
heap
page read and write
55DE000
trusted library allocation
page read and write
BD94000
direct allocation
page read and write
55E6000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
BC34000
direct allocation
page read and write
55F5000
trusted library allocation
page read and write
32A4000
heap
page read and write
3293000
heap
page read and write
BD12000
direct allocation
page read and write
3295000
heap
page read and write
560C000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
BC5E000
direct allocation
page read and write
55B3000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
32CD000
heap
page read and write
168A000
heap
page read and write
BDB2000
direct allocation
page read and write
32D0000
heap
page read and write
BB4D000
stack
page read and write
55DB000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
BD0C000
direct allocation
page read and write
BDD2000
direct allocation
page read and write
327E000
heap
page read and write
32CD000
heap
page read and write
55BB000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
BC78000
direct allocation
page read and write
55D6000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
32B0000
heap
page read and write
BC5A000
direct allocation
page read and write
BC4E000
direct allocation
page read and write
55BB000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
1148000
unkown
page read and write
BC0C000
direct allocation
page read and write
32CD000
heap
page read and write
55DB000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
3270000
heap
page read and write
55DB000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
18C0000
direct allocation
page read and write
BC36000
direct allocation
page read and write
320D000
heap
page read and write
55DB000
trusted library allocation
page read and write
329E000
heap
page read and write
1960000
heap
page read and write
5603000
trusted library allocation
page read and write
32AC000
heap
page read and write
55FB000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
314F000
stack
page read and write
BDB0000
direct allocation
page read and write
32D0000
heap
page read and write
31C0000
remote allocation
page read and write
BB52000
direct allocation
page read and write
3247000
heap
page read and write
55DB000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
1202000
unkown
page readonly
56A0000
heap
page read and write
BC5C000
direct allocation
page read and write
32CD000
heap
page read and write
3295000
heap
page read and write
55B4000
trusted library allocation
page read and write
5644000
trusted library allocation
page read and write
32D1000
heap
page read and write
BC4C000
direct allocation
page read and write
13BC000
stack
page read and write
55AA000
trusted library allocation
page read and write
32C0000
heap
page read and write
3293000
heap
page read and write
55D3000
trusted library allocation
page read and write
31FC000
heap
page read and write
55BB000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
BDB4000
direct allocation
page read and write
5614000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55EC000
trusted library allocation
page read and write
329D000
heap
page read and write
55E4000
trusted library allocation
page read and write
BDFC000
direct allocation
page read and write
55F6000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
32AD000
stack
page read and write
3271000
heap
page read and write
32BF000
heap
page read and write
5607000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
5633000
trusted library allocation
page read and write
BD0A000
direct allocation
page read and write
1184000
unkown
page read and write
3297000
heap
page read and write
3040000
heap
page read and write
55CE000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
55DE000
trusted library allocation
page read and write
BD80000
direct allocation
page read and write
31C0000
remote allocation
page read and write
BD9C000
direct allocation
page read and write
329C000
heap
page read and write
55B7000
trusted library allocation
page read and write
329D000
heap
page read and write
55B9000
trusted library allocation
page read and write
11C6000
unkown
page readonly
55F3000
trusted library allocation
page read and write
BC6C000
direct allocation
page read and write
1699000
heap
page read and write
55DB000
trusted library allocation
page read and write
3228000
heap
page read and write
191E000
stack
page read and write
BD18000
direct allocation
page read and write
55B9000
trusted library allocation
page read and write
560B000
trusted library allocation
page read and write
1190000
unkown
page write copy
55FC000
trusted library allocation
page read and write
5590000
heap
page read and write
32D4000
heap
page read and write
32F0000
direct allocation
page read and write
BE80000
direct allocation
page read and write
55CB000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
32C3000
heap
page read and write
55DB000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
2BDFF000
stack
page read and write
3312000
direct allocation
page read and write
BD67000
direct allocation
page read and write
32D0000
heap
page read and write
55BB000
trusted library allocation
page read and write
2BCFF000
stack
page read and write
329B000
heap
page read and write
329A000
heap
page read and write
3222000
heap
page read and write
55B7000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
7D0000
unkown
page readonly
327E000
heap
page read and write
55C0000
trusted library allocation
page read and write
11BB000
unkown
page read and write
BC08000
direct allocation
page read and write
578D000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
BC46000
direct allocation
page read and write
32B5000
heap
page read and write
3299000
heap
page read and write
3293000
heap
page read and write
3047000
heap
page read and write
11C2000
unkown
page read and write
55EC000
trusted library allocation
page read and write
3299000
heap
page read and write
3295000
heap
page read and write
52DE000
stack
page read and write
55EA000
trusted library allocation
page read and write
11C5000
unkown
page write copy
55AA000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
BC14000
direct allocation
page read and write
BD06000
direct allocation
page read and write
BDFE000
direct allocation
page read and write
55F3000
trusted library allocation
page read and write
560A000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
32D4000
heap
page read and write
326F000
heap
page read and write
55E5000
trusted library allocation
page read and write
BC7A000
direct allocation
page read and write
55DC000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
3288000
heap
page read and write
32BF000
heap
page read and write
33DF000
stack
page read and write
55F6000
trusted library allocation
page read and write
32BF000
heap
page read and write
32CD000
heap
page read and write
32C3000
heap
page read and write
55A0000
trusted library allocation
page read and write
1202000
unkown
page readonly
55F6000
trusted library allocation
page read and write
114C000
unkown
page read and write
BD22000
direct allocation
page read and write
55E5000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
3270000
heap
page read and write
114B000
unkown
page write copy
BFEC000
direct allocation
page read and write
32BF000
heap
page read and write
55F5000
trusted library allocation
page read and write
18D0000
direct allocation
page read and write
BD02000
direct allocation
page read and write
3270000
heap
page read and write
5603000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
327E000
heap
page read and write
3295000
heap
page read and write
55F3000
trusted library allocation
page read and write
55C2000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
BD9E000
direct allocation
page read and write
55B9000
trusted library allocation
page read and write
BD0E000
direct allocation
page read and write
32BA000
heap
page read and write
5645000
trusted library allocation
page read and write
329D000
heap
page read and write
55AA000
trusted library allocation
page read and write
55EC000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
577D000
trusted library allocation
page read and write
3297000
heap
page read and write
32B3000
heap
page read and write
32D4000
heap
page read and write
5613000
trusted library allocation
page read and write
3222000
heap
page read and write
32C3000
heap
page read and write
1150000
unkown
page write copy
3297000
heap
page read and write
3291000
heap
page read and write
BC20000
direct allocation
page read and write
1680000
heap
page read and write
BEBA000
direct allocation
page read and write
3295000
heap
page read and write
55BA000
trusted library allocation
page read and write
BD00000
direct allocation
page read and write
32C3000
heap
page read and write
BC02000
direct allocation
page read and write
BC84000
direct allocation
page read and write
4BBD000
stack
page read and write
55B9000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
32BA000
heap
page read and write
328C000
heap
page read and write
328B000
heap
page read and write
55EB000
trusted library allocation
page read and write
55EC000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
2E9A000
stack
page read and write
560C000
trusted library allocation
page read and write
560B000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
There are 606 hidden memdumps, click here to show them.