Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
OMHGCG.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Windata\update.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZFZRCN.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=4,
Archive, ctime=Wed Nov 30 07:45:52 2022, mtime=Wed Nov 30 07:45:53 2022, atime=Wed Nov 30 07:45:53 2022, length=808241, window=hide
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\OMHGCG.exe
|
C:\Users\user\Desktop\OMHGCG.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c schtasks /create /tn ZFZRCN.exe /tr C:\Users\user\AppData\Roaming\Windata\update.exe /sc minute
/mo 1
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /tn ZFZRCN.exe /tr C:\Users\user\AppData\Roaming\Windata\update.exe /sc minute /mo 1
|
||
C:\Users\user\AppData\Roaming\Windata\update.exe
|
C:\Users\user\AppData\Roaming\Windata\update.exe
|
||
C:\Users\user\AppData\Roaming\Windata\update.exe
|
"C:\Users\user\AppData\Roaming\Windata\update.exe"
|
||
C:\Users\user\AppData\Roaming\Windata\update.exe
|
"C:\Users\user\AppData\Roaming\Windata\update.exe"
|
||
C:\Users\user\AppData\Roaming\Windata\update.exe
|
"C:\Users\user\AppData\Roaming\Windata\update.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.autoitscript.com/autoit3/files/beta/autoit/archive/sqlite/SQLite3
|
unknown
|
||
http://www.autoitscript.com/autoit3/files/beta/autoit/archive/sqlite/SQLite3%%
|
unknown
|
||
http://checkip.amazonaws.com/D
|
unknown
|
||
http://www.autoitscript.com/autoit3/files/beta/autoit/archive/sqlite/SQLite3GK
|
unknown
|
||
http://ip-score.com/checkip/
|
unknown
|
||
http://checkip.amazonaws.com/
|
unknown
|
||
http://www.autoitscript.com/autoit3/files/beta/autoit/archive/sqlite/SQLite3D
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
test202022.ddns.net
|
197.42.186.178
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
197.42.186.178
|
test202022.ddns.net
|
Egypt
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
ZFZRCN
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AAAA2FB000
|
stack
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
3D0F000
|
trusted library allocation
|
page read and write
|
||
3C1A000
|
trusted library allocation
|
page read and write
|
||
1AB0000
|
trusted library allocation
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
1F47F702000
|
heap
|
page read and write
|
||
3DDC000
|
trusted library allocation
|
page read and write
|
||
3C61000
|
trusted library allocation
|
page read and write
|
||
3B93000
|
trusted library allocation
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
2B45E42A000
|
heap
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
20132C13000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1AA9AAE0000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
544CE79000
|
stack
|
page read and write
|
||
3D8B000
|
trusted library allocation
|
page read and write
|
||
3C57000
|
trusted library allocation
|
page read and write
|
||
3BF0000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
trusted library allocation
|
page read and write
|
||
3D09000
|
trusted library allocation
|
page read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
3C65000
|
trusted library allocation
|
page read and write
|
||
3CE5000
|
trusted library allocation
|
page read and write
|
||
3C7D000
|
trusted library allocation
|
page read and write
|
||
4BD000
|
unkown
|
page write copy
|
||
3CBB000
|
trusted library allocation
|
page read and write
|
||
3C5A000
|
trusted library allocation
|
page read and write
|
||
1AA9905B000
|
heap
|
page read and write
|
||
3C41000
|
trusted library allocation
|
page read and write
|
||
2B45E449000
|
heap
|
page read and write
|
||
29E32802000
|
trusted library allocation
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
2B45E445000
|
heap
|
page read and write
|
||
3C47000
|
trusted library allocation
|
page read and write
|
||
1AA9AC02000
|
trusted library allocation
|
page read and write
|
||
3CDC000
|
trusted library allocation
|
page read and write
|
||
1AA99113000
|
heap
|
page read and write
|
||
3CDE000
|
trusted library allocation
|
page read and write
|
||
29E32740000
|
remote allocation
|
page read and write
|
||
3B69000
|
trusted library allocation
|
page read and write
|
||
476000
|
unkown
|
page execute and write copy
|
||
9BBB37F000
|
stack
|
page read and write
|
||
1B3AEC5A000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C2C000
|
trusted library allocation
|
page read and write
|
||
3CE8000
|
trusted library allocation
|
page read and write
|
||
3C41000
|
trusted library allocation
|
page read and write
|
||
3DCE000
|
trusted library allocation
|
page read and write
|
||
3BAD000
|
trusted library allocation
|
page read and write
|
||
AAAA97E000
|
stack
|
page read and write
|
||
1AA9AA90000
|
trusted library allocation
|
page read and write
|
||
3B80000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
20132229000
|
heap
|
page read and write
|
||
3B76000
|
trusted library allocation
|
page read and write
|
||
1611000
|
trusted library allocation
|
page read and write
|
||
1AA98F90000
|
heap
|
page read and write
|
||
3C62000
|
trusted library allocation
|
page read and write
|
||
29E32000000
|
heap
|
page read and write
|
||
3CD4000
|
trusted library allocation
|
page read and write
|
||
3C30000
|
trusted library allocation
|
page read and write
|
||
2B45E380000
|
heap
|
page read and write
|
||
3C14000
|
trusted library allocation
|
page read and write
|
||
AAA9EDB000
|
stack
|
page read and write
|
||
9BBB27F000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
AAAAB7E000
|
stack
|
page read and write
|
||
2B45E485000
|
heap
|
page read and write
|
||
3C14000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3CFE000
|
trusted library allocation
|
page read and write
|
||
4A8000
|
unkown
|
page execute and read and write
|
||
20132150000
|
trusted library allocation
|
page read and write
|
||
3D27000
|
trusted library allocation
|
page read and write
|
||
3BF3000
|
trusted library allocation
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
4BC000
|
unkown
|
page execute and write copy
|
||
194000
|
heap
|
page read and write
|
||
29E32013000
|
heap
|
page read and write
|
||
3D9A000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
trusted library allocation
|
page read and write
|
||
21698C60000
|
heap
|
page read and write
|
||
3BD9000
|
trusted library allocation
|
page read and write
|
||
1461CA02000
|
heap
|
page read and write
|
||
E76477E000
|
stack
|
page read and write
|
||
3E1C000
|
trusted library allocation
|
page read and write
|
||
3B7C000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1B3AEC51000
|
heap
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
3CC4000
|
trusted library allocation
|
page read and write
|
||
1AA9903E000
|
heap
|
page read and write
|
||
2B45E47F000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page execute and read and write
|
||
1F47F688000
|
heap
|
page read and write
|
||
3DEE000
|
trusted library allocation
|
page read and write
|
||
3BA8000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
trusted library allocation
|
page read and write
|
||
20132B22000
|
heap
|
page read and write
|
||
2013226B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1AA9905A000
|
heap
|
page read and write
|
||
3006000
|
heap
|
page read and write
|
||
21698C00000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
3035000
|
heap
|
page read and write
|
||
20132289000
|
heap
|
page read and write
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
201323E5000
|
heap
|
page read and write
|
||
3C9B000
|
trusted library allocation
|
page read and write
|
||
1F47FF00000
|
heap
|
page read and write
|
||
3BF7000
|
trusted library allocation
|
page read and write
|
||
4B9000
|
unkown
|
page execute and read and write
|
||
1F47FF32000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
AAAA57F000
|
stack
|
page read and write
|
||
29E32002000
|
heap
|
page read and write
|
||
1C0000
|
trusted library allocation
|
page read and write
|
||
3C0B000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
20132C30000
|
heap
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
1F47F4B0000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3DF7000
|
trusted library allocation
|
page read and write
|
||
1461C9F0000
|
trusted library allocation
|
page read and write
|
||
3CCB000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1461CA00000
|
heap
|
page read and write
|
||
3BB6000
|
trusted library allocation
|
page read and write
|
||
404A000
|
trusted library allocation
|
page read and write
|
||
20132B96000
|
heap
|
page read and write
|
||
1B3AEC02000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
BA68FF000
|
stack
|
page read and write
|
||
20132284000
|
heap
|
page read and write
|
||
BA61FE000
|
stack
|
page read and write
|
||
3C36000
|
trusted library allocation
|
page read and write
|
||
20132213000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C36000
|
trusted library allocation
|
page read and write
|
||
29E32740000
|
remote allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
AAAA5FC000
|
stack
|
page read and write
|
||
4B5000
|
unkown
|
page execute and read and write
|
||
20132313000
|
heap
|
page read and write
|
||
C914A7D000
|
stack
|
page read and write
|
||
29E3205C000
|
heap
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
1AC5000
|
heap
|
page read and write
|
||
1B8A4F9000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3BA6000
|
trusted library allocation
|
page read and write
|
||
2B45EC02000
|
trusted library allocation
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
3BB8000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3BA6000
|
trusted library allocation
|
page read and write
|
||
1AA9904B000
|
heap
|
page read and write
|
||
1461CA3B000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page execute and read and write
|
||
3C36000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
trusted library allocation
|
page read and write
|
||
20132B22000
|
heap
|
page read and write
|
||
3D54000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
544D07A000
|
stack
|
page read and write
|
||
3CF5000
|
trusted library allocation
|
page read and write
|
||
4B9000
|
unkown
|
page execute and read and write
|
||
1F47F5B0000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
E76497E000
|
stack
|
page read and write
|
||
3FD3000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
21698E79000
|
heap
|
page read and write
|
||
4218000
|
trusted library allocation
|
page read and write
|
||
20132C23000
|
heap
|
page read and write
|
||
476000
|
unkown
|
page execute and write copy
|
||
21698F02000
|
heap
|
page read and write
|
||
3D12000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3CB4000
|
trusted library allocation
|
page read and write
|
||
3E1C000
|
trusted library allocation
|
page read and write
|
||
1B3AEA60000
|
heap
|
page read and write
|
||
1AA99059000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page execute and read and write
|
||
3CD4000
|
trusted library allocation
|
page read and write
|
||
3BE3000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C7E000
|
trusted library allocation
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
20132292000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
3D67000
|
trusted library allocation
|
page read and write
|
||
20132B43000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
21698E00000
|
heap
|
page read and write
|
||
3C8D000
|
trusted library allocation
|
page read and write
|
||
2B45E47B000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
1B3AEC8A000
|
heap
|
page read and write
|
||
3BF4000
|
trusted library allocation
|
page read and write
|
||
1B3AED02000
|
heap
|
page read and write
|
||
9BBB77E000
|
stack
|
page read and write
|
||
2B45E44A000
|
heap
|
page read and write
|
||
3F40000
|
trusted library allocation
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3BD0000
|
trusted library allocation
|
page read and write
|
||
2B45E46C000
|
heap
|
page read and write
|
||
1461C820000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
2B45E43E000
|
heap
|
page read and write
|
||
20132265000
|
heap
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
3009000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
21698E4E000
|
heap
|
page read and write
|
||
30000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
29E31F40000
|
heap
|
page read and write
|
||
2B45E43A000
|
heap
|
page read and write
|
||
3BFE000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
3C00000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
3B91000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
1AA99118000
|
heap
|
page read and write
|
||
2B45E3F0000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
544D27A000
|
stack
|
page read and write
|
||
16CF000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C57000
|
trusted library allocation
|
page read and write
|
||
1461D002000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C02000
|
trusted library allocation
|
page read and write
|
||
4BC000
|
unkown
|
page execute and write copy
|
||
194000
|
heap
|
page read and write
|
||
3B81000
|
trusted library allocation
|
page read and write
|
||
3C7C000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3D11000
|
trusted library allocation
|
page read and write
|
||
300C000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3D86000
|
trusted library allocation
|
page read and write
|
||
3C6E000
|
trusted library allocation
|
page read and write
|
||
1B3AED13000
|
heap
|
page read and write
|
||
3BFE000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
unkown
|
page execute and read and write
|
||
544CCFE000
|
stack
|
page read and write
|
||
2B45E446000
|
heap
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
4BD000
|
unkown
|
page write copy
|
||
2013227B000
|
heap
|
page read and write
|
||
C914D7D000
|
stack
|
page read and write
|
||
3C37000
|
trusted library allocation
|
page read and write
|
||
2B45E468000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4BC000
|
unkown
|
page execute and write copy
|
||
21698BF0000
|
heap
|
page read and write
|
||
3BB5000
|
trusted library allocation
|
page read and write
|
||
3CEE000
|
trusted library allocation
|
page read and write
|
||
3BC7000
|
trusted library allocation
|
page read and write
|
||
1B3AEC75000
|
heap
|
page read and write
|
||
BA5FFB000
|
stack
|
page read and write
|
||
3C4E000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3CCC000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page execute and read and write
|
||
A20000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
3C65000
|
trusted library allocation
|
page read and write
|
||
1B3AEC29000
|
heap
|
page read and write
|
||
1773000
|
trusted library allocation
|
page read and write
|
||
2B45E502000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3B80000
|
trusted library allocation
|
page read and write
|
||
2B45E441000
|
heap
|
page read and write
|
||
3C48000
|
trusted library allocation
|
page read and write
|
||
20132278000
|
heap
|
page read and write
|
||
3D9C000
|
trusted library allocation
|
page read and write
|
||
E7642AC000
|
stack
|
page read and write
|
||
3C92000
|
trusted library allocation
|
page read and write
|
||
4BD000
|
unkown
|
page write copy
|
||
2B45E400000
|
heap
|
page read and write
|
||
3E1B000
|
trusted library allocation
|
page read and write
|
||
3B87000
|
trusted library allocation
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3CBE000
|
trusted library allocation
|
page read and write
|
||
1A8E000
|
stack
|
page read and write
|
||
544CF7E000
|
stack
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
2013238C000
|
heap
|
page read and write
|
||
2B45E452000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
BA60FD000
|
stack
|
page read and write
|
||
4BC000
|
unkown
|
page execute and write copy
|
||
194000
|
heap
|
page read and write
|
||
2B45E430000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page execute and read and write
|
||
3F41000
|
trusted library allocation
|
page read and write
|
||
21698F13000
|
heap
|
page read and write
|
||
4B9000
|
unkown
|
page execute and read and write
|
||
194000
|
heap
|
page read and write
|
||
1B3AEAC0000
|
heap
|
page read and write
|
||
3DFC000
|
trusted library allocation
|
page read and write
|
||
3B9B000
|
trusted library allocation
|
page read and write
|
||
29E31F50000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3FD2000
|
trusted library allocation
|
page read and write
|
||
21698E13000
|
heap
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
AAAA47F000
|
stack
|
page read and write
|
||
2E7C000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
21698E74000
|
heap
|
page read and write
|
||
2B45E450000
|
heap
|
page read and write
|
||
1AA99073000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1AA99066000
|
heap
|
page read and write
|
||
29E32740000
|
remote allocation
|
page read and write
|
||
20131FE0000
|
heap
|
page read and write
|
||
1AE6000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3D5C000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
29E32020000
|
heap
|
page read and write
|
||
1B3AEC00000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1AA99049000
|
heap
|
page read and write
|
||
3C36000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page execute and read and write
|
||
A90000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
3B75000
|
trusted library allocation
|
page read and write
|
||
3BAB000
|
trusted library allocation
|
page read and write
|
||
1AA9AB20000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3FB4000
|
trusted library allocation
|
page read and write
|
||
9BBB47E000
|
stack
|
page read and write
|
||
2B45E413000
|
heap
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
1211000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page execute and read and write
|
||
2B45E448000
|
heap
|
page read and write
|
||
1AE0000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
1AA99000000
|
heap
|
page read and write
|
||
1B89FEB000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1B3AEC65000
|
heap
|
page read and write
|
||
3BDC000
|
trusted library allocation
|
page read and write
|
||
1611000
|
trusted library allocation
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3BE8000
|
trusted library allocation
|
page read and write
|
||
3C89000
|
trusted library allocation
|
page read and write
|
||
1F47FE02000
|
heap
|
page read and write
|
||
3C46000
|
trusted library allocation
|
page read and write
|
||
E764A7E000
|
stack
|
page read and write
|
||
3CA7000
|
trusted library allocation
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3C81000
|
trusted library allocation
|
page read and write
|
||
1CE000
|
stack
|
page read and write
|
||
3D30000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
9BBB0FD000
|
stack
|
page read and write
|
||
400D000
|
trusted library allocation
|
page read and write
|
||
2013225B000
|
heap
|
page read and write
|
||
2B45E478000
|
heap
|
page read and write
|
||
3CC2000
|
trusted library allocation
|
page read and write
|
||
3C41000
|
trusted library allocation
|
page read and write
|
||
3B85000
|
trusted library allocation
|
page read and write
|
||
20132B00000
|
heap
|
page read and write
|
||
544D17E000
|
stack
|
page read and write
|
||
1B3AEC3D000
|
heap
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1F47F6C3000
|
heap
|
page read and write
|
||
2013223C000
|
heap
|
page read and write
|
||
1461CA44000
|
heap
|
page read and write
|
||
3CDC000
|
trusted library allocation
|
page read and write
|
||
20132243000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1F47F6CB000
|
heap
|
page read and write
|
||
1461CA52000
|
heap
|
page read and write
|
||
3C50000
|
trusted library allocation
|
page read and write
|
||
BA63FE000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3BE3000
|
trusted library allocation
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
509F000
|
stack
|
page read and write
|
||
3C6E000
|
trusted library allocation
|
page read and write
|
||
3CD4000
|
trusted library allocation
|
page read and write
|
||
3C80000
|
trusted library allocation
|
page read and write
|
||
3BA6000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
3B7D000
|
trusted library allocation
|
page read and write
|
||
1F47F713000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3E3B000
|
trusted library allocation
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
544CAFF000
|
stack
|
page read and write
|
||
1F47F450000
|
heap
|
page read and write
|
||
3D23000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
194000
|
heap
|
page read and write
|
||
3C46000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
4BD000
|
unkown
|
page read and write
|
||
20132170000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
8E7DF0B000
|
stack
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
21698E59000
|
heap
|
page read and write
|
||
3B96000
|
trusted library allocation
|
page read and write
|
||
2B45E466000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C7C000
|
trusted library allocation
|
page read and write
|
||
3C24000
|
trusted library allocation
|
page read and write
|
||
1B8A3FE000
|
stack
|
page read and write
|
||
3E25000
|
trusted library allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
C9147FE000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
2B45E442000
|
heap
|
page read and write
|
||
476000
|
unkown
|
page execute and write copy
|
||
3ECE000
|
trusted library allocation
|
page read and write
|
||
3C77000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
30000
|
trusted library allocation
|
page read and write
|
||
12CD000
|
stack
|
page read and write
|
||
21698D60000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C00000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
2B45E443000
|
heap
|
page read and write
|
||
9BBB67D000
|
stack
|
page read and write
|
||
3CE5000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C6E000
|
trusted library allocation
|
page read and write
|
||
3C53000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
4BD000
|
unkown
|
page write copy
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page execute and read and write
|
||
194000
|
heap
|
page read and write
|
||
1AA9ABA0000
|
remote allocation
|
page read and write
|
||
3CAC000
|
trusted library allocation
|
page read and write
|
||
3C63000
|
trusted library allocation
|
page read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
BA69FF000
|
stack
|
page read and write
|
||
3B51000
|
trusted library allocation
|
page read and write
|
||
BA64FD000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4B9000
|
unkown
|
page execute and read and write
|
||
1F47F600000
|
heap
|
page read and write
|
||
3BC4000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C15000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
30E5000
|
heap
|
page read and write
|
||
21698E28000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4BD000
|
unkown
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
2B45E451000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
4BD000
|
unkown
|
page read and write
|
||
1F47F6E1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
29E32102000
|
heap
|
page read and write
|
||
3C17000
|
trusted library allocation
|
page read and write
|
||
1AA99002000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
C91436C000
|
stack
|
page read and write
|
||
41DC000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
481F000
|
stack
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
3B61000
|
trusted library allocation
|
page read and write
|
||
3CDE000
|
trusted library allocation
|
page read and write
|
||
1461CA29000
|
heap
|
page read and write
|
||
3DA0000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
1461C7C0000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
20132C27000
|
heap
|
page read and write
|
||
3B94000
|
trusted library allocation
|
page read and write
|
||
21698E6A000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
3CB4000
|
trusted library allocation
|
page read and write
|
||
3C43000
|
trusted library allocation
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
3B76000
|
trusted library allocation
|
page read and write
|
||
3B81000
|
trusted library allocation
|
page read and write
|
||
3CC2000
|
trusted library allocation
|
page read and write
|
||
3CD4000
|
trusted library allocation
|
page read and write
|
||
3CA8000
|
trusted library allocation
|
page read and write
|
||
1AA9ABA0000
|
remote allocation
|
page read and write
|
||
3BB5000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
3DF7000
|
trusted library allocation
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
3CA2000
|
trusted library allocation
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3B8C000
|
trusted library allocation
|
page read and write
|
||
3D9B000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
unkown
|
page execute and read and write
|
||
3D13000
|
trusted library allocation
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3C15000
|
trusted library allocation
|
page read and write
|
||
C91487E000
|
stack
|
page read and write
|
||
3E1D000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C51000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
trusted library allocation
|
page read and write
|
||
3C95000
|
trusted library allocation
|
page read and write
|
||
3C15000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3C48000
|
trusted library allocation
|
page read and write
|
||
3C7E000
|
trusted library allocation
|
page read and write
|
||
21699602000
|
trusted library allocation
|
page read and write
|
||
3C25000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C8A000
|
trusted library allocation
|
page read and write
|
||
1AA98F80000
|
heap
|
page read and write
|
||
3C70000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
AAAA77B000
|
stack
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F47F6BA000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
BA65FF000
|
stack
|
page read and write
|
||
4BC000
|
unkown
|
page execute and write copy
|
||
8E7E47B000
|
stack
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
1AA9904A000
|
heap
|
page read and write
|
||
3C6E000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
3BCB000
|
trusted library allocation
|
page read and write
|
||
1B3AEC67000
|
heap
|
page read and write
|
||
3C43000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3D00000
|
trusted library allocation
|
page read and write
|
||
20132A02000
|
heap
|
page read and write
|
||
20132B54000
|
heap
|
page read and write
|
||
3CE5000
|
trusted library allocation
|
page read and write
|
||
1F47F629000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
2B45E46E000
|
heap
|
page read and write
|
||
3CF5000
|
trusted library allocation
|
page read and write
|
||
40C6000
|
trusted library allocation
|
page read and write
|
||
3BE3000
|
trusted library allocation
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
20132258000
|
heap
|
page read and write
|
||
3CEE000
|
trusted library allocation
|
page read and write
|
||
3C6F000
|
trusted library allocation
|
page read and write
|
||
20132C3B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
29E31FB0000
|
heap
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
1AA9AAB0000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
3B9F000
|
trusted library allocation
|
page read and write
|
||
2B45E44C000
|
heap
|
page read and write
|
||
4B5000
|
unkown
|
page execute and read and write
|
||
3CCB000
|
trusted library allocation
|
page read and write
|
||
AAAAA7C000
|
stack
|
page read and write
|
||
2B45E447000
|
heap
|
page read and write
|
||
300A000
|
heap
|
page read and write
|
||
3BC1000
|
trusted library allocation
|
page read and write
|
||
3BCE000
|
trusted library allocation
|
page read and write
|
||
3B74000
|
trusted library allocation
|
page read and write
|
||
1275000
|
trusted library allocation
|
page read and write
|
||
476000
|
unkown
|
page execute and write copy
|
||
C91497E000
|
stack
|
page read and write
|
||
3CA0000
|
trusted library allocation
|
page read and write
|
||
2F0F000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1461CB02000
|
heap
|
page read and write
|
||
476000
|
unkown
|
page execute and write copy
|
||
194000
|
heap
|
page read and write
|
||
BA66FF000
|
stack
|
page read and write
|
||
3CEB000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
1AA98FF0000
|
heap
|
page read and write
|
||
E7643AE000
|
stack
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
3C13000
|
trusted library allocation
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
1F47F670000
|
heap
|
page read and write
|
||
3B62000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1F47F643000
|
heap
|
page read and write
|
||
3299000
|
trusted library allocation
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
3C3A000
|
trusted library allocation
|
page read and write
|
||
3BA4000
|
trusted library allocation
|
page read and write
|
||
3BD6000
|
trusted library allocation
|
page read and write
|
||
E76432E000
|
stack
|
page read and write
|
||
3C4B000
|
trusted library allocation
|
page read and write
|
||
3CEE000
|
trusted library allocation
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
1B8A5FA000
|
stack
|
page read and write
|
||
21698F00000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C72000
|
trusted library allocation
|
page read and write
|
||
1F47F440000
|
heap
|
page read and write
|
||
3039000
|
heap
|
page read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
3BE3000
|
trusted library allocation
|
page read and write
|
||
20132C30000
|
heap
|
page read and write
|
||
1461CA2E000
|
heap
|
page read and write
|
||
3CB7000
|
trusted library allocation
|
page read and write
|
||
1AA99013000
|
heap
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3C77000
|
trusted library allocation
|
page read and write
|
||
3CF5000
|
trusted library allocation
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
3D06000
|
trusted library allocation
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
20132BB1000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
3B92000
|
trusted library allocation
|
page read and write
|
||
3B76000
|
trusted library allocation
|
page read and write
|
||
20132C00000
|
heap
|
page read and write
|
||
3C41000
|
trusted library allocation
|
page read and write
|
||
155000
|
heap
|
page read and write
|
||
201323B9000
|
heap
|
page read and write
|
||
2B45EB50000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3E0D000
|
trusted library allocation
|
page read and write
|
||
3C24000
|
trusted library allocation
|
page read and write
|
||
1F47F613000
|
heap
|
page read and write
|
||
3C23000
|
trusted library allocation
|
page read and write
|
||
3C01000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3E2F000
|
trusted library allocation
|
page read and write
|
||
BA62FF000
|
stack
|
page read and write
|
||
3C57000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
trusted library allocation
|
page read and write
|
||
3BB3000
|
trusted library allocation
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
1B3AEC70000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
3C0A000
|
trusted library allocation
|
page read and write
|
||
3BA5000
|
trusted library allocation
|
page read and write
|
||
8E7E67B000
|
stack
|
page read and write
|
||
C914BFD000
|
stack
|
page read and write
|
||
1B3AEBC0000
|
trusted library allocation
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A9C000
|
heap
|
page read and write
|
||
2B45E47C000
|
heap
|
page read and write
|
||
3C15000
|
trusted library allocation
|
page read and write
|
||
E76487E000
|
stack
|
page read and write
|
||
3B63000
|
trusted library allocation
|
page read and write
|
||
1461CA3D000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
3C7E000
|
trusted library allocation
|
page read and write
|
||
3C19000
|
trusted library allocation
|
page read and write
|
||
3B99000
|
trusted library allocation
|
page read and write
|
||
29E32029000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3B74000
|
trusted library allocation
|
page read and write
|
||
3CC3000
|
trusted library allocation
|
page read and write
|
||
3BFF000
|
trusted library allocation
|
page read and write
|
||
3BB5000
|
trusted library allocation
|
page read and write
|
||
30000
|
trusted library allocation
|
page read and write
|
||
3B93000
|
trusted library allocation
|
page read and write
|
||
C914AFE000
|
stack
|
page read and write
|
||
3C96000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
3C0B000
|
trusted library allocation
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
20132C02000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
3BC5000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3BD5000
|
trusted library allocation
|
page read and write
|
||
20132200000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page execute and read and write
|
||
3D9B000
|
trusted library allocation
|
page read and write
|
||
3CFF000
|
trusted library allocation
|
page read and write
|
||
3C39000
|
trusted library allocation
|
page read and write
|
||
3C43000
|
trusted library allocation
|
page read and write
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
3D66000
|
trusted library allocation
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
30000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
20132BC0000
|
heap
|
page read and write
|
||
4B5000
|
unkown
|
page execute and read and write
|
||
194000
|
heap
|
page read and write
|
||
3C4E000
|
trusted library allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
3B76000
|
trusted library allocation
|
page read and write
|
||
3CA7000
|
trusted library allocation
|
page read and write
|
||
39CD000
|
trusted library allocation
|
page read and write
|
||
3BBF000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
1A4E000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
20132BC9000
|
heap
|
page read and write
|
||
1AA9ABA0000
|
remote allocation
|
page read and write
|
||
30000
|
trusted library allocation
|
page read and write
|
||
1461CA1F000
|
heap
|
page read and write
|
||
3CC2000
|
trusted library allocation
|
page read and write
|
||
1461C7D0000
|
heap
|
page read and write
|
||
1B3AEA50000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C38000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C50000
|
trusted library allocation
|
page read and write
|
||
AAAA6FD000
|
stack
|
page read and write
|
||
4BD000
|
unkown
|
page write copy
|
||
544CB7E000
|
stack
|
page read and write
|
||
3D0A000
|
trusted library allocation
|
page read and write
|
||
3CC8000
|
trusted library allocation
|
page read and write
|
||
180000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3BC4000
|
trusted library allocation
|
page read and write
|
||
3DF7000
|
trusted library allocation
|
page read and write
|
||
1AA99102000
|
heap
|
page read and write
|
||
3BB3000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
3C5C000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C59000
|
trusted library allocation
|
page read and write
|
||
BA5BFB000
|
stack
|
page read and write
|
||
300C000
|
heap
|
page read and write
|
||
441E000
|
stack
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
1AA9902A000
|
heap
|
page read and write
|
||
BA67FF000
|
stack
|
page read and write
|
||
15DF000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
1AA99100000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
20132B02000
|
heap
|
page read and write
|
||
2B45E44F000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
AAAA87D000
|
stack
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
8E7E77F000
|
stack
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
1461CA13000
|
heap
|
page read and write
|
||
3BB1000
|
trusted library allocation
|
page read and write
|
||
2B45E390000
|
heap
|
page read and write
|
||
3CF7000
|
trusted library allocation
|
page read and write
|
||
1B8A6FF000
|
stack
|
page read and write
|
||
4BD000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
194000
|
heap
|
page read and write
|
||
3C43000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
21698E02000
|
heap
|
page read and write
|
||
1625000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C89000
|
trusted library allocation
|
page read and write
|
||
3BC2000
|
trusted library allocation
|
page read and write
|
||
3BAC000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
4022000
|
trusted library allocation
|
page read and write
|
||
3BFC000
|
trusted library allocation
|
page read and write
|
||
3BDF000
|
trusted library allocation
|
page read and write
|
||
3BB6000
|
trusted library allocation
|
page read and write
|
||
303C000
|
heap
|
page read and write
|
||
195000
|
heap
|
page read and write
|
||
21698E40000
|
heap
|
page read and write
|
||
3D4D000
|
trusted library allocation
|
page read and write
|
||
20132B71000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
A9F000
|
heap
|
page read and write
|
||
3CF5000
|
trusted library allocation
|
page read and write
|
||
3DEE000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3C6E000
|
trusted library allocation
|
page read and write
|
||
2B45E46B000
|
heap
|
page read and write
|
||
20132050000
|
heap
|
page read and write
|
||
3BE3000
|
trusted library allocation
|
page read and write
|
||
3CA4000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
544CDFB000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
544C72C000
|
stack
|
page read and write
|
||
9BBACAB000
|
stack
|
page read and write
|
||
3C23000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3E24000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
3C43000
|
trusted library allocation
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
3C7E000
|
trusted library allocation
|
page read and write
|
||
3BE4000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
3B51000
|
trusted library allocation
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
8E7E57B000
|
stack
|
page read and write
|
||
3C2E000
|
trusted library allocation
|
page read and write
|
||
4B9000
|
unkown
|
page execute and read and write
|
||
3B93000
|
trusted library allocation
|
page read and write
|
||
1B3AF402000
|
trusted library allocation
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
2E3E000
|
trusted library allocation
|
page read and write
|
||
20131FF0000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3BE6000
|
trusted library allocation
|
page read and write
|
||
3BE2000
|
trusted library allocation
|
page read and write
|
||
3CAD000
|
trusted library allocation
|
page read and write
|
||
29E31FE0000
|
trusted library allocation
|
page read and write
|
||
3BB3000
|
trusted library allocation
|
page read and write
|
||
9BBB57C000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
9BBB87C000
|
stack
|
page read and write
|
||
1B3AEC13000
|
heap
|
page read and write
|
||
4BD000
|
unkown
|
page read and write
|
||
C914C7E000
|
stack
|
page read and write
|
||
29E32040000
|
heap
|
page read and write
|
||
3B9A000
|
trusted library allocation
|
page read and write
|
There are 898 hidden memdumps, click here to show them.