IOC Report
OMHGCG.exe

loading gif

Files

File Path
Type
Category
Malicious
OMHGCG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Windata\update.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZFZRCN.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=4, Archive, ctime=Wed Nov 30 07:45:52 2022, mtime=Wed Nov 30 07:45:53 2022, atime=Wed Nov 30 07:45:53 2022, length=808241, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OMHGCG.exe
C:\Users\user\Desktop\OMHGCG.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c schtasks /create /tn ZFZRCN.exe /tr C:\Users\user\AppData\Roaming\Windata\update.exe /sc minute /mo 1
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /tn ZFZRCN.exe /tr C:\Users\user\AppData\Roaming\Windata\update.exe /sc minute /mo 1
malicious
C:\Users\user\AppData\Roaming\Windata\update.exe
C:\Users\user\AppData\Roaming\Windata\update.exe
malicious
C:\Users\user\AppData\Roaming\Windata\update.exe
"C:\Users\user\AppData\Roaming\Windata\update.exe"
malicious
C:\Users\user\AppData\Roaming\Windata\update.exe
"C:\Users\user\AppData\Roaming\Windata\update.exe"
malicious
C:\Users\user\AppData\Roaming\Windata\update.exe
"C:\Users\user\AppData\Roaming\Windata\update.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.autoitscript.com/autoit3/files/beta/autoit/archive/sqlite/SQLite3
unknown
http://www.autoitscript.com/autoit3/files/beta/autoit/archive/sqlite/SQLite3%%
unknown
http://checkip.amazonaws.com/D
unknown
http://www.autoitscript.com/autoit3/files/beta/autoit/archive/sqlite/SQLite3GK
unknown
http://ip-score.com/checkip/
unknown
http://checkip.amazonaws.com/
unknown
http://www.autoitscript.com/autoit3/files/beta/autoit/archive/sqlite/SQLite3D
unknown

Domains

Name
IP
Malicious
test202022.ddns.net
197.42.186.178
malicious

IPs

IP
Domain
Country
Malicious
197.42.186.178
test202022.ddns.net
Egypt
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
ZFZRCN

Memdumps

Base Address
Regiontype
Protect
Malicious
AAAA2FB000
stack
page read and write
3ED7000
trusted library allocation
page read and write
3D0F000
trusted library allocation
page read and write
3C1A000
trusted library allocation
page read and write
1AB0000
trusted library allocation
page read and write
195000
heap
page read and write
3BBA000
trusted library allocation
page read and write
194000
heap
page read and write
A47000
heap
page read and write
1F47F702000
heap
page read and write
3DDC000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
3B93000
trusted library allocation
page read and write
94E000
stack
page read and write
3D78000
trusted library allocation
page read and write
2B45E42A000
heap
page read and write
3BAF000
trusted library allocation
page read and write
20000
heap
page read and write
20132C13000
heap
page read and write
194000
heap
page read and write
1AA9AAE0000
trusted library allocation
page read and write
194000
heap
page read and write
544CE79000
stack
page read and write
3D8B000
trusted library allocation
page read and write
3C57000
trusted library allocation
page read and write
3BF0000
trusted library allocation
page read and write
3E2E000
trusted library allocation
page read and write
3D09000
trusted library allocation
page read and write
3B01000
trusted library allocation
page read and write
3C65000
trusted library allocation
page read and write
3CE5000
trusted library allocation
page read and write
3C7D000
trusted library allocation
page read and write
4BD000
unkown
page write copy
3CBB000
trusted library allocation
page read and write
3C5A000
trusted library allocation
page read and write
1AA9905B000
heap
page read and write
3C41000
trusted library allocation
page read and write
2B45E449000
heap
page read and write
29E32802000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
2B45E445000
heap
page read and write
3C47000
trusted library allocation
page read and write
1AA9AC02000
trusted library allocation
page read and write
3CDC000
trusted library allocation
page read and write
1AA99113000
heap
page read and write
3CDE000
trusted library allocation
page read and write
29E32740000
remote allocation
page read and write
3B69000
trusted library allocation
page read and write
476000
unkown
page execute and write copy
9BBB37F000
stack
page read and write
1B3AEC5A000
heap
page read and write
194000
heap
page read and write
3C2C000
trusted library allocation
page read and write
3CE8000
trusted library allocation
page read and write
3C41000
trusted library allocation
page read and write
3DCE000
trusted library allocation
page read and write
3BAD000
trusted library allocation
page read and write
AAAA97E000
stack
page read and write
1AA9AA90000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
16D0000
heap
page read and write
20132229000
heap
page read and write
3B76000
trusted library allocation
page read and write
1611000
trusted library allocation
page read and write
1AA98F90000
heap
page read and write
3C62000
trusted library allocation
page read and write
29E32000000
heap
page read and write
3CD4000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
2B45E380000
heap
page read and write
3C14000
trusted library allocation
page read and write
AAA9EDB000
stack
page read and write
9BBB27F000
stack
page read and write
194000
heap
page read and write
194000
heap
page read and write
150000
heap
page read and write
401000
unkown
page execute and read and write
AAAAB7E000
stack
page read and write
2B45E485000
heap
page read and write
3C14000
trusted library allocation
page read and write
400000
unkown
page readonly
3CFE000
trusted library allocation
page read and write
4A8000
unkown
page execute and read and write
20132150000
trusted library allocation
page read and write
3D27000
trusted library allocation
page read and write
3BF3000
trusted library allocation
page read and write
168F000
stack
page read and write
4BC000
unkown
page execute and write copy
194000
heap
page read and write
29E32013000
heap
page read and write
3D9A000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
21698C60000
heap
page read and write
3BD9000
trusted library allocation
page read and write
1461CA02000
heap
page read and write
E76477E000
stack
page read and write
3E1C000
trusted library allocation
page read and write
3B7C000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
1B3AEC51000
heap
page read and write
131F000
stack
page read and write
3CC4000
trusted library allocation
page read and write
1AA9903E000
heap
page read and write
2B45E47F000
heap
page read and write
4A7000
unkown
page execute and read and write
1F47F688000
heap
page read and write
3DEE000
trusted library allocation
page read and write
3BA8000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
20132B22000
heap
page read and write
2013226B000
heap
page read and write
400000
unkown
page readonly
1AA9905A000
heap
page read and write
3006000
heap
page read and write
21698C00000
heap
page read and write
33F0000
heap
page read and write
3035000
heap
page read and write
20132289000
heap
page read and write
3CD9000
trusted library allocation
page read and write
201323E5000
heap
page read and write
3C9B000
trusted library allocation
page read and write
1F47FF00000
heap
page read and write
3BF7000
trusted library allocation
page read and write
4B9000
unkown
page execute and read and write
1F47FF32000
heap
page read and write
2F90000
heap
page read and write
AAAA57F000
stack
page read and write
29E32002000
heap
page read and write
1C0000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
194000
heap
page read and write
20132C30000
heap
page read and write
8BF000
stack
page read and write
1F47F4B0000
heap
page read and write
194000
heap
page read and write
3DF7000
trusted library allocation
page read and write
1461C9F0000
trusted library allocation
page read and write
3CCB000
trusted library allocation
page read and write
194000
heap
page read and write
1461CA00000
heap
page read and write
3BB6000
trusted library allocation
page read and write
404A000
trusted library allocation
page read and write
20132B96000
heap
page read and write
1B3AEC02000
heap
page read and write
194000
heap
page read and write
94E000
stack
page read and write
BA68FF000
stack
page read and write
20132284000
heap
page read and write
BA61FE000
stack
page read and write
3C36000
trusted library allocation
page read and write
20132213000
heap
page read and write
194000
heap
page read and write
3C36000
trusted library allocation
page read and write
29E32740000
remote allocation
page read and write
2F30000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
AAAA5FC000
stack
page read and write
4B5000
unkown
page execute and read and write
20132313000
heap
page read and write
C914A7D000
stack
page read and write
29E3205C000
heap
page read and write
3BA1000
trusted library allocation
page read and write
1AC5000
heap
page read and write
1B8A4F9000
stack
page read and write
B20000
heap
page read and write
194000
heap
page read and write
3BA6000
trusted library allocation
page read and write
2B45EC02000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
18E000
stack
page read and write
3BB8000
trusted library allocation
page read and write
20000
heap
page read and write
194000
heap
page read and write
3BA6000
trusted library allocation
page read and write
1AA9904B000
heap
page read and write
1461CA3B000
heap
page read and write
4A7000
unkown
page execute and read and write
3C36000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
20132B22000
heap
page read and write
3D54000
trusted library allocation
page read and write
9A000
stack
page read and write
544D07A000
stack
page read and write
3CF5000
trusted library allocation
page read and write
4B9000
unkown
page execute and read and write
1F47F5B0000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
E76497E000
stack
page read and write
3FD3000
trusted library allocation
page read and write
194000
heap
page read and write
21698E79000
heap
page read and write
4218000
trusted library allocation
page read and write
20132C23000
heap
page read and write
476000
unkown
page execute and write copy
21698F02000
heap
page read and write
3D12000
trusted library allocation
page read and write
194000
heap
page read and write
195000
heap
page read and write
3CB4000
trusted library allocation
page read and write
3E1C000
trusted library allocation
page read and write
1B3AEA60000
heap
page read and write
1AA99059000
heap
page read and write
194000
heap
page read and write
4A7000
unkown
page execute and read and write
3CD4000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
A80000
heap
page read and write
194000
heap
page read and write
3C7E000
trusted library allocation
page read and write
8BF000
stack
page read and write
3BBB000
trusted library allocation
page read and write
20132292000
heap
page read and write
194000
heap
page read and write
401000
unkown
page execute and read and write
3D67000
trusted library allocation
page read and write
20132B43000
heap
page read and write
3000000
heap
page read and write
194000
heap
page read and write
21698E00000
heap
page read and write
3C8D000
trusted library allocation
page read and write
2B45E47B000
heap
page read and write
50A1000
heap
page read and write
1B3AEC8A000
heap
page read and write
3BF4000
trusted library allocation
page read and write
1B3AED02000
heap
page read and write
9BBB77E000
stack
page read and write
2B45E44A000
heap
page read and write
3F40000
trusted library allocation
page read and write
195000
heap
page read and write
3BD0000
trusted library allocation
page read and write
2B45E46C000
heap
page read and write
1461C820000
heap
page read and write
194000
heap
page read and write
2B45E43E000
heap
page read and write
20132265000
heap
page read and write
4C9E000
stack
page read and write
3009000
heap
page read and write
194000
heap
page read and write
21698E4E000
heap
page read and write
30000
trusted library allocation
page read and write
194000
heap
page read and write
29E31F40000
heap
page read and write
2B45E43A000
heap
page read and write
3BFE000
trusted library allocation
page read and write
20000
heap
page read and write
3C00000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
1AC0000
heap
page read and write
33F4000
heap
page read and write
3B91000
trusted library allocation
page read and write
194000
heap
page read and write
3350000
trusted library allocation
page read and write
1AA99118000
heap
page read and write
2B45E3F0000
heap
page read and write
194000
heap
page read and write
544D27A000
stack
page read and write
16CF000
stack
page read and write
194000
heap
page read and write
3C57000
trusted library allocation
page read and write
1461D002000
trusted library allocation
page read and write
194000
heap
page read and write
3C02000
trusted library allocation
page read and write
4BC000
unkown
page execute and write copy
194000
heap
page read and write
3B81000
trusted library allocation
page read and write
3C7C000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
3D11000
trusted library allocation
page read and write
300C000
heap
page read and write
194000
heap
page read and write
3D86000
trusted library allocation
page read and write
3C6E000
trusted library allocation
page read and write
1B3AED13000
heap
page read and write
3BFE000
trusted library allocation
page read and write
4B5000
unkown
page execute and read and write
544CCFE000
stack
page read and write
2B45E446000
heap
page read and write
195000
heap
page read and write
4BD000
unkown
page write copy
2013227B000
heap
page read and write
C914D7D000
stack
page read and write
3C37000
trusted library allocation
page read and write
2B45E468000
heap
page read and write
400000
unkown
page readonly
194000
heap
page read and write
194000
heap
page read and write
4BC000
unkown
page execute and write copy
21698BF0000
heap
page read and write
3BB5000
trusted library allocation
page read and write
3CEE000
trusted library allocation
page read and write
3BC7000
trusted library allocation
page read and write
1B3AEC75000
heap
page read and write
BA5FFB000
stack
page read and write
3C4E000
trusted library allocation
page read and write
194000
heap
page read and write
3CCC000
trusted library allocation
page read and write
490000
unkown
page execute and read and write
A20000
heap
page read and write
374F000
stack
page read and write
3C65000
trusted library allocation
page read and write
1B3AEC29000
heap
page read and write
1773000
trusted library allocation
page read and write
2B45E502000
heap
page read and write
194000
heap
page read and write
3B80000
trusted library allocation
page read and write
2B45E441000
heap
page read and write
3C48000
trusted library allocation
page read and write
20132278000
heap
page read and write
3D9C000
trusted library allocation
page read and write
E7642AC000
stack
page read and write
3C92000
trusted library allocation
page read and write
4BD000
unkown
page write copy
2B45E400000
heap
page read and write
3E1B000
trusted library allocation
page read and write
3B87000
trusted library allocation
page read and write
195000
heap
page read and write
3CBE000
trusted library allocation
page read and write
1A8E000
stack
page read and write
544CF7E000
stack
page read and write
2F80000
trusted library allocation
page read and write
2013238C000
heap
page read and write
2B45E452000
heap
page read and write
9A000
stack
page read and write
BA60FD000
stack
page read and write
4BC000
unkown
page execute and write copy
194000
heap
page read and write
2B45E430000
heap
page read and write
490000
unkown
page execute and read and write
3F41000
trusted library allocation
page read and write
21698F13000
heap
page read and write
4B9000
unkown
page execute and read and write
194000
heap
page read and write
1B3AEAC0000
heap
page read and write
3DFC000
trusted library allocation
page read and write
3B9B000
trusted library allocation
page read and write
29E31F50000
heap
page read and write
194000
heap
page read and write
3FD2000
trusted library allocation
page read and write
21698E13000
heap
page read and write
50A0000
heap
page read and write
AAAA47F000
stack
page read and write
2E7C000
trusted library allocation
page read and write
B00000
heap
page read and write
21698E74000
heap
page read and write
2B45E450000
heap
page read and write
1AA99073000
heap
page read and write
194000
heap
page read and write
1AA99066000
heap
page read and write
29E32740000
remote allocation
page read and write
20131FE0000
heap
page read and write
1AE6000
heap
page read and write
194000
heap
page read and write
3D5C000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
29E32020000
heap
page read and write
1B3AEC00000
heap
page read and write
194000
heap
page read and write
1AA99049000
heap
page read and write
3C36000
trusted library allocation
page read and write
490000
unkown
page execute and read and write
A90000
heap
page read and write
B28000
heap
page read and write
3B75000
trusted library allocation
page read and write
3BAB000
trusted library allocation
page read and write
1AA9AB20000
trusted library allocation
page read and write
194000
heap
page read and write
3FB4000
trusted library allocation
page read and write
9BBB47E000
stack
page read and write
2B45E413000
heap
page read and write
195000
heap
page read and write
960000
trusted library allocation
page read and write
1211000
trusted library allocation
page read and write
490000
unkown
page execute and read and write
2B45E448000
heap
page read and write
1AE0000
heap
page read and write
3F3F000
stack
page read and write
1AA99000000
heap
page read and write
1B89FEB000
stack
page read and write
910000
heap
page read and write
A0E000
stack
page read and write
18E0000
heap
page read and write
194000
heap
page read and write
1B3AEC65000
heap
page read and write
3BDC000
trusted library allocation
page read and write
1611000
trusted library allocation
page read and write
195000
heap
page read and write
3BE8000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
1F47FE02000
heap
page read and write
3C46000
trusted library allocation
page read and write
E764A7E000
stack
page read and write
3CA7000
trusted library allocation
page read and write
195000
heap
page read and write
3C81000
trusted library allocation
page read and write
1CE000
stack
page read and write
3D30000
trusted library allocation
page read and write
194000
heap
page read and write
9BBB0FD000
stack
page read and write
400D000
trusted library allocation
page read and write
2013225B000
heap
page read and write
2B45E478000
heap
page read and write
3CC2000
trusted library allocation
page read and write
3C41000
trusted library allocation
page read and write
3B85000
trusted library allocation
page read and write
20132B00000
heap
page read and write
544D17E000
stack
page read and write
1B3AEC3D000
heap
page read and write
16E0000
trusted library allocation
page read and write
194000
heap
page read and write
1F47F6C3000
heap
page read and write
2013223C000
heap
page read and write
1461CA44000
heap
page read and write
3CDC000
trusted library allocation
page read and write
20132243000
heap
page read and write
A7E000
stack
page read and write
194000
heap
page read and write
1F47F6CB000
heap
page read and write
1461CA52000
heap
page read and write
3C50000
trusted library allocation
page read and write
BA63FE000
stack
page read and write
194000
heap
page read and write
3BE3000
trusted library allocation
page read and write
3B00000
trusted library allocation
page read and write
509F000
stack
page read and write
3C6E000
trusted library allocation
page read and write
3CD4000
trusted library allocation
page read and write
3C80000
trusted library allocation
page read and write
3BA6000
trusted library allocation
page read and write
194000
heap
page read and write
1DE000
stack
page read and write
3B7D000
trusted library allocation
page read and write
1F47F713000
heap
page read and write
194000
heap
page read and write
3E3B000
trusted library allocation
page read and write
3FF5000
trusted library allocation
page read and write
544CAFF000
stack
page read and write
1F47F450000
heap
page read and write
3D23000
trusted library allocation
page read and write
400000
unkown
page readonly
194000
heap
page read and write
3C46000
trusted library allocation
page read and write
194000
heap
page read and write
3BAF000
trusted library allocation
page read and write
4BD000
unkown
page read and write
20132170000
trusted library allocation
page read and write
A0E000
stack
page read and write
2FC0000
trusted library allocation
page read and write
8E7DF0B000
stack
page read and write
3B3F000
stack
page read and write
21698E59000
heap
page read and write
3B96000
trusted library allocation
page read and write
2B45E466000
heap
page read and write
194000
heap
page read and write
3C7C000
trusted library allocation
page read and write
3C24000
trusted library allocation
page read and write
1B8A3FE000
stack
page read and write
3E25000
trusted library allocation
page read and write
20000
heap
page read and write
194000
heap
page read and write
C9147FE000
stack
page read and write
30E0000
heap
page read and write
2B45E442000
heap
page read and write
476000
unkown
page execute and write copy
3ECE000
trusted library allocation
page read and write
3C77000
trusted library allocation
page read and write
194000
heap
page read and write
30000
trusted library allocation
page read and write
12CD000
stack
page read and write
21698D60000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
3C00000
trusted library allocation
page read and write
194000
heap
page read and write
2B45E443000
heap
page read and write
9BBB67D000
stack
page read and write
3CE5000
trusted library allocation
page read and write
194000
heap
page read and write
3C6E000
trusted library allocation
page read and write
3C53000
trusted library allocation
page read and write
194000
heap
page read and write
90E000
stack
page read and write
4BD000
unkown
page write copy
194000
heap
page read and write
194000
heap
page read and write
4A7000
unkown
page execute and read and write
194000
heap
page read and write
1AA9ABA0000
remote allocation
page read and write
3CAC000
trusted library allocation
page read and write
3C63000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
BA69FF000
stack
page read and write
3B51000
trusted library allocation
page read and write
BA64FD000
stack
page read and write
194000
heap
page read and write
194000
heap
page read and write
194000
heap
page read and write
4B9000
unkown
page execute and read and write
1F47F600000
heap
page read and write
3BC4000
trusted library allocation
page read and write
194000
heap
page read and write
3C15000
trusted library allocation
page read and write
3DEF000
trusted library allocation
page read and write
400000
unkown
page readonly
30E5000
heap
page read and write
21698E28000
heap
page read and write
194000
heap
page read and write
194000
heap
page read and write
4BD000
unkown
page read and write
A90000
trusted library allocation
page read and write
3030000
heap
page read and write
1620000
heap
page read and write
2B45E451000
heap
page read and write
9B0000
heap
page read and write
4BD000
unkown
page read and write
1F47F6E1000
heap
page read and write
400000
unkown
page readonly
29E32102000
heap
page read and write
3C17000
trusted library allocation
page read and write
1AA99002000
heap
page read and write
166E000
stack
page read and write
C91436C000
stack
page read and write
41DC000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
481F000
stack
page read and write
195000
heap
page read and write
194000
heap
page read and write
195000
heap
page read and write
4C5F000
stack
page read and write
3B61000
trusted library allocation
page read and write
3CDE000
trusted library allocation
page read and write
1461CA29000
heap
page read and write
3DA0000
trusted library allocation
page read and write
2F94000
heap
page read and write
1461C7C0000
heap
page read and write
194000
heap
page read and write
20132C27000
heap
page read and write
3B94000
trusted library allocation
page read and write
21698E6A000
heap
page read and write
2F00000
trusted library allocation
page read and write
3CB4000
trusted library allocation
page read and write
3C43000
trusted library allocation
page read and write
19E000
stack
page read and write
194000
heap
page read and write
194000
heap
page read and write
194000
heap
page read and write
194000
heap
page read and write
401000
unkown
page execute and read and write
3B76000
trusted library allocation
page read and write
3B81000
trusted library allocation
page read and write
3CC2000
trusted library allocation
page read and write
3CD4000
trusted library allocation
page read and write
3CA8000
trusted library allocation
page read and write
1AA9ABA0000
remote allocation
page read and write
3BB5000
trusted library allocation
page read and write
194000
heap
page read and write
AA6000
heap
page read and write
3DF7000
trusted library allocation
page read and write
AA6000
heap
page read and write
3CA2000
trusted library allocation
page read and write
195000
heap
page read and write
3B8C000
trusted library allocation
page read and write
3D9B000
trusted library allocation
page read and write
4B5000
unkown
page execute and read and write
3D13000
trusted library allocation
page read and write
9CE000
stack
page read and write
195000
heap
page read and write
3C15000
trusted library allocation
page read and write
C91487E000
stack
page read and write
3E1D000
trusted library allocation
page read and write
194000
heap
page read and write
3C51000
trusted library allocation
page read and write
3C00000
trusted library allocation
page read and write
3C95000
trusted library allocation
page read and write
3C15000
trusted library allocation
page read and write
400000
unkown
page readonly
3C48000
trusted library allocation
page read and write
3C7E000
trusted library allocation
page read and write
21699602000
trusted library allocation
page read and write
3C25000
trusted library allocation
page read and write
194000
heap
page read and write
3C8A000
trusted library allocation
page read and write
1AA98F80000
heap
page read and write
3C70000
trusted library allocation
page read and write
400000
unkown
page readonly
3CD9000
trusted library allocation
page read and write
AAAA77B000
stack
page read and write
3BB7000
trusted library allocation
page read and write
A35000
heap
page read and write
1F4000
heap
page read and write
1F47F6BA000
heap
page read and write
194000
heap
page read and write
BA65FF000
stack
page read and write
4BC000
unkown
page execute and write copy
8E7E47B000
stack
page read and write
3DA7000
trusted library allocation
page read and write
1AA9904A000
heap
page read and write
3C6E000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
AD0000
heap
page read and write
3BCB000
trusted library allocation
page read and write
1B3AEC67000
heap
page read and write
3C43000
trusted library allocation
page read and write
194000
heap
page read and write
3D00000
trusted library allocation
page read and write
20132A02000
heap
page read and write
20132B54000
heap
page read and write
3CE5000
trusted library allocation
page read and write
1F47F629000
heap
page read and write
194000
heap
page read and write
2B45E46E000
heap
page read and write
3CF5000
trusted library allocation
page read and write
40C6000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
195000
heap
page read and write
20132258000
heap
page read and write
3CEE000
trusted library allocation
page read and write
3C6F000
trusted library allocation
page read and write
20132C3B000
heap
page read and write
400000
unkown
page readonly
1690000
trusted library allocation
page read and write
29E31FB0000
heap
page read and write
11DF000
stack
page read and write
1AA9AAB0000
trusted library allocation
page read and write
194000
heap
page read and write
8BF000
stack
page read and write
3B9F000
trusted library allocation
page read and write
2B45E44C000
heap
page read and write
4B5000
unkown
page execute and read and write
3CCB000
trusted library allocation
page read and write
AAAAA7C000
stack
page read and write
2B45E447000
heap
page read and write
300A000
heap
page read and write
3BC1000
trusted library allocation
page read and write
3BCE000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
1275000
trusted library allocation
page read and write
476000
unkown
page execute and write copy
C91497E000
stack
page read and write
3CA0000
trusted library allocation
page read and write
2F0F000
trusted library allocation
page read and write
190000
heap
page read and write
1461CB02000
heap
page read and write
476000
unkown
page execute and write copy
194000
heap
page read and write
BA66FF000
stack
page read and write
3CEB000
trusted library allocation
page read and write
A90000
heap
page read and write
1AA98FF0000
heap
page read and write
E7643AE000
stack
page read and write
128E000
stack
page read and write
3C13000
trusted library allocation
page read and write
3B4F000
stack
page read and write
1F47F670000
heap
page read and write
3B62000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
1F47F643000
heap
page read and write
3299000
trusted library allocation
page read and write
ADA000
heap
page read and write
3C3A000
trusted library allocation
page read and write
3BA4000
trusted library allocation
page read and write
3BD6000
trusted library allocation
page read and write
E76432E000
stack
page read and write
3C4B000
trusted library allocation
page read and write
3CEE000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
1B8A5FA000
stack
page read and write
21698F00000
heap
page read and write
194000
heap
page read and write
3C72000
trusted library allocation
page read and write
1F47F440000
heap
page read and write
3039000
heap
page read and write
960000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
20132C30000
heap
page read and write
1461CA2E000
heap
page read and write
3CB7000
trusted library allocation
page read and write
1AA99013000
heap
page read and write
195000
heap
page read and write
3C77000
trusted library allocation
page read and write
3CF5000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
3D06000
trusted library allocation
page read and write
918000
heap
page read and write
20132BB1000
heap
page read and write
377F000
stack
page read and write
3B92000
trusted library allocation
page read and write
3B76000
trusted library allocation
page read and write
20132C00000
heap
page read and write
3C41000
trusted library allocation
page read and write
155000
heap
page read and write
201323B9000
heap
page read and write
2B45EB50000
trusted library allocation
page read and write
194000
heap
page read and write
3E0D000
trusted library allocation
page read and write
3C24000
trusted library allocation
page read and write
1F47F613000
heap
page read and write
3C23000
trusted library allocation
page read and write
3C01000
trusted library allocation
page read and write
194000
heap
page read and write
3E2F000
trusted library allocation
page read and write
BA62FF000
stack
page read and write
3C57000
trusted library allocation
page read and write
3C00000
trusted library allocation
page read and write
3BB3000
trusted library allocation
page read and write
39BF000
stack
page read and write
1B3AEC70000
heap
page read and write
A4E000
stack
page read and write
195000
heap
page read and write
3C0A000
trusted library allocation
page read and write
3BA5000
trusted library allocation
page read and write
8E7E67B000
stack
page read and write
C914BFD000
stack
page read and write
1B3AEBC0000
trusted library allocation
page read and write
A1A000
heap
page read and write
400000
unkown
page readonly
A9C000
heap
page read and write
2B45E47C000
heap
page read and write
3C15000
trusted library allocation
page read and write
E76487E000
stack
page read and write
3B63000
trusted library allocation
page read and write
1461CA3D000
heap
page read and write
140000
heap
page read and write
3C7E000
trusted library allocation
page read and write
3C19000
trusted library allocation
page read and write
3B99000
trusted library allocation
page read and write
29E32029000
heap
page read and write
194000
heap
page read and write
3B74000
trusted library allocation
page read and write
3CC3000
trusted library allocation
page read and write
3BFF000
trusted library allocation
page read and write
3BB5000
trusted library allocation
page read and write
30000
trusted library allocation
page read and write
3B93000
trusted library allocation
page read and write
C914AFE000
stack
page read and write
3C96000
trusted library allocation
page read and write
194000
heap
page read and write
35BF000
stack
page read and write
3C0B000
trusted library allocation
page read and write
4040000
trusted library allocation
page read and write
90E000
stack
page read and write
20132C02000
heap
page read and write
194000
heap
page read and write
20000
heap
page read and write
3BC5000
trusted library allocation
page read and write
194000
heap
page read and write
3BD5000
trusted library allocation
page read and write
20132200000
heap
page read and write
490000
unkown
page execute and read and write
3D9B000
trusted library allocation
page read and write
3CFF000
trusted library allocation
page read and write
3C39000
trusted library allocation
page read and write
3C43000
trusted library allocation
page read and write
3CD9000
trusted library allocation
page read and write
3D66000
trusted library allocation
page read and write
161E000
stack
page read and write
30000
trusted library allocation
page read and write
A10000
heap
page read and write
50A1000
heap
page read and write
20132BC0000
heap
page read and write
4B5000
unkown
page execute and read and write
194000
heap
page read and write
3C4E000
trusted library allocation
page read and write
382F000
stack
page read and write
3B76000
trusted library allocation
page read and write
3CA7000
trusted library allocation
page read and write
39CD000
trusted library allocation
page read and write
3BBF000
trusted library allocation
page read and write
194000
heap
page read and write
8BF000
stack
page read and write
1A4E000
stack
page read and write
A30000
heap
page read and write
20132BC9000
heap
page read and write
1AA9ABA0000
remote allocation
page read and write
30000
trusted library allocation
page read and write
1461CA1F000
heap
page read and write
3CC2000
trusted library allocation
page read and write
1461C7D0000
heap
page read and write
1B3AEA50000
heap
page read and write
194000
heap
page read and write
3C38000
trusted library allocation
page read and write
9A000
stack
page read and write
194000
heap
page read and write
3C50000
trusted library allocation
page read and write
AAAA6FD000
stack
page read and write
4BD000
unkown
page write copy
544CB7E000
stack
page read and write
3D0A000
trusted library allocation
page read and write
3CC8000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
194000
heap
page read and write
3BC4000
trusted library allocation
page read and write
3DF7000
trusted library allocation
page read and write
1AA99102000
heap
page read and write
3BB3000
trusted library allocation
page read and write
194000
heap
page read and write
3B50000
trusted library allocation
page read and write
3C5C000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
194000
heap
page read and write
3C59000
trusted library allocation
page read and write
BA5BFB000
stack
page read and write
300C000
heap
page read and write
441E000
stack
page read and write
8BF000
stack
page read and write
1AA9902A000
heap
page read and write
BA67FF000
stack
page read and write
15DF000
stack
page read and write
9A000
stack
page read and write
1AA99100000
heap
page read and write
B04000
heap
page read and write
1F0000
heap
page read and write
20132B02000
heap
page read and write
2B45E44F000
heap
page read and write
3B7F000
stack
page read and write
3BB7000
trusted library allocation
page read and write
AAAA87D000
stack
page read and write
A24000
heap
page read and write
8E7E77F000
stack
page read and write
A98000
heap
page read and write
194000
heap
page read and write
1461CA13000
heap
page read and write
3BB1000
trusted library allocation
page read and write
2B45E390000
heap
page read and write
3CF7000
trusted library allocation
page read and write
1B8A6FF000
stack
page read and write
4BD000
unkown
page read and write
401000
unkown
page execute and read and write
194000
heap
page read and write
3C43000
trusted library allocation
page read and write
9A000
stack
page read and write
21698E02000
heap
page read and write
1625000
heap
page read and write
194000
heap
page read and write
3C89000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
3BAC000
trusted library allocation
page read and write
194000
heap
page read and write
140000
heap
page read and write
4022000
trusted library allocation
page read and write
3BFC000
trusted library allocation
page read and write
3BDF000
trusted library allocation
page read and write
3BB6000
trusted library allocation
page read and write
303C000
heap
page read and write
195000
heap
page read and write
21698E40000
heap
page read and write
3D4D000
trusted library allocation
page read and write
20132B71000
heap
page read and write
9EE000
stack
page read and write
A9F000
heap
page read and write
3CF5000
trusted library allocation
page read and write
3DEE000
trusted library allocation
page read and write
194000
heap
page read and write
3C6E000
trusted library allocation
page read and write
2B45E46B000
heap
page read and write
20132050000
heap
page read and write
3BE3000
trusted library allocation
page read and write
3CA4000
trusted library allocation
page read and write
990000
heap
page read and write
194000
heap
page read and write
544CDFB000
stack
page read and write
194000
heap
page read and write
544C72C000
stack
page read and write
9BBACAB000
stack
page read and write
3C23000
trusted library allocation
page read and write
194000
heap
page read and write
3E24000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
16A0000
trusted library allocation
page read and write
3C43000
trusted library allocation
page read and write
485E000
stack
page read and write
3C7E000
trusted library allocation
page read and write
3BE4000
trusted library allocation
page read and write
194000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3B51000
trusted library allocation
page read and write
171E000
stack
page read and write
3C2F000
stack
page read and write
8E7E57B000
stack
page read and write
3C2E000
trusted library allocation
page read and write
4B9000
unkown
page execute and read and write
3B93000
trusted library allocation
page read and write
1B3AF402000
trusted library allocation
page read and write
194000
heap
page read and write
194000
heap
page read and write
2E3E000
trusted library allocation
page read and write
20131FF0000
heap
page read and write
194000
heap
page read and write
3BE6000
trusted library allocation
page read and write
3BE2000
trusted library allocation
page read and write
3CAD000
trusted library allocation
page read and write
29E31FE0000
trusted library allocation
page read and write
3BB3000
trusted library allocation
page read and write
9BBB57C000
stack
page read and write
194000
heap
page read and write
9BBB87C000
stack
page read and write
1B3AEC13000
heap
page read and write
4BD000
unkown
page read and write
C914C7E000
stack
page read and write
29E32040000
heap
page read and write
3B9A000
trusted library allocation
page read and write
There are 898 hidden memdumps, click here to show them.