Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Aurora.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Msedge.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
\Device\Null
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aurora.exe_4ddec6df7537fc171b2d38e73121d365b626f68_00000000_5bd2e63e-4bad-43be-8393-fab0a7e1ec72\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER60.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFF57.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFFA6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OneDrive Updater.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OneDrive.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1uuujoo1.clx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4lm50jwl.i2z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_an3zbuep.zfx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brbwoi3y.qyo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwq3a0y1.kyd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gk5j21i5.wc1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ihuvrwie.ry2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4hp2vu4.v5d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbhkmpqf.zry.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kpse5r2a.vvn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mhcmucsk.4c5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mumy503g.ad0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ougdpndo.n4z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_skfb5wha.3tg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x2iypfu3.l4n.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zktoup0v.gtd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Aurora.exe
|
"C:\Users\user\Desktop\Aurora.exe"
|
||
C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe
|
"C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe"
"C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe"
/deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe"
&& exit" && && exit "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
|
"C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe"
&& attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA)
&& del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe"
|
||
C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe
|
"C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\PING.EXE
|
ping localhost -n 1
|
||
C:\Windows\System32\cmd.exe
|
cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty
-Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive
Updater.exe"' -PropertyType 'String'
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st
00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
#cmd
|
||
C:\Users\user\AppData\Local\Msedge.exe
|
C:\Users\user\AppData\Local\Msedge.exe
|
||
C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe
|
"C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du
9999:59 /sc once /ri 60 /rl HIGHEST /f
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac
0 & powercfg /x -standby-timeout-dc 0
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2")
{ schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe'''
} Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe')
-Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate
-DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost'
-RunLevel 'Highest' -Force; }
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -standby-timeout-dc 0
|
||
C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
|
"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
#cmd
|
||
C:\Users\user\AppData\Local\Msedge.exe
|
"C:\Users\user\AppData\Local\Msedge.exe"
|
||
C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
|
"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
#cmd
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
#cmd
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
#cmd
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
#cmd
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
#cmd
|
||
C:\Users\user\AppData\Local\Msedge.exe
|
"C:\Users\user\AppData\Local\Msedge.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac
0 & powercfg /x -standby-timeout-dc 0
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2")
{ schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe'''
} Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe')
-Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate
-DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost'
-RunLevel 'Highest' -Force; }
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
powercfg /x -standby-timeout-dc 0
|
||
C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
|
"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
#cmd
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\System32\conhost.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2")
{ schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe'''
} Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe')
-Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate
-DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost'
-RunLevel 'Highest' -Force; }
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe
|
||
C:\Windows\System32\attrib.exe
|
attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe"
|
||
C:\Windows\System32\icacls.exe
|
icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA)
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
|
dw20.exe -x -s 1480
|
There are 45 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
auroraforge.art
|
|||
https://api.ipify.orgcookies//settinString.Removeg
|
unknown
|
||
https://ipinfo.io/ip%appdata%
|
unknown
|
||
http://154.81.220.233:28105/
|
154.81.220.233
|
||
http://tempuri.org/Endpoint/CheckConnectLR
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
|
unknown
|
||
http://tempuri.org/Endpoint/EnvironmentSettings
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/Endpoint/EnvironmentSettingsLR
|
unknown
|
||
http://tempuri.org/Endpo$
|
unknown
|
||
http://tempuri.org/Endpoint/VerifyUpdateResponse
|
unknown
|
||
http://go.micros
|
unknown
|
||
http://tempuri.org/Endpoint/SetEnvironment
|
unknown
|
||
http://tempuri.org/Endpoint/SetEnvironmentResponse
|
unknown
|
||
http://154.81.220.233:
|
unknown
|
||
http://tempuri.org/Endpoint/CheckCon
|
unknown
|
||
http://tempuri.org/Endpoint/GetUpdates
|
unknown
|
||
https://github.com/sapics/ip-location-db/raw/master/dbip-city/dbip-city-ipv4.csv.gzjson:
|
unknown
|
||
http://tempuri.org/Endpo(
|
unknown
|
||
http://tempuri.org/Endpoint/GetUpdatesLR
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://tempuri.org/Endpo4
|
unknown
|
||
http://tempuri.org/Endpoint/VerifyUpdateLR
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://www.sysinternals.com0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://tempuri.org/Endpoint/
|
unknown
|
||
http://tempuri.org/Endpoint/VerifyUpdate
|
unknown
|
||
http://tempuri.org/0
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354sCannot
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://go.microsoft.coV
|
unknown
|
||
https://api.ipify.org/
|
unknown
|
||
https://t.me/aurora_botnet_support
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://api.telegram.org/file/bot%s/%sindex
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnectResponse
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
|
unknown
|
||
http://154.81.220.233:28105
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnect
|
unknown
|
||
https://github.com/electron/electron/releases/download/v%s/electron-v%s-%s-%s.zipInvalid
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://154.81.220.233:28105t-
|
unknown
|
||
http://tempuri.org/Endpoint/SetEnvironmentLR
|
unknown
|
||
https://go.microsoft.coVpnClient.psd1mpatib
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://tempuri.org/Endpoint/GetUpdatesResponse
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://ipwho.is/
|
unknown
|
||
http://127.0.0.1/dashboardid
|
unknown
|
||
http://schemas.xmlsoap.org/soap/actor/next
|
unknown
|
||
https://t.me/cheshire_aurora
|
unknown
|
||
http://tempuri.org/Endpo
|
unknown
|
There are 56 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
thesirenmika.com
|
123.123.123.123
|
||
auroraforge.art
|
192.64.119.108
|
||
xmr-us-east1.nanopool.org
|
51.222.106.253
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.64.119.108
|
auroraforge.art
|
United States
|
||
154.81.220.233
|
unknown
|
Seychelles
|
||
123.123.123.123
|
thesirenmika.com
|
China
|
||
51.79.71.77
|
unknown
|
Canada
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Microsoft Edge
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
OneDriveUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
ProgramId
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
FileId
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
LowerCaseLongPath
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
LongPathHash
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
Name
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
OriginalFileName
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
Publisher
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
Version
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
BinFileVersion
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
BinaryType
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
ProductName
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
ProductVersion
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
LinkDate
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
BinProductVersion
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
AppxPackageFullName
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
Size
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
Language
|
||
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 28 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A0C2000
|
trusted library allocation
|
page read and write
|
||
4AB9000
|
trusted library allocation
|
page read and write
|
||
5E2000
|
unkown
|
page readonly
|
||
466E000
|
trusted library allocation
|
page read and write
|
||
30B1000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
273AB26A000
|
heap
|
page read and write
|
||
2E4B000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
trusted library allocation
|
page read and write
|
||
2C6F000
|
trusted library allocation
|
page read and write
|
||
40B9000
|
trusted library allocation
|
page read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
96C2000
|
trusted library allocation
|
page read and write
|
||
720000
|
remote allocation
|
page execute and read and write
|
||
48DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
201595A2000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
E49FCFF000
|
stack
|
page read and write
|
||
3120000
|
heap
|
page execute and read and write
|
||
273AB273000
|
heap
|
page read and write
|
||
164A000
|
trusted library allocation
|
page execute and read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
8C4667A000
|
stack
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
3035000
|
trusted library allocation
|
page read and write
|
||
28FAD9F0000
|
heap
|
page read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
7FF62B641000
|
unkown
|
page execute read
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
E42B64E000
|
stack
|
page read and write
|
||
7233000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
1256000
|
trusted library allocation
|
page read and write
|
||
2942CFB0000
|
heap
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
E41BC7F000
|
stack
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
2F7361F0000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
2E52000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
28FC7A40000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
C29887D000
|
stack
|
page read and write
|
||
C29857E000
|
stack
|
page read and write
|
||
E42A77F000
|
stack
|
page read and write
|
||
29447672000
|
heap
|
page read and write
|
||
4EC5E37000
|
stack
|
page read and write
|
||
130D000
|
heap
|
page read and write
|
||
23A51313000
|
heap
|
page read and write
|
||
DB6000
|
trusted library allocation
|
page execute and read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
49D6000
|
trusted library allocation
|
page read and write
|
||
24F12320000
|
heap
|
page read and write
|
||
12C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD28000
|
trusted library allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
7DB467F000
|
stack
|
page read and write
|
||
2F3F000
|
unkown
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
4EC6C8A000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
20158254000
|
heap
|
page read and write
|
||
5266000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
2942ED04000
|
trusted library allocation
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
52E6000
|
trusted library allocation
|
page read and write
|
||
1F9E36D0000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page execute and read and write
|
||
7DF493CA0000
|
trusted library allocation
|
page execute and read and write
|
||
5280000
|
trusted library allocation
|
page execute and read and write
|
||
20156660000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
2942D040000
|
heap
|
page read and write
|
||
29430B35000
|
trusted library allocation
|
page read and write
|
||
19A55410000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
58F4000
|
trusted library allocation
|
page read and write
|
||
7FAE000
|
stack
|
page read and write
|
||
E8A000
|
unkown
|
page readonly
|
||
20159E1E000
|
trusted library allocation
|
page read and write
|
||
23A51002000
|
unkown
|
page read and write
|
||
31C6000
|
trusted library allocation
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
740E000
|
stack
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
245C000
|
trusted library allocation
|
page execute and read and write
|
||
AECF97F000
|
stack
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD2C000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
24F109B9000
|
heap
|
page read and write
|
||
1FE9F440000
|
heap
|
page read and write
|
||
273AB22F000
|
heap
|
page read and write
|
||
20170903000
|
heap
|
page read and write
|
||
273AB1F0000
|
heap
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
28FB108B000
|
trusted library allocation
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
116B000
|
heap
|
page read and write
|
||
690E000
|
stack
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
19A55450000
|
heap
|
page read and write
|
||
1153000
|
heap
|
page read and write
|
||
2942D0C9000
|
heap
|
page read and write
|
||
DCB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB6A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
heap
|
page read and write
|
||
20158CC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
534F000
|
trusted library allocation
|
page read and write
|
||
1491000
|
unkown
|
page execute and read and write
|
||
28FC81D9000
|
heap
|
page read and write
|
||
20158160000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
668E000
|
stack
|
page read and write
|
||
7DB438D000
|
stack
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
heap
|
page execute and read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
273AB313000
|
heap
|
page read and write
|
||
52FD000
|
trusted library allocation
|
page read and write
|
||
19A55430000
|
heap
|
page read and write
|
||
273B3000000
|
heap
|
page read and write
|
||
3E27000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
1830C940000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
1A112980000
|
heap
|
page read and write
|
||
DC5000
|
trusted library allocation
|
page execute and read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
273ACCF0000
|
heap
|
page read and write
|
||
4EC60BE000
|
stack
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
7FF6C12A0000
|
unkown
|
page readonly
|
||
281C000
|
stack
|
page read and write
|
||
273ACD00000
|
direct allocation
|
page execute and read and write
|
||
28FB03F6000
|
trusted library allocation
|
page read and write
|
||
28FADA35000
|
heap
|
page read and write
|
||
12AC000
|
unkown
|
page readonly
|
||
919847F000
|
stack
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
7FF62B641000
|
unkown
|
page execute read
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
23A51300000
|
heap
|
page read and write
|
||
28FC7EB0000
|
trusted library allocation
|
page read and write
|
||
1830C7E0000
|
heap
|
page read and write
|
||
142D000
|
trusted library allocation
|
page execute and read and write
|
||
2F7362D8000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page read and write
|
||
19A55330000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
20170866000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page execute and read and write
|
||
1424000
|
trusted library allocation
|
page read and write
|
||
DBA000
|
trusted library allocation
|
page execute and read and write
|
||
2FF2000
|
heap
|
page read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
4EC6B0E000
|
stack
|
page read and write
|
||
2D23000
|
trusted library allocation
|
page execute and read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
E42A679000
|
stack
|
page read and write
|
||
C2984FE000
|
stack
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
28FC7B50000
|
heap
|
page execute and read and write
|
||
42AE000
|
stack
|
page read and write
|
||
52F1000
|
trusted library allocation
|
page read and write
|
||
3D10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
2942EC91000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
64E0000
|
heap
|
page read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
2CE5000
|
trusted library allocation
|
page read and write
|
||
20159E31000
|
trusted library allocation
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
201708F7000
|
heap
|
page read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
14C53FB0000
|
heap
|
page read and write
|
||
4307000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
14BC000
|
heap
|
page read and write
|
||
273AEA00000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
201592B0000
|
trusted library allocation
|
page read and write
|
||
28FC7A9D000
|
heap
|
page read and write
|
||
29430A73000
|
trusted library allocation
|
page read and write
|
||
1BDA1E50000
|
heap
|
page readonly
|
||
51F2000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page execute and read and write
|
||
2BB5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9CB000
|
trusted library allocation
|
page read and write
|
||
64FC000
|
stack
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB64000
|
trusted library allocation
|
page read and write
|
||
B28000
|
stack
|
page read and write
|
||
23A51100000
|
trusted library allocation
|
page read and write
|
||
3076000
|
trusted library allocation
|
page read and write
|
||
7249000
|
heap
|
page read and write
|
||
29447639000
|
heap
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
4034000
|
trusted library allocation
|
page read and write
|
||
724F000
|
heap
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
EE3000
|
trusted library allocation
|
page execute and read and write
|
||
C2989B7000
|
stack
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
28FC7A4F000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page execute and read and write
|
||
52FF000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
4FB8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DB000
|
trusted library allocation
|
page execute and read and write
|
||
2015656E000
|
heap
|
page read and write
|
||
2943060B000
|
trusted library allocation
|
page read and write
|
||
7FF6C12B4000
|
unkown
|
page read and write
|
||
294474E7000
|
heap
|
page read and write
|
||
201565F2000
|
heap
|
page read and write
|
||
2943EF87000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page read and write
|
||
1072000
|
trusted library allocation
|
page read and write
|
||
58B3000
|
heap
|
page read and write
|
||
2020000
|
heap
|
page read and write
|
||
2430000
|
trusted library allocation
|
page read and write
|
||
20158280000
|
trusted library allocation
|
page read and write
|
||
7F30000
|
trusted library allocation
|
page read and write
|
||
28FADC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
7FF6D68BC000
|
unkown
|
page readonly
|
||
2942D09E000
|
heap
|
page read and write
|
||
4EC57EF000
|
stack
|
page read and write
|
||
E42ABFE000
|
stack
|
page read and write
|
||
28FB14C0000
|
trusted library allocation
|
page read and write
|
||
20156558000
|
heap
|
page read and write
|
||
23A51000000
|
unkown
|
page read and write
|
||
201A5FE0000
|
heap
|
page read and write
|
||
7FF62B655000
|
unkown
|
page readonly
|
||
19A55690000
|
heap
|
page read and write
|
||
7FFD9BD19000
|
trusted library allocation
|
page read and write
|
||
14C542E0000
|
unkown
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
20156770000
|
heap
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page execute and read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9CB000
|
trusted library allocation
|
page read and write
|
||
7FF62B654000
|
unkown
|
page write copy
|
||
4870000
|
heap
|
page execute and read and write
|
||
28FADA4F000
|
heap
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page execute and read and write
|
||
101A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BDB3000
|
trusted library allocation
|
page read and write
|
||
28FC7B1F000
|
heap
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FF6325B8000
|
unkown
|
page write copy
|
||
83D000
|
stack
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
2410000
|
unclassified section
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
8470000
|
trusted library allocation
|
page read and write
|
||
5A28000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
2943ED02000
|
trusted library allocation
|
page read and write
|
||
29430704000
|
trusted library allocation
|
page read and write
|
||
273AB302000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
23A50E90000
|
heap
|
page read and write
|
||
20BC000
|
heap
|
page read and write
|
||
273B1200000
|
heap
|
page read and write
|
||
10D7000
|
trusted library allocation
|
page execute and read and write
|
||
28FADC70000
|
trusted library allocation
|
page read and write
|
||
7DF47DB80000
|
trusted library allocation
|
page execute and read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
618D000
|
trusted library allocation
|
page read and write
|
||
71E1000
|
heap
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
1495000
|
unkown
|
page execute and read and write
|
||
C298D3B000
|
stack
|
page read and write
|
||
E0B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE52000
|
trusted library allocation
|
page read and write
|
||
58E6000
|
heap
|
page read and write
|
||
4EC5C7A000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2942D030000
|
trusted library section
|
page read and write
|
||
202A000
|
heap
|
page read and write
|
||
273AB1D0000
|
heap
|
page read and write
|
||
6430000
|
trusted library allocation
|
page execute and read and write
|
||
23A51033000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page execute and read and write
|
||
28FADC80000
|
heap
|
page execute and read and write
|
||
273ACFA5000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
28FC7E29000
|
heap
|
page read and write
|
||
E41BCFF000
|
stack
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
28FB11D5000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
20159502000
|
trusted library allocation
|
page read and write
|
||
23A50F90000
|
trusted library allocation
|
page read and write
|
||
8125000
|
heap
|
page read and write
|
||
29447848000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
5790000
|
heap
|
page execute and read and write
|
||
C2985FF000
|
stack
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
2942FBFE000
|
trusted library allocation
|
page read and write
|
||
91981DD000
|
stack
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD8A000
|
trusted library allocation
|
page read and write
|
||
13D3000
|
heap
|
page read and write
|
||
C298AB8000
|
stack
|
page read and write
|
||
28FB0830000
|
trusted library allocation
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
7FF62B640000
|
unkown
|
page readonly
|
||
6C3E000
|
stack
|
page read and write
|
||
7FFD9BB97000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
7F10000
|
heap
|
page read and write
|
||
2942D250000
|
heap
|
page readonly
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
28FC7DA9000
|
heap
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
294475D9000
|
heap
|
page read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
7FFD9BB52000
|
trusted library allocation
|
page read and write
|
||
1243000
|
trusted library allocation
|
page execute and read and write
|
||
23F0000
|
direct allocation
|
page read and write
|
||
12CD000
|
trusted library allocation
|
page execute and read and write
|
||
29447649000
|
heap
|
page read and write
|
||
F98000
|
stack
|
page read and write
|
||
4FB8000
|
trusted library allocation
|
page read and write
|
||
6CCC000
|
stack
|
page read and write
|
||
3FB7000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
28FADAED000
|
heap
|
page read and write
|
||
89AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page read and write
|
||
201682F1000
|
trusted library allocation
|
page read and write
|
||
2F7364B0000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
1017000
|
trusted library allocation
|
page execute and read and write
|
||
12E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
7F620000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
1497000
|
unkown
|
page execute and read and write
|
||
20157F42000
|
heap
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
3D20000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
3C10000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
28FADA7A000
|
heap
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
15A8000
|
heap
|
page read and write
|
||
E42A977000
|
stack
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
1830C840000
|
heap
|
page read and write
|
||
201580E0000
|
heap
|
page read and write
|
||
3079000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
20159DAE000
|
trusted library allocation
|
page read and write
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
4EC5D78000
|
stack
|
page read and write
|
||
14C54320000
|
heap
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
1140000
|
trusted library allocation
|
page execute and read and write
|
||
7FF62B654000
|
unkown
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB61000
|
trusted library allocation
|
page read and write
|
||
22D1EBB8000
|
heap
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
E42B74E000
|
stack
|
page read and write
|
||
41A0000
|
heap
|
page execute and read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
4881000
|
trusted library allocation
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
165B000
|
trusted library allocation
|
page execute and read and write
|
||
28FC7E19000
|
heap
|
page read and write
|
||
7FFD9B9D4000
|
trusted library allocation
|
page read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
2B94000
|
trusted library allocation
|
page read and write
|
||
C298A39000
|
stack
|
page read and write
|
||
42E0000
|
heap
|
page read and write
|
||
2724000
|
trusted library allocation
|
page read and write
|
||
7FF632020000
|
unkown
|
page readonly
|
||
42E6000
|
heap
|
page read and write
|
||
5652000
|
trusted library allocation
|
page read and write
|
||
2944762C000
|
heap
|
page read and write
|
||
2CDC000
|
stack
|
page read and write
|
||
2942EC8A000
|
heap
|
page read and write
|
||
3D1A000
|
trusted library allocation
|
page execute and read and write
|
||
4F1B000
|
stack
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
22D1EBB0000
|
heap
|
page read and write
|
||
2943ECB1000
|
trusted library allocation
|
page read and write
|
||
201685C3000
|
trusted library allocation
|
page read and write
|
||
1616000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
146C000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD28000
|
trusted library allocation
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
16B6000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
294474C0000
|
heap
|
page read and write
|
||
1434000
|
trusted library allocation
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
1FE9F330000
|
heap
|
page read and write
|
||
7FFD9BB92000
|
trusted library allocation
|
page read and write
|
||
65FE000
|
stack
|
page read and write
|
||
52A4000
|
trusted library allocation
|
page read and write
|
||
201566A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
AECF87E000
|
stack
|
page read and write
|
||
3C61000
|
trusted library allocation
|
page read and write
|
||
273AD600000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
22D1ED60000
|
heap
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
744D000
|
stack
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
heap
|
page read and write
|
||
12F5000
|
trusted library allocation
|
page read and write
|
||
7FF62B640000
|
unkown
|
page readonly
|
||
B13ECFF000
|
stack
|
page read and write
|
||
28FB033C000
|
trusted library allocation
|
page read and write
|
||
2041000
|
heap
|
page read and write
|
||
3085000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
7F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
28FAD9B0000
|
heap
|
page read and write
|
||
C29970E000
|
stack
|
page read and write
|
||
1254000
|
trusted library allocation
|
page read and write
|
||
7FF6C12A0000
|
unkown
|
page readonly
|
||
4EC5DBE000
|
stack
|
page read and write
|
||
7FF62B64F000
|
unkown
|
page readonly
|
||
7FFD9BC3C000
|
trusted library allocation
|
page read and write
|
||
4EC6B8C000
|
stack
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
28FBF651000
|
trusted library allocation
|
page read and write
|
||
29447140000
|
heap
|
page execute and read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
29430C48000
|
trusted library allocation
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
8C46A7C000
|
stack
|
page read and write
|
||
127B000
|
trusted library allocation
|
page execute and read and write
|
||
52C6000
|
trusted library allocation
|
page read and write
|
||
C298C3C000
|
stack
|
page read and write
|
||
7258000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
1004000
|
trusted library allocation
|
page read and write
|
||
E99000
|
stack
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
2D24000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
1904000
|
trusted library allocation
|
page read and write
|
||
28FC7E09000
|
heap
|
page read and write
|
||
56EE000
|
trusted library allocation
|
page read and write
|
||
1BDA26D0000
|
unkown
|
page read and write
|
||
7DF47E6E0000
|
trusted library allocation
|
page execute and read and write
|
||
1080000
|
heap
|
page read and write
|
||
7FF6D68BA000
|
unkown
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
28FADA76000
|
heap
|
page read and write
|
||
145B000
|
unkown
|
page execute and read and write
|
||
663E000
|
stack
|
page read and write
|
||
28FADD00000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
7F20000
|
trusted library allocation
|
page execute and read and write
|
||
201708C5000
|
heap
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
20156552000
|
heap
|
page read and write
|
||
1F9E36D5000
|
heap
|
page read and write
|
||
2A9FAA40000
|
heap
|
page read and write
|
||
2017093B000
|
heap
|
page read and write
|
||
5A5D000
|
trusted library allocation
|
page read and write
|
||
1F9E3428000
|
heap
|
page read and write
|
||
5B1A000
|
trusted library allocation
|
page read and write
|
||
564D000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
27381010000
|
heap
|
page read and write
|
||
1539000
|
stack
|
page read and write
|
||
20159D69000
|
trusted library allocation
|
page read and write
|
||
28FAF610000
|
heap
|
page read and write
|
||
28FADBC0000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2BA6000
|
trusted library allocation
|
page read and write
|
||
5741000
|
trusted library allocation
|
page read and write
|
||
7AC000
|
stack
|
page read and write
|
||
28FB102C000
|
trusted library allocation
|
page read and write
|
||
7FF6C12AF000
|
unkown
|
page readonly
|
||
215F75F0000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page execute and read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
1BDA1E60000
|
heap
|
page read and write
|
||
4F05000
|
trusted library allocation
|
page read and write
|
||
273AB2FF000
|
heap
|
page read and write
|
||
2944768C000
|
heap
|
page read and write
|
||
561F000
|
stack
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
1830CAF0000
|
heap
|
page read and write
|
||
273ACF8C000
|
heap
|
page read and write
|
||
7460000
|
trusted library allocation
|
page execute and read and write
|
||
4EC5EBC000
|
stack
|
page read and write
|
||
12C3000
|
trusted library allocation
|
page execute and read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
2942EC85000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
22D1ED65000
|
heap
|
page read and write
|
||
23A51200000
|
heap
|
page read and write
|
||
4383000
|
trusted library allocation
|
page read and write
|
||
20158206000
|
heap
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
7FFD9BCFC000
|
trusted library allocation
|
page read and write
|
||
20159CC3000
|
trusted library allocation
|
page read and write
|
||
C29867E000
|
stack
|
page read and write
|
||
294476BB000
|
heap
|
page read and write
|
||
273AE000000
|
heap
|
page read and write
|
||
28FC7E21000
|
heap
|
page read and write
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D4000
|
trusted library allocation
|
page read and write
|
||
51E6000
|
trusted library allocation
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
7FF6D68C8000
|
unkown
|
page readonly
|
||
104E000
|
stack
|
page read and write
|
||
3FB7000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
4EC5AFE000
|
stack
|
page read and write
|
||
52E4000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
2E0E000
|
unkown
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
8300000
|
trusted library allocation
|
page read and write
|
||
23A50EB0000
|
heap
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB97000
|
trusted library allocation
|
page read and write
|
||
7327000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
2061000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
1BFB000
|
stack
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
600E000
|
stack
|
page read and write
|
||
7FFD9BE30000
|
trusted library allocation
|
page read and write
|
||
2CFD000
|
stack
|
page read and write
|
||
E42A39E000
|
stack
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
E42A3DE000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
20170947000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
4160000
|
unclassified section
|
page read and write
|
||
7FFD9BB22000
|
trusted library allocation
|
page read and write
|
||
28991740000
|
heap
|
page read and write
|
||
27380060000
|
direct allocation
|
page execute and read and write
|
||
2017080E000
|
heap
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
207C000
|
heap
|
page read and write
|
||
7FFD9BE30000
|
trusted library allocation
|
page read and write
|
||
642E000
|
stack
|
page read and write
|
||
5978000
|
heap
|
page read and write
|
||
4EC5A7F000
|
stack
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
29447810000
|
heap
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
29447130000
|
heap
|
page read and write
|
||
7FFD9BB67000
|
trusted library allocation
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
2942CFA0000
|
heap
|
page read and write
|
||
55AD17F000
|
stack
|
page read and write
|
||
566C000
|
trusted library allocation
|
page read and write
|
||
8167000
|
heap
|
page read and write
|
||
28FC7DBD000
|
heap
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
28FADC30000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page execute and read and write
|
||
987000
|
stack
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
2956000
|
trusted library allocation
|
page read and write
|
||
2E94000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
201708E7000
|
heap
|
page read and write
|
||
1FE9F410000
|
heap
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page execute and read and write
|
||
40B1000
|
trusted library allocation
|
page read and write
|
||
7FF62B654000
|
unkown
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
2990000
|
heap
|
page execute and read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1459000
|
unkown
|
page execute and read and write
|
||
514B000
|
stack
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD14000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE6000
|
trusted library allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
2942D240000
|
trusted library allocation
|
page read and write
|
||
2748000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
20170646000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
6180000
|
heap
|
page read and write
|
||
2015907E000
|
trusted library allocation
|
page read and write
|
||
28FB07BC000
|
trusted library allocation
|
page read and write
|
||
7FF6D68A1000
|
unkown
|
page execute read
|
||
1A112960000
|
heap
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
23A51010000
|
unkown
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
2944755D000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2FC2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD2C000
|
trusted library allocation
|
page read and write
|
||
28FC7D91000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
72A6000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
5624000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page execute and read and write
|
||
ABABFF000
|
stack
|
page read and write
|
||
6F6B000
|
stack
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
28FAF4D0000
|
heap
|
page read and write
|
||
28991720000
|
heap
|
page read and write
|
||
14AD000
|
unkown
|
page execute and read and write
|
||
273ACFA5000
|
heap
|
page read and write
|
||
201707D7000
|
heap
|
page execute and read and write
|
||
DAD000
|
trusted library allocation
|
page execute and read and write
|
||
70E1000
|
heap
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
2942D260000
|
trusted library allocation
|
page read and write
|
||
8C4717E000
|
stack
|
page read and write
|
||
28FC7C9E000
|
heap
|
page read and write
|
||
124D000
|
trusted library allocation
|
page execute and read and write
|
||
FBF000
|
stack
|
page read and write
|
||
58B9000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
E42A87D000
|
stack
|
page read and write
|
||
5902000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
7FF6D68C3000
|
unkown
|
page read and write
|
||
28FC7AE5000
|
heap
|
page read and write
|
||
20156602000
|
heap
|
page read and write
|
||
562B000
|
trusted library allocation
|
page read and write
|
||
2942D0C5000
|
heap
|
page read and write
|
||
30D7000
|
trusted library allocation
|
page execute and read and write
|
||
10D2000
|
trusted library allocation
|
page read and write
|
||
28FC7BB0000
|
heap
|
page read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
28FC7DB1000
|
heap
|
page read and write
|
||
20159056000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
20170957000
|
heap
|
page read and write
|
||
3FC1000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
7265000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
C29893E000
|
stack
|
page read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
28FC7BC3000
|
heap
|
page read and write
|
||
20159E6C000
|
trusted library allocation
|
page read and write
|
||
20170830000
|
heap
|
page read and write
|
||
2A9FADC0000
|
heap
|
page read and write
|
||
70C0000
|
heap
|
page execute and read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
42F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
133B000
|
heap
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
128E000
|
stack
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
12F9000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
28FC81C0000
|
heap
|
page read and write
|
||
28DC000
|
trusted library allocation
|
page read and write
|
||
20170888000
|
heap
|
page read and write
|
||
486D000
|
stack
|
page read and write
|
||
201582C1000
|
trusted library allocation
|
page read and write
|
||
2015825B000
|
heap
|
page read and write
|
||
71D0000
|
heap
|
page read and write
|
||
1050000
|
trusted library allocation
|
page execute and read and write
|
||
273B4400000
|
heap
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
5904000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
174D000
|
stack
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
632E000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
7FFD9BB92000
|
trusted library allocation
|
page read and write
|
||
13AB000
|
heap
|
page read and write
|
||
52AB000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
8000000
|
heap
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
14C53FC0000
|
heap
|
page read and write
|
||
2015A15B000
|
trusted library allocation
|
page read and write
|
||
2E2C000
|
trusted library allocation
|
page read and write
|
||
5250000
|
trusted library allocation
|
page execute and read and write
|
||
E49F9ED000
|
stack
|
page read and write
|
||
A2000
|
unkown
|
page execute read
|
||
20159080000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
E42A8F9000
|
stack
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
1A112880000
|
heap
|
page read and write
|
||
29447069000
|
heap
|
page read and write
|
||
294471C0000
|
heap
|
page execute and read and write
|
||
7FF62B64F000
|
unkown
|
page readonly
|
||
28FC7AF6000
|
heap
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
28FC7C90000
|
heap
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
20159228000
|
trusted library allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
201E000
|
stack
|
page read and write
|
||
12B2000
|
unkown
|
page readonly
|
||
52C1000
|
trusted library allocation
|
page read and write
|
||
31D8000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
5919000
|
trusted library allocation
|
page read and write
|
||
3E25000
|
trusted library allocation
|
page read and write
|
||
2089000
|
heap
|
page read and write
|
||
273ACF45000
|
heap
|
page read and write
|
||
23A51013000
|
unkown
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF63203C000
|
unkown
|
page write copy
|
||
2F7E000
|
stack
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
48E2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1F9E33D0000
|
heap
|
page read and write
|
||
8C46D7E000
|
stack
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
27CA47B0000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD24000
|
trusted library allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
28FC7E25000
|
heap
|
page read and write
|
||
30E7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF62B655000
|
unkown
|
page readonly
|
||
1590000
|
heap
|
page read and write
|
||
182C000
|
unkown
|
page execute read
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
7FF62B641000
|
unkown
|
page execute read
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
244A000
|
trusted library allocation
|
page execute and read and write
|
||
56C0000
|
heap
|
page execute and read and write
|
||
838000
|
stack
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
2943074B000
|
trusted library allocation
|
page read and write
|
||
22D1EB40000
|
heap
|
page read and write
|
||
7FFD9BD47000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
28FC7A30000
|
heap
|
page execute and read and write
|
||
4180000
|
heap
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
18DF000
|
stack
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
2942FE36000
|
trusted library allocation
|
page read and write
|
||
28FC7FB0000
|
heap
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
28FB0340000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
28FC7BD6000
|
heap
|
page read and write
|
||
273B2600000
|
heap
|
page read and write
|
||
20156620000
|
heap
|
page read and write
|
||
7FF62B640000
|
unkown
|
page readonly
|
||
39F5000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
4EC5CFD000
|
stack
|
page read and write
|
||
215F5C50000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page execute and read and write
|
||
28FADA3D000
|
heap
|
page read and write
|
||
1027000
|
trusted library allocation
|
page execute and read and write
|
||
28991870000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
273B0800000
|
heap
|
page read and write
|
||
7FF6C12A1000
|
unkown
|
page execute read
|
||
3D2A000
|
trusted library allocation
|
page execute and read and write
|
||
2943ECA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
58F0000
|
heap
|
page read and write
|
||
148D000
|
unkown
|
page execute and read and write
|
||
7FF62B655000
|
unkown
|
page readonly
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
A3000
|
unkown
|
page execute and read and write
|
||
11D5000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
294470A9000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
2015A0F8000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
trusted library allocation
|
page read and write
|
||
61F6000
|
heap
|
page read and write
|
||
1053000
|
trusted library allocation
|
page execute and read and write
|
||
678E000
|
stack
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
201563E0000
|
heap
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
273B1C00000
|
heap
|
page read and write
|
||
3064000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
20156795000
|
heap
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
4C3A77D000
|
stack
|
page read and write
|
||
24F109BC000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
B13EC7D000
|
stack
|
page read and write
|
||
2F00000
|
heap
|
page readonly
|
||
B20000
|
heap
|
page read and write
|
||
7FF6325B5000
|
unkown
|
page write copy
|
||
28FC7E53000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
1461000
|
unkown
|
page execute and read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
E42A293000
|
stack
|
page read and write
|
||
163D000
|
trusted library allocation
|
page execute and read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
28FC7B90000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
2942EEB9000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
trusted library allocation
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
555F000
|
trusted library allocation
|
page read and write
|
||
2942F9AD000
|
trusted library allocation
|
page read and write
|
||
12AB000
|
unkown
|
page execute read
|
||
292D000
|
trusted library allocation
|
page read and write
|
||
8149000
|
heap
|
page read and write
|
||
102B000
|
trusted library allocation
|
page execute and read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
1266000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page execute and read and write
|
||
1A1129A5000
|
heap
|
page read and write
|
||
30DA000
|
trusted library allocation
|
page execute and read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
3D16000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
71FC000
|
heap
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
EED000
|
trusted library allocation
|
page execute and read and write
|
||
201580B0000
|
heap
|
page execute and read and write
|
||
1680000
|
heap
|
page read and write
|
||
1F60000
|
heap
|
page read and write
|
||
6E3F000
|
stack
|
page read and write
|
||
215F5C40000
|
heap
|
page read and write
|
||
4C3A7FF000
|
stack
|
page read and write
|
||
27380050000
|
direct allocation
|
page execute and read and write
|
||
10CE000
|
stack
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
1EF9000
|
stack
|
page read and write
|
||
12B4000
|
unkown
|
page execute and read and write
|
||
13D0000
|
heap
|
page read and write
|
||
24F123E0000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
19A55695000
|
heap
|
page read and write
|
||
8C4677F000
|
stack
|
page read and write
|
||
58F5000
|
heap
|
page read and write
|
||
5900000
|
trusted library allocation
|
page execute and read and write
|
||
3D37000
|
trusted library allocation
|
page execute and read and write
|
||
1493000
|
unkown
|
page execute and read and write
|
||
201566D0000
|
trusted library allocation
|
page read and write
|
||
1667000
|
trusted library allocation
|
page execute and read and write
|
||
2D10000
|
heap
|
page read and write
|
||
1499000
|
unkown
|
page execute and read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
54E7000
|
trusted library allocation
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
273B3A00000
|
heap
|
page read and write
|
||
7FF6325B5000
|
unkown
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
52C0000
|
heap
|
page execute and read and write
|
||
610E000
|
stack
|
page read and write
|
||
2943EF89000
|
trusted library allocation
|
page read and write
|
||
273AB28B000
|
heap
|
page read and write
|
||
201A5FF0000
|
heap
|
page read and write
|
||
201685A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD9C000
|
trusted library allocation
|
page read and write
|
||
3D22000
|
trusted library allocation
|
page execute and read and write
|
||
475E000
|
stack
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
40B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE10000
|
trusted library allocation
|
page read and write
|
||
6CFA000
|
stack
|
page read and write
|
||
2D39000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
trusted library allocation
|
page read and write
|
||
28FADCC0000
|
trusted library allocation
|
page read and write
|
||
6F2D000
|
stack
|
page read and write
|
||
23A51300000
|
heap
|
page read and write
|
||
2016832C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB6A000
|
trusted library allocation
|
page read and write
|
||
3FB5000
|
trusted library allocation
|
page read and write
|
||
28FB10D2000
|
trusted library allocation
|
page read and write
|
||
8C4697D000
|
stack
|
page read and write
|
||
DC2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
804E000
|
stack
|
page read and write
|
||
20170943000
|
heap
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
28FBF91C000
|
trusted library allocation
|
page read and write
|
||
1BDA1D70000
|
heap
|
page read and write
|
||
2942FC86000
|
trusted library allocation
|
page read and write
|
||
430D000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
28FADA39000
|
heap
|
page read and write
|
||
1BDA1EB0000
|
heap
|
page read and write
|
||
8311000
|
trusted library allocation
|
page read and write
|
||
201564E0000
|
heap
|
page read and write
|
||
120B000
|
heap
|
page read and write
|
||
2450000
|
trusted library allocation
|
page read and write
|
||
273ACF76000
|
heap
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
2A9FAA48000
|
heap
|
page read and write
|
||
18F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
23A51302000
|
heap
|
page read and write
|
||
27CA4800000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
B330000
|
heap
|
page execute and read and write
|
||
C298473000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page execute and read and write
|
||
1463000
|
unkown
|
page execute and read and write
|
||
3000000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page execute and read and write
|
||
23A51215000
|
heap
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
4EC5BFE000
|
stack
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
273AB278000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
28FC7E7B000
|
heap
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
7FF6C12B5000
|
unkown
|
page readonly
|
||
2017092B000
|
heap
|
page read and write
|
||
7FF6C12AF000
|
unkown
|
page readonly
|
||
7FFD9BE30000
|
trusted library allocation
|
page read and write
|
||
3FC7000
|
trusted library allocation
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
817F000
|
heap
|
page read and write
|
||
7F220000
|
trusted library allocation
|
page execute and read and write
|
||
28FB0586000
|
trusted library allocation
|
page read and write
|
||
5A2C000
|
trusted library allocation
|
page read and write
|
||
14D8000
|
unkown
|
page execute and read and write
|
||
EA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE6000
|
trusted library allocation
|
page read and write
|
||
8C4707E000
|
stack
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
27CA2DF8000
|
heap
|
page read and write
|
||
294470BC000
|
heap
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
2943EF7F000
|
trusted library allocation
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
58AD000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
7268000
|
heap
|
page read and write
|
||
1054000
|
trusted library allocation
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
7FFD9BCE4000
|
trusted library allocation
|
page read and write
|
||
72543AC000
|
stack
|
page read and write
|
||
2942D2C0000
|
heap
|
page execute and read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
202E000
|
heap
|
page read and write
|
||
201A6040000
|
heap
|
page read and write
|
||
20156710000
|
trusted library allocation
|
page read and write
|
||
8C46C7F000
|
stack
|
page read and write
|
||
273AFE00000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
1BDA20F0000
|
unkown
|
page read and write
|
||
7FF62B64F000
|
unkown
|
page readonly
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
28FB08FA000
|
trusted library allocation
|
page read and write
|
||
28FB1461000
|
trusted library allocation
|
page read and write
|
||
1657000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
24F109B0000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
4BD1000
|
trusted library allocation
|
page read and write
|
||
23A5102B000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
6160000
|
trusted library allocation
|
page read and write
|
||
51DB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
1063000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
29447190000
|
trusted library allocation
|
page read and write
|
||
2FBF000
|
trusted library allocation
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
20170818000
|
heap
|
page read and write
|
||
201682C1000
|
trusted library allocation
|
page read and write
|
||
73B633C000
|
stack
|
page read and write
|
||
80D0000
|
heap
|
page read and write
|
||
294306A5000
|
trusted library allocation
|
page read and write
|
||
EF8000
|
stack
|
page read and write
|
||
201708E5000
|
heap
|
page read and write
|
||
201707E0000
|
heap
|
page read and write
|
||
3891000
|
trusted library allocation
|
page read and write
|
||
7DF47DB90000
|
trusted library allocation
|
page execute and read and write
|
||
52FA000
|
trusted library allocation
|
page read and write
|
||
273ACE02000
|
heap
|
page read and write
|
||
1830CAF5000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page read and write
|
||
C29978A000
|
stack
|
page read and write
|
||
7FFD9BCF3000
|
trusted library allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
C298CBE000
|
stack
|
page read and write
|
||
C298BBF000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page execute and read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
A189DFF000
|
stack
|
page read and write
|
||
29430813000
|
trusted library allocation
|
page read and write
|
||
7FF6325AC000
|
unkown
|
page readonly
|
||
20159461000
|
trusted library allocation
|
page read and write
|
||
7FF62B640000
|
unkown
|
page readonly
|
||
2943084E000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
2942FC7E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
204C000
|
heap
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
2942D138000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD6000
|
trusted library allocation
|
page execute and read and write
|
||
2A9FAA20000
|
heap
|
page read and write
|
||
28FC7DF7000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
55AD0FF000
|
stack
|
page read and write
|
||
273ACF43000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
2FBD000
|
stack
|
page read and write
|
||
7FF6325AC000
|
unkown
|
page readonly
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
3FB1000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
3D2C000
|
trusted library allocation
|
page execute and read and write
|
||
273ACF6B000
|
heap
|
page read and write
|
||
201685AA000
|
trusted library allocation
|
page read and write
|
||
7FF62B64F000
|
unkown
|
page readonly
|
||
ABA9ED000
|
stack
|
page read and write
|
||
D93000
|
trusted library allocation
|
page execute and read and write
|
||
3D60000
|
heap
|
page read and write
|
||
28FC7DA1000
|
heap
|
page read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
10DB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF62B640000
|
unkown
|
page readonly
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
28FADD20000
|
heap
|
page read and write
|
||
273AB200000
|
heap
|
page read and write
|
||
64BF000
|
stack
|
page read and write
|
||
AA2000
|
unkown
|
page execute read
|
||
148F000
|
unkown
|
page execute and read and write
|
||
8B0000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
2452000
|
trusted library allocation
|
page execute and read and write
|
||
7E0000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
20159D22000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
145F000
|
unkown
|
page execute and read and write
|
||
2942D088000
|
heap
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page execute and read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
2943EF14000
|
trusted library allocation
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
20170620000
|
heap
|
page read and write
|
||
7FF62B654000
|
unkown
|
page write copy
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
E07000
|
trusted library allocation
|
page execute and read and write
|
||
22D1EA40000
|
heap
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
4314000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD2A000
|
trusted library allocation
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
59E0000
|
heap
|
page execute and read and write
|
||
28FC7E2D000
|
heap
|
page read and write
|
||
E42AB7E000
|
stack
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
23A51213000
|
heap
|
page read and write
|
||
28991620000
|
heap
|
page read and write
|
||
5686000
|
heap
|
page read and write
|
||
28FADC60000
|
heap
|
page readonly
|
||
14B3000
|
unkown
|
page execute and read and write
|
||
1FBE000
|
stack
|
page read and write
|
||
20156596000
|
heap
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
201707D0000
|
heap
|
page execute and read and write
|
||
3D3B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF62B641000
|
unkown
|
page execute read
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
5201000
|
trusted library allocation
|
page read and write
|
||
4EC5F3A000
|
stack
|
page read and write
|
||
2E9F000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
15C1000
|
heap
|
page read and write
|
||
1423000
|
trusted library allocation
|
page execute and read and write
|
||
48B4000
|
trusted library allocation
|
page read and write
|
||
7FF632020000
|
unkown
|
page readonly
|
||
4FC0000
|
heap
|
page execute and read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
23EF000
|
stack
|
page read and write
|
||
4B8D000
|
stack
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
B82000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
28FADA2E000
|
heap
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
28FAF621000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
unkown
|
page readonly
|
||
28991875000
|
heap
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
273AB26A000
|
heap
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page execute and read and write
|
||
DFA000
|
trusted library allocation
|
page execute and read and write
|
||
4EC613B000
|
stack
|
page read and write
|
||
22EF000
|
stack
|
page read and write
|
||
1481000
|
unkown
|
page execute and read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
294474D0000
|
heap
|
page read and write
|
||
2942D365000
|
heap
|
page read and write
|
||
8329000
|
trusted library allocation
|
page read and write
|
||
201581A3000
|
heap
|
page read and write
|
||
2926000
|
trusted library allocation
|
page read and write
|
||
20DA000
|
heap
|
page read and write
|
||
1830C800000
|
heap
|
page read and write
|
||
2944764D000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
8320000
|
trusted library allocation
|
page read and write
|
||
20156510000
|
heap
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
2943EF99000
|
trusted library allocation
|
page read and write
|
||
EA4000
|
trusted library allocation
|
page read and write
|
||
2015654D000
|
heap
|
page read and write
|
||
2017090F000
|
heap
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
2D78000
|
heap
|
page read and write
|
||
B62000
|
unkown
|
page readonly
|
||
1F9E3420000
|
heap
|
page read and write
|
||
10F8000
|
stack
|
page read and write
|
||
2E10000
|
heap
|
page execute and read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
7FF62B640000
|
unkown
|
page readonly
|
||
E50000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page execute and read and write
|
||
2F7361D0000
|
heap
|
page read and write
|
||
28FADA2C000
|
heap
|
page read and write
|
||
2D6C000
|
heap
|
page read and write
|
||
28FC7D13000
|
heap
|
page read and write
|
||
294471C6000
|
heap
|
page execute and read and write
|
||
8C46E7F000
|
stack
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
28FC7E15000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
E41B9AD000
|
stack
|
page read and write
|
||
6FEF000
|
stack
|
page read and write
|
||
23A51302000
|
heap
|
page read and write
|
||
2942D07E000
|
heap
|
page read and write
|
||
3D30000
|
trusted library allocation
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
7FF62B654000
|
unkown
|
page write copy
|
||
603E000
|
stack
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
3054000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
28FBF92C000
|
trusted library allocation
|
page read and write
|
||
1BDA20E0000
|
heap
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
1F9E33B0000
|
heap
|
page read and write
|
||
28FC820E000
|
heap
|
page read and write
|
||
1453000
|
unkown
|
page execute and read and write
|
||
7FF6325B9000
|
unkown
|
page readonly
|
||
2A9FADC5000
|
heap
|
page read and write
|
||
273ACF00000
|
heap
|
page read and write
|
||
55AD07C000
|
stack
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
166B000
|
trusted library allocation
|
page execute and read and write
|
||
12BE000
|
stack
|
page read and write
|
||
1BDA2690000
|
unkown
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
7FF6325A9000
|
unkown
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
28FADA37000
|
heap
|
page read and write
|
||
706F000
|
stack
|
page read and write
|
||
5A17000
|
trusted library allocation
|
page read and write
|
||
E42AC7C000
|
stack
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
28FC7D9C000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
28FADA02000
|
heap
|
page read and write
|
||
E42AA7E000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page execute and read and write
|
||
EE4000
|
trusted library allocation
|
page read and write
|
||
1642000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
2017062B000
|
heap
|
page read and write
|
||
294475DB000
|
heap
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
28FB019F000
|
trusted library allocation
|
page read and write
|
||
2A9FA9F0000
|
heap
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
5666000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
143C000
|
stack
|
page read and write
|
||
7DF47E6D0000
|
trusted library allocation
|
page execute and read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
2942D210000
|
trusted library section
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
5350000
|
heap
|
page execute and read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
2942F8B9000
|
trusted library allocation
|
page read and write
|
||
7FF62B654000
|
unkown
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
2943EF7B000
|
trusted library allocation
|
page read and write
|
||
4EC5FBE000
|
stack
|
page read and write
|
||
2943ECC1000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
28FBF621000
|
trusted library allocation
|
page read and write
|
||
514D000
|
stack
|
page read and write
|
||
7FFD9BDBC000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
245A000
|
trusted library allocation
|
page execute and read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
28FC7D70000
|
heap
|
page read and write
|
||
7205000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
1449000
|
heap
|
page read and write
|
||
2942D220000
|
trusted library allocation
|
page read and write
|
||
2943EFA9000
|
trusted library allocation
|
page read and write
|
||
28FAD9C0000
|
heap
|
page read and write
|
||
2015833F000
|
trusted library allocation
|
page read and write
|
||
1903000
|
trusted library allocation
|
page execute and read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
5910000
|
heap
|
page read and write
|
||
6260000
|
trusted library allocation
|
page execute and read and write
|
||
725F000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
201A6010000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
29447040000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1F9E32D0000
|
heap
|
page read and write
|
||
4279000
|
trusted library allocation
|
page read and write
|
||
1633000
|
trusted library allocation
|
page read and write
|
||
273ACFA5000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
4EE4000
|
trusted library allocation
|
page read and write
|
||
28FC7D80000
|
heap
|
page read and write
|
||
AECF67D000
|
stack
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
2FE2000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
A2000
|
unkown
|
page execute read
|
||
2942D280000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page execute and read and write
|
||
160C000
|
heap
|
page read and write
|
||
20170923000
|
heap
|
page read and write
|
||
28FC7D75000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
201581A1000
|
heap
|
page read and write
|
||
F1C000
|
stack
|
page read and write
|
||
28FADBF0000
|
heap
|
page read and write
|
||
190D000
|
trusted library allocation
|
page execute and read and write
|
||
119E000
|
heap
|
page read and write
|
||
4271000
|
trusted library allocation
|
page read and write
|
||
4596000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
E42B6CC000
|
stack
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
1830C849000
|
heap
|
page read and write
|
||
7FF62B655000
|
unkown
|
page readonly
|
||
7FFD9BE22000
|
trusted library allocation
|
page read and write
|
||
8112000
|
heap
|
page read and write
|
||
FD3507D000
|
stack
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
AECFB7B000
|
stack
|
page read and write
|
||
AA3000
|
unkown
|
page execute and read and write
|
||
2942EB15000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
4275000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
7DF493CB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
3C65000
|
trusted library allocation
|
page read and write
|
||
501E000
|
trusted library allocation
|
page read and write
|
||
107A000
|
trusted library allocation
|
page execute and read and write
|
||
8C46F7E000
|
stack
|
page read and write
|
||
14C54910000
|
unkown
|
page read and write
|
||
5790000
|
heap
|
page execute and read and write
|
||
566F000
|
trusted library allocation
|
page read and write
|
||
1077000
|
trusted library allocation
|
page execute and read and write
|
||
7237000
|
heap
|
page read and write
|
||
106D000
|
trusted library allocation
|
page execute and read and write
|
||
20159E22000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page execute and read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
28FAF6A7000
|
trusted library allocation
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
3074000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
667E000
|
stack
|
page read and write
|
||
23A51202000
|
heap
|
page read and write
|
||
1646000
|
trusted library allocation
|
page execute and read and write
|
||
2FBC000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
28991700000
|
heap
|
page read and write
|
||
DD3000
|
trusted library allocation
|
page execute and read and write
|
||
2942EC80000
|
heap
|
page read and write
|
||
4EC6C0D000
|
stack
|
page read and write
|
||
2B84000
|
trusted library allocation
|
page read and write
|
||
201580E5000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
28FAF849000
|
trusted library allocation
|
page read and write
|
||
8080000
|
trusted library allocation
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
273AB2EF000
|
heap
|
page read and write
|
||
14C54370000
|
unkown
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
20158FDA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
42D0000
|
trusted library allocation
|
page read and write
|
||
7DF47E6C0000
|
trusted library allocation
|
page execute and read and write
|
||
1310000
|
heap
|
page read and write
|
||
7FFD9BCF3000
|
trusted library allocation
|
page read and write
|
||
C2988F9000
|
stack
|
page read and write
|
||
7FF6325B9000
|
unkown
|
page readonly
|
||
7F238000
|
trusted library allocation
|
page execute and read and write
|
||
2017093F000
|
heap
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
20170953000
|
heap
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
CF9000
|
stack
|
page read and write
|
||
7FB0000
|
heap
|
page read and write
|
||
298D000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
DC7000
|
trusted library allocation
|
page execute and read and write
|
||
144F000
|
unkown
|
page execute and read and write
|
||
7FFD9BE1D000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
273ACCB0000
|
heap
|
page read and write
|
||
273ACC80000
|
heap
|
page read and write
|
||
1253000
|
trusted library allocation
|
page read and write
|
||
1343000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
68CF000
|
stack
|
page read and write
|
||
23A51313000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
201A6020000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
heap
|
page read and write
|
||
20158256000
|
heap
|
page read and write
|
||
201582A0000
|
heap
|
page read and write
|
||
5305000
|
trusted library allocation
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
820010C000
|
stack
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
145D000
|
unkown
|
page execute and read and write
|
||
65FC000
|
stack
|
page read and write
|
||
125D000
|
trusted library allocation
|
page execute and read and write
|
||
3D17000
|
trusted library allocation
|
page execute and read and write
|
||
7FF62B641000
|
unkown
|
page execute read
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BDED000
|
trusted library allocation
|
page read and write
|
||
2F6C000
|
stack
|
page read and write
|
||
20156680000
|
trusted library allocation
|
page read and write
|
||
2E55000
|
trusted library allocation
|
page execute and read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
29447089000
|
heap
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
7F21000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page execute and read and write
|
||
C29980E000
|
stack
|
page read and write
|
||
20E7000
|
heap
|
page read and write
|
||
536D000
|
stack
|
page read and write
|
||
28FC7A37000
|
heap
|
page execute and read and write
|
||
19A55458000
|
heap
|
page read and write
|
||
273AF400000
|
heap
|
page read and write
|
||
91984FF000
|
stack
|
page read and write
|
||
2017097D000
|
heap
|
page read and write
|
||
58DF000
|
stack
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
A189EFF000
|
stack
|
page read and write
|
||
4EF9000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
28FB119A000
|
trusted library allocation
|
page read and write
|
||
2F7362D0000
|
heap
|
page read and write
|
||
7FFD9BA3E000
|
trusted library allocation
|
page execute and read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
C298B3E000
|
stack
|
page read and write
|
||
7FF6C12B5000
|
unkown
|
page readonly
|
||
8C46B7F000
|
stack
|
page read and write
|
||
4356000
|
trusted library allocation
|
page read and write
|
||
201685B2000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
C32000
|
heap
|
page read and write
|
||
E42A6FE000
|
stack
|
page read and write
|
||
7FF6C12A1000
|
unkown
|
page execute read
|
||
1FE9F49C000
|
heap
|
page read and write
|
||
273ACCE0000
|
heap
|
page readonly
|
||
2C8B000
|
trusted library allocation
|
page read and write
|
||
20156690000
|
heap
|
page readonly
|
||
E70000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2D2D000
|
trusted library allocation
|
page execute and read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD19000
|
trusted library allocation
|
page read and write
|
||
28FADD05000
|
heap
|
page read and write
|
||
C2986F9000
|
stack
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
E42A7FA000
|
stack
|
page read and write
|
||
201564C0000
|
heap
|
page read and write
|
||
5593000
|
heap
|
page read and write
|
||
149B000
|
unkown
|
page execute and read and write
|
||
1F70000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
3C69000
|
trusted library allocation
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
73CF000
|
stack
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
294475AC000
|
heap
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
A189CFC000
|
stack
|
page read and write
|
||
3286000
|
trusted library allocation
|
page read and write
|
||
7FF62B641000
|
unkown
|
page execute read
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
DE4000
|
trusted library allocation
|
page read and write
|
||
738E000
|
stack
|
page read and write
|
||
1474000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page execute and read and write
|
||
201584E9000
|
trusted library allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB61000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
29430ADB000
|
trusted library allocation
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
5646000
|
trusted library allocation
|
page read and write
|
||
2942CFD0000
|
heap
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DB000
|
trusted library allocation
|
page execute and read and write
|
||
294475FF000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
24F10960000
|
heap
|
page read and write
|
||
2942D2D0000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
unclassified section
|
page read and write
|
||
7FFD9BE55000
|
trusted library allocation
|
page read and write
|
||
3E21000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
5A00000
|
trusted library allocation
|
page execute and read and write
|
||
27CA2F00000
|
heap
|
page read and write
|
||
7FF63203B000
|
unkown
|
page read and write
|
||
51E1000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FF62B655000
|
unkown
|
page readonly
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
29DD000
|
stack
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
2942D010000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
12D0000
|
heap
|
page read and write
|
||
2F7360F0000
|
heap
|
page read and write
|
||
721E000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD22000
|
trusted library allocation
|
page read and write
|
||
22D1EB20000
|
heap
|
page read and write
|
||
54A2000
|
trusted library allocation
|
page read and write
|
||
3009000
|
heap
|
page read and write
|
||
2C69000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC3000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page execute and read and write
|
||
215F5C58000
|
heap
|
page read and write
|
||
4EC5763000
|
stack
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
30EB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
AB8ABEE000
|
stack
|
page read and write
|
||
20170BE0000
|
heap
|
page read and write
|
||
C2987FA000
|
stack
|
page read and write
|
||
52CD000
|
trusted library allocation
|
page read and write
|
||
7FF6325B8000
|
unkown
|
page write copy
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
4EC603F000
|
stack
|
page read and write
|
||
24F10970000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
20170820000
|
heap
|
page read and write
|
||
59F0000
|
heap
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
28FB0904000
|
trusted library allocation
|
page read and write
|
||
2C67000
|
trusted library allocation
|
page read and write
|
||
28FC7E61000
|
heap
|
page read and write
|
||
2EA5000
|
trusted library allocation
|
page read and write
|
||
B12000
|
heap
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
7FF62B64F000
|
unkown
|
page readonly
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
201A6015000
|
heap
|
page read and write
|
||
7FF63203B000
|
unkown
|
page write copy
|
||
1A1129D8000
|
heap
|
page read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
27CA2DF0000
|
heap
|
page read and write
|
||
201685AC000
|
trusted library allocation
|
page read and write
|
||
273AB25E000
|
heap
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
7FFD9BCE9000
|
trusted library allocation
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
6208000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
28FB0902000
|
trusted library allocation
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
trusted library allocation
|
page read and write
|
||
732A000
|
trusted library allocation
|
page read and write
|
||
28FA000
|
trusted library allocation
|
page read and write
|
||
E42A31F000
|
stack
|
page read and write
|
||
16C0000
|
heap
|
page execute and read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
1244000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
273AB213000
|
heap
|
page read and write
|
||
2942D360000
|
heap
|
page read and write
|
||
28FBF641000
|
trusted library allocation
|
page read and write
|
||
201595A4000
|
trusted library allocation
|
page read and write
|
||
29447641000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
D9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
7FF632021000
|
unkown
|
page execute read
|
||
1790000
|
trusted library allocation
|
page read and write
|
||
4351000
|
trusted library allocation
|
page read and write
|
||
2942D086000
|
heap
|
page read and write
|
||
5641000
|
trusted library allocation
|
page read and write
|
||
14C54330000
|
unkown
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
6110000
|
heap
|
page read and write
|
||
201A6048000
|
heap
|
page read and write
|
||
28FBF695000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7FF632021000
|
unkown
|
page execute read
|
||
920000
|
heap
|
page read and write
|
||
5513000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
28FBF90E000
|
trusted library allocation
|
page read and write
|
||
215F5E20000
|
heap
|
page read and write
|
||
1652000
|
trusted library allocation
|
page read and write
|
||
273AB2AE000
|
heap
|
page read and write
|
||
27380050000
|
trusted library allocation
|
page read and write
|
||
77F1000
|
trusted library allocation
|
page read and write
|
||
524D000
|
stack
|
page read and write
|
||
272A000
|
trusted library allocation
|
page read and write
|
||
50B8000
|
trusted library allocation
|
page read and write
|
||
28FC7BBB000
|
heap
|
page read and write
|
||
2FD5000
|
heap
|
page execute and read and write
|
||
1657000
|
trusted library allocation
|
page execute and read and write
|
||
1262000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
7FF6D68C5000
|
unkown
|
page read and write
|
||
273AB2AB000
|
heap
|
page read and write
|
||
273ACF84000
|
heap
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
3FBD000
|
trusted library allocation
|
page read and write
|
||
1EF6000
|
stack
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6D68A0000
|
unkown
|
page readonly
|
||
6C8E000
|
stack
|
page read and write
|
||
1277000
|
trusted library allocation
|
page execute and read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
726C000
|
heap
|
page read and write
|
||
28FC7AC4000
|
heap
|
page read and write
|
||
2943EC91000
|
trusted library allocation
|
page read and write
|
||
126A000
|
trusted library allocation
|
page execute and read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
23A51115000
|
trusted library allocation
|
page read and write
|
||
28991748000
|
heap
|
page read and write
|
||
294471F0000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
201709A1000
|
heap
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
14C54010000
|
heap
|
page read and write
|
||
2442000
|
trusted library allocation
|
page execute and read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
215F7690000
|
heap
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
7FF62B64F000
|
unkown
|
page readonly
|
||
273AD402000
|
heap
|
page read and write
|
||
28FADC90000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
64B1000
|
trusted library allocation
|
page read and write
|
||
D48000
|
stack
|
page read and write
|
||
8178000
|
heap
|
page read and write
|
||
B27000
|
heap
|
page read and write
|
||
20156790000
|
heap
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
6100000
|
trusted library allocation
|
page read and write
|
||
273ACC90000
|
direct allocation
|
page execute read
|
||
39F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
E49FC7F000
|
stack
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
29430800000
|
trusted library allocation
|
page read and write
|
||
6DCC000
|
stack
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
2D48000
|
heap
|
page read and write
|
||
7FFD9B99B000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE17000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
2F7364B5000
|
heap
|
page read and write
|
||
27381221000
|
heap
|
page read and write
|
||
2942D082000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
6152000
|
heap
|
page read and write
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
9171000
|
trusted library allocation
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
28FADD25000
|
heap
|
page read and write
|
||
23A51102000
|
trusted library allocation
|
page read and write
|
||
7FF6C12B4000
|
unkown
|
page write copy
|
||
23A51124000
|
heap
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
27CA2FE0000
|
heap
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
273AB27E000
|
heap
|
page read and write
|
||
58EB000
|
trusted library allocation
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
AECFA7E000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
8645000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
2A9FAA00000
|
heap
|
page read and write
|
||
82F0000
|
trusted library allocation
|
page execute and read and write
|
||
27381000000
|
heap
|
page read and write
|
||
28FC7E1D000
|
heap
|
page read and write
|
||
28FC7DF3000
|
heap
|
page read and write
|
||
28FB03DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
3F86000
|
trusted library allocation
|
page read and write
|
||
82D2000
|
trusted library allocation
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
5916000
|
trusted library allocation
|
page read and write
|
||
2942D300000
|
trusted library allocation
|
page read and write
|
||
E42B7CA000
|
stack
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
4EC5B79000
|
stack
|
page read and write
|
||
3FB1000
|
trusted library allocation
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
C29877E000
|
stack
|
page read and write
|
||
165A000
|
trusted library allocation
|
page execute and read and write
|
||
E076A7D000
|
stack
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
105D000
|
trusted library allocation
|
page execute and read and write
|
||
64BE000
|
stack
|
page read and write
|
||
29430790000
|
trusted library allocation
|
page read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
1830C700000
|
heap
|
page read and write
|
||
1A1129A0000
|
heap
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
27380070000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
1FE9F490000
|
heap
|
page read and write
|
||
7FF62B655000
|
unkown
|
page readonly
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
52F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE57000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
heap
|
page read and write
|
||
AB8ABDD000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
DDD000
|
trusted library allocation
|
page execute and read and write
|
||
6170000
|
trusted library allocation
|
page execute and read and write
|
||
28FC7A76000
|
heap
|
page read and write
|
||
E42A9FA000
|
stack
|
page read and write
|
||
DF7000
|
trusted library allocation
|
page execute and read and write
|
||
814E000
|
heap
|
page read and write
|
||
7FFD9BD25000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDBA000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
7272000
|
heap
|
page read and write
|
||
6D00000
|
heap
|
page read and write
|
||
201708B4000
|
heap
|
page read and write
|
||
1FD0000
|
heap
|
page read and write
|
||
6DF1000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
1272000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5F3E000
|
stack
|
page read and write
|
||
6BFB000
|
stack
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
201582B0000
|
heap
|
page execute and read and write
|
||
27380000000
|
trusted library allocation
|
page read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
28FBF912000
|
trusted library allocation
|
page read and write
|
||
1A1129D0000
|
heap
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
201709BB000
|
heap
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
ABA9FE000
|
stack
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD14000
|
trusted library allocation
|
page read and write
|
||
148B000
|
unkown
|
page execute and read and write
|
||
B60000
|
unkown
|
page readonly
|
||
1302000
|
heap
|
page read and write
|
||
3077000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
1FE9F470000
|
heap
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
E42AAFF000
|
stack
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
201709D0000
|
heap
|
page read and write
|
||
3D40000
|
heap
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
28FB1117000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF8000
|
trusted library allocation
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
D94000
|
trusted library allocation
|
page read and write
|
||
52D2000
|
trusted library allocation
|
page read and write
|
||
201682E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
There are 1959 hidden memdumps, click here to show them.