IOC Report
WGo3ga1AL9.exe

loading gif

Files

File Path
Type
Category
Malicious
WGo3ga1AL9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\GDBFCGIIIJ.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Google\Chrome\updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WGo3ga1AL9.exe_c64af2e17828a752ecb1c78a0f516ee4dc0108_ed2ad96c_09b19eb5-2db0-4408-8cc8-8b51e692e205\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\BGDAAEHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EGDGCGCFHIEHIDGDBAAE
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\FCGIJDBAFCBAAKECGDGCBKFIDG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GDGDHJJDGHCAAAKEHIJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HJJKJJDHCGCAECAAECFH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJEBKKEGDBFIIEBFHIEHCBKJJK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KKJJEBFC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xf22c24ec, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E20.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 31 16:12:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8025.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8054.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8062.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER80F0.tmp.txt
data
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\chrome_131[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbnwij54.lep.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h1mgxww1.rlc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrw1ekzs.ysi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nliojnjl.zy1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 101
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (790)
downloaded
Chrome Cache Entry: 98
ASCII text
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (65531)
downloaded
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WGo3ga1AL9.exe
"C:\Users\user\Desktop\WGo3ga1AL9.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2560 --field-trial-handle=2444,i,1816216943429670437,7438663567690844307,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\GDBFCGIIIJ.exe"
malicious
C:\ProgramData\GDBFCGIIIJ.exe
"C:\ProgramData\GDBFCGIIIJ.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
malicious
C:\ProgramData\Google\Chrome\updater.exe
C:\ProgramData\Google\Chrome\updater.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 7308 -ip 7308
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7308 -s 2296
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.235.128.16/562c1eb14955c897.php
185.235.128.16
malicious
http://185.235.128.16/4bdcdc3545a160aa/msvcp140.dll
185.235.128.16
malicious
http://185.235.128.16/4bdcdc3545a160aa/sqlite3.dll
185.235.128.16
malicious
http://185.235.128.16/4bdcdc3545a160aa/vcruntime140.dll
185.235.128.16
malicious
http://185.235.128.16/4bdcdc3545a160aa/mozglue.dll
185.235.128.16
malicious
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
http://185.235.128.16/3
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://anglebug.com/7714
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
http://crl.ver)
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.184.206
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://185.235.128.16/4bdcdc3545a160aa/mozglue.dllC
unknown
http://anglebug.com/3624
unknown
http://185.235.128.16/562c1eb14955c897.phption:
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://185.235.128.16/4bdcdc3545a160aa/freebl3.dll3
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
http://185.235.128.16/4bdcdc3545a160aa/sqlite3.dllU
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://lens.google.com/v3/2
unknown
https://anglebug.com/7847
unknown
https://google-ohttp-relay-join.fastly-edge.com/
unknown
https://lens.google.com/v3/upload
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.100
http://anglebug.com/3832
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://drive-daily-6.corp.google.com/
unknown
https://drive-daily-0.corp.google.com/
unknown
https://drive-thirdparty.googleusercontent.com/32/type/
unknown
https://lens.google.com/upload
unknown
https://drive-daily-3.corp.google.com/
unknown
http://anglebug.com/6651
unknown
https://anglebug.com/6574
unknown
https://anglebug.com/4830
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17crosoft
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
apis.google.com
unknown
malicious
plus.l.google.com
142.250.184.206
play.google.com
216.58.206.78
www.google.com
142.250.185.100
osteo9.esalnuvol.com
87.106.236.48

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
185.235.128.16
unknown
Ukraine
malicious
87.106.236.48
osteo9.esalnuvol.com
Germany
216.58.206.78
play.google.com
United States
142.250.185.100
www.google.com
United States
239.255.255.250
unknown
Reserved
142.250.184.206
plus.l.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7308
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7308
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7308
CreationTime
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
ProgramId
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
FileId
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
LowerCaseLongPath
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
LongPathHash
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
Name
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
OriginalFileName
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
Publisher
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
Version
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
BinFileVersion
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
BinaryType
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
ProductName
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
ProductVersion
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
LinkDate
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
BinProductVersion
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
AppxPackageFullName
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
AppxPackageRelativeId
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
Size
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
Language
\REGISTRY\A\{481a5d9b-7bd3-05be-429e-c366f5c48191}\Root\InventoryApplicationFile\wgo3ga1al9.exe|507a987e29f5534
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2500000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2420000
direct allocation
page execute and read and write
malicious
98E000
heap
page read and write
malicious
20F1C000
heap
page read and write
2A1002544000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
1BD9AE66000
heap
page read and write
1EB87700000
trusted library allocation
page read and write
20EDD000
heap
page read and write
1BD9AE67000
heap
page read and write
D63FAFF000
stack
page read and write
1AF69000
heap
page read and write
2A1002C18000
trusted library allocation
page read and write
154C7ED000
stack
page read and write
2A1002C18000
trusted library allocation
page read and write
132B4AE0000
direct allocation
page read and write
6503FFE000
stack
page read and write
2A1002E84000
trusted library allocation
page read and write
1B307F00000
trusted library allocation
page read and write
93904FE000
unkown
page readonly
20EEF000
heap
page read and write
1EB87613000
unkown
page read and write
1BD9AE63000
heap
page read and write
1A8AF000
stack
page read and write
2A1003694000
trusted library allocation
page read and write
2A1002BD1000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
1AF60000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
21D0BBA0000
heap
page read and write
1BD9AE86000
heap
page read and write
1BD9AE60000
heap
page read and write
7FF7739F2000
unkown
page readonly
2A1002FD0000
trusted library allocation
page read and write
1EB87913000
heap
page read and write
2A100253C000
trusted library allocation
page read and write
6C81F000
unkown
page readonly
2A1002E74000
trusted library allocation
page read and write
960000
heap
page read and write
20F1C000
heap
page read and write
93907FC000
stack
page read and write
1BD9AE5B000
heap
page read and write
27DDC8A0000
heap
page read and write
2A10025D8000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
2A1002430000
trusted library allocation
page read and write
98A000
heap
page read and write
1BD9AE55000
heap
page read and write
1AE50000
heap
page read and write
638077F000
stack
page read and write
2A1003778000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
598F2C000
stack
page read and write
2FFC006E8000
trusted library allocation
page read and write
93909FD000
stack
page read and write
2A1002BC8000
trusted library allocation
page read and write
2A100082A000
trusted library allocation
page read and write
14003338000
heap
page read and write
2FFC00614000
trusted library allocation
page read and write
2FFC00390000
trusted library allocation
page read and write
27024938000
heap
page read and write
2A10031D4000
trusted library allocation
page read and write
7FF7739F2000
unkown
page readonly
1BD9AE5B000
heap
page read and write
1B307FA0000
trusted library allocation
page read and write
638032D000
stack
page read and write
21260000
remote allocation
page read and write
2A1003130000
trusted library allocation
page read and write
1B302800000
heap
page read and write
6F8ED000
unkown
page readonly
2FF14ED000
stack
page read and write
19D000
stack
page read and write
2031D5B0000
heap
page read and write
1BD9AE60000
heap
page read and write
1B307F30000
trusted library allocation
page read and write
1B307F03000
trusted library allocation
page read and write
9391EFE000
unkown
page readonly
20F01000
heap
page read and write
EFEC67D000
stack
page read and write
2A1003778000
trusted library allocation
page read and write
20F6B000
heap
page read and write
20EF4000
heap
page read and write
2A1002BD3000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
2A1002E84000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
15A58370000
heap
page read and write
2A1002BCC000
trusted library allocation
page read and write
2A10035C0000
trusted library allocation
page read and write
7FF67D470000
unkown
page readonly
1B602FB0000
heap
page read and write
1B307F40000
trusted library allocation
page read and write
2A1002418000
trusted library allocation
page read and write
2A1003538000
trusted library allocation
page read and write
21031000
heap
page read and write
2FFC00788000
trusted library allocation
page read and write
20EF2000
heap
page read and write
2FF15FF000
stack
page read and write
2A10036F0000
trusted library allocation
page read and write
2A1002E8C000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
2A100320C000
trusted library allocation
page read and write
2A1002C18000
trusted library allocation
page read and write
209DE9A8000
heap
page read and write
2A10034CC000
trusted library allocation
page read and write
7FF7739F5000
unkown
page read and write
6CFB0000
unkown
page readonly
1BD9AE5B000
heap
page read and write
1BD9AE66000
heap
page read and write
1BD9AE60000
heap
page read and write
1B307F90000
trusted library allocation
page read and write
2A1000E2C000
trusted library allocation
page read and write
156FC8C000
stack
page read and write
1BD9AE5B000
heap
page read and write
7FF7740C1000
unkown
page readonly
1B307EB6000
trusted library allocation
page read and write
1B303D00000
heap
page read and write
1BD9AE60000
heap
page read and write
1EB87610000
unkown
page read and write
1B303C44000
heap
page read and write
7FF7740C6000
unkown
page execute and read and write
1BD9AE55000
heap
page read and write
61E00000
direct allocation
page execute and read and write
2A1002598000
trusted library allocation
page read and write
2FFC00730000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
2A1003288000
trusted library allocation
page read and write
7FF67DED8000
unkown
page execute and read and write
2A10024B4000
trusted library allocation
page read and write
2031F1B0000
heap
page read and write
2031D510000
heap
page read and write
15700FF000
stack
page read and write
253E000
stack
page read and write
1B303CA9000
heap
page read and write
7FF67DB56000
unkown
page execute and read and write
1BD9AE86000
heap
page read and write
1BD9AE54000
heap
page read and write
294800244000
direct allocation
page read and write
1B303C60000
heap
page read and write
1BD9AE5B000
heap
page read and write
24A000F8000
heap
page read and write
2A10034C4000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
1B602F70000
heap
page read and write
2FFC00688000
trusted library allocation
page read and write
1BD9AE63000
heap
page read and write
1BD9AE60000
heap
page read and write
2A1002BC8000
trusted library allocation
page read and write
1BD9AE4E000
heap
page read and write
2A1002ED4000
trusted library allocation
page read and write
2A1003154000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
1BD9AE67000
heap
page read and write
1AD8C955000
heap
page read and write
20EF4000
heap
page read and write
939107F000
stack
page read and write
7FF67D485000
unkown
page write copy
2A10023AC000
trusted library allocation
page read and write
1B307E75000
trusted library allocation
page read and write
D63F97B000
stack
page read and write
9F2000
heap
page read and write
2FFC00758000
trusted library allocation
page read and write
2FFC00734000
trusted library allocation
page read and write
154CAFF000
stack
page read and write
1BD9AE60000
heap
page read and write
1BD9AE7E000
heap
page read and write
1F4AAD98000
heap
page read and write
6503EFC000
stack
page read and write
FE5178F000
stack
page read and write
1BD9AE64000
heap
page read and write
7FF67DB55000
unkown
page readonly
7FF67D482000
unkown
page readonly
20ED0000
heap
page read and write
2A1002FE4000
trusted library allocation
page read and write
20F01000
heap
page read and write
1BD9AE63000
heap
page read and write
1BD9AE55000
heap
page read and write
2A1002DDC000
trusted library allocation
page read and write
1B307EEE000
trusted library allocation
page read and write
7FF7740C5000
unkown
page readonly
1B302680000
heap
page read and write
93782FF000
stack
page read and write
2A1002E0C000
trusted library allocation
page read and write
2A1003364000
trusted library allocation
page read and write
20F1B000
heap
page read and write
1BD9AE67000
heap
page read and write
21D0BBC8000
heap
page read and write
132B6840000
unkown
page read and write
2FFC00704000
trusted library allocation
page read and write
2A100249A000
trusted library allocation
page read and write
1B307FC0000
trusted library allocation
page read and write
2A1002BC8000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
1BD9AE67000
heap
page read and write
6F871000
unkown
page execute read
2113E000
stack
page read and write
93901FE000
unkown
page readonly
2A10037F3000
trusted library allocation
page read and write
7FF7739F5000
unkown
page write copy
93905FE000
stack
page read and write
2A10023E0000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
1BD9AE67000
heap
page read and write
2650000
heap
page read and write
1F4AAD70000
heap
page read and write
1BD9AE55000
heap
page read and write
93902F7000
stack
page read and write
28A20000
heap
page read and write
1F10002C0000
trusted library allocation
page read and write
14003530000
heap
page read and write
1EB87902000
heap
page read and write
7FF7739E0000
unkown
page readonly
939247E000
stack
page read and write
20EEE000
heap
page read and write
20F0C000
heap
page read and write
549000
unkown
page execute and read and write
2A10023F8000
trusted library allocation
page read and write
2FFC00664000
trusted library allocation
page read and write
2A100358C000
trusted library allocation
page read and write
9391BFB000
stack
page read and write
20F13000
heap
page read and write
1BD9AE67000
heap
page read and write
15A58375000
heap
page read and write
132B4A90000
heap
page read and write
20EF3000
heap
page read and write
1B303C05000
heap
page read and write
20EF5000
heap
page read and write
20FD0000
heap
page read and write
1B303C13000
heap
page read and write
1B307FB0000
trusted library allocation
page read and write
132B4B2C000
heap
page read and write
1BD9AE5B000
heap
page read and write
2A1002E74000
trusted library allocation
page read and write
1A7AE000
stack
page read and write
1B307EC4000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
1D4E1B40000
direct allocation
page read and write
1B307E61000
trusted library allocation
page read and write
2A10036C8000
trusted library allocation
page read and write
2FFC00320000
trusted library allocation
page read and write
1AE60000
heap
page read and write
6CFB1000
unkown
page execute read
2A1002494000
trusted library allocation
page read and write
1F4AB0A5000
heap
page read and write
7FF67DED2000
unkown
page execute and read and write
1BD9AE63000
heap
page read and write
7FF7740C5000
unkown
page readonly
2A10023EC000
trusted library allocation
page read and write
20ED4000
heap
page read and write
20EF3000
heap
page read and write
2A1002494000
trusted library allocation
page read and write
27DDCA70000
heap
page read and write
27024880000
heap
page read and write
15A58380000
heap
page read and write
1B307F5C000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
2A10037F1000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
2A1002420000
trusted library allocation
page read and write
A4B000
heap
page read and write
93924FE000
unkown
page readonly
2A100360C000
trusted library allocation
page read and write
2A10023F0000
trusted library allocation
page read and write
1BD9AE7E000
heap
page read and write
1B307EAD000
trusted library allocation
page read and write
209DE915000
heap
page read and write
2A100369C000
trusted library allocation
page read and write
1B30282B000
heap
page read and write
2FFC00750000
trusted library allocation
page read and write
1B3028B5000
heap
page read and write
2A1002FCC000
trusted library allocation
page read and write
2A1002DDC000
trusted library allocation
page read and write
1B303CBE000
heap
page read and write
1BD9AE66000
heap
page read and write
1BD9AE55000
heap
page read and write
2A10035C0000
trusted library allocation
page read and write
1BD9AE80000
heap
page read and write
1BD9AE60000
heap
page read and write
20F05000
heap
page read and write
20F03000
heap
page read and write
1BD9AE66000
heap
page read and write
7D0000
direct allocation
page execute and read and write
9750FCF000
stack
page read and write
1B302828000
heap
page read and write
2FFC00320000
trusted library allocation
page read and write
2FFC0069C000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
1D4E1B40000
direct allocation
page read and write
1BD9AE4B000
heap
page read and write
9377FBD000
stack
page read and write
1BD9AE64000
heap
page read and write
1BD9AE7E000
heap
page read and write
1B303E00000
trusted library allocation
page read and write
1D4E1830000
heap
page read and write
865000
heap
page read and write
20F1B000
heap
page read and write
61E01000
direct allocation
page execute read
1B308000000
remote allocation
page read and write
1B308000000
remote allocation
page read and write
1BD9AE67000
heap
page read and write
1F1000248000
trusted library allocation
page read and write
2A1002BC8000
trusted library allocation
page read and write
1EB87602000
unkown
page read and write
1BD9AE7E000
heap
page read and write
1BD9AE8E000
heap
page read and write
1BD9AE66000
heap
page read and write
2A10005E0000
trusted library allocation
page read and write
598FAE000
stack
page read and write
1B554740000
heap
page read and write
93914FB000
stack
page read and write
93915FE000
unkown
page readonly
1BD9AE5B000
heap
page read and write
2FF17FF000
stack
page read and write
1BD9AE5C000
heap
page read and write
1CFF63F0000
heap
page read and write
1BD9AE60000
heap
page read and write
1BD9AE7E000
heap
page read and write
1B602FBF000
heap
page read and write
1BD9AE67000
heap
page read and write
9390AFE000
unkown
page readonly
21D0BB40000
heap
page read and write
2A1002E74000
trusted library allocation
page read and write
2A1002E8C000
trusted library allocation
page read and write
1B30311A000
heap
page read and write
1BD9AE67000
heap
page read and write
20F10000
heap
page read and write
8AE000
stack
page read and write
154CBFF000
stack
page read and write
1BD9AE66000
heap
page read and write
27024930000
heap
page read and write
2A10034CC000
trusted library allocation
page read and write
21010000
heap
page read and write
1B307F50000
trusted library allocation
page read and write
2A100358C000
trusted library allocation
page read and write
1B302863000
heap
page read and write
1BD9AE5B000
heap
page read and write
2A1002498000
trusted library allocation
page read and write
2A100320C000
trusted library allocation
page read and write
1B30288E000
heap
page read and write
2A1003108000
trusted library allocation
page read and write
27024C25000
heap
page read and write
1BD9AE5B000
heap
page read and write
2FFC0039C000
trusted library allocation
page read and write
20F03000
heap
page read and write
2FFC00248000
trusted library allocation
page read and write
1D4E1B40000
direct allocation
page read and write
1D4E1B40000
direct allocation
page read and write
1B303C86000
heap
page read and write
2A100340C000
trusted library allocation
page read and write
2A100370C000
trusted library allocation
page read and write
24A00405000
heap
page read and write
1BD9AE55000
heap
page read and write
1B307E80000
trusted library allocation
page read and write
9D2000
heap
page read and write
1BD9AE5B000
heap
page read and write
1BD9AE5B000
heap
page read and write
A74000
heap
page read and write
1EB87600000
unkown
page read and write
2A1002494000
trusted library allocation
page read and write
1F10002D8000
trusted library allocation
page read and write
7FF7743C2000
unkown
page execute and read and write
2031D810000
heap
page read and write
20F1C000
heap
page read and write
1B307F22000
trusted library allocation
page read and write
1B307E62000
trusted library allocation
page read and write
2A1000720000
trusted library allocation
page read and write
2A1002DE0000
trusted library allocation
page read and write
9750ECC000
stack
page read and write
2A1002544000
trusted library allocation
page read and write
7FF67DB53000
unkown
page read and write
132B4AE0000
direct allocation
page read and write
2A10006F4000
trusted library allocation
page read and write
1B554745000
heap
page read and write
21D0BB30000
heap
page read and write
2A10034C4000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
2A10023D0000
trusted library allocation
page read and write
1B307F67000
trusted library allocation
page read and write
2A100251C000
trusted library allocation
page read and write
2A1003718000
trusted library allocation
page read and write
15A58350000
heap
page read and write
1BD9AE63000
heap
page read and write
2A1002410000
trusted library allocation
page read and write
1CFF63F8000
heap
page read and write
1B307F51000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
2A1003178000
trusted library allocation
page read and write
1CFF6690000
heap
page read and write
1B3028BC000
heap
page read and write
1BD9AE5B000
heap
page read and write
937827F000
stack
page read and write
2A1002E74000
trusted library allocation
page read and write
1ACEE000
stack
page read and write
20EEE000
heap
page read and write
2A100258C000
trusted library allocation
page read and write
1B303C4F000
heap
page read and write
21240000
trusted library allocation
page read and write
6C85E000
unkown
page read and write
1B302913000
heap
page read and write
1BD9AE67000
heap
page read and write
1EB87902000
heap
page read and write
2A10024F0000
trusted library allocation
page read and write
1B303C5C000
heap
page read and write
A5C507E000
stack
page read and write
1BD9AE55000
heap
page read and write
2A100358C000
trusted library allocation
page read and write
2FFC00424000
trusted library allocation
page read and write
1B307F30000
trusted library allocation
page read and write
1BD9AE7E000
heap
page read and write
2A100240C000
trusted library allocation
page read and write
7FF7739E1000
unkown
page execute read
15A583F0000
heap
page read and write
939017E000
stack
page read and write
1EB87400000
heap
page read and write
1BD9AE67000
heap
page read and write
1B3028FE000
heap
page read and write
65040FE000
stack
page read and write
1BD9AE5B000
heap
page read and write
7FF77463E000
unkown
page execute read
1B303780000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
1B303100000
heap
page read and write
939007B000
stack
page read and write
2A1002E74000
trusted library allocation
page read and write
57B000
unkown
page execute and read and write
197000
stack
page read and write
1B303104000
heap
page read and write
1BD9AE64000
heap
page read and write
1B307E6E000
trusted library allocation
page read and write
2FFC00694000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
2A1002598000
trusted library allocation
page read and write
2031D410000
heap
page read and write
20EF3000
heap
page read and write
1AB9E000
stack
page read and write
132B4AE0000
direct allocation
page read and write
20F03000
heap
page read and write
1BD9AE63000
heap
page read and write
7FF67DE52000
unkown
page execute and read and write
156FD8F000
stack
page read and write
1BD9AE64000
heap
page read and write
2A1002E8C000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
132B4EE5000
heap
page read and write
7FF7743F8000
unkown
page execute and read and write
2A100253C000
trusted library allocation
page read and write
2A100480C000
trusted library allocation
page read and write
1BD9AE49000
heap
page read and write
1BD9AE64000
heap
page read and write
1B307ED2000
trusted library allocation
page read and write
2A1003650000
trusted library allocation
page read and write
1BD9AE66000
heap
page read and write
27DDC890000
heap
page read and write
1BD9AE5B000
heap
page read and write
1BD9AE60000
heap
page read and write
2A100258C000
trusted library allocation
page read and write
2A1003130000
trusted library allocation
page read and write
1B307EF1000
trusted library allocation
page read and write
132B4B00000
unkown
page read and write
5B661FF000
stack
page read and write
1B303540000
trusted library allocation
page read and write
1AE61000
heap
page read and write
20F13000
heap
page read and write
2A100062E000
trusted library allocation
page read and write
7FF7740C1000
unkown
page readonly
7FF7739E1000
unkown
page execute read
20F6B000
heap
page read and write
1BD9AE6B000
heap
page read and write
1BD9AE63000
heap
page read and write
2A10036EC000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
93908FE000
unkown
page readonly
2A1003238000
trusted library allocation
page read and write
1B307F1A000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
1A9FF000
stack
page read and write
1BD9AE67000
heap
page read and write
400000
unkown
page readonly
1BD9AE66000
heap
page read and write
28A81000
heap
page read and write
2FFC00368000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
1F10002A0000
trusted library allocation
page read and write
9390CFE000
unkown
page readonly
6C681000
unkown
page execute read
2A1000676000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
1BD9AE67000
heap
page read and write
1B307E90000
trusted library allocation
page read and write
2A1002494000
trusted library allocation
page read and write
1B554490000
heap
page read and write
EFEC6FF000
stack
page read and write
1BD9AE83000
heap
page read and write
1EB8761B000
unkown
page read and write
1E810E50000
heap
page read and write
2A1002494000
trusted library allocation
page read and write
27E0A000
heap
page read and write
910000
heap
page read and write
1BD9AE66000
heap
page read and write
66E000
unkown
page execute and read and write
1BD9AE55000
heap
page read and write
1BD9AE67000
heap
page read and write
A3429BE000
stack
page read and write
1EB87638000
heap
page read and write
2FFC00678000
trusted library allocation
page read and write
2A1002E84000
trusted library allocation
page read and write
93912FE000
unkown
page readonly
1AD8C718000
heap
page read and write
7FF774442000
unkown
page execute and read and write
1BD9AE66000
heap
page read and write
1BD9AE5B000
heap
page read and write
15A58340000
heap
page read and write
2A10034B0000
trusted library allocation
page read and write
2A10035B0000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
2A1002F58000
trusted library allocation
page read and write
1E810E58000
heap
page read and write
6C680000
unkown
page readonly
1BD9AE5B000
heap
page read and write
209DE8E0000
heap
page read and write
20EF2000
heap
page read and write
1B303C3A000
heap
page read and write
1BD9AE67000
heap
page read and write
2A1000328000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
1B30285B000
heap
page read and write
212D9000
heap
page read and write
2A1002528000
trusted library allocation
page read and write
20F01000
heap
page read and write
2A1003670000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
1BD9AE66000
heap
page read and write
1BD9AE66000
heap
page read and write
2A10030E0000
trusted library allocation
page read and write
7B2FF7F000
stack
page read and write
2A10037E7000
trusted library allocation
page read and write
2A10030A8000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
2FFC006C8000
trusted library allocation
page read and write
1B303CC3000
heap
page read and write
1BD9AE5F000
heap
page read and write
132B4AE0000
direct allocation
page read and write
1F10002C8000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
132B4AB0000
heap
page read and write
1BD9AE67000
heap
page read and write
1BD9AE5B000
heap
page read and write
2FFC00310000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
1B30289F000
heap
page read and write
2A100253C000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
1D4E1B40000
direct allocation
page read and write
59927E000
stack
page read and write
2A1003154000
trusted library allocation
page read and write
20EEE000
heap
page read and write
1AC9D000
stack
page read and write
1B302902000
heap
page read and write
2A10001D0000
trusted library allocation
page read and write
132B708D000
unkown
page read and write
1B308230000
trusted library allocation
page read and write
2A10037E7000
trusted library allocation
page read and write
638067F000
stack
page read and write
1BD9AE66000
heap
page read and write
1B302780000
heap
page read and write
1B303D0A000
heap
page read and write
2A10036C8000
trusted library allocation
page read and write
1BD9AE66000
heap
page read and write
1BD9AE63000
heap
page read and write
1BD9AE66000
heap
page read and write
2A1003130000
trusted library allocation
page read and write
20EE9000
heap
page read and write
2FFC00320000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
27DDC8A8000
heap
page read and write
2A1002DDC000
trusted library allocation
page read and write
1BD9AE85000
heap
page read and write
2A100253C000
trusted library allocation
page read and write
2A1002598000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
1B303CD5000
heap
page read and write
D63F55D000
stack
page read and write
2A100242C000
trusted library allocation
page read and write
7FF77438A000
unkown
page execute and read and write
24A00400000
heap
page read and write
A3428BD000
stack
page read and write
2A1004948000
trusted library allocation
page read and write
1AD8C950000
heap
page read and write
1D4E183C000
heap
page read and write
1B307F50000
trusted library allocation
page read and write
1E811060000
heap
page read and write
2A10023E4000
trusted library allocation
page read and write
1BD9AE63000
heap
page read and write
1BD9AE67000
heap
page read and write
1B3028BA000
heap
page read and write
20F03000
heap
page read and write
1B302906000
heap
page read and write
1B303CEE000
heap
page read and write
2A1002DDC000
trusted library allocation
page read and write
2A1002530000
trusted library allocation
page read and write
2A100253C000
trusted library allocation
page read and write
953000
heap
page read and write
1B3028FE000
heap
page read and write
1BD9AE64000
heap
page read and write
2A100318C000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
2FFC00418000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
2031D4F0000
heap
page read and write
2FFC00668000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
1BD9AE66000
heap
page read and write
5AA000
unkown
page execute and read and write
209DE9A0000
heap
page read and write
93906FE000
unkown
page readonly
14003705000
heap
page read and write
1BD9AE63000
heap
page read and write
7FF67DB51000
unkown
page readonly
2A100326C000
trusted library allocation
page read and write
F8A797E000
stack
page read and write
1B303200000
trusted library allocation
page read and write
7FF77463E000
unkown
page execute read
1EB87715000
trusted library allocation
page read and write
2A10024A8000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
F8A787D000
stack
page read and write
20EE6000
heap
page read and write
2FFC00700000
trusted library allocation
page read and write
2A1003238000
trusted library allocation
page read and write
27DDCA90000
heap
page read and write
1BD9AE55000
heap
page read and write
1D4E1B80000
heap
page read and write
1F10002A0000
trusted library allocation
page read and write
2FFC00754000
trusted library allocation
page read and write
95E000
heap
page read and write
21260000
remote allocation
page read and write
2A1003568000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
2A100284C000
trusted library allocation
page read and write
1BD9AE7E000
heap
page read and write
2A100316C000
trusted library allocation
page read and write
1B303CBC000
heap
page read and write
2A10035B0000
trusted library allocation
page read and write
2A100372C000
trusted library allocation
page read and write
24A000F0000
heap
page read and write
C7F000
stack
page read and write
1BD9AE60000
heap
page read and write
1B302929000
heap
page read and write
1D4E1B40000
direct allocation
page read and write
2A1000D62000
trusted library allocation
page read and write
2FFC00644000
trusted library allocation
page read and write
1BD9AE6C000
heap
page read and write
DB7EE7D000
stack
page read and write
1BD9AE7E000
heap
page read and write
20EEE000
heap
page read and write
2A10034E4000
trusted library allocation
page read and write
2A10035CC000
trusted library allocation
page read and write
2A1002428000
trusted library allocation
page read and write
1B307ECF000
trusted library allocation
page read and write
14003330000
heap
page read and write
1BD9AE5B000
heap
page read and write
1BD9B425000
heap
page read and write
1D4E1B40000
direct allocation
page read and write
27024C20000
heap
page read and write
7FF67E0CE000
unkown
page execute read
2A1002498000
trusted library allocation
page read and write
F8A7A7F000
stack
page read and write
1B307E90000
trusted library allocation
page read and write
2FFC006E0000
trusted library allocation
page read and write
1BD9AE5C000
heap
page read and write
2A100321C000
trusted library allocation
page read and write
1BD9AE6C000
heap
page read and write
7FF67DB55000
unkown
page readonly
1B5544B0000
heap
page read and write
1BD9AE66000
heap
page read and write
2A1004958000
trusted library allocation
page read and write
132B4AE0000
direct allocation
page read and write
14003510000
heap
page read and write
2A1002414000
trusted library allocation
page read and write
1EB87724000
heap
page read and write
A5C4F7F000
stack
page read and write
1B30311B000
heap
page read and write
1BD9AE60000
heap
page read and write
20EF2000
heap
page read and write
2A10003D2000
trusted library allocation
page read and write
95C000
heap
page read and write
1AD8C6A0000
heap
page read and write
24A00040000
heap
page read and write
2FFC00684000
trusted library allocation
page read and write
2A10046BC000
trusted library allocation
page read and write
2A10023B4000
trusted library allocation
page read and write
1F10002C0000
trusted library allocation
page read and write
2A1002E74000
trusted library allocation
page read and write
2A10034DC000
trusted library allocation
page read and write
1D4E1B40000
direct allocation
page read and write
1BD9AE63000
heap
page read and write
1B303BE0000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
1EB87802000
heap
page read and write
1B307F48000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
2A100258C000
trusted library allocation
page read and write
20ED0000
trusted library allocation
page read and write
6C860000
unkown
page read and write
1B303BA1000
trusted library allocation
page read and write
1F4AB0A0000
heap
page read and write
20F6C000
heap
page read and write
7FF67D471000
unkown
page execute read
1BD9AE5B000
heap
page read and write
20EF2000
heap
page read and write
1AD8C680000
heap
page read and write
1BD9AE64000
heap
page read and write
1BD9AE55000
heap
page read and write
2A1002E74000
trusted library allocation
page read and write
1EB87900000
heap
page read and write
1B5543B0000
heap
page read and write
1BD9AE60000
heap
page read and write
2FFC006FC000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
1EB87677000
heap
page read and write
2A100367C000
trusted library allocation
page read and write
2A100258C000
trusted library allocation
page read and write
2FFC006BC000
trusted library allocation
page read and write
5B660FD000
stack
page read and write
20ED0000
trusted library allocation
page read and write
1B308000000
remote allocation
page read and write
20F08000
heap
page read and write
7FF7740C3000
unkown
page read and write
1BD9AE66000
heap
page read and write
1BD9AE8E000
heap
page read and write
2A10030E0000
trusted library allocation
page read and write
2A1003154000
trusted library allocation
page read and write
2A100495C000
trusted library allocation
page read and write
7FF77438D000
unkown
page execute and read and write
2A100253C000
trusted library allocation
page read and write
2FFC006D4000
trusted library allocation
page read and write
2A100377A000
trusted library allocation
page read and write
20FF0000
heap
page read and write
14003430000
heap
page read and write
1B307ECC000
trusted library allocation
page read and write
2A1003628000
trusted library allocation
page read and write
2A1000880000
trusted library allocation
page read and write
2A10031AC000
trusted library allocation
page read and write
1B307E50000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
2A1002E48000
trusted library allocation
page read and write
1B303000000
heap
page read and write
1B602FB8000
heap
page read and write
2FF16FF000
stack
page read and write
2FFC0033C000
trusted library allocation
page read and write
1BD9AE66000
heap
page read and write
1B302813000
heap
page read and write
1BD9AE67000
heap
page read and write
1F4AAD90000
heap
page read and write
1EB87813000
heap
page read and write
61ED3000
direct allocation
page read and write
20F01000
heap
page read and write
1BD9AE66000
heap
page read and write
2A1002510000
trusted library allocation
page read and write
2A10030A8000
trusted library allocation
page read and write
20F05000
heap
page read and write
2A10023D4000
trusted library allocation
page read and write
2A10031C4000
trusted library allocation
page read and write
212E5000
heap
page read and write
1F10002A0000
trusted library allocation
page read and write
2A10030F0000
trusted library allocation
page read and write
6C85F000
unkown
page write copy
1BD9AE55000
heap
page read and write
1BD9AE66000
heap
page read and write
7FF67DB53000
unkown
page write copy
7B3007F000
stack
page read and write
7B2FE7C000
stack
page read and write
1B303C2D000
heap
page read and write
1BD9AE67000
heap
page read and write
2A1002C18000
trusted library allocation
page read and write
2A10031A0000
trusted library allocation
page read and write
1B307F54000
trusted library allocation
page read and write
1B303102000
heap
page read and write
212ED000
heap
page read and write
1B307F5F000
trusted library allocation
page read and write
27DDCB50000
heap
page read and write
1B303C10000
heap
page read and write
2A1002504000
trusted library allocation
page read and write
20F13000
heap
page read and write
7FF67DB4E000
unkown
page readonly
1BD9AE63000
heap
page read and write
2A10025D8000
trusted library allocation
page read and write
2A1002494000
trusted library allocation
page read and write
867000
heap
page read and write
1BD9AE60000
heap
page read and write
132B4B20000
heap
page read and write
1BD9AE5B000
heap
page read and write
2A10023F4000
trusted library allocation
page read and write
6F8FE000
unkown
page read and write
2814C000
stack
page read and write
1BD9AE67000
heap
page read and write
2A10035CC000
trusted library allocation
page read and write
2FFC00408000
trusted library allocation
page read and write
1B303C84000
heap
page read and write
1BD9AE67000
heap
page read and write
2A100258C000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
1BD9AE66000
heap
page read and write
2A1004874000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
2FFC00658000
trusted library allocation
page read and write
2A10025D8000
trusted library allocation
page read and write
6C865000
unkown
page readonly
2FFC00630000
trusted library allocation
page read and write
1BD9AE4E000
heap
page read and write
1BD9AE60000
heap
page read and write
20EEE000
heap
page read and write
1F4AAF80000
heap
page read and write
2A1003684000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
2A1003A4F000
trusted library allocation
page read and write
1B302917000
heap
page read and write
27024780000
heap
page read and write
2FFC0033C000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
2FFC00330000
trusted library allocation
page read and write
93911FB000
stack
page read and write
2A10023B4000
trusted library allocation
page read and write
7FF67D471000
unkown
page execute read
20EF7000
heap
page read and write
2FFC00714000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
1BD9AE52000
heap
page read and write
15A583F9000
heap
page read and write
2A100253C000
trusted library allocation
page read and write
1B307E60000
trusted library allocation
page read and write
1BD9B40D000
heap
page read and write
93903FE000
unkown
page readonly
1BD9AE5B000
heap
page read and write
867000
heap
page read and write
1D4E1B40000
direct allocation
page read and write
1CFF6695000
heap
page read and write
2A10036AC000
trusted library allocation
page read and write
1F10002A0000
trusted library allocation
page read and write
2A1002E8C000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
2A100377A000
trusted library allocation
page read and write
2FFC00330000
trusted library allocation
page read and write
132B4AE0000
direct allocation
page read and write
1B30289E000
heap
page read and write
1B303D03000
heap
page read and write
61ECC000
direct allocation
page read and write
20EF7000
heap
page read and write
1B3028B0000
heap
page read and write
2A1000F22000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
7FF67E0CE000
unkown
page execute read
2123F000
stack
page read and write
132B4B10000
unkown
page read and write
1B307E78000
trusted library allocation
page read and write
2A1002494000
trusted library allocation
page read and write
20EEE000
heap
page read and write
1B303CF8000
heap
page read and write
41E000
unkown
page execute read
2A1003804000
trusted library allocation
page read and write
1BD9AE66000
heap
page read and write
6F870000
unkown
page readonly
212DF000
heap
page read and write
1BD9AE5B000
heap
page read and write
1BD9AE67000
heap
page read and write
2FFC00698000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
7FF7740C3000
unkown
page write copy
1D4E184E000
heap
page read and write
4E4000
unkown
page execute and read and write
1BD9AE55000
heap
page read and write
2A1002E8C000
trusted library allocation
page read and write
2FFC00354000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
2A1002424000
trusted library allocation
page read and write
2A10030E0000
trusted library allocation
page read and write
2A100316C000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
2A1003504000
trusted library allocation
page read and write
28518000
heap
page read and write
2A10035DC000
trusted library allocation
page read and write
2A1002494000
trusted library allocation
page read and write
21D0BB60000
heap
page read and write
27DDCB55000
heap
page read and write
1BD9AE5B000
heap
page read and write
2FFC0035C000
trusted library allocation
page read and write
2FFC00610000
trusted library allocation
page read and write
2A1003108000
trusted library allocation
page read and write
212D1000
heap
page read and write
2A10031C4000
trusted library allocation
page read and write
1BD9AE6D000
heap
page read and write
1F0000
heap
page read and write
1BD9AE67000
heap
page read and write
1F10002A0000
trusted library allocation
page read and write
1BD9AE66000
heap
page read and write
1BD9AE67000
heap
page read and write
1E811040000
heap
page read and write
132B4AE0000
direct allocation
page read and write
1B303113000
heap
page read and write
1B303D0C000
heap
page read and write
2A100258C000
trusted library allocation
page read and write
132B4AE0000
direct allocation
page read and write
209DE910000
heap
page read and write
14003700000
heap
page read and write
1BD9AE60000
heap
page read and write
28000000
heap
page read and write
2A1002DE0000
trusted library allocation
page read and write
1B303C6D000
heap
page read and write
65041FF000
stack
page read and write
1B602F50000
heap
page read and write
1BD9AE67000
heap
page read and write
27D0F000
stack
page read and write
2A1003730000
trusted library allocation
page read and write
1B602F75000
heap
page read and write
20EDD000
heap
page read and write
1EB87702000
trusted library allocation
page read and write
867000
heap
page read and write
132B4A80000
heap
page read and write
1BD9AE55000
heap
page read and write
1BD9AE66000
heap
page read and write
9390BFB000
stack
page read and write
1F10002C0000
trusted library allocation
page read and write
1AD8C5A0000
heap
page read and write
1BD9AE64000
heap
page read and write
1B307F45000
trusted library allocation
page read and write
132B4AE0000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
1D4E1B85000
heap
page read and write
1B307FB0000
trusted library allocation
page read and write
132B4B29000
heap
page read and write
1BD9AE60000
heap
page read and write
20F01000
heap
page read and write
7FF67D470000
unkown
page readonly
9391CFE000
unkown
page readonly
1B307EA4000
trusted library allocation
page read and write
1BD9AE66000
heap
page read and write
1BD9AE55000
heap
page read and write
2A1004970000
trusted library allocation
page read and write
2031D815000
heap
page read and write
2727A000
heap
page read and write
1AE61000
heap
page read and write
1BD9AE5B000
heap
page read and write
1BD9AE6C000
heap
page read and write
5B6617F000
stack
page read and write
1BD9AE53000
heap
page read and write
56E000
unkown
page execute and read and write
2804C000
stack
page read and write
2A100253C000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
2A1002E8C000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
2A10025D8000
trusted library allocation
page read and write
1B303C41000
heap
page read and write
2A1003288000
trusted library allocation
page read and write
6E8000
unkown
page execute and read and write
8EE000
stack
page read and write
1AD8C710000
heap
page read and write
7FF67DE1A000
unkown
page execute and read and write
1BD9AE63000
heap
page read and write
132B4AE0000
direct allocation
page read and write
2FFC00620000
trusted library allocation
page read and write
1B302902000
heap
page read and write
1BD9AE60000
heap
page read and write
61EB4000
direct allocation
page read and write
1A8FE000
stack
page read and write
1BD9AE55000
heap
page read and write
980000
heap
page read and write
1BD9AE60000
heap
page read and write
1BD9AE52000
heap
page read and write
1AE61000
heap
page read and write
1EB87900000
heap
page read and write
7FF7740BE000
unkown
page readonly
1BD9AE5B000
heap
page read and write
1F10002A0000
trusted library allocation
page read and write
7FF774965000
unkown
page readonly
21D0BBA5000
heap
page read and write
1BD9AE64000
heap
page read and write
2FFC00640000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
2A10035B0000
trusted library allocation
page read and write
1F10002E4000
trusted library allocation
page read and write
2A1002694000
trusted library allocation
page read and write
1BD9AE63000
heap
page read and write
132B6840000
direct allocation
page read and write
1AA4E000
stack
page read and write
2129E000
stack
page read and write
1BD9AE66000
heap
page read and write
2FFC006E4000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
1B307E60000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
7FF774448000
unkown
page execute and read and write
5A7000
unkown
page execute and read and write
1BD9AE64000
heap
page read and write
DB7F07E000
stack
page read and write
20EEB000
heap
page read and write
2A100370C000
trusted library allocation
page read and write
1B5545B0000
heap
page read and write
1BD9AE64000
heap
page read and write
132B4EE0000
heap
page read and write
2031D5B7000
heap
page read and write
1BD9AE66000
heap
page read and write
1BD9AE66000
heap
page read and write
20EDD000
heap
page read and write
1B307E68000
trusted library allocation
page read and write
2A10031C4000
trusted library allocation
page read and write
2A10037E7000
trusted library allocation
page read and write
2A1002DE0000
trusted library allocation
page read and write
6D057000
unkown
page read and write
2FFC006F0000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
20F03000
heap
page read and write
1BD9AE64000
heap
page read and write
1BD9AE67000
heap
page read and write
1BD9AE60000
heap
page read and write
1BD9AE60000
heap
page read and write
2A1002E8C000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
2A1002C18000
trusted library allocation
page read and write
2A10036F2000
trusted library allocation
page read and write
1BD9AE6D000
heap
page read and write
1D4E1B40000
direct allocation
page read and write
DB7EF7E000
stack
page read and write
1D4E1B40000
direct allocation
page read and write
2A10030A8000
trusted library allocation
page read and write
1B307EA0000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
2A100321C000
trusted library allocation
page read and write
1BD9AE64000
heap
page read and write
1D4E1B40000
direct allocation
page read and write
2A1002DDC000
trusted library allocation
page read and write
263F000
stack
page read and write
4A2000
unkown
page readonly
1BD9AE60000
heap
page read and write
21D0BBC0000
heap
page read and write
6D059000
unkown
page readonly
1F4AAF60000
heap
page read and write
2FFC00354000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
1B303015000
heap
page read and write
1B30286D000
heap
page read and write
20EF7000
heap
page read and write
93918FD000
stack
page read and write
2A10023D8000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
9B000
stack
page read and write
1E811070000
heap
page read and write
1BD9AE60000
heap
page read and write
2A10024F3000
trusted library allocation
page read and write
1B303002000
heap
page read and write
1B303D0C000
heap
page read and write
97512FE000
stack
page read and write
1BD9AE67000
heap
page read and write
132B4AE0000
direct allocation
page read and write
2A10028BC000
trusted library allocation
page read and write
2A1003300000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
1BD9AE8E000
heap
page read and write
2A1003064000
trusted library allocation
page read and write
2A1002C18000
trusted library allocation
page read and write
1B303BD0000
trusted library allocation
page read and write
D63FBFE000
stack
page read and write
2FFC00654000
trusted library allocation
page read and write
7FF67D485000
unkown
page read and write
1B3082C0000
trusted library allocation
page read and write
9391DFE000
stack
page read and write
950000
heap
page read and write
1BD9AE55000
heap
page read and write
1BD9AE66000
heap
page read and write
132B4B3F000
heap
page read and write
2A1002DE8000
trusted library allocation
page read and write
209DE8F0000
heap
page read and write
2FFC003EC000
trusted library allocation
page read and write
1BD9AE53000
heap
page read and write
514000
unkown
page execute and read and write
1BD9AE55000
heap
page read and write
7FF67DE1D000
unkown
page execute and read and write
20EEE000
heap
page read and write
7FF67D482000
unkown
page readonly
27024860000
heap
page read and write
2FFC00380000
trusted library allocation
page read and write
860000
heap
page read and write
1BD9AE60000
heap
page read and write
648000
unkown
page execute and read and write
1EB87800000
heap
page read and write
1BD9AE67000
heap
page read and write
209DE920000
heap
page read and write
1BD9AE60000
heap
page read and write
1BD9AE66000
heap
page read and write
59B000
unkown
page execute and read and write
7FF67E3F5000
unkown
page readonly
1EB87913000
heap
page read and write
1BD9AE54000
heap
page read and write
7FF67DB51000
unkown
page readonly
EFEC77F000
stack
page read and write
6D011000
unkown
page readonly
7FF774965000
unkown
page readonly
1BD9AE66000
heap
page read and write
2FFC006D0000
trusted library allocation
page read and write
192000
stack
page read and write
1B3027B0000
trusted library allocation
page read and write
1B307E40000
trusted library allocation
page read and write
2A10023DC000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
1BD9AE63000
heap
page read and write
1BD9AE60000
heap
page read and write
1BD9AE55000
heap
page read and write
1F10002C0000
trusted library allocation
page read and write
1BD9AE5A000
heap
page read and write
27E00000
heap
page read and write
A5C4E7D000
stack
page read and write
7FF7739E0000
unkown
page readonly
1BD9AE86000
heap
page read and write
1B303C00000
heap
page read and write
1BD9AE52000
heap
page read and write
7FF67DB4E000
unkown
page readonly
1BD9AE5B000
heap
page read and write
1B302868000
heap
page read and write
1BD9AE5B000
heap
page read and write
1BD9AE5B000
heap
page read and write
1B302840000
heap
page read and write
1BD9AE67000
heap
page read and write
2FFC0075C000
trusted library allocation
page read and write
2A1002E8C000
trusted library allocation
page read and write
20EF2000
heap
page read and write
2A100349C000
trusted library allocation
page read and write
7FF67DE88000
unkown
page execute and read and write
1D4E2260000
direct allocation
page read and write
1BD9AE66000
heap
page read and write
2A10032A8000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
1B3082B0000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
2A10031AC000
trusted library allocation
page read and write
1CFF6510000
heap
page read and write
1BD9AE63000
heap
page read and write
1AB4E000
stack
page read and write
1BD9AE67000
heap
page read and write
1BD9AE60000
heap
page read and write
7FF67E3F5000
unkown
page readonly
1EB87500000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
6F902000
unkown
page readonly
FE5170D000
stack
page read and write
2A10036BC000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
2A1002E68000
trusted library allocation
page read and write
1E811065000
heap
page read and write
2A100316C000
trusted library allocation
page read and write
2A1002DDC000
trusted library allocation
page read and write
2FFC006B4000
trusted library allocation
page read and write
2A1000A48000
trusted library allocation
page read and write
1B30288C000
heap
page read and write
2A1004994000
trusted library allocation
page read and write
20F10000
heap
page read and write
1BD9AE60000
heap
page read and write
2FFC0060C000
trusted library allocation
page read and write
2FFC00760000
trusted library allocation
page read and write
2FFC006CC000
trusted library allocation
page read and write
2A100249A000
trusted library allocation
page read and write
21260000
remote allocation
page read and write
401000
unkown
page execute read
1B5544B8000
heap
page read and write
1F10002A4000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
2FFC00320000
trusted library allocation
page read and write
1BD9AE67000
heap
page read and write
1D4E1A40000
heap
page read and write
2A10023E8000
trusted library allocation
page read and write
A342CFF000
stack
page read and write
1BD9AE60000
heap
page read and write
20F05000
heap
page read and write
1D4E1A20000
heap
page read and write
1BD9AE64000
heap
page read and write
6EB000
unkown
page readonly
1BD9AE55000
heap
page read and write
1EB8762B000
heap
page read and write
1BD9AE64000
heap
page read and write
7C0000
heap
page read and write
2A1003504000
trusted library allocation
page read and write
668000
unkown
page execute and read and write
1BD9AE60000
heap
page read and write
2A10034E4000
trusted library allocation
page read and write
1BD9AE5B000
heap
page read and write
2A1002434000
trusted library allocation
page read and write
1BD9AE60000
heap
page read and write
1BD9AE55000
heap
page read and write
24A00060000
heap
page read and write
2A10023AC000
trusted library allocation
page read and write
D63FCF9000
stack
page read and write
1ADED000
stack
page read and write
1B3028A4000
heap
page read and write
1B307F60000
trusted library allocation
page read and write
2A1002544000
trusted library allocation
page read and write
1BD9AE7E000
heap
page read and write
1BD9AE63000
heap
page read and write
2A10036B4000
trusted library allocation
page read and write
24A00030000
heap
page read and write
1BD9AE60000
heap
page read and write
2FFC0040C000
trusted library allocation
page read and write
495000
unkown
page write copy
1BD9AE5B000
heap
page read and write
B7E000
stack
page read and write
2A1004728000
trusted library allocation
page read and write
2A1002E4C000
trusted library allocation
page read and write
1BD9AE55000
heap
page read and write
132B4AE0000
direct allocation
page read and write
1A66E000
stack
page read and write
1CFF6310000
heap
page read and write
2FF14FE000
stack
page read and write
1BD9AE64000
heap
page read and write
1BD9AE67000
heap
page read and write
2A100241C000
trusted library allocation
page read and write
1B307F7A000
trusted library allocation
page read and write
2FFC00624000
trusted library allocation
page read and write
132B4AE0000
direct allocation
page read and write
1BD9AE55000
heap
page read and write
2A1002E8C000
trusted library allocation
page read and write
2A1003568000
trusted library allocation
page read and write
1B602E70000
heap
page read and write
1F10002A4000
trusted library allocation
page read and write
1B3026A0000
heap
page read and write
1BD9AE60000
heap
page read and write
2FFC006B0000
trusted library allocation
page read and write
1D4E1940000
heap
page read and write
1CFF64F0000
heap
page read and write
1B309000000
heap
page read and write
1A76F000
stack
page read and write
61ED4000
direct allocation
page readonly
7FF7740BE000
unkown
page readonly
1E810F60000
heap
page read and write
20F05000
heap
page read and write
1EB87420000
heap
page read and write
1F10002C0000
trusted library allocation
page read and write
2FFC002FC000
trusted library allocation
page read and write
1B602F80000
heap
page read and write
93919FE000
unkown
page readonly
939047E000
stack
page read and write
2A100258C000
trusted library allocation
page read and write
2A1000A94000
trusted library allocation
page read and write
1F10002B0000
trusted library allocation
page read and write
There are 1232 hidden memdumps, click here to show them.