IOC Report
Aurora.exe

loading gif

Files

File Path
Type
Category
Malicious
Aurora.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Msedge.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
\Device\Null
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aurora.exe_4ddec6df7537fc171b2d38e73121d365b626f68_00000000_5bd2e63e-4bad-43be-8393-fab0a7e1ec72\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER60.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFF57.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFFA6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OneDrive Updater.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OneDrive.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1uuujoo1.clx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4lm50jwl.i2z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_an3zbuep.zfx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brbwoi3y.qyo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwq3a0y1.kyd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gk5j21i5.wc1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ihuvrwie.ry2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4hp2vu4.v5d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbhkmpqf.zry.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kpse5r2a.vvn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mhcmucsk.4c5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mumy503g.ad0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ougdpndo.n4z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_skfb5wha.3tg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x2iypfu3.l4n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zktoup0v.gtd.psm1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Aurora.exe
"C:\Users\user\Desktop\Aurora.exe"
malicious
C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe
"C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c start cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe" && exit" && && exit "
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe
"C:\Users\user\AppData\Roaming\Microsoft Edge\build.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\cmd.exe
cmd /Q /C " ping localhost -n 1 && copy "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" "C:\Users\user\AppData\Local\Msedge.exe" && attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe" && icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA) && del "C:\Users\user\AppData\Roaming\AdobeLicense\AdobeUpdate.exe" && cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe"
malicious
C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe
"C:\Users\user\AppData\Roaming\OneDrive Update Tool\OneDrive.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\PING.EXE
ping localhost -n 1
malicious
C:\Windows\System32\cmd.exe
cmd /C "start "C:\Users\user\AppData\Local\Msedge.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'OneDriveUpdate' -Value '"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"' -PropertyType 'String'
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd" /C schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
#cmd
malicious
C:\Users\user\AppData\Local\Msedge.exe
C:\Users\user\AppData\Local\Msedge.exe
malicious
C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe
"C:\Users\user\AppData\Roaming\VLC Media Player\vlc.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /tn \OneDriveUpdate /tr "C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-dc 0
malicious
C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
#cmd
malicious
C:\Users\user\AppData\Local\Msedge.exe
"C:\Users\user\AppData\Local\Msedge.exe"
malicious
C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
#cmd
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
#cmd
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
#cmd
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
#cmd
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
#cmd
malicious
C:\Users\user\AppData\Local\Msedge.exe
"C:\Users\user\AppData\Local\Msedge.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#npnsokoe#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-dc 0
malicious
C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe
"C:\Users\user\AppData\Roaming\OneDriveUpdate\OneDrive Updater.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
#cmd
malicious
C:\Windows\System32\conhost.exe
C:\Windows\System32\conhost.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lygkxs#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'ConsoleWindowsHost' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\svchost.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ConsoleWindowsHost' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
malicious
C:\Windows\System32\attrib.exe
attrib +r +h +a "C:\Users\user\AppData\Local\Msedge.exe"
C:\Windows\System32\icacls.exe
icacls "C:\Users\user\AppData\Local\Msedge.exe" /deny "everyone":(WD,AD,WEA,WA)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 1480
There are 45 hidden processes, click here to show them.

URLs

Name
IP
Malicious
auroraforge.art
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
http://154.81.220.233:28105/
154.81.220.233
malicious
http://tempuri.org/Endpoint/CheckConnectLR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://contoso.com/License
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsLR
unknown
http://tempuri.org/Endpo$
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://go.micros
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://154.81.220.233:
unknown
http://tempuri.org/Endpoint/CheckCon
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://github.com/sapics/ip-location-db/raw/master/dbip-city/dbip-city-ipv4.csv.gzjson:
unknown
http://tempuri.org/Endpo(
unknown
http://tempuri.org/Endpoint/GetUpdatesLR
unknown
https://aka.ms/pscore6lB
unknown
http://tempuri.org/Endpo4
unknown
http://tempuri.org/Endpoint/VerifyUpdateLR
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://www.sysinternals.com0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://tempuri.org/Endpoint/
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
https://stackoverflow.com/q/2152978/23354sCannot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://go.microsoft.coV
unknown
https://api.ipify.org/
unknown
https://t.me/aurora_botnet_support
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://api.telegram.org/file/bot%s/%sindex
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://154.81.220.233:28105
unknown
https://contoso.com/Icon
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://github.com/electron/electron/releases/download/v%s/electron-v%s-%s-%s.zipInvalid
unknown
https://github.com/Pester/Pester
unknown
http://154.81.220.233:28105t-
unknown
http://tempuri.org/Endpoint/SetEnvironmentLR
unknown
https://go.microsoft.coVpnClient.psd1mpatib
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://crl.micro
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
https://aka.ms/pscore68
unknown
https://ipwho.is/
unknown
http://127.0.0.1/dashboardid
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
https://t.me/cheshire_aurora
unknown
http://tempuri.org/Endpo
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
thesirenmika.com
123.123.123.123
malicious
auroraforge.art
192.64.119.108
malicious
xmr-us-east1.nanopool.org
51.222.106.253
malicious

IPs

IP
Domain
Country
Malicious
192.64.119.108
auroraforge.art
United States
malicious
154.81.220.233
unknown
Seychelles
malicious
123.123.123.123
thesirenmika.com
China
malicious
51.79.71.77
unknown
Canada
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Edge
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
OneDriveUpdate
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
FileDirectory
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
ProgramId
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
FileId
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
LowerCaseLongPath
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
LongPathHash
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
Name
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
OriginalFileName
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
Publisher
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
Version
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
BinFileVersion
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
BinaryType
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
ProductName
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
ProductVersion
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
LinkDate
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
BinProductVersion
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
AppxPackageFullName
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
AppxPackageRelativeId
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
Size
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
Language
\REGISTRY\A\{768aec47-1db4-4e58-b2ef-46dd78a746a9}\Root\InventoryApplicationFile\aurora.exe|f1d5c63d6c6c50bf
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 28 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A0C2000
trusted library allocation
page read and write
malicious
4AB9000
trusted library allocation
page read and write
malicious
5E2000
unkown
page readonly
malicious
466E000
trusted library allocation
page read and write
malicious
30B1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2FB1000
trusted library allocation
page read and write
malicious
2FCC000
trusted library allocation
page read and write
malicious
273AB26A000
heap
page read and write
malicious
2E4B000
trusted library allocation
page read and write
malicious
4EEE000
trusted library allocation
page read and write
malicious
2C6F000
trusted library allocation
page read and write
malicious
40B9000
trusted library allocation
page read and write
malicious
29F1000
trusted library allocation
page read and write
malicious
96C2000
trusted library allocation
page read and write
malicious
720000
remote allocation
page execute and read and write
malicious
48DE000
trusted library allocation
page read and write
malicious
7FFD9BC60000
trusted library allocation
page read and write
201595A2000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
E49FCFF000
stack
page read and write
3120000
heap
page execute and read and write
273AB273000
heap
page read and write
164A000
trusted library allocation
page execute and read and write
5A60000
trusted library allocation
page read and write
8C4667A000
stack
page read and write
1235000
heap
page read and write
31CF000
stack
page read and write
3035000
trusted library allocation
page read and write
28FAD9F0000
heap
page read and write
2F18000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
7FF62B641000
unkown
page execute read
27380070000
trusted library allocation
page read and write
E42B64E000
stack
page read and write
7233000
heap
page read and write
465E000
stack
page read and write
5B9E000
stack
page read and write
7FFD9BC50000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
1256000
trusted library allocation
page read and write
2942CFB0000
heap
page read and write
6150000
trusted library allocation
page read and write
E41BC7F000
stack
page read and write
1690000
heap
page read and write
2F7361F0000
heap
page read and write
31D0000
heap
page read and write
2E52000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
28FC7A40000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
C29887D000
stack
page read and write
C29857E000
stack
page read and write
E42A77F000
stack
page read and write
29447672000
heap
page read and write
4EC5E37000
stack
page read and write
130D000
heap
page read and write
23A51313000
heap
page read and write
DB6000
trusted library allocation
page execute and read and write
5B40000
trusted library allocation
page read and write
5FC000
stack
page read and write
15D5000
heap
page read and write
49D6000
trusted library allocation
page read and write
24F12320000
heap
page read and write
12C4000
trusted library allocation
page read and write
7FFD9BD28000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
7DB467F000
stack
page read and write
2F3F000
unkown
page read and write
7FFD9BB90000
trusted library allocation
page read and write
4EC6C8A000
stack
page read and write
2DF0000
heap
page read and write
20158254000
heap
page read and write
5266000
trusted library allocation
page read and write
AD0000
heap
page read and write
B56000
heap
page read and write
2942ED04000
trusted library allocation
page read and write
28FC000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
1F9E36D0000
heap
page read and write
E40000
trusted library allocation
page execute and read and write
7DF493CA0000
trusted library allocation
page execute and read and write
5280000
trusted library allocation
page execute and read and write
20156660000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
2942D040000
heap
page read and write
29430B35000
trusted library allocation
page read and write
19A55410000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
58F4000
trusted library allocation
page read and write
7FAE000
stack
page read and write
E8A000
unkown
page readonly
20159E1E000
trusted library allocation
page read and write
23A51002000
unkown
page read and write
31C6000
trusted library allocation
page read and write
27380070000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
740E000
stack
page read and write
52F0000
trusted library allocation
page read and write
245C000
trusted library allocation
page execute and read and write
AECF97F000
stack
page read and write
42A4000
trusted library allocation
page read and write
5A90000
trusted library allocation
page execute and read and write
7FFD9B9B4000
trusted library allocation
page read and write
7FFD9BD2C000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
24F109B9000
heap
page read and write
1FE9F440000
heap
page read and write
273AB22F000
heap
page read and write
20170903000
heap
page read and write
273AB1F0000
heap
page read and write
1270000
trusted library allocation
page read and write
28FB108B000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
116B000
heap
page read and write
690E000
stack
page read and write
27380000000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
19A55450000
heap
page read and write
1153000
heap
page read and write
2942D0C9000
heap
page read and write
DCB000
trusted library allocation
page execute and read and write
7FFD9BB6A000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
55F0000
heap
page read and write
20158CC3000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
534F000
trusted library allocation
page read and write
1491000
unkown
page execute and read and write
28FC81D9000
heap
page read and write
20158160000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
668E000
stack
page read and write
7DB438D000
stack
page read and write
27380000000
trusted library allocation
page read and write
4F50000
heap
page execute and read and write
7FFD9BD50000
trusted library allocation
page read and write
273AB313000
heap
page read and write
52FD000
trusted library allocation
page read and write
19A55430000
heap
page read and write
273B3000000
heap
page read and write
3E27000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
1830C940000
heap
page read and write
6280000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
2FA0000
heap
page read and write
1A112980000
heap
page read and write
DC5000
trusted library allocation
page execute and read and write
27380070000
trusted library allocation
page read and write
273ACCF0000
heap
page read and write
4EC60BE000
stack
page read and write
DB0000
trusted library allocation
page read and write
7FF6C12A0000
unkown
page readonly
281C000
stack
page read and write
273ACD00000
direct allocation
page execute and read and write
28FB03F6000
trusted library allocation
page read and write
28FADA35000
heap
page read and write
12AC000
unkown
page readonly
919847F000
stack
page read and write
61A0000
trusted library allocation
page read and write
7FF62B641000
unkown
page execute read
27380000000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
23A51300000
heap
page read and write
28FC7EB0000
trusted library allocation
page read and write
1830C7E0000
heap
page read and write
142D000
trusted library allocation
page execute and read and write
2F7362D8000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
19A55330000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
20170866000
heap
page read and write
53B0000
trusted library allocation
page execute and read and write
1424000
trusted library allocation
page read and write
DBA000
trusted library allocation
page execute and read and write
2FF2000
heap
page read and write
7FFD9BE00000
trusted library allocation
page read and write
4EC6B0E000
stack
page read and write
2D23000
trusted library allocation
page execute and read and write
5B00000
trusted library allocation
page read and write
E42A679000
stack
page read and write
C2984FE000
stack
page read and write
30C0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
28FC7B50000
heap
page execute and read and write
42AE000
stack
page read and write
52F1000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
2942EC91000
trusted library allocation
page read and write
5E0000
unkown
page readonly
27380050000
trusted library allocation
page read and write
1380000
heap
page read and write
27380000000
trusted library allocation
page read and write
64E0000
heap
page read and write
6C7E000
stack
page read and write
2CE5000
trusted library allocation
page read and write
20159E31000
trusted library allocation
page read and write
11AE000
stack
page read and write
201708F7000
heap
page read and write
7FFD9BE20000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
14C53FB0000
heap
page read and write
4307000
trusted library allocation
page read and write
7FFD9BB94000
trusted library allocation
page read and write
14BC000
heap
page read and write
273AEA00000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
201592B0000
trusted library allocation
page read and write
28FC7A9D000
heap
page read and write
29430A73000
trusted library allocation
page read and write
1BDA1E50000
heap
page readonly
51F2000
trusted library allocation
page read and write
5710000
trusted library allocation
page execute and read and write
2BB5000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9B9CB000
trusted library allocation
page read and write
64FC000
stack
page read and write
27380000000
trusted library allocation
page read and write
7FFD9BB64000
trusted library allocation
page read and write
B28000
stack
page read and write
23A51100000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
7249000
heap
page read and write
29447639000
heap
page read and write
5A5A000
trusted library allocation
page read and write
4034000
trusted library allocation
page read and write
724F000
heap
page read and write
7500000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
EE3000
trusted library allocation
page execute and read and write
C2989B7000
stack
page read and write
5340000
trusted library allocation
page read and write
28FC7A4F000
heap
page read and write
2CF0000
heap
page execute and read and write
52FF000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
E3E000
stack
page read and write
4FB8000
trusted library allocation
page read and write
7FFD9B9DB000
trusted library allocation
page execute and read and write
2015656E000
heap
page read and write
2943060B000
trusted library allocation
page read and write
7FF6C12B4000
unkown
page read and write
294474E7000
heap
page read and write
201565F2000
heap
page read and write
2943EF87000
trusted library allocation
page read and write
7FFD9BDF0000
trusted library allocation
page read and write
1072000
trusted library allocation
page read and write
58B3000
heap
page read and write
2020000
heap
page read and write
2430000
trusted library allocation
page read and write
20158280000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
28FADC50000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
7FF6D68BC000
unkown
page readonly
2942D09E000
heap
page read and write
4EC57EF000
stack
page read and write
E42ABFE000
stack
page read and write
28FB14C0000
trusted library allocation
page read and write
20156558000
heap
page read and write
23A51000000
unkown
page read and write
201A5FE0000
heap
page read and write
7FF62B655000
unkown
page readonly
19A55690000
heap
page read and write
7FFD9BD19000
trusted library allocation
page read and write
14C542E0000
unkown
page read and write
5620000
trusted library allocation
page read and write
20156770000
heap
page read and write
7FFD9B9AB000
trusted library allocation
page execute and read and write
27380070000
trusted library allocation
page read and write
7FFD9B9CB000
trusted library allocation
page read and write
7FF62B654000
unkown
page write copy
4870000
heap
page execute and read and write
28FADA4F000
heap
page read and write
2BA9000
trusted library allocation
page read and write
5890000
heap
page read and write
53F0000
trusted library allocation
page execute and read and write
101A000
trusted library allocation
page execute and read and write
7FFD9BDB3000
trusted library allocation
page read and write
28FC7B1F000
heap
page read and write
7450000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FF6325B8000
unkown
page write copy
83D000
stack
page read and write
2D20000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
2410000
unclassified section
page read and write
C17000
heap
page read and write
8470000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
2943ED02000
trusted library allocation
page read and write
29430704000
trusted library allocation
page read and write
273AB302000
heap
page read and write
27380000000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
4D5E000
stack
page read and write
1910000
heap
page read and write
23A50E90000
heap
page read and write
20BC000
heap
page read and write
273B1200000
heap
page read and write
10D7000
trusted library allocation
page execute and read and write
28FADC70000
trusted library allocation
page read and write
7DF47DB80000
trusted library allocation
page execute and read and write
27380070000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
145E000
heap
page read and write
618D000
trusted library allocation
page read and write
71E1000
heap
page read and write
59D0000
trusted library allocation
page read and write
1495000
unkown
page execute and read and write
C298D3B000
stack
page read and write
E0B000
trusted library allocation
page execute and read and write
7FFD9BE52000
trusted library allocation
page read and write
58E6000
heap
page read and write
4EC5C7A000
stack
page read and write
55D0000
trusted library allocation
page read and write
2942D030000
trusted library section
page read and write
202A000
heap
page read and write
273AB1D0000
heap
page read and write
6430000
trusted library allocation
page execute and read and write
23A51033000
heap
page read and write
1690000
trusted library allocation
page execute and read and write
28FADC80000
heap
page execute and read and write
273ACFA5000
heap
page read and write
4E0E000
stack
page read and write
28FC7E29000
heap
page read and write
E41BCFF000
stack
page read and write
5881000
trusted library allocation
page read and write
28FB11D5000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
2DAF000
stack
page read and write
20159502000
trusted library allocation
page read and write
23A50F90000
trusted library allocation
page read and write
8125000
heap
page read and write
29447848000
heap
page read and write
1020000
trusted library allocation
page read and write
5790000
heap
page execute and read and write
C2985FF000
stack
page read and write
7FFD9BC30000
trusted library allocation
page read and write
4F0E000
stack
page read and write
2942FBFE000
trusted library allocation
page read and write
91981DD000
stack
page read and write
7FFD9BC30000
trusted library allocation
page read and write
544D000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
DC0000
heap
page read and write
1305000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
7FFD9BD8A000
trusted library allocation
page read and write
13D3000
heap
page read and write
C298AB8000
stack
page read and write
28FB0830000
trusted library allocation
page read and write
5934000
trusted library allocation
page read and write
3110000
heap
page read and write
7FF62B640000
unkown
page readonly
6C3E000
stack
page read and write
7FFD9BB97000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
7F10000
heap
page read and write
2942D250000
heap
page readonly
59F0000
trusted library allocation
page read and write
28FC7DA9000
heap
page read and write
121B000
heap
page read and write
294475D9000
heap
page read and write
6EEE000
stack
page read and write
7FFD9BB52000
trusted library allocation
page read and write
1243000
trusted library allocation
page execute and read and write
23F0000
direct allocation
page read and write
12CD000
trusted library allocation
page execute and read and write
29447649000
heap
page read and write
F98000
stack
page read and write
4FB8000
trusted library allocation
page read and write
6CCC000
stack
page read and write
3FB7000
trusted library allocation
page read and write
2C50000
heap
page read and write
28FADAED000
heap
page read and write
89AA000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
201682F1000
trusted library allocation
page read and write
2F7364B0000
heap
page read and write
27380070000
trusted library allocation
page read and write
1017000
trusted library allocation
page execute and read and write
12E0000
trusted library allocation
page execute and read and write
7FFD9BA66000
trusted library allocation
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
7F620000
trusted library allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
1497000
unkown
page execute and read and write
20157F42000
heap
page read and write
DB2000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
3D20000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
3C10000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
28FADA7A000
heap
page read and write
27380050000
trusted library allocation
page read and write
1230000
heap
page read and write
30E0000
trusted library allocation
page read and write
15A8000
heap
page read and write
E42A977000
stack
page read and write
74D0000
trusted library allocation
page read and write
1830C840000
heap
page read and write
201580E0000
heap
page read and write
3079000
trusted library allocation
page read and write
2BFE000
stack
page read and write
54B8000
trusted library allocation
page read and write
144E000
heap
page read and write
20159DAE000
trusted library allocation
page read and write
54EC000
trusted library allocation
page read and write
4EC5D78000
stack
page read and write
14C54320000
heap
page read and write
46DE000
stack
page read and write
12D0000
heap
page read and write
316E000
stack
page read and write
1140000
trusted library allocation
page execute and read and write
7FF62B654000
unkown
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
7FFD9BB61000
trusted library allocation
page read and write
22D1EBB8000
heap
page read and write
2FB1000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
BA0000
heap
page read and write
E42B74E000
stack
page read and write
41A0000
heap
page execute and read and write
54C4000
trusted library allocation
page read and write
4881000
trusted library allocation
page read and write
72D0000
trusted library allocation
page execute and read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
AB0000
heap
page read and write
165B000
trusted library allocation
page execute and read and write
28FC7E19000
heap
page read and write
7FFD9B9D4000
trusted library allocation
page read and write
2C6B000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
C298A39000
stack
page read and write
42E0000
heap
page read and write
2724000
trusted library allocation
page read and write
7FF632020000
unkown
page readonly
42E6000
heap
page read and write
5652000
trusted library allocation
page read and write
2944762C000
heap
page read and write
2CDC000
stack
page read and write
2942EC8A000
heap
page read and write
3D1A000
trusted library allocation
page execute and read and write
4F1B000
stack
page read and write
5290000
trusted library allocation
page read and write
13E0000
heap
page read and write
22D1EBB0000
heap
page read and write
2943ECB1000
trusted library allocation
page read and write
201685C3000
trusted library allocation
page read and write
1616000
heap
page read and write
5310000
trusted library allocation
page read and write
146C000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BD28000
trusted library allocation
page read and write
4710000
heap
page read and write
16B6000
trusted library allocation
page read and write
BF0000
heap
page read and write
294474C0000
heap
page read and write
1434000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
7510000
trusted library allocation
page read and write
ABE000
heap
page read and write
27380070000
trusted library allocation
page read and write
5A2E000
trusted library allocation
page read and write
2D40000
heap
page read and write
1FE9F330000
heap
page read and write
7FFD9BB92000
trusted library allocation
page read and write
65FE000
stack
page read and write
52A4000
trusted library allocation
page read and write
201566A0000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
AECF87E000
stack
page read and write
3C61000
trusted library allocation
page read and write
273AD600000
heap
page read and write
E90000
trusted library allocation
page read and write
22D1ED60000
heap
page read and write
5A5E000
stack
page read and write
744D000
stack
page read and write
27380000000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
58B7000
heap
page read and write
12F5000
trusted library allocation
page read and write
7FF62B640000
unkown
page readonly
B13ECFF000
stack
page read and write
28FB033C000
trusted library allocation
page read and write
2041000
heap
page read and write
3085000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
7F40000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
28FAD9B0000
heap
page read and write
C29970E000
stack
page read and write
1254000
trusted library allocation
page read and write
7FF6C12A0000
unkown
page readonly
4EC5DBE000
stack
page read and write
7FF62B64F000
unkown
page readonly
7FFD9BC3C000
trusted library allocation
page read and write
4EC6B8C000
stack
page read and write
27380070000
trusted library allocation
page read and write
1290000
heap
page read and write
27380070000
trusted library allocation
page read and write
28FBF651000
trusted library allocation
page read and write
29447140000
heap
page execute and read and write
74A0000
trusted library allocation
page read and write
29430C48000
trusted library allocation
page read and write
27380070000
trusted library allocation
page read and write
8C46A7C000
stack
page read and write
127B000
trusted library allocation
page execute and read and write
52C6000
trusted library allocation
page read and write
C298C3C000
stack
page read and write
7258000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
1004000
trusted library allocation
page read and write
E99000
stack
page read and write
5A40000
trusted library allocation
page read and write
F90000
heap
page read and write
2D24000
trusted library allocation
page read and write
56F0000
heap
page read and write
1904000
trusted library allocation
page read and write
28FC7E09000
heap
page read and write
56EE000
trusted library allocation
page read and write
1BDA26D0000
unkown
page read and write
7DF47E6E0000
trusted library allocation
page execute and read and write
1080000
heap
page read and write
7FF6D68BA000
unkown
page read and write
5590000
heap
page read and write
28FADA76000
heap
page read and write
145B000
unkown
page execute and read and write
663E000
stack
page read and write
28FADD00000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7F20000
trusted library allocation
page execute and read and write
201708C5000
heap
page read and write
1430000
trusted library allocation
page read and write
20156552000
heap
page read and write
1F9E36D5000
heap
page read and write
2A9FAA40000
heap
page read and write
2017093B000
heap
page read and write
5A5D000
trusted library allocation
page read and write
1F9E3428000
heap
page read and write
5B1A000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
27381010000
heap
page read and write
1539000
stack
page read and write
20159D69000
trusted library allocation
page read and write
28FAF610000
heap
page read and write
28FADBC0000
heap
page read and write
F80000
heap
page read and write
2BA6000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
7AC000
stack
page read and write
28FB102C000
trusted library allocation
page read and write
7FF6C12AF000
unkown
page readonly
215F75F0000
heap
page read and write
2EA0000
heap
page execute and read and write
7330000
trusted library allocation
page read and write
1BDA1E60000
heap
page read and write
4F05000
trusted library allocation
page read and write
273AB2FF000
heap
page read and write
2944768C000
heap
page read and write
561F000
stack
page read and write
1240000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
50CE000
stack
page read and write
1830CAF0000
heap
page read and write
273ACF8C000
heap
page read and write
7460000
trusted library allocation
page execute and read and write
4EC5EBC000
stack
page read and write
12C3000
trusted library allocation
page execute and read and write
53C0000
trusted library allocation
page read and write
2942EC85000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
22D1ED65000
heap
page read and write
23A51200000
heap
page read and write
4383000
trusted library allocation
page read and write
20158206000
heap
page read and write
A0000
unkown
page readonly
7FFD9BCFC000
trusted library allocation
page read and write
20159CC3000
trusted library allocation
page read and write
C29867E000
stack
page read and write
294476BB000
heap
page read and write
273AE000000
heap
page read and write
28FC7E21000
heap
page read and write
4ED4000
trusted library allocation
page read and write
7FFD9B9D4000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
88C000
stack
page read and write
7FF6D68C8000
unkown
page readonly
104E000
stack
page read and write
3FB7000
trusted library allocation
page read and write
2DEE000
stack
page read and write
4EC5AFE000
stack
page read and write
52E4000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
2E0E000
unkown
page read and write
27380070000
trusted library allocation
page read and write
FFF000
stack
page read and write
8300000
trusted library allocation
page read and write
23A50EB0000
heap
page read and write
59A0000
trusted library allocation
page execute and read and write
7FFD9BB97000
trusted library allocation
page read and write
7327000
trusted library allocation
page read and write
2E10000
heap
page read and write
2061000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
FEE000
stack
page read and write
1BFB000
stack
page read and write
519F000
stack
page read and write
600E000
stack
page read and write
7FFD9BE30000
trusted library allocation
page read and write
2CFD000
stack
page read and write
E42A39E000
stack
page read and write
5380000
heap
page read and write
E42A3DE000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
20170947000
heap
page read and write
29E0000
heap
page read and write
4160000
unclassified section
page read and write
7FFD9BB22000
trusted library allocation
page read and write
28991740000
heap
page read and write
27380060000
direct allocation
page execute and read and write
2017080E000
heap
page read and write
2728000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
207C000
heap
page read and write
7FFD9BE30000
trusted library allocation
page read and write
642E000
stack
page read and write
5978000
heap
page read and write
4EC5A7F000
stack
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
29447810000
heap
page read and write
130F000
heap
page read and write
29447130000
heap
page read and write
7FFD9BB67000
trusted library allocation
page read and write
5504000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
2942CFA0000
heap
page read and write
55AD17F000
stack
page read and write
566C000
trusted library allocation
page read and write
8167000
heap
page read and write
28FC7DBD000
heap
page read and write
A0000
unkown
page readonly
28FADC30000
trusted library allocation
page read and write
53A0000
trusted library allocation
page execute and read and write
987000
stack
page read and write
53CD000
trusted library allocation
page read and write
6EAE000
stack
page read and write
2956000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
201708E7000
heap
page read and write
1FE9F410000
heap
page read and write
2E4A000
trusted library allocation
page execute and read and write
40B1000
trusted library allocation
page read and write
7FF62B654000
unkown
page read and write
573D000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
DB0000
heap
page read and write
1459000
unkown
page execute and read and write
514B000
stack
page read and write
27380070000
trusted library allocation
page read and write
7FFD9BD14000
trusted library allocation
page read and write
7FFD9BDE6000
trusted library allocation
page read and write
326E000
stack
page read and write
2942D240000
trusted library allocation
page read and write
2748000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
20170646000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
6180000
heap
page read and write
2015907E000
trusted library allocation
page read and write
28FB07BC000
trusted library allocation
page read and write
7FF6D68A1000
unkown
page execute read
1A112960000
heap
page read and write
30D0000
trusted library allocation
page read and write
582E000
stack
page read and write
23A51010000
unkown
page read and write
82E0000
trusted library allocation
page read and write
6115000
trusted library allocation
page read and write
2944755D000
heap
page read and write
E60000
heap
page read and write
2FC2000
trusted library allocation
page read and write
7FFD9BD2C000
trusted library allocation
page read and write
28FC7D91000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
72A6000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
5624000
trusted library allocation
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
ABABFF000
stack
page read and write
6F6B000
stack
page read and write
5520000
trusted library allocation
page read and write
28FAF4D0000
heap
page read and write
28991720000
heap
page read and write
14AD000
unkown
page execute and read and write
273ACFA5000
heap
page read and write
201707D7000
heap
page execute and read and write
DAD000
trusted library allocation
page execute and read and write
70E1000
heap
page read and write
27380050000
trusted library allocation
page read and write
2942D260000
trusted library allocation
page read and write
8C4717E000
stack
page read and write
28FC7C9E000
heap
page read and write
124D000
trusted library allocation
page execute and read and write
FBF000
stack
page read and write
58B9000
heap
page read and write
27380070000
trusted library allocation
page read and write
E42A87D000
stack
page read and write
5902000
heap
page read and write
54D5000
trusted library allocation
page read and write
7FF6D68C3000
unkown
page read and write
28FC7AE5000
heap
page read and write
20156602000
heap
page read and write
562B000
trusted library allocation
page read and write
2942D0C5000
heap
page read and write
30D7000
trusted library allocation
page execute and read and write
10D2000
trusted library allocation
page read and write
28FC7BB0000
heap
page read and write
84E0000
trusted library allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
2F70000
heap
page read and write
28FC7DB1000
heap
page read and write
20159056000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
20170957000
heap
page read and write
3FC1000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
7265000
heap
page read and write
B7E000
stack
page read and write
C29893E000
stack
page read and write
5B47000
trusted library allocation
page read and write
28FC7BC3000
heap
page read and write
20159E6C000
trusted library allocation
page read and write
20170830000
heap
page read and write
2A9FADC0000
heap
page read and write
70C0000
heap
page execute and read and write
7FFD9BE00000
trusted library allocation
page read and write
42F1000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
133B000
heap
page read and write
C1A000
heap
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
128E000
stack
page read and write
647E000
stack
page read and write
12F9000
stack
page read and write
51D0000
trusted library allocation
page read and write
28FC81C0000
heap
page read and write
28DC000
trusted library allocation
page read and write
20170888000
heap
page read and write
486D000
stack
page read and write
201582C1000
trusted library allocation
page read and write
2015825B000
heap
page read and write
71D0000
heap
page read and write
1050000
trusted library allocation
page execute and read and write
273B4400000
heap
page read and write
5750000
trusted library allocation
page read and write
5904000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
174D000
stack
page read and write
30A0000
heap
page read and write
F95000
heap
page read and write
27380050000
trusted library allocation
page read and write
632E000
stack
page read and write
FA0000
heap
page read and write
7FFD9BB92000
trusted library allocation
page read and write
13AB000
heap
page read and write
52AB000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
8000000
heap
page read and write
55DE000
stack
page read and write
54F0000
trusted library allocation
page read and write
14C53FC0000
heap
page read and write
2015A15B000
trusted library allocation
page read and write
2E2C000
trusted library allocation
page read and write
5250000
trusted library allocation
page execute and read and write
E49F9ED000
stack
page read and write
A2000
unkown
page execute read
20159080000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
E42A8F9000
stack
page read and write
5500000
trusted library allocation
page read and write
1A112880000
heap
page read and write
29447069000
heap
page read and write
294471C0000
heap
page execute and read and write
7FF62B64F000
unkown
page readonly
28FC7AF6000
heap
page read and write
AF1000
heap
page read and write
D90000
trusted library allocation
page read and write
28FC7C90000
heap
page read and write
5940000
trusted library allocation
page read and write
20159228000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
201E000
stack
page read and write
12B2000
unkown
page readonly
52C1000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
295E000
stack
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
5930000
trusted library allocation
page read and write
8070000
trusted library allocation
page read and write
5919000
trusted library allocation
page read and write
3E25000
trusted library allocation
page read and write
2089000
heap
page read and write
273ACF45000
heap
page read and write
23A51013000
unkown
page read and write
27380070000
trusted library allocation
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
7FF63203C000
unkown
page write copy
2F7E000
stack
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
5790000
trusted library allocation
page execute and read and write
7FFD9BB50000
trusted library allocation
page read and write
48E2000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1F9E33D0000
heap
page read and write
8C46D7E000
stack
page read and write
D80000
trusted library allocation
page read and write
27CA47B0000
heap
page read and write
27380070000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
7FFD9BD24000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
28FC7E25000
heap
page read and write
30E7000
trusted library allocation
page execute and read and write
7FF62B655000
unkown
page readonly
1590000
heap
page read and write
182C000
unkown
page execute read
27380000000
trusted library allocation
page read and write
15A0000
heap
page read and write
7FF62B641000
unkown
page execute read
5550000
trusted library allocation
page read and write
244A000
trusted library allocation
page execute and read and write
56C0000
heap
page execute and read and write
838000
stack
page read and write
27380000000
trusted library allocation
page read and write
2943074B000
trusted library allocation
page read and write
22D1EB40000
heap
page read and write
7FFD9BD47000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
28FC7A30000
heap
page execute and read and write
4180000
heap
page read and write
5680000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
18DF000
stack
page read and write
2F77000
heap
page read and write
2942FE36000
trusted library allocation
page read and write
28FC7FB0000
heap
page read and write
1078000
heap
page read and write
28FB0340000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
EF0000
heap
page read and write
27380050000
trusted library allocation
page read and write
28FC7BD6000
heap
page read and write
273B2600000
heap
page read and write
20156620000
heap
page read and write
7FF62B640000
unkown
page readonly
39F5000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
4EC5CFD000
stack
page read and write
215F5C50000
heap
page read and write
2880000
heap
page execute and read and write
28FADA3D000
heap
page read and write
1027000
trusted library allocation
page execute and read and write
28991870000
heap
page read and write
9F0000
heap
page read and write
273B0800000
heap
page read and write
7FF6C12A1000
unkown
page execute read
3D2A000
trusted library allocation
page execute and read and write
2943ECA0000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
58F0000
heap
page read and write
148D000
unkown
page execute and read and write
7FF62B655000
unkown
page readonly
7FFD9BC70000
trusted library allocation
page read and write
A3000
unkown
page execute and read and write
11D5000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
294470A9000
heap
page read and write
27380070000
trusted library allocation
page read and write
2015A0F8000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
45C1000
trusted library allocation
page read and write
61F6000
heap
page read and write
1053000
trusted library allocation
page execute and read and write
678E000
stack
page read and write
17DE000
stack
page read and write
27380000000
trusted library allocation
page read and write
201563E0000
heap
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
273B1C00000
heap
page read and write
3064000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
20156795000
heap
page read and write
56BF000
trusted library allocation
page read and write
4C3A77D000
stack
page read and write
24F109BC000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
B13EC7D000
stack
page read and write
2F00000
heap
page readonly
B20000
heap
page read and write
7FF6325B5000
unkown
page write copy
28FC7E53000
heap
page read and write
6111000
trusted library allocation
page read and write
1461000
unkown
page execute and read and write
1070000
trusted library allocation
page read and write
E42A293000
stack
page read and write
163D000
trusted library allocation
page execute and read and write
54D0000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
28FC7B90000
heap
page read and write
74E0000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
2942EEB9000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
144E000
heap
page read and write
555F000
trusted library allocation
page read and write
2942F9AD000
trusted library allocation
page read and write
12AB000
unkown
page execute read
292D000
trusted library allocation
page read and write
8149000
heap
page read and write
102B000
trusted library allocation
page execute and read and write
2E40000
trusted library allocation
page read and write
1266000
trusted library allocation
page execute and read and write
7FFD9BDF0000
trusted library allocation
page execute and read and write
1A1129A5000
heap
page read and write
30DA000
trusted library allocation
page execute and read and write
5780000
trusted library allocation
page read and write
3D16000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
71FC000
heap
page read and write
1375000
heap
page read and write
EED000
trusted library allocation
page execute and read and write
201580B0000
heap
page execute and read and write
1680000
heap
page read and write
1F60000
heap
page read and write
6E3F000
stack
page read and write
215F5C40000
heap
page read and write
4C3A7FF000
stack
page read and write
27380050000
direct allocation
page execute and read and write
10CE000
stack
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
27380070000
trusted library allocation
page read and write
1EF9000
stack
page read and write
12B4000
unkown
page execute and read and write
13D0000
heap
page read and write
24F123E0000
heap
page read and write
B10000
trusted library allocation
page read and write
19A55695000
heap
page read and write
8C4677F000
stack
page read and write
58F5000
heap
page read and write
5900000
trusted library allocation
page execute and read and write
3D37000
trusted library allocation
page execute and read and write
1493000
unkown
page execute and read and write
201566D0000
trusted library allocation
page read and write
1667000
trusted library allocation
page execute and read and write
2D10000
heap
page read and write
1499000
unkown
page execute and read and write
1040000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
702E000
stack
page read and write
273B3A00000
heap
page read and write
7FF6325B5000
unkown
page read and write
170E000
stack
page read and write
52C0000
heap
page execute and read and write
610E000
stack
page read and write
2943EF89000
trusted library allocation
page read and write
273AB28B000
heap
page read and write
201A5FF0000
heap
page read and write
201685A5000
trusted library allocation
page read and write
7FFD9BD9C000
trusted library allocation
page read and write
3D22000
trusted library allocation
page execute and read and write
475E000
stack
page read and write
479E000
stack
page read and write
61C0000
trusted library allocation
page read and write
40B5000
trusted library allocation
page read and write
7FFD9BE10000
trusted library allocation
page read and write
6CFA000
stack
page read and write
2D39000
trusted library allocation
page read and write
51FE000
trusted library allocation
page read and write
28FADCC0000
trusted library allocation
page read and write
6F2D000
stack
page read and write
23A51300000
heap
page read and write
2016832C000
trusted library allocation
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
3FB5000
trusted library allocation
page read and write
28FB10D2000
trusted library allocation
page read and write
8C4697D000
stack
page read and write
DC2000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
804E000
stack
page read and write
20170943000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFE000
stack
page read and write
54C0000
trusted library allocation
page read and write
28FBF91C000
trusted library allocation
page read and write
1BDA1D70000
heap
page read and write
2942FC86000
trusted library allocation
page read and write
430D000
trusted library allocation
page read and write
2730000
heap
page read and write
1660000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
28FADA39000
heap
page read and write
1BDA1EB0000
heap
page read and write
8311000
trusted library allocation
page read and write
201564E0000
heap
page read and write
120B000
heap
page read and write
2450000
trusted library allocation
page read and write
273ACF76000
heap
page read and write
58A9000
trusted library allocation
page read and write
2891000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
2A9FAA48000
heap
page read and write
18F0000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
119C000
heap
page read and write
400000
remote allocation
page execute and read and write
23A51302000
heap
page read and write
27CA4800000
heap
page read and write
59E0000
trusted library allocation
page read and write
B330000
heap
page execute and read and write
C298473000
stack
page read and write
5490000
trusted library allocation
page execute and read and write
1463000
unkown
page execute and read and write
3000000
heap
page read and write
2FD0000
heap
page execute and read and write
23A51215000
heap
page read and write
6140000
trusted library allocation
page read and write
4EC5BFE000
stack
page read and write
1192000
heap
page read and write
273AB278000
heap
page read and write
27380000000
trusted library allocation
page read and write
28FC7E7B000
heap
page read and write
10BE000
stack
page read and write
7FF6C12B5000
unkown
page readonly
2017092B000
heap
page read and write
7FF6C12AF000
unkown
page readonly
7FFD9BE30000
trusted library allocation
page read and write
3FC7000
trusted library allocation
page read and write
6F3E000
stack
page read and write
817F000
heap
page read and write
7F220000
trusted library allocation
page execute and read and write
28FB0586000
trusted library allocation
page read and write
5A2C000
trusted library allocation
page read and write
14D8000
unkown
page execute and read and write
EA6000
trusted library allocation
page read and write
7FFD9BDE6000
trusted library allocation
page read and write
8C4707E000
stack
page read and write
2F5C000
stack
page read and write
27CA2DF8000
heap
page read and write
294470BC000
heap
page read and write
5510000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
2943EF7F000
trusted library allocation
page read and write
65BE000
stack
page read and write
58AD000
heap
page read and write
ACE000
stack
page read and write
2F1F000
stack
page read and write
7268000
heap
page read and write
1054000
trusted library allocation
page read and write
6A4E000
stack
page read and write
7FFD9BCE4000
trusted library allocation
page read and write
72543AC000
stack
page read and write
2942D2C0000
heap
page execute and read and write
7FFD9BE20000
trusted library allocation
page read and write
202E000
heap
page read and write
201A6040000
heap
page read and write
20156710000
trusted library allocation
page read and write
8C46C7F000
stack
page read and write
273AFE00000
heap
page read and write
1300000
trusted library allocation
page read and write
1BDA20F0000
unkown
page read and write
7FF62B64F000
unkown
page readonly
27380000000
trusted library allocation
page read and write
28FB08FA000
trusted library allocation
page read and write
28FB1461000
trusted library allocation
page read and write
1657000
trusted library allocation
page execute and read and write
7FFD9BC60000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
24F109B0000
heap
page read and write
27380070000
trusted library allocation
page read and write
731E000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
66FE000
stack
page read and write
57EF000
stack
page read and write
2E7C000
stack
page read and write
4BD1000
trusted library allocation
page read and write
23A5102B000
heap
page read and write
61B0000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
51DB000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
1063000
trusted library allocation
page read and write
40EE000
stack
page read and write
29447190000
trusted library allocation
page read and write
2FBF000
trusted library allocation
page read and write
C24000
heap
page read and write
20170818000
heap
page read and write
201682C1000
trusted library allocation
page read and write
73B633C000
stack
page read and write
80D0000
heap
page read and write
294306A5000
trusted library allocation
page read and write
EF8000
stack
page read and write
201708E5000
heap
page read and write
201707E0000
heap
page read and write
3891000
trusted library allocation
page read and write
7DF47DB90000
trusted library allocation
page execute and read and write
52FA000
trusted library allocation
page read and write
273ACE02000
heap
page read and write
1830CAF5000
heap
page read and write
7FFD9BA66000
trusted library allocation
page read and write
C29978A000
stack
page read and write
7FFD9BCF3000
trusted library allocation
page read and write
498E000
stack
page read and write
C298CBE000
stack
page read and write
C298BBF000
stack
page read and write
1270000
heap
page execute and read and write
5B10000
trusted library allocation
page read and write
2FDB000
heap
page read and write
A189DFF000
stack
page read and write
29430813000
trusted library allocation
page read and write
7FF6325AC000
unkown
page readonly
20159461000
trusted library allocation
page read and write
7FF62B640000
unkown
page readonly
2943084E000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
2942FC7E000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
3100000
trusted library allocation
page read and write
5F0E000
stack
page read and write
204C000
heap
page read and write
53AE000
stack
page read and write
2942D138000
heap
page read and write
27380000000
trusted library allocation
page read and write
7FFD9BAD6000
trusted library allocation
page execute and read and write
2A9FAA20000
heap
page read and write
28FC7DF7000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
55AD0FF000
stack
page read and write
273ACF43000
heap
page read and write
E6E000
stack
page read and write
2FBD000
stack
page read and write
7FF6325AC000
unkown
page readonly
7FFD9B9B3000
trusted library allocation
page execute and read and write
3FB1000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
57DE000
stack
page read and write
1790000
heap
page read and write
3D2C000
trusted library allocation
page execute and read and write
273ACF6B000
heap
page read and write
201685AA000
trusted library allocation
page read and write
7FF62B64F000
unkown
page readonly
ABA9ED000
stack
page read and write
D93000
trusted library allocation
page execute and read and write
3D60000
heap
page read and write
28FC7DA1000
heap
page read and write
7FFD9BB94000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
10DB000
trusted library allocation
page execute and read and write
7FF62B640000
unkown
page readonly
27380000000
trusted library allocation
page read and write
28FADD20000
heap
page read and write
273AB200000
heap
page read and write
64BF000
stack
page read and write
AA2000
unkown
page execute read
148F000
unkown
page execute and read and write
8B0000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
2452000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
DE0000
trusted library allocation
page read and write
139E000
stack
page read and write
20159D22000
trusted library allocation
page read and write
BBE000
stack
page read and write
1250000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
145F000
unkown
page execute and read and write
2942D088000
heap
page read and write
52D0000
trusted library allocation
page read and write
7FFD9BDC0000
trusted library allocation
page execute and read and write
5A70000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
2943EF14000
trusted library allocation
page read and write
47DE000
stack
page read and write
20170620000
heap
page read and write
7FF62B654000
unkown
page write copy
8060000
trusted library allocation
page read and write
E07000
trusted library allocation
page execute and read and write
22D1EA40000
heap
page read and write
B5F000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
4314000
trusted library allocation
page read and write
7FFD9BD2A000
trusted library allocation
page read and write
1091000
heap
page read and write
2BFF000
stack
page read and write
59E0000
heap
page execute and read and write
28FC7E2D000
heap
page read and write
E42AB7E000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
23A51213000
heap
page read and write
28991620000
heap
page read and write
5686000
heap
page read and write
28FADC60000
heap
page readonly
14B3000
unkown
page execute and read and write
1FBE000
stack
page read and write
20156596000
heap
page read and write
926000
heap
page read and write
27380000000
trusted library allocation
page read and write
17A0000
heap
page read and write
201707D0000
heap
page execute and read and write
3D3B000
trusted library allocation
page execute and read and write
7FF62B641000
unkown
page execute read
27380070000
trusted library allocation
page read and write
5201000
trusted library allocation
page read and write
4EC5F3A000
stack
page read and write
2E9F000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
27380070000
trusted library allocation
page read and write
15C1000
heap
page read and write
1423000
trusted library allocation
page execute and read and write
48B4000
trusted library allocation
page read and write
7FF632020000
unkown
page readonly
4FC0000
heap
page execute and read and write
2E70000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
23EF000
stack
page read and write
4B8D000
stack
page read and write
7FFD9BD10000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
B82000
heap
page read and write
27380000000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
28FADA2E000
heap
page read and write
61F0000
trusted library allocation
page read and write
28FAF621000
trusted library allocation
page read and write
12AE000
unkown
page readonly
28991875000
heap
page read and write
12A0000
trusted library allocation
page read and write
273AB26A000
heap
page read and write
2FC0000
trusted library allocation
page execute and read and write
DFA000
trusted library allocation
page execute and read and write
4EC613B000
stack
page read and write
22EF000
stack
page read and write
1481000
unkown
page execute and read and write
52E0000
trusted library allocation
page read and write
294474D0000
heap
page read and write
2942D365000
heap
page read and write
8329000
trusted library allocation
page read and write
201581A3000
heap
page read and write
2926000
trusted library allocation
page read and write
20DA000
heap
page read and write
1830C800000
heap
page read and write
2944764D000
heap
page read and write
27380000000
trusted library allocation
page read and write
8320000
trusted library allocation
page read and write
20156510000
heap
page read and write
11CD000
heap
page read and write
2943EF99000
trusted library allocation
page read and write
EA4000
trusted library allocation
page read and write
2015654D000
heap
page read and write
2017090F000
heap
page read and write
163F000
stack
page read and write
2D78000
heap
page read and write
B62000
unkown
page readonly
1F9E3420000
heap
page read and write
10F8000
stack
page read and write
2E10000
heap
page execute and read and write
6190000
trusted library allocation
page read and write
7FF62B640000
unkown
page readonly
E50000
heap
page read and write
61E0000
trusted library allocation
page execute and read and write
2F7361D0000
heap
page read and write
28FADA2C000
heap
page read and write
2D6C000
heap
page read and write
28FC7D13000
heap
page read and write
294471C6000
heap
page execute and read and write
8C46E7F000
stack
page read and write
BFE000
heap
page read and write
6B8E000
stack
page read and write
28FC7E15000
heap
page read and write
74C0000
trusted library allocation
page read and write
E41B9AD000
stack
page read and write
6FEF000
stack
page read and write
23A51302000
heap
page read and write
2942D07E000
heap
page read and write
3D30000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
7FF62B654000
unkown
page write copy
603E000
stack
page read and write
27380070000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
1480000
heap
page read and write
D60000
heap
page read and write
28FBF92C000
trusted library allocation
page read and write
1BDA20E0000
heap
page read and write
27380050000
trusted library allocation
page read and write
1F9E33B0000
heap
page read and write
28FC820E000
heap
page read and write
1453000
unkown
page execute and read and write
7FF6325B9000
unkown
page readonly
2A9FADC5000
heap
page read and write
273ACF00000
heap
page read and write
55AD07C000
stack
page read and write
7FFD9BC40000
trusted library allocation
page read and write
166B000
trusted library allocation
page execute and read and write
12BE000
stack
page read and write
1BDA2690000
unkown
page read and write
61D0000
trusted library allocation
page read and write
7FFD9BB31000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
7FF6325A9000
unkown
page read and write
2E21000
trusted library allocation
page read and write
27380070000
trusted library allocation
page read and write
28FADA37000
heap
page read and write
706F000
stack
page read and write
5A17000
trusted library allocation
page read and write
E42AC7C000
stack
page read and write
27380050000
trusted library allocation
page read and write
28FC7D9C000
heap
page read and write
E9E000
stack
page read and write
28FADA02000
heap
page read and write
E42AA7E000
stack
page read and write
1570000
heap
page read and write
5760000
trusted library allocation
page read and write
7FFD9BDF0000
trusted library allocation
page execute and read and write
EE4000
trusted library allocation
page read and write
1642000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
2017062B000
heap
page read and write
294475DB000
heap
page read and write
7480000
trusted library allocation
page read and write
28FB019F000
trusted library allocation
page read and write
2A9FA9F0000
heap
page read and write
27380050000
trusted library allocation
page read and write
4F8E000
stack
page read and write
5666000
heap
page read and write
E40000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
143C000
stack
page read and write
7DF47E6D0000
trusted library allocation
page execute and read and write
2940000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
2942D210000
trusted library section
page read and write
2AFF000
stack
page read and write
5350000
heap
page execute and read and write
5CF4000
trusted library allocation
page read and write
2942F8B9000
trusted library allocation
page read and write
7FF62B654000
unkown
page read and write
1580000
heap
page read and write
2943EF7B000
trusted library allocation
page read and write
4EC5FBE000
stack
page read and write
2943ECC1000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
28FBF621000
trusted library allocation
page read and write
514D000
stack
page read and write
7FFD9BDBC000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
245A000
trusted library allocation
page execute and read and write
27380000000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
28FC7D70000
heap
page read and write
7205000
heap
page read and write
2FD0000
heap
page read and write
1449000
heap
page read and write
2942D220000
trusted library allocation
page read and write
2943EFA9000
trusted library allocation
page read and write
28FAD9C0000
heap
page read and write
2015833F000
trusted library allocation
page read and write
1903000
trusted library allocation
page execute and read and write
27380000000
trusted library allocation
page read and write
5910000
heap
page read and write
6260000
trusted library allocation
page execute and read and write
725F000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
201A6010000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
29447040000
heap
page read and write
27380070000
trusted library allocation
page read and write
11F0000
heap
page read and write
1F9E32D0000
heap
page read and write
4279000
trusted library allocation
page read and write
1633000
trusted library allocation
page read and write
273ACFA5000
heap
page read and write
27380070000
trusted library allocation
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
52BE000
trusted library allocation
page read and write
6A0E000
stack
page read and write
4EE4000
trusted library allocation
page read and write
28FC7D80000
heap
page read and write
AECF67D000
stack
page read and write
2FF5000
heap
page read and write
12B0000
heap
page read and write
13A9000
heap
page read and write
27380070000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
1410000
heap
page read and write
A2000
unkown
page execute read
2942D280000
heap
page read and write
27380000000
trusted library allocation
page read and write
55B0000
trusted library allocation
page execute and read and write
160C000
heap
page read and write
20170923000
heap
page read and write
28FC7D75000
heap
page read and write
2EBE000
stack
page read and write
29F0000
heap
page read and write
201581A1000
heap
page read and write
F1C000
stack
page read and write
28FADBF0000
heap
page read and write
190D000
trusted library allocation
page execute and read and write
119E000
heap
page read and write
4271000
trusted library allocation
page read and write
4596000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
E42B6CC000
stack
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
1830C849000
heap
page read and write
7FF62B655000
unkown
page readonly
7FFD9BE22000
trusted library allocation
page read and write
8112000
heap
page read and write
FD3507D000
stack
page read and write
5A80000
trusted library allocation
page read and write
AECFB7B000
stack
page read and write
AA3000
unkown
page execute and read and write
2942EB15000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
4275000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
7DF493CB0000
trusted library allocation
page execute and read and write
7FFD9B9B4000
trusted library allocation
page read and write
11F5000
heap
page read and write
5AF0000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
3C65000
trusted library allocation
page read and write
501E000
trusted library allocation
page read and write
107A000
trusted library allocation
page execute and read and write
8C46F7E000
stack
page read and write
14C54910000
unkown
page read and write
5790000
heap
page execute and read and write
566F000
trusted library allocation
page read and write
1077000
trusted library allocation
page execute and read and write
7237000
heap
page read and write
106D000
trusted library allocation
page execute and read and write
20159E22000
trusted library allocation
page read and write
7FFD9BE20000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
DD4000
trusted library allocation
page read and write
6120000
trusted library allocation
page execute and read and write
2EFE000
stack
page read and write
28FAF6A7000
trusted library allocation
page read and write
10A5000
heap
page read and write
3074000
trusted library allocation
page read and write
1070000
heap
page read and write
667E000
stack
page read and write
23A51202000
heap
page read and write
1646000
trusted library allocation
page execute and read and write
2FBC000
trusted library allocation
page read and write
2F9E000
stack
page read and write
9FC000
stack
page read and write
55F0000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
28991700000
heap
page read and write
DD3000
trusted library allocation
page execute and read and write
2942EC80000
heap
page read and write
4EC6C0D000
stack
page read and write
2B84000
trusted library allocation
page read and write
201580E5000
heap
page read and write
A00000
heap
page read and write
11E0000
trusted library allocation
page read and write
28FAF849000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
1428000
heap
page read and write
6CBE000
stack
page read and write
273AB2EF000
heap
page read and write
14C54370000
unkown
page read and write
27380070000
trusted library allocation
page read and write
20158FDA000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
7DF47E6C0000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
7FFD9BCF3000
trusted library allocation
page read and write
C2988F9000
stack
page read and write
7FF6325B9000
unkown
page readonly
7F238000
trusted library allocation
page execute and read and write
2017093F000
heap
page read and write
1005000
heap
page read and write
20170953000
heap
page read and write
5730000
trusted library allocation
page read and write
A40000
heap
page read and write
27380000000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
ABA000
heap
page read and write
27380000000
trusted library allocation
page read and write
CF9000
stack
page read and write
7FB0000
heap
page read and write
298D000
stack
page read and write
BB0000
heap
page read and write
DC7000
trusted library allocation
page execute and read and write
144F000
unkown
page execute and read and write
7FFD9BE1D000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
273ACCB0000
heap
page read and write
273ACC80000
heap
page read and write
1253000
trusted library allocation
page read and write
1343000
heap
page read and write
EB0000
heap
page read and write
68CF000
stack
page read and write
23A51313000
heap
page read and write
113E000
stack
page read and write
201A6020000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
58A0000
heap
page read and write
20158256000
heap
page read and write
201582A0000
heap
page read and write
5305000
trusted library allocation
page read and write
67CE000
stack
page read and write
27380000000
trusted library allocation
page read and write
820010C000
stack
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
145D000
unkown
page execute and read and write
65FC000
stack
page read and write
125D000
trusted library allocation
page execute and read and write
3D17000
trusted library allocation
page execute and read and write
7FF62B641000
unkown
page execute read
2960000
trusted library allocation
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
7FFD9BDED000
trusted library allocation
page read and write
2F6C000
stack
page read and write
20156680000
trusted library allocation
page read and write
2E55000
trusted library allocation
page execute and read and write
4FB0000
trusted library allocation
page read and write
29447089000
heap
page read and write
5A37000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
7F21000
trusted library allocation
page read and write
E80000
trusted library allocation
page execute and read and write
C29980E000
stack
page read and write
20E7000
heap
page read and write
536D000
stack
page read and write
28FC7A37000
heap
page execute and read and write
19A55458000
heap
page read and write
273AF400000
heap
page read and write
91984FF000
stack
page read and write
2017097D000
heap
page read and write
58DF000
stack
page read and write
2D30000
trusted library allocation
page read and write
A189EFF000
stack
page read and write
4EF9000
trusted library allocation
page read and write
A20000
heap
page read and write
5B30000
trusted library allocation
page read and write
28FB119A000
trusted library allocation
page read and write
2F7362D0000
heap
page read and write
7FFD9BA3E000
trusted library allocation
page execute and read and write
4F91000
trusted library allocation
page read and write
5EFE000
stack
page read and write
C298B3E000
stack
page read and write
7FF6C12B5000
unkown
page readonly
8C46B7F000
stack
page read and write
4356000
trusted library allocation
page read and write
201685B2000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
C32000
heap
page read and write
E42A6FE000
stack
page read and write
7FF6C12A1000
unkown
page execute read
1FE9F49C000
heap
page read and write
273ACCE0000
heap
page readonly
2C8B000
trusted library allocation
page read and write
20156690000
heap
page readonly
E70000
heap
page read and write
27380000000
trusted library allocation
page read and write
27380050000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
58E0000
trusted library allocation
page read and write
469F000
stack
page read and write
DF0000
heap
page read and write
2D2D000
trusted library allocation
page execute and read and write
5300000
trusted library allocation
page read and write
7FFD9BD19000
trusted library allocation
page read and write
28FADD05000
heap
page read and write
C2986F9000
stack
page read and write
7FFD9BB80000
trusted library allocation
page read and write
E42A7FA000
stack
page read and write
201564C0000
heap
page read and write
5593000
heap
page read and write
149B000
unkown
page execute and read and write
1F70000
heap
page read and write
27380000000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2E1E000
stack
page read and write
3C69000
trusted library allocation
page read and write
27380070000
trusted library allocation
page read and write
73CF000
stack
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
7FFD9B982000
trusted library allocation
page read and write
27380070000
trusted library allocation
page read and write
12D0000
heap
page read and write
294475AC000
heap
page read and write
178E000
stack
page read and write
27380070000
trusted library allocation
page read and write
A189CFC000
stack
page read and write
3286000
trusted library allocation
page read and write
7FF62B641000
unkown
page execute read
7FFD9B9C0000
trusted library allocation
page read and write
DE4000
trusted library allocation
page read and write
738E000
stack
page read and write
1474000
heap
page read and write
5320000
trusted library allocation
page execute and read and write
201584E9000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
7FFD9BB61000
trusted library allocation
page read and write
1200000
heap
page read and write
29430ADB000
trusted library allocation
page read and write
B98000
heap
page read and write
5646000
trusted library allocation
page read and write
2942CFD0000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
7FFD9B9DB000
trusted library allocation
page execute and read and write
294475FF000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
24F10960000
heap
page read and write
2942D2D0000
trusted library allocation
page read and write
64A0000
unclassified section
page read and write
7FFD9BE55000
trusted library allocation
page read and write
3E21000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
5A00000
trusted library allocation
page execute and read and write
27CA2F00000
heap
page read and write
7FF63203B000
unkown
page read and write
51E1000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FF62B655000
unkown
page readonly
54E0000
trusted library allocation
page read and write
29DD000
stack
page read and write
7FFD9BB62000
trusted library allocation
page read and write
2942D010000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
12D0000
heap
page read and write
2F7360F0000
heap
page read and write
721E000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BD22000
trusted library allocation
page read and write
22D1EB20000
heap
page read and write
54A2000
trusted library allocation
page read and write
3009000
heap
page read and write
2C69000
trusted library allocation
page read and write
7FFD9BCC3000
trusted library allocation
page read and write
5600000
trusted library allocation
page execute and read and write
215F5C58000
heap
page read and write
4EC5763000
stack
page read and write
6FAE000
stack
page read and write
30EB000
trusted library allocation
page execute and read and write
7FFD9BCA0000
trusted library allocation
page read and write
AB8ABEE000
stack
page read and write
20170BE0000
heap
page read and write
C2987FA000
stack
page read and write
52CD000
trusted library allocation
page read and write
7FF6325B8000
unkown
page write copy
7FFD9BA96000
trusted library allocation
page execute and read and write
4EC603F000
stack
page read and write
24F10970000
heap
page read and write
1210000
heap
page read and write
20170820000
heap
page read and write
59F0000
heap
page read and write
7530000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
304F000
stack
page read and write
28FB0904000
trusted library allocation
page read and write
2C67000
trusted library allocation
page read and write
28FC7E61000
heap
page read and write
2EA5000
trusted library allocation
page read and write
B12000
heap
page read and write
5262000
trusted library allocation
page read and write
7FF62B64F000
unkown
page readonly
7FFD9B9B2000
trusted library allocation
page read and write
201A6015000
heap
page read and write
7FF63203B000
unkown
page write copy
1A1129D8000
heap
page read and write
7FFD9BE00000
trusted library allocation
page read and write
27CA2DF0000
heap
page read and write
201685AC000
trusted library allocation
page read and write
273AB25E000
heap
page read and write
1640000
heap
page read and write
7FFD9BCE9000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
6208000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
534F000
stack
page read and write
563E000
trusted library allocation
page read and write
28FB0902000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
3E31000
trusted library allocation
page read and write
732A000
trusted library allocation
page read and write
28FA000
trusted library allocation
page read and write
E42A31F000
stack
page read and write
16C0000
heap
page execute and read and write
7FFD9BCB0000
trusted library allocation
page read and write
1244000
trusted library allocation
page read and write
1000000
heap
page read and write
273AB213000
heap
page read and write
2942D360000
heap
page read and write
28FBF641000
trusted library allocation
page read and write
201595A4000
trusted library allocation
page read and write
29447641000
heap
page read and write
6B4E000
stack
page read and write
D9D000
trusted library allocation
page execute and read and write
7FFD9BC90000
trusted library allocation
page read and write
B30000
heap
page read and write
27380000000
trusted library allocation
page read and write
63BE000
stack
page read and write
7FF632021000
unkown
page execute read
1790000
trusted library allocation
page read and write
4351000
trusted library allocation
page read and write
2942D086000
heap
page read and write
5641000
trusted library allocation
page read and write
14C54330000
unkown
page read and write
900000
heap
page read and write
6110000
heap
page read and write
201A6048000
heap
page read and write
28FBF695000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FF632021000
unkown
page execute read
920000
heap
page read and write
5513000
heap
page read and write
27380070000
trusted library allocation
page read and write
13A0000
heap
page read and write
28FBF90E000
trusted library allocation
page read and write
215F5E20000
heap
page read and write
1652000
trusted library allocation
page read and write
273AB2AE000
heap
page read and write
27380050000
trusted library allocation
page read and write
77F1000
trusted library allocation
page read and write
524D000
stack
page read and write
272A000
trusted library allocation
page read and write
50B8000
trusted library allocation
page read and write
28FC7BBB000
heap
page read and write
2FD5000
heap
page execute and read and write
1657000
trusted library allocation
page execute and read and write
1262000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
7FF6D68C5000
unkown
page read and write
273AB2AB000
heap
page read and write
273ACF84000
heap
page read and write
270E000
stack
page read and write
3FBD000
trusted library allocation
page read and write
1EF6000
stack
page read and write
BFA000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
7FF6D68A0000
unkown
page readonly
6C8E000
stack
page read and write
1277000
trusted library allocation
page execute and read and write
27380000000
trusted library allocation
page read and write
51CE000
stack
page read and write
726C000
heap
page read and write
28FC7AC4000
heap
page read and write
2943EC91000
trusted library allocation
page read and write
126A000
trusted library allocation
page execute and read and write
54C0000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
7FFD9BCF2000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
23A51115000
trusted library allocation
page read and write
28991748000
heap
page read and write
294471F0000
heap
page read and write
7520000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
201709A1000
heap
page read and write
2710000
trusted library allocation
page read and write
14C54010000
heap
page read and write
2442000
trusted library allocation
page execute and read and write
1670000
trusted library allocation
page read and write
215F7690000
heap
page read and write
27380000000
trusted library allocation
page read and write
5B5E000
stack
page read and write
2E48000
trusted library allocation
page read and write
7FF62B64F000
unkown
page readonly
273AD402000
heap
page read and write
28FADC90000
trusted library allocation
page read and write
4F4E000
stack
page read and write
64B1000
trusted library allocation
page read and write
D48000
stack
page read and write
8178000
heap
page read and write
B27000
heap
page read and write
20156790000
heap
page read and write
575E000
stack
page read and write
6100000
trusted library allocation
page read and write
273ACC90000
direct allocation
page execute read
39F9000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
E49FC7F000
stack
page read and write
2CE0000
trusted library allocation
page read and write
29430800000
trusted library allocation
page read and write
6DCC000
stack
page read and write
16B0000
trusted library allocation
page read and write
534E000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2D48000
heap
page read and write
7FFD9B99B000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
27380070000
trusted library allocation
page read and write
7FFD9BE17000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
2F7364B5000
heap
page read and write
27381221000
heap
page read and write
2942D082000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2460000
heap
page read and write
6152000
heap
page read and write
5278000
trusted library allocation
page read and write
9171000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
28FADD25000
heap
page read and write
23A51102000
trusted library allocation
page read and write
7FF6C12B4000
unkown
page write copy
23A51124000
heap
page read and write
5740000
heap
page read and write
27CA2FE0000
heap
page read and write
5284000
trusted library allocation
page read and write
273AB27E000
heap
page read and write
58EB000
trusted library allocation
page read and write
579E000
stack
page read and write
AECFA7E000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
8645000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
2A9FAA00000
heap
page read and write
82F0000
trusted library allocation
page execute and read and write
27381000000
heap
page read and write
28FC7E1D000
heap
page read and write
28FC7DF3000
heap
page read and write
28FB03DE000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
3F86000
trusted library allocation
page read and write
82D2000
trusted library allocation
page read and write
5510000
heap
page read and write
3271000
trusted library allocation
page read and write
5916000
trusted library allocation
page read and write
2942D300000
trusted library allocation
page read and write
E42B7CA000
stack
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
4EC5B79000
stack
page read and write
3FB1000
trusted library allocation
page read and write
27380070000
trusted library allocation
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
C29877E000
stack
page read and write
165A000
trusted library allocation
page execute and read and write
E076A7D000
stack
page read and write
2FE0000
trusted library allocation
page read and write
A45000
heap
page read and write
BE0000
heap
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
105D000
trusted library allocation
page execute and read and write
64BE000
stack
page read and write
29430790000
trusted library allocation
page read and write
27380000000
trusted library allocation
page read and write
1830C700000
heap
page read and write
1A1129A0000
heap
page read and write
5580000
heap
page read and write
27380070000
trusted library allocation
page read and write
54BE000
stack
page read and write
1440000
heap
page read and write
1FE9F490000
heap
page read and write
7FF62B655000
unkown
page readonly
10F0000
trusted library allocation
page read and write
2E30000
heap
page read and write
8FE000
stack
page read and write
52F4000
trusted library allocation
page read and write
7FFD9BE57000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
55E0000
heap
page read and write
AB8ABDD000
stack
page read and write
B90000
heap
page read and write
DDD000
trusted library allocation
page execute and read and write
6170000
trusted library allocation
page execute and read and write
28FC7A76000
heap
page read and write
E42A9FA000
stack
page read and write
DF7000
trusted library allocation
page execute and read and write
814E000
heap
page read and write
7FFD9BD25000
trusted library allocation
page read and write
7FFD9BDBA000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
7272000
heap
page read and write
6D00000
heap
page read and write
201708B4000
heap
page read and write
1FD0000
heap
page read and write
6DF1000
trusted library allocation
page read and write
2FAE000
stack
page read and write
1160000
heap
page read and write
1272000
trusted library allocation
page read and write
1150000
heap
page read and write
5A85000
trusted library allocation
page read and write
5F3E000
stack
page read and write
6BFB000
stack
page read and write
52A0000
trusted library allocation
page read and write
201582B0000
heap
page execute and read and write
27380000000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
28FBF912000
trusted library allocation
page read and write
1A1129D0000
heap
page read and write
53E0000
trusted library allocation
page read and write
201709BB000
heap
page read and write
A3F000
stack
page read and write
E50000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
ABA9FE000
stack
page read and write
59C0000
trusted library allocation
page read and write
7FFD9BD14000
trusted library allocation
page read and write
148B000
unkown
page execute and read and write
B60000
unkown
page readonly
1302000
heap
page read and write
3077000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
1FE9F470000
heap
page read and write
A8E000
stack
page read and write
2B7E000
stack
page read and write
1680000
trusted library allocation
page read and write
E42AAFF000
stack
page read and write
4EF6000
trusted library allocation
page read and write
201709D0000
heap
page read and write
3D40000
heap
page read and write
AF9000
stack
page read and write
28FB1117000
trusted library allocation
page read and write
7FFD9BCF8000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
D94000
trusted library allocation
page read and write
52D2000
trusted library allocation
page read and write
201682E1000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
There are 1959 hidden memdumps, click here to show them.