IOC Report
Okfjk1hs4kdhs2.exe

loading gif

Files

File Path
Type
Category
Malicious
Okfjk1hs4kdhs2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\756341\Place.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\756341\V
data
dropped
C:\Users\user\AppData\Local\Temp\Abuse
data
dropped
C:\Users\user\AppData\Local\Temp\Belly
ASCII text, with very long lines (971), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Belly.bat
ASCII text, with very long lines (971), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Bow
data
dropped
C:\Users\user\AppData\Local\Temp\Hit
data
dropped
C:\Users\user\AppData\Local\Temp\Intimate
data
dropped
C:\Users\user\AppData\Local\Temp\Olympics
data
dropped
C:\Users\user\AppData\Local\Temp\Relevance
data
dropped
C:\Users\user\AppData\Local\Temp\Significant
data
dropped
C:\Users\user\AppData\Local\Temp\Suzuki
data
dropped
C:\Users\user\AppData\Local\Temp\Tobago
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Belly Belly.bat & Belly.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 756341
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "MENTIONSTATICARGUEKEEPS" Abuse
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Significant + ..\Bow + ..\Olympics + ..\Intimate + ..\Tobago + ..\Suzuki + ..\Relevance V
malicious
C:\Users\user\AppData\Local\Temp\756341\Place.pif
Place.pif V
malicious
C:\Users\user\Desktop\Okfjk1hs4kdhs2.exe
"C:\Users\user\Desktop\Okfjk1hs4kdhs2.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
servicedny.site
malicious
goalyfeastz.site
malicious
contemteny.site
malicious
opposezmny.site
malicious
https://faulteyotk.site/api
104.21.9.13
malicious
authorisev.site
malicious
faulteyotk.site
malicious
seallysl.site
malicious
dilemmadu.site
malicious
https://faulteyotk.site/apit
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://faulteyotk.site/y?
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://faulteyotk.site/apiz
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://faulteyotk.site/
unknown
https://www.autoitscript.com/autoit3/
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://faulteyotk.site:443/apil
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://faulteyotk.site/pi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://faulteyotk.site/3
unknown
https://faulteyotk.site/4
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://faulteyotk.site/.
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
faulteyotk.site
104.21.9.13
malicious
XoihaBktBfpQRsABjqvzDOKOlj.XoihaBktBfpQRsABjqvzDOKOlj
unknown

IPs

IP
Domain
Country
Malicious
104.21.9.13
faulteyotk.site
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
47E1000
direct allocation
page execute and read and write
malicious
12DE000
heap
page read and write
malicious
441B000
trusted library allocation
page read and write
547F000
stack
page read and write
37C0000
heap
page read and write
45F1000
trusted library allocation
page read and write
289A000
heap
page read and write
8D2000
heap
page read and write
4462000
trusted library allocation
page read and write
46C2000
trusted library allocation
page read and write
E00000
heap
page read and write
45F7000
trusted library allocation
page read and write
327E000
heap
page read and write
2F2B000
heap
page read and write
2940000
heap
page read and write
43F1000
trusted library allocation
page read and write
12FF000
heap
page read and write
DBE000
stack
page read and write
37C1000
heap
page read and write
3AAD000
stack
page read and write
46D2000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
37C1000
heap
page read and write
45FF000
trusted library allocation
page read and write
45FA000
trusted library allocation
page read and write
43A9000
trusted library allocation
page read and write
3250000
heap
page read and write
51E0000
heap
page read and write
4421000
trusted library allocation
page read and write
3050000
remote allocation
page read and write
5542000
trusted library allocation
page read and write
42F1000
trusted library allocation
page read and write
4683000
trusted library allocation
page read and write
8F7000
heap
page read and write
2F3A000
heap
page read and write
DDA000
stack
page read and write
442A000
trusted library allocation
page read and write
649000
unkown
page readonly
4411000
trusted library allocation
page read and write
45F3000
trusted library allocation
page read and write
37C1000
heap
page read and write
45F1000
trusted library allocation
page read and write
46BA000
trusted library allocation
page read and write
4369000
trusted library allocation
page read and write
37C1000
heap
page read and write
4404000
trusted library allocation
page read and write
37C1000
heap
page read and write
28DC000
stack
page read and write
549E000
trusted library allocation
page read and write
8D2000
heap
page read and write
43EE000
trusted library allocation
page read and write
443F000
trusted library allocation
page read and write
580000
heap
page read and write
4640000
trusted library allocation
page read and write
4727000
trusted library allocation
page read and write
824000
heap
page read and write
4428000
trusted library allocation
page read and write
43AA000
trusted library allocation
page read and write
2F2B000
heap
page read and write
3EAE000
stack
page read and write
4400000
trusted library allocation
page read and write
37C1000
heap
page read and write
FB4000
heap
page read and write
510000
heap
page read and write
231E000
stack
page read and write
3253000
heap
page read and write
42F1000
trusted library allocation
page read and write
45F5000
trusted library allocation
page read and write
8CA000
heap
page read and write
45F6000
trusted library allocation
page read and write
12FF000
heap
page read and write
FC8000
heap
page read and write
45F5000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
4350000
trusted library allocation
page read and write
37C1000
heap
page read and write
26DE000
stack
page read and write
4411000
trusted library allocation
page read and write
326A000
heap
page read and write
45FF000
trusted library allocation
page read and write
31FF000
stack
page read and write
4441000
trusted library allocation
page read and write
4372000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
8D2000
heap
page read and write
446E000
trusted library allocation
page read and write
8CA000
heap
page read and write
37C1000
heap
page read and write
313F000
stack
page read and write
8BE000
heap
page read and write
468F000
trusted library allocation
page read and write
8BE000
heap
page read and write
34BE000
stack
page read and write
447D000
trusted library allocation
page read and write
45FE000
trusted library allocation
page read and write
37C1000
heap
page read and write
43EE000
trusted library allocation
page read and write
3238000
heap
page read and write
45F3000
trusted library allocation
page read and write
12FF000
heap
page read and write
560A000
trusted library allocation
page read and write
4429000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
435A000
trusted library allocation
page read and write
46B4000
trusted library allocation
page read and write
43F6000
trusted library allocation
page read and write
4423000
trusted library allocation
page read and write
4699000
trusted library allocation
page read and write
1350000
heap
page read and write
8E6000
heap
page read and write
29CE000
stack
page read and write
45F6000
trusted library allocation
page read and write
12FF000
heap
page read and write
4424000
trusted library allocation
page read and write
440F000
trusted library allocation
page read and write
37C1000
heap
page read and write
43F1000
trusted library allocation
page read and write
6C0000
heap
page read and write
43EE000
trusted library allocation
page read and write
2F35000
heap
page read and write
27E0000
heap
page read and write
307C000
stack
page read and write
40B000
unkown
page read and write
507E000
stack
page read and write
13B4000
heap
page read and write
43F1000
trusted library allocation
page read and write
37C1000
heap
page read and write
4409000
trusted library allocation
page read and write
4410000
trusted library allocation
page read and write
46BD000
trusted library allocation
page read and write
8BE000
heap
page read and write
318E000
stack
page read and write
4413000
trusted library allocation
page read and write
6AE000
stack
page read and write
43EE000
trusted library allocation
page read and write
42F1000
trusted library allocation
page read and write
433B000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
4448000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
63E000
stack
page read and write
8F7000
heap
page read and write
549B000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
447A000
trusted library allocation
page read and write
3190000
heap
page read and write
4C2F000
stack
page read and write
27ED000
heap
page read and write
12FF000
heap
page read and write
EE6000
heap
page read and write
37C1000
heap
page read and write
4418000
trusted library allocation
page read and write
FE3000
heap
page read and write
43F1000
trusted library allocation
page read and write
4432000
trusted library allocation
page read and write
463D000
stack
page read and write
37C1000
heap
page read and write
434F000
trusted library allocation
page read and write
45F6000
trusted library allocation
page read and write
324E000
heap
page read and write
6A0000
heap
page read and write
4432000
trusted library allocation
page read and write
435A000
trusted library allocation
page read and write
8D2000
heap
page read and write
37C1000
heap
page read and write
43EE000
trusted library allocation
page read and write
8CA000
heap
page read and write
111D000
heap
page read and write
2F0E000
heap
page read and write
326A000
heap
page read and write
108E000
heap
page read and write
46BF000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
3487000
heap
page read and write
8D2000
heap
page read and write
40B000
unkown
page write copy
47CC000
trusted library allocation
page read and write
443A000
trusted library allocation
page read and write
3050000
remote allocation
page read and write
4F4000
unkown
page readonly
10F9000
heap
page read and write
DFC000
stack
page read and write
3074000
heap
page read and write
434E000
trusted library allocation
page read and write
2EF8000
heap
page read and write
475C000
trusted library allocation
page read and write
441F000
trusted library allocation
page read and write
45F4000
trusted library allocation
page read and write
434E000
trusted library allocation
page read and write
4439000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
37C1000
heap
page read and write
12FF000
heap
page read and write
45FD000
trusted library allocation
page read and write
37C1000
heap
page read and write
4F4000
unkown
page readonly
474E000
trusted library allocation
page read and write
37C1000
heap
page read and write
13B5000
heap
page read and write
3197000
heap
page read and write
45C000
stack
page read and write
37C1000
heap
page read and write
37C1000
heap
page read and write
4680000
trusted library allocation
page read and write
45F4000
trusted library allocation
page read and write
37C1000
heap
page read and write
441A000
trusted library allocation
page read and write
4409000
trusted library allocation
page read and write
347F000
stack
page read and write
478D000
trusted library allocation
page read and write
2F13000
heap
page read and write
4372000
trusted library allocation
page read and write
4431000
trusted library allocation
page read and write
37C1000
heap
page read and write
3070000
heap
page read and write
45F4000
trusted library allocation
page read and write
440D000
trusted library allocation
page read and write
45FB000
trusted library allocation
page read and write
45F7000
trusted library allocation
page read and write
4482000
trusted library allocation
page read and write
8D2000
heap
page read and write
4446000
trusted library allocation
page read and write
27E1000
heap
page read and write
4BEE000
stack
page read and write
4452000
trusted library allocation
page read and write
4350000
trusted library allocation
page read and write
4452000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
8BE000
heap
page read and write
4446000
trusted library allocation
page read and write
8E6000
heap
page read and write
34F8000
heap
page read and write
47CA000
trusted library allocation
page read and write
8CA000
heap
page read and write
7FF000
stack
page read and write
98000
stack
page read and write
42F1000
trusted library allocation
page read and write
4459000
trusted library allocation
page read and write
443D000
trusted library allocation
page read and write
5572000
trusted library allocation
page read and write
46C7000
trusted library allocation
page read and write
4B6E000
stack
page read and write
446F000
trusted library allocation
page read and write
37C1000
heap
page read and write
434F000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
660000
heap
page read and write
106F000
heap
page read and write
32B0000
heap
page read and write
2F3E000
heap
page read and write
4693000
trusted library allocation
page read and write
43EE000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
4363000
trusted library allocation
page read and write
435A000
trusted library allocation
page read and write
468D000
stack
page read and write
67E000
stack
page read and write
435C000
trusted library allocation
page read and write
401000
unkown
page execute read
45FF000
trusted library allocation
page read and write
441A000
trusted library allocation
page read and write
45F1000
trusted library allocation
page read and write
13AC000
heap
page read and write
289C000
stack
page read and write
47E6000
trusted library allocation
page read and write
37C1000
heap
page read and write
4B2F000
stack
page read and write
636000
unkown
page readonly
80E000
stack
page read and write
461000
unkown
page read and write
8CA000
heap
page read and write
FF4000
heap
page read and write
8F4000
heap
page read and write
4348000
trusted library allocation
page read and write
43F6000
trusted library allocation
page read and write
3253000
heap
page read and write
2F10000
heap
page read and write
324E000
heap
page read and write
581000
unkown
page execute read
6C8000
heap
page read and write
47BF000
trusted library allocation
page read and write
8D2000
heap
page read and write
3EED000
stack
page read and write
37C1000
heap
page read and write
43F6000
trusted library allocation
page read and write
4353000
trusted library allocation
page read and write
4415000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
30FE000
stack
page read and write
45FA000
trusted library allocation
page read and write
37C1000
heap
page read and write
4479000
trusted library allocation
page read and write
4446000
trusted library allocation
page read and write
367F000
stack
page read and write
326A000
heap
page read and write
FC0000
heap
page read and write
12C5000
heap
page read and write
441A000
trusted library allocation
page read and write
45FB000
trusted library allocation
page read and write
3070000
heap
page read and write
5200000
heap
page read and write
8BE000
heap
page read and write
46A1000
trusted library allocation
page read and write
3140000
heap
page read and write
A7F000
stack
page read and write
8D2000
heap
page read and write
447C000
trusted library allocation
page read and write
8BE000
heap
page read and write
46A2000
trusted library allocation
page read and write
469C000
trusted library allocation
page read and write
27E6000
heap
page read and write
FD8000
heap
page read and write
27DF000
stack
page read and write
46AC000
trusted library allocation
page read and write
43EE000
trusted library allocation
page read and write
46D7000
trusted library allocation
page read and write
2F2B000
heap
page read and write
2F0E000
heap
page read and write
13B9000
heap
page read and write
432B000
trusted library allocation
page read and write
17BE000
stack
page read and write
46C1000
trusted library allocation
page read and write
12FF000
heap
page read and write
46BC000
trusted library allocation
page read and write
400000
unkown
page readonly
8E6000
heap
page read and write
478B000
trusted library allocation
page read and write
326A000
heap
page read and write
37C1000
heap
page read and write
37C1000
heap
page read and write
2D5F000
stack
page read and write
563F000
trusted library allocation
page read and write
4BEF000
heap
page read and write
37C1000
heap
page read and write
37C1000
heap
page read and write
2F39000
heap
page read and write
441E000
trusted library allocation
page read and write
51DF000
stack
page read and write
4402000
trusted library allocation
page read and write
4452000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
440C000
trusted library allocation
page read and write
3253000
heap
page read and write
37C1000
heap
page read and write
4422000
trusted library allocation
page read and write
12DE000
heap
page read and write
4448000
trusted library allocation
page read and write
ED0000
direct allocation
page execute and read and write
8F4000
heap
page read and write
4422000
trusted library allocation
page read and write
557A000
trusted library allocation
page read and write
4427000
trusted library allocation
page read and write
47CC000
trusted library allocation
page read and write
326D000
heap
page read and write
43F1000
trusted library allocation
page read and write
F70000
heap
page read and write
13B4000
heap
page read and write
12FF000
heap
page read and write
46C5000
trusted library allocation
page read and write
46EF000
trusted library allocation
page read and write
45FE000
trusted library allocation
page read and write
43F9000
trusted library allocation
page read and write
47C9000
trusted library allocation
page read and write
2D0E000
stack
page read and write
4415000
trusted library allocation
page read and write
EB0000
heap
page read and write
10D9000
heap
page read and write
610000
unkown
page readonly
8BE000
heap
page read and write
440B000
trusted library allocation
page read and write
326A000
heap
page read and write
46DE000
trusted library allocation
page read and write
27E7000
heap
page read and write
37C1000
heap
page read and write
37C1000
heap
page read and write
13A7000
heap
page read and write
447E000
trusted library allocation
page read and write
431E000
trusted library allocation
page read and write
4415000
trusted library allocation
page read and write
2D10000
heap
page read and write
37C1000
heap
page read and write
327E000
heap
page read and write
43C6000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
840000
heap
page read and write
435C000
trusted library allocation
page read and write
55C8000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
45FE000
trusted library allocation
page read and write
37C1000
heap
page read and write
644000
unkown
page write copy
4448000
trusted library allocation
page read and write
1269000
heap
page read and write
326E000
heap
page read and write
4C90000
heap
page read and write
820000
heap
page read and write
446E000
trusted library allocation
page read and write
442D000
trusted library allocation
page read and write
4421000
trusted library allocation
page read and write
4427000
trusted library allocation
page read and write
37C1000
heap
page read and write
4408000
trusted library allocation
page read and write
581000
unkown
page execute read
37C1000
heap
page read and write
6E0000
heap
page read and write
43F1000
trusted library allocation
page read and write
469B000
trusted library allocation
page read and write
37BC000
stack
page read and write
45F6000
trusted library allocation
page read and write
8BB000
heap
page read and write
45FB000
trusted library allocation
page read and write
37C1000
heap
page read and write
2F2B000
heap
page read and write
3050000
remote allocation
page read and write
4369000
trusted library allocation
page read and write
37C1000
heap
page read and write
30B0000
heap
page read and write
37C1000
heap
page read and write
69A000
stack
page read and write
636000
unkown
page readonly
45F6000
trusted library allocation
page read and write
43C6000
trusted library allocation
page read and write
37C1000
heap
page read and write
43F8000
trusted library allocation
page read and write
408000
unkown
page readonly
8E3000
heap
page read and write
37C1000
heap
page read and write
45F5000
trusted library allocation
page read and write
37C1000
heap
page read and write
43F1000
trusted library allocation
page read and write
45F1000
trusted library allocation
page read and write
4366000
trusted library allocation
page read and write
4BEF000
heap
page read and write
4441000
trusted library allocation
page read and write
8BE000
heap
page read and write
4372000
trusted library allocation
page read and write
4371000
trusted library allocation
page read and write
8D2000
heap
page read and write
43FB000
trusted library allocation
page read and write
13B4000
heap
page read and write
4685000
trusted library allocation
page read and write
12FF000
heap
page read and write
45FF000
trusted library allocation
page read and write
13B5000
heap
page read and write
7CF000
stack
page read and write
F70000
trusted library allocation
page read and write
E7E000
stack
page read and write
46B5000
trusted library allocation
page read and write
4438000
trusted library allocation
page read and write
45F5000
trusted library allocation
page read and write
8CA000
heap
page read and write
3230000
heap
page read and write
8CA000
heap
page read and write
13A3000
heap
page read and write
5499000
trusted library allocation
page read and write
12AC000
heap
page read and write
37C1000
heap
page read and write
46DE000
trusted library allocation
page read and write
13B6000
heap
page read and write
53E000
stack
page read and write
43F1000
trusted library allocation
page read and write
46CC000
trusted library allocation
page read and write
343E000
stack
page read and write
324E000
heap
page read and write
8CE000
heap
page read and write
3170000
heap
page read and write
441A000
trusted library allocation
page read and write
12FF000
heap
page read and write
8CA000
heap
page read and write
2D16000
heap
page read and write
327C000
heap
page read and write
434E000
trusted library allocation
page read and write
4343000
trusted library allocation
page read and write
640000
unkown
page write copy
599C000
trusted library allocation
page read and write
4427000
trusted library allocation
page read and write
4738000
trusted library allocation
page read and write
37C1000
heap
page read and write
42ED000
stack
page read and write
46E2000
trusted library allocation
page read and write
45FE000
trusted library allocation
page read and write
49D000
stack
page read and write
46CD000
trusted library allocation
page read and write
45FD000
trusted library allocation
page read and write
7FE000
stack
page read and write
4BAF000
stack
page read and write
440B000
trusted library allocation
page read and write
8CB000
heap
page read and write
46EF000
trusted library allocation
page read and write
27EA000
heap
page read and write
2F36000
heap
page read and write
46BA000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
45F8000
trusted library allocation
page read and write
43FD000
trusted library allocation
page read and write
950000
heap
page read and write
FB0000
heap
page read and write
4418000
trusted library allocation
page read and write
4448000
trusted library allocation
page read and write
43F5000
trusted library allocation
page read and write
443A000
trusted library allocation
page read and write
37D0000
heap
page read and write
27E6000
heap
page read and write
31BE000
stack
page read and write
43F1000
trusted library allocation
page read and write
46BF000
trusted library allocation
page read and write
850000
heap
page read and write
29D0000
heap
page read and write
610000
unkown
page readonly
43F1000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
45F8000
trusted library allocation
page read and write
88E000
heap
page read and write
357E000
stack
page read and write
45FA000
trusted library allocation
page read and write
431E000
trusted library allocation
page read and write
2350000
heap
page read and write
4422000
trusted library allocation
page read and write
4438000
trusted library allocation
page read and write
45F2000
trusted library allocation
page read and write
6C0000
heap
page read and write
43F5000
trusted library allocation
page read and write
37C1000
heap
page read and write
45F0000
trusted library allocation
page read and write
8D2000
heap
page read and write
519E000
stack
page read and write
2F2D000
heap
page read and write
43D2000
trusted library allocation
page read and write
37C1000
heap
page read and write
43F1000
trusted library allocation
page read and write
4766000
trusted library allocation
page read and write
880000
heap
page read and write
45FA000
trusted library allocation
page read and write
4839000
direct allocation
page execute and read and write
DCE000
stack
page read and write
10EB000
heap
page read and write
4686000
trusted library allocation
page read and write
37C1000
heap
page read and write
2F3E000
heap
page read and write
515F000
stack
page read and write
401000
unkown
page execute read
479F000
trusted library allocation
page read and write
4435000
trusted library allocation
page read and write
46BC000
trusted library allocation
page read and write
442D000
trusted library allocation
page read and write
46EA000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
4415000
trusted library allocation
page read and write
88A000
heap
page read and write
400000
unkown
page readonly
580000
unkown
page readonly
37C1000
heap
page read and write
4400000
trusted library allocation
page read and write
12FF000
heap
page read and write
37C1000
heap
page read and write
4440000
trusted library allocation
page read and write
408000
unkown
page readonly
4349000
trusted library allocation
page read and write
580000
unkown
page readonly
4348000
trusted library allocation
page read and write
8E6000
heap
page read and write
4442000
trusted library allocation
page read and write
556A000
trusted library allocation
page read and write
13B4000
heap
page read and write
4C60000
heap
page read and write
4429000
trusted library allocation
page read and write
848000
heap
page read and write
6C5000
heap
page read and write
43F0000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
8BE000
heap
page read and write
8E6000
heap
page read and write
435A000
trusted library allocation
page read and write
46AC000
trusted library allocation
page read and write
45F7000
trusted library allocation
page read and write
503E000
stack
page read and write
4684000
trusted library allocation
page read and write
28A8000
heap
page read and write
8CA000
heap
page read and write
EE0000
heap
page read and write
12FF000
heap
page read and write
326A000
heap
page read and write
3249000
heap
page read and write
2F40000
heap
page read and write
4692000
trusted library allocation
page read and write
12FF000
heap
page read and write
13A3000
heap
page read and write
8CA000
heap
page read and write
43F1000
trusted library allocation
page read and write
37C1000
heap
page read and write
27EC000
heap
page read and write
8E6000
heap
page read and write
45FD000
trusted library allocation
page read and write
45F4000
trusted library allocation
page read and write
43D2000
trusted library allocation
page read and write
298E000
stack
page read and write
FB4000
heap
page read and write
4C3F000
stack
page read and write
45F0000
trusted library allocation
page read and write
4429000
trusted library allocation
page read and write
46C1000
trusted library allocation
page read and write
4417000
trusted library allocation
page read and write
2F2E000
heap
page read and write
46A8000
trusted library allocation
page read and write
46AD000
trusted library allocation
page read and write
8E4000
heap
page read and write
443E000
trusted library allocation
page read and write
45F7000
trusted library allocation
page read and write
46C0000
trusted library allocation
page read and write
8D2000
heap
page read and write
4372000
trusted library allocation
page read and write
45F2000
trusted library allocation
page read and write
45F6000
trusted library allocation
page read and write
34F0000
heap
page read and write
5EA4000
trusted library allocation
page read and write
2F3E000
heap
page read and write
46AB000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
12FF000
heap
page read and write
47E0000
direct allocation
page read and write
327F000
heap
page read and write
47A5000
trusted library allocation
page read and write
41F000
unkown
page read and write
43F1000
trusted library allocation
page read and write
640000
unkown
page read and write
4368000
trusted library allocation
page read and write
12FF000
heap
page read and write
435C000
trusted library allocation
page read and write
57E000
stack
page read and write
1186000
heap
page read and write
3176000
heap
page read and write
46AF000
trusted library allocation
page read and write
434E000
trusted library allocation
page read and write
4344000
trusted library allocation
page read and write
4449000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
4687000
trusted library allocation
page read and write
436C000
trusted library allocation
page read and write
46C0000
trusted library allocation
page read and write
45F0000
trusted library allocation
page read and write
19A000
stack
page read and write
347E000
stack
page read and write
444F000
trusted library allocation
page read and write
4371000
trusted library allocation
page read and write
303C000
stack
page read and write
45FC000
trusted library allocation
page read and write
46D4000
trusted library allocation
page read and write
443A000
trusted library allocation
page read and write
13B7000
heap
page read and write
43F1000
trusted library allocation
page read and write
46DC000
trusted library allocation
page read and write
46DD000
trusted library allocation
page read and write
43F5000
trusted library allocation
page read and write
4F0000
heap
page read and write
45F8000
trusted library allocation
page read and write
42F0000
trusted library allocation
page read and write
36BC000
stack
page read and write
4349000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
2EF0000
heap
page read and write
46DE000
trusted library allocation
page read and write
27E1000
heap
page read and write
5F0000
heap
page read and write
46A3000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
649000
unkown
page readonly
There are 657 hidden memdumps, click here to show them.