IOC Report
BraveCrashHandler64.exe

loading gif

Files

File Path
Type
Category
Malicious
BraveCrashHandler64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\12605RR4.bat
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BraveCrashHandler64.exe
"C:\Users\user\Desktop\BraveCrashHandler64.exe"
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name M2403 -accept-tos
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ""C:\Users\user~1\AppData\Local\Temp\12605RR4.bat" "C:\Users\user\Desktop\BraveCrashHandler64.exe""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 1252
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /i "RuntimeBrooker.exe"
There are 27 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.iproyal.comt
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==8
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://crl.xrampsecurity.com/XGCA.crlGo
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.chambersign.org1
unknown
http://www.firmaprofesional.com/cps0
unknown
http://repository.swisssign.com/0
unknown
http://crl.securetrust.com/SGCA.crl=
unknown
https://enigmaprotector.com/taggant/spv.crl0
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://api.iproyal.com1714047682worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
unknown
https://api.iproyal.com/https://api6.my-ip.io/ipidna:
unknown
http://crl.securetrust.com/STCA.crl0
unknown
https://enigmaprotector.com/taggant/user.crl0
unknown
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==kqGk19
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
unknown
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==ExesL3jCExiRYi82g3ylkSM5T1
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://ocsp.accv.es
unknown
https://api.iproyal.com1714053689worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
unknown
http://cps.chambersign.org/cps/chambersignroot.html0
unknown
http://policy.camerfirma.com0
unknown
http://crl.certigna.fr/certignarootca.crl
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.accv.es/legislacion_c.htm0U
unknown
https://api.iproyal.com1714047672worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://ocsp.accv.es0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0B1
unknown
https://api.iproyal.com/v1/users/login
unknown
https://api.iproyal.com1714047675worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllCommon
unknown
https://api.iproyal.com1714047687worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
unknown
https://api.iproyal.comCommonProgramFiles=C:
unknown
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==AfWgpX0XnpfyEMMJtmlM3HjxKy
unknown
https://api.iproyal.com1714047679worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
unknown
https://api.iproyal.com/v1/users/loginPost
unknown
https://www.catcert.net/verarrel
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://crl.chambersign.org/chambersignroot.crl0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==7m9fHZvLPTY2pWRLrSiq0MGQOl
unknown
http://crl.certigna.fr/certignarootca.crlhttp://crl.dhimyotis.com/certignarootca.crl
unknown
https://www.catcert.net/verarrel05
unknown
http://crl.certigna.fr/certignarootca.crl01
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
unknown
http://ocsp.accv.esTWCA
unknown
http://www.accv.es00
unknown
http://www.cert.fnmt.es/dpcs/0
unknown
https://api.iproyal.com
unknown
https://api.iproyal.com1714053685worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
unknown
There are 49 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.iproyal.com
193.228.196.69

IPs

IP
Domain
Country
Malicious
193.228.196.69
api.iproyal.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
C000242000
direct allocation
page read and write
28BC3D70000
heap
page read and write
C000122000
direct allocation
page read and write
C0002E0000
direct allocation
page read and write
C000296000
direct allocation
page read and write
1E5B278D000
direct allocation
page read and write
2061B565000
heap
page read and write
B95000
unkown
page readonly
7E9000
unkown
page execute and write copy
B95000
unkown
page readonly
2061ACC9000
direct allocation
page read and write
C00029B000
direct allocation
page read and write
C00019C000
direct allocation
page read and write
2BA5000
unkown
page execute and read and write
2899CEBD000
direct allocation
page read and write
2BA5000
unkown
page execute and write copy
BF6D3FF000
stack
page read and write
C000100000
direct allocation
page read and write
AC7000
unkown
page execute and write copy
101FFE000
stack
page read and write
C0002AA000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C000238000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
310E000
stack
page read and write
16361070000
direct allocation
page read and write
C000072000
direct allocation
page read and write
FE2000
unkown
page execute and read and write
7FFB2B3C0000
direct allocation
page execute and read and write
7E9000
unkown
page execute and write copy
C000120000
direct allocation
page read and write
C0002A4000
direct allocation
page read and write
223F000
unkown
page execute and read and write
C00010A000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
2E60000
heap
page read and write
2899D0E0000
heap
page read and write
C000004000
direct allocation
page read and write
30B8000
heap
page read and write
26132D84000
direct allocation
page read and write
303E000
stack
page read and write
C0000DC000
direct allocation
page read and write
1D46CB20000
heap
page read and write
26159AC4000
direct allocation
page read and write
2061BFFC000
heap
page read and write
C0000DA000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
CA9BFFF000
stack
page read and write
28BC32A0000
heap
page read and write
1D46CAE0000
heap
page read and write
C0001BE000
direct allocation
page read and write
C0002C0000
direct allocation
page read and write
6EDF1000
unkown
page execute read
1D46C460000
heap
page read and write
2061AB90000
heap
page read and write
C00008A000
direct allocation
page read and write
870000
heap
page read and write
3D0000
heap
page read and write
23F536A0000
direct allocation
page read and write
7FF4B17A0000
direct allocation
page execute and read and write
C00003A000
direct allocation
page read and write
3068000
heap
page read and write
26132D8B000
direct allocation
page read and write
4C6F000
stack
page read and write
C000252000
direct allocation
page read and write
6EE0F000
unkown
page readonly
2DD0000
heap
page read and write
5A5000
heap
page read and write
C00006E000
direct allocation
page read and write
C000120000
direct allocation
page read and write
C0002A0000
direct allocation
page read and write
2A28000
direct allocation
page execute and read and write
2DD0000
heap
page read and write
7E9000
unkown
page readonly
23F566D8000
heap
page read and write
40A000
unkown
page execute and write copy
C00003A000
direct allocation
page read and write
C000162000
direct allocation
page read and write
E01000
unkown
page execute and write copy
C00023C000
direct allocation
page read and write
2899E0A0000
heap
page read and write
C000260000
direct allocation
page read and write
6EE0D000
unkown
page read and write
C000052000
direct allocation
page read and write
4F0000
unkown
page readonly
B5F000
unkown
page read and write
1D46CC27000
heap
page read and write
B337BFE000
stack
page read and write
C00018E000
direct allocation
page read and write
26132FD0000
heap
page read and write
4EE000
stack
page read and write
1D46C660000
heap
page read and write
1633B320000
heap
page read and write
6EDF1000
unkown
page execute read
C0001EE000
direct allocation
page read and write
503E000
stack
page read and write
C000052000
direct allocation
page read and write
10E5000
unkown
page execute and read and write
2061AD50000
heap
page read and write
B95000
unkown
page execute and write copy
10E5000
unkown
page execute and read and write
401000
unkown
page execute and write copy
B2B2DFF000
stack
page read and write
C000244000
direct allocation
page read and write
C000240000
direct allocation
page read and write
16338758000
heap
page read and write
223F000
unkown
page execute and read and write
C000292000
direct allocation
page read and write
C000164000
direct allocation
page read and write
C000124000
direct allocation
page read and write
414000
unkown
page execute and write copy
2D4E000
stack
page read and write
7E0000
heap
page read and write
2899CD40000
heap
page read and write
C2E000
unkown
page readonly
6BA000
heap
page read and write
2061ACCD000
direct allocation
page read and write
C000252000
direct allocation
page read and write
B14000
heap
page read and write
C000056000
direct allocation
page read and write
4F4E000
stack
page read and write
C00026C000
direct allocation
page read and write
26159AA7000
direct allocation
page read and write
2A3C000
direct allocation
page execute and read and write
26132DE9000
heap
page read and write
23F55A80000
heap
page read and write
C000132000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C000030000
direct allocation
page read and write
CA9B7FE000
stack
page read and write
2061BFF8000
heap
page read and write
4F1000
unkown
page execute and write copy
B566BFE000
stack
page read and write
C000252000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
785000
heap
page read and write
2BA2000
unkown
page execute and write copy
7EF000
stack
page read and write
C000280000
direct allocation
page read and write
4F2F000
stack
page read and write
4F0000
unkown
page readonly
28BC1818000
heap
page read and write
C00007A000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
A40000
heap
page read and write
C00014E000
direct allocation
page read and write
28BC3478000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C000260000
direct allocation
page read and write
1633A1C0000
trusted library allocation
page read and write
309A000
heap
page read and write
C000008000
direct allocation
page read and write
C0002D4000
direct allocation
page read and write
23F55C05000
heap
page read and write
2DD5000
heap
page read and write
2A28000
direct allocation
page execute and read and write
7FFB2B3C0000
direct allocation
page execute and read and write
2DE5000
heap
page read and write
4F1000
unkown
page execute read
C0000AA000
direct allocation
page read and write
C000030000
direct allocation
page read and write
BF6E3FE000
stack
page read and write
C000174000
direct allocation
page read and write
CA9A3FF000
stack
page read and write
ADD1FE000
stack
page read and write
C0001EE000
direct allocation
page read and write
E01000
unkown
page execute and write copy
C000030000
direct allocation
page read and write
C00024F000
direct allocation
page read and write
A95000
heap
page read and write
1633A1C4000
direct allocation
page read and write
23F566D6000
heap
page read and write
C1F000
stack
page read and write
71A000
heap
page read and write
16360FFD000
direct allocation
page read and write
C00020E000
direct allocation
page read and write
C000035000
direct allocation
page read and write
C000124000
direct allocation
page read and write
898000
heap
page read and write
C000008000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
309A000
heap
page read and write
6E0000
heap
page read and write
B14000
heap
page read and write
9DF000
stack
page read and write
C00023C000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
8DE000
stack
page read and write
1E58B9D0000
heap
page read and write
2899E05F000
direct allocation
page read and write
AC0000
trusted library allocation
page read and write
4F0000
unkown
page readonly
C00027E000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
2899D850000
heap
page read and write
C000100000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
B565BF9000
stack
page read and write
B95000
unkown
page readonly
2DC0000
heap
page read and write
1633AB51000
heap
page read and write
C000252000
direct allocation
page read and write
1D46CB60000
heap
page read and write
B567BFF000
stack
page read and write
AC7000
unkown
page read and write
C00016E000
direct allocation
page read and write
C0001F8000
direct allocation
page read and write
C000030000
direct allocation
page read and write
1633A9E0000
heap
page read and write
2D1C000
stack
page read and write
2899D150000
heap
page read and write
780000
heap
page read and write
6EDF1000
unkown
page execute read
C0001B4000
direct allocation
page read and write
C000248000
direct allocation
page read and write
C000000000
direct allocation
page read and write
2061ACC0000
trusted library allocation
page read and write
C0002BE000
direct allocation
page read and write
C000025000
direct allocation
page read and write
7E9000
unkown
page readonly
2899D070000
direct allocation
page read and write
C000075000
direct allocation
page read and write
2899CE30000
heap
page read and write
C000024000
direct allocation
page read and write
28BC1810000
heap
page read and write
B14000
heap
page read and write
C000018000
direct allocation
page read and write
28BC36F0000
heap
page read and write
4A7E000
stack
page read and write
C000242000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
4FEE000
stack
page read and write
28BC3490000
direct allocation
page read and write
16338720000
trusted library allocation
page read and write
261336D0000
heap
page read and write
2061ABA0000
heap
page read and write
581000
heap
page read and write
4F1000
unkown
page execute and write copy
C000114000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
B5F000
unkown
page read and write
C0001BC000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
7FFB2B3C0000
direct allocation
page execute and read and write
C00003A000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
1E58B9B0000
direct allocation
page read and write
23F55300000
heap
page read and write
32D0000
direct allocation
page execute and read and write
C000166000
direct allocation
page read and write
B2C000
stack
page read and write
C00016E000
direct allocation
page read and write
1E58BCD0000
heap
page read and write
AEE000
heap
page read and write
2A28000
direct allocation
page execute and read and write
C00019E000
direct allocation
page read and write
C000102000
direct allocation
page read and write
28BC3EB0000
heap
page read and write
C10000
heap
page read and write
C000016000
direct allocation
page read and write
28BC3E30000
heap
page read and write
30BC000
heap
page read and write
4F0000
unkown
page readonly
C0000AA000
direct allocation
page read and write
2899D810000
heap
page read and write
C000035000
direct allocation
page read and write
6EDF1000
unkown
page execute read
C000112000
direct allocation
page read and write
16338750000
heap
page read and write
FE2000
unkown
page execute and read and write
C00005C000
direct allocation
page read and write
6CB000
heap
page read and write
32A0000
heap
page read and write
1E58B920000
heap
page read and write
32A8000
heap
page read and write
C00011E000
direct allocation
page read and write
C000132000
direct allocation
page read and write
C000140000
direct allocation
page read and write
3230000
heap
page read and write
28BC3419000
direct allocation
page read and write
C000294000
direct allocation
page read and write
31D1000
heap
page read and write
2EE0000
heap
page read and write
C000264000
direct allocation
page read and write
7E9000
unkown
page readonly
FB1000
unkown
page execute and read and write
50FF000
stack
page read and write
C000140000
direct allocation
page read and write
10E5000
unkown
page execute and read and write
2899D881000
heap
page read and write
23F55BC0000
heap
page read and write
3060000
heap
page read and write
ADE000
stack
page read and write
28BC3E70000
heap
page read and write
16338680000
heap
page read and write
C000160000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
4F1000
unkown
page execute read
1D46C0D9000
direct allocation
page read and write
C00023A000
direct allocation
page read and write
C000180000
direct allocation
page read and write
5AC000
heap
page read and write
C000254000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
2C10000
heap
page read and write
309A000
heap
page read and write
5A9000
heap
page read and write
B14000
heap
page read and write
FB1000
unkown
page execute and read and write
2613370C000
heap
page read and write
C000180000
direct allocation
page read and write
2DD0000
heap
page read and write
AD8000
heap
page read and write
28BC3700000
heap
page read and write
2B9D000
unkown
page execute and read and write
474E000
stack
page read and write
6EE0F000
unkown
page readonly
C25FFFE000
stack
page read and write
1E58B8ED000
direct allocation
page read and write
1D46D260000
heap
page read and write
28BC3D30000
heap
page read and write
C0002D6000
direct allocation
page read and write
C000124000
direct allocation
page read and write
2BA2000
unkown
page execute and write copy
2A28000
direct allocation
page execute and read and write
B65000
unkown
page read and write
FA6000
unkown
page execute and read and write
2899CF30000
heap
page read and write
AC7000
unkown
page execute and write copy
FA6000
unkown
page execute and read and write
2061B5A6000
heap
page read and write
C0001B8000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
7E9000
unkown
page readonly
28BC48B5000
heap
page read and write
2D4E000
stack
page read and write
B14000
heap
page read and write
C2603FE000
stack
page read and write
6EDF0000
unkown
page readonly
C000037000
direct allocation
page read and write
C000140000
direct allocation
page read and write
5A2000
heap
page read and write
C00015E000
direct allocation
page read and write
E01000
unkown
page readonly
C000242000
direct allocation
page read and write
C000100000
direct allocation
page read and write
E01000
unkown
page execute and write copy
C000248000
direct allocation
page read and write
C000240000
direct allocation
page read and write
950000
heap
page read and write
32DC000
heap
page read and write
28BC48B3000
heap
page read and write
318E000
stack
page read and write
ADD9FE000
stack
page read and write
30AC000
heap
page read and write
6EE0D000
unkown
page read and write
28BC34C0000
direct allocation
page read and write
C000192000
direct allocation
page read and write
2E98000
heap
page read and write
C000110000
direct allocation
page read and write
C000124000
direct allocation
page read and write
1633A240000
heap
page read and write
FB4000
unkown
page execute and read and write
C000254000
direct allocation
page read and write
32D0000
direct allocation
page execute and read and write
1D46D410000
heap
page read and write
2899CF4F000
heap
page read and write
C000256000
direct allocation
page read and write
1E589DC0000
heap
page read and write
1E58C8F8000
direct allocation
page read and write
B14000
heap
page read and write
C00000E000
direct allocation
page read and write
100FFE000
stack
page read and write
1E58B9C0000
heap
page read and write
2A3C000
direct allocation
page execute and read and write
C00026C000
direct allocation
page read and write
2899D048000
direct allocation
page read and write
2C9C000
stack
page read and write
C000254000
direct allocation
page read and write
2061B520000
heap
page read and write
FB4000
unkown
page execute and read and write
23F536A4000
direct allocation
page read and write
E73000
unkown
page execute and write copy
FB4000
unkown
page execute and read and write
2A3C000
direct allocation
page execute and read and write
B5F000
unkown
page read and write
3270000
heap
page read and write
6EE0F000
unkown
page readonly
E73000
unkown
page execute and write copy
E74000
unkown
page execute and read and write
C000096000
direct allocation
page read and write
1D46A618000
heap
page read and write
206190D0000
heap
page read and write
2061B3E0000
heap
page read and write
C000037000
direct allocation
page read and write
2BA2000
unkown
page execute and write copy
26132DD0000
heap
page read and write
E01000
unkown
page readonly
C00020E000
direct allocation
page read and write
1D46C3D0000
heap
page read and write
6EE0F000
unkown
page readonly
16338730000
heap
page read and write
1633A620000
heap
page read and write
63C000
stack
page read and write
C000000000
direct allocation
page read and write
2CCD000
heap
page read and write
23F55C45000
heap
page read and write
26131150000
heap
page read and write
C00001C000
direct allocation
page read and write
6EE0D000
unkown
page read and write
ADD5FD000
stack
page read and write
4F1000
unkown
page execute and write copy
1E58CD64000
heap
page read and write
1D46C1F0000
heap
page read and write
BDF000
stack
page read and write
E74000
unkown
page execute and read and write
2A14000
direct allocation
page execute and read and write
C0000BE000
direct allocation
page read and write
23F56300000
heap
page read and write
28BC34A0000
direct allocation
page read and write
C00020E000
direct allocation
page read and write
31D0000
heap
page read and write
2061AB94000
heap
page read and write
C00007E000
direct allocation
page read and write
4790000
heap
page read and write
1E58C253000
heap
page read and write
BF0000
heap
page read and write
C00028E000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
2CB0000
heap
page read and write
314F000
stack
page read and write
C000276000
direct allocation
page read and write
C000258000
direct allocation
page read and write
C000120000
direct allocation
page read and write
2A3C000
direct allocation
page execute and read and write
2061ACC0000
trusted library allocation
page read and write
C000220000
direct allocation
page read and write
C000248000
direct allocation
page read and write
1D46C164000
heap
page read and write
C000075000
direct allocation
page read and write
B3383FF000
stack
page read and write
1FD000
stack
page read and write
C0000A2000
direct allocation
page read and write
28BC3770000
heap
page read and write
23F536AD000
direct allocation
page read and write
4F8F000
stack
page read and write
C0001EE000
direct allocation
page read and write
FA6000
unkown
page execute and read and write
C0001AC000
direct allocation
page read and write
2CEA000
heap
page read and write
C000037000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
CA99FF9000
stack
page read and write
B5F000
stack
page read and write
890000
heap
page read and write
FB4000
unkown
page execute and read and write
4F0000
unkown
page readonly
C00007E000
direct allocation
page read and write
1D46C0D4000
direct allocation
page read and write
2899CEB0000
direct allocation
page read and write
2061BFFF000
heap
page read and write
FE2000
unkown
page execute and read and write
C0001C0000
direct allocation
page read and write
C000102000
direct allocation
page read and write
C000258000
direct allocation
page read and write
26133797000
heap
page read and write
C2E000
unkown
page readonly
23F55310000
heap
page read and write
6EDF1000
unkown
page execute read
C000008000
direct allocation
page read and write
1E5B2785000
direct allocation
page read and write
C00023A000
direct allocation
page read and write
B14000
heap
page read and write
C000056000
direct allocation
page read and write
C000152000
direct allocation
page read and write
206190A0000
heap
page read and write
B6C000
stack
page read and write
C000052000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C2E000
unkown
page readonly
C000056000
direct allocation
page read and write
C25E7FF000
stack
page read and write
C000052000
direct allocation
page read and write
C000045000
direct allocation
page read and write
C000082000
direct allocation
page read and write
C000264000
direct allocation
page read and write
FB4000
unkown
page execute and read and write
C00000E000
direct allocation
page read and write
BDE000
stack
page read and write
C000080000
direct allocation
page read and write
2BA5000
unkown
page execute and write copy
C000030000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
327E000
stack
page read and write
C000008000
direct allocation
page read and write
C000025000
direct allocation
page read and write
4F10000
heap
page read and write
C000166000
direct allocation
page read and write
1D46D3C5000
direct allocation
page read and write
BF6CFF9000
stack
page read and write
6EDF0000
unkown
page readonly
C0000C0000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C000112000
direct allocation
page read and write
1E589ED0000
heap
page read and write
4FCE000
stack
page read and write
AC7000
unkown
page read and write
C000124000
direct allocation
page read and write
2B9D000
unkown
page execute and read and write
2BA5000
unkown
page execute and write copy
FB1000
unkown
page execute and read and write
C000094000
direct allocation
page read and write
E01000
unkown
page readonly
C000118000
direct allocation
page read and write
1E58BAD0000
heap
page read and write
7FF4DC000000
direct allocation
page execute and read and write
C00020E000
direct allocation
page read and write
E73000
unkown
page execute and write copy
C00010A000
direct allocation
page read and write
59A000
heap
page read and write
B95000
unkown
page readonly
23F550C0000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
59A000
heap
page read and write
440000
heap
page read and write
C000041000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
C000045000
direct allocation
page read and write
31AE000
stack
page read and write
23F550F0000
direct allocation
page read and write
30BC000
heap
page read and write
C1E000
stack
page read and write
2A24000
direct allocation
page execute and read and write
C0001A6000
direct allocation
page read and write
6EE0D000
unkown
page read and write
1E58C20C000
heap
page read and write
C000112000
direct allocation
page read and write
31DE000
stack
page read and write
C000052000
direct allocation
page read and write
FB9000
unkown
page execute and read and write
C0002D8000
direct allocation
page read and write
C000114000
direct allocation
page read and write
2899D710000
heap
page read and write
C000256000
direct allocation
page read and write
C000102000
direct allocation
page read and write
AD8000
heap
page read and write
28BC3970000
heap
page read and write
E73000
unkown
page execute and write copy
C000174000
direct allocation
page read and write
C000162000
direct allocation
page read and write
16360FF0000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C00024F000
direct allocation
page read and write
26132DEB000
heap
page read and write
C0000A0000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
26132F04000
direct allocation
page read and write
1E58C150000
heap
page read and write
23F55680000
heap
page read and write
B95000
unkown
page readonly
223F000
unkown
page execute and read and write
C000287000
direct allocation
page read and write
1E58C930000
direct allocation
page read and write
20619090000
heap
page read and write
163386C0000
heap
page read and write
C00013C000
direct allocation
page read and write
1633A1C9000
direct allocation
page read and write
B1B000
heap
page read and write
28BC3414000
direct allocation
page read and write
325F000
stack
page read and write
2899CF4A000
heap
page read and write
C000075000
direct allocation
page read and write
E73000
unkown
page execute and write copy
10E5000
unkown
page execute and read and write
28BC33E4000
heap
page read and write
23F5515D000
direct allocation
page read and write
28BC3F37000
heap
page read and write
B65000
unkown
page read and write
28BC17F0000
heap
page read and write
2B9D000
unkown
page execute and read and write
32D8000
direct allocation
page execute and read and write
AC7000
unkown
page read and write
3040000
heap
page read and write
10C000
stack
page read and write
C00009E000
direct allocation
page read and write
B65000
unkown
page read and write
C000220000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
B95000
unkown
page execute and write copy
B5677FE000
stack
page read and write
C00015C000
direct allocation
page read and write
1D46CBA0000
heap
page read and write
E74000
unkown
page execute and read and write
B14000
heap
page read and write
2BA2000
unkown
page execute and write copy
5070000
heap
page read and write
B5F000
unkown
page read and write
C2E000
unkown
page readonly
1D46D262000
heap
page read and write
C00013C000
direct allocation
page read and write
E73000
unkown
page execute and write copy
B14000
heap
page read and write
C00013C000
direct allocation
page read and write
1D46C0DD000
direct allocation
page read and write
C000214000
direct allocation
page read and write
6EE0D000
unkown
page read and write
C000152000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C000285000
direct allocation
page read and write
5040000
heap
page read and write
C00026C000
direct allocation
page read and write
23F55BBC000
heap
page read and write
C000132000
direct allocation
page read and write
31D000
stack
page read and write
1027FE000
stack
page read and write
2A28000
direct allocation
page execute and read and write
C00014E000
direct allocation
page read and write
BA0000
heap
page read and write
31D5000
heap
page read and write
310E000
stack
page read and write
E73000
unkown
page execute and write copy
C000090000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
4AFE000
stack
page read and write
4F0000
unkown
page readonly
BF6EFFE000
stack
page read and write
1E58C201000
heap
page read and write
B14000
heap
page read and write
5090000
heap
page read and write
95F000
stack
page read and write
2E5F000
stack
page read and write
2BA2000
unkown
page execute and write copy
6EE06000
unkown
page readonly
C000043000
direct allocation
page read and write
B3377FF000
stack
page read and write
B65000
unkown
page read and write
E01000
unkown
page execute and write copy
C000118000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
2BA5000
unkown
page execute and read and write
59A000
heap
page read and write
2BA5000
unkown
page execute and write copy
C000030000
direct allocation
page read and write
26132DD4000
heap
page read and write
C0000E4000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
C000132000
direct allocation
page read and write
4F0000
unkown
page readonly
BF6EBFE000
stack
page read and write
C000000000
direct allocation
page read and write
C000180000
direct allocation
page read and write
223F000
unkown
page execute and read and write
23F55B00000
heap
page read and write
C00001C000
direct allocation
page read and write
23F53700000
heap
page read and write
BF6E7FE000
stack
page read and write
B5F000
unkown
page read and write
28BC3340000
heap
page read and write
C00015C000
direct allocation
page read and write
7E9000
unkown
page readonly
2DEF000
stack
page read and write
10E5000
unkown
page execute and read and write
A90000
heap
page read and write
C000112000
direct allocation
page read and write
C000160000
direct allocation
page read and write
4F1000
unkown
page execute read
4F1000
unkown
page execute and write copy
26131190000
heap
page read and write
2BA2000
unkown
page execute and write copy
16338734000
heap
page read and write
6EE0F000
unkown
page readonly
C000045000
direct allocation
page read and write
32BD000
heap
page read and write
2899CDA0000
heap
page read and write
59F000
heap
page read and write
4E4E000
stack
page read and write
C00010C000
direct allocation
page read and write
C00023A000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C0000EA000
direct allocation
page read and write
C000258000
direct allocation
page read and write
B8D000
unkown
page read and write
6EDF1000
unkown
page execute read
B566FFF000
stack
page read and write
B95000
unkown
page execute and write copy
C000238000
direct allocation
page read and write
C2E000
unkown
page readonly
30AC000
heap
page read and write
23F55155000
direct allocation
page read and write
FA6000
unkown
page execute and read and write
C000140000
direct allocation
page read and write
1D46C0D0000
direct allocation
page read and write
2A28000
direct allocation
page execute and read and write
1017FE000
stack
page read and write
C00011E000
direct allocation
page read and write
2EDE000
stack
page read and write
E73000
unkown
page execute and write copy
B338FFF000
stack
page read and write
23F550A0000
direct allocation
page read and write
57D000
heap
page read and write
1633AA20000
heap
page read and write
B14000
heap
page read and write
2A24000
direct allocation
page execute and read and write
B2B29FE000
stack
page read and write
2061AD20000
direct allocation
page read and write
4F1000
unkown
page execute and write copy
C000052000
direct allocation
page read and write
B8D000
unkown
page read and write
20641A5D000
direct allocation
page read and write
FE2000
unkown
page execute and read and write
E01000
unkown
page readonly
FA6000
unkown
page execute and read and write
2CB8000
heap
page read and write
1D46C080000
heap
page read and write
C0000CE000
direct allocation
page read and write
C000041000
direct allocation
page read and write
23F566DE000
heap
page read and write
26132D00000
heap
page read and write
C00003A000
direct allocation
page read and write
5AC000
heap
page read and write
C000234000
direct allocation
page read and write
30AC000
heap
page read and write
C000025000
direct allocation
page read and write
1D46C0D0000
trusted library allocation
page read and write
C000272000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
28BC3410000
trusted library allocation
page read and write
FA6000
unkown
page execute and read and write
C00024F000
direct allocation
page read and write
C000194000
direct allocation
page read and write
C000270000
direct allocation
page read and write
C000214000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
C000075000
direct allocation
page read and write
57F000
heap
page read and write
C000102000
direct allocation
page read and write
2061ACC4000
direct allocation
page read and write
2899CEB0000
trusted library allocation
page read and write
1D46CBE5000
heap
page read and write
6EDF1000
unkown
page execute read
C000110000
direct allocation
page read and write
B8D000
unkown
page read and write
26159AE0000
direct allocation
page read and write
C000214000
direct allocation
page read and write
C000120000
direct allocation
page read and write
2BA2000
unkown
page execute and write copy
4B3F000
stack
page read and write
C000080000
direct allocation
page read and write
C000234000
direct allocation
page read and write
2899E075000
direct allocation
page read and write
C0E000
stack
page read and write
C00015C000
direct allocation
page read and write
23F550A8000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
4F1000
unkown
page execute read
2061B511000
heap
page read and write
2899D914000
heap
page read and write
325F000
stack
page read and write
6EDF0000
unkown
page readonly
B95000
unkown
page execute and write copy
1E589EA0000
heap
page read and write
1D46D3A0000
direct allocation
page read and write
C000290000
direct allocation
page read and write
1E58B8E0000
direct allocation
page read and write
FE2000
unkown
page execute and read and write
C00001C000
direct allocation
page read and write
32D0000
direct allocation
page execute and read and write
AC0000
heap
page read and write
760000
heap
page read and write
2977000
heap
page read and write
26133701000
heap
page read and write
C000043000
direct allocation
page read and write
2061AD40000
direct allocation
page read and write
1B0000
heap
page read and write
C000164000
direct allocation
page read and write
6AD000
unkown
page execute and write copy
7FF3FF730000
direct allocation
page execute and read and write
1D46CA20000
heap
page read and write
C0001C2000
direct allocation
page read and write
B5663FE000
stack
page read and write
26131218000
heap
page read and write
B14000
heap
page read and write
16338690000
heap
page read and write
3238000
heap
page read and write
B95000
unkown
page execute and write copy
C000264000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
20641A30000
direct allocation
page read and write
5110000
heap
page read and write
E01000
unkown
page execute and write copy
C000238000
direct allocation
page read and write
1633AAA0000
heap
page read and write
C000274000
direct allocation
page read and write
C000152000
direct allocation
page read and write
2DCE000
stack
page read and write
C000100000
direct allocation
page read and write
23F55170000
heap
page read and write
C000043000
direct allocation
page read and write
2E1E000
stack
page read and write
2061B4A0000
heap
page read and write
4F1000
unkown
page execute and write copy
2061BBE0000
direct allocation
page read and write
C000047000
direct allocation
page read and write
2899E050000
direct allocation
page read and write
6EE06000
unkown
page readonly
E01000
unkown
page execute and write copy
C00026C000
direct allocation
page read and write
AC7000
unkown
page read and write
C0000EE000
direct allocation
page read and write
100BFE000
stack
page read and write
C000196000
direct allocation
page read and write
67C000
stack
page read and write
C00012A000
direct allocation
page read and write
ADC1FE000
stack
page read and write
2061AFE0000
heap
page read and write
C000060000
direct allocation
page read and write
C000252000
direct allocation
page read and write
C000174000
direct allocation
page read and write
1E58B8E0000
trusted library allocation
page read and write
1D46C3E0000
heap
page read and write
1023FE000
stack
page read and write
26159AC0000
direct allocation
page read and write
23F566D9000
heap
page read and write
30BC000
heap
page read and write
6EE06000
unkown
page readonly
4F1000
unkown
page execute read
C000248000
direct allocation
page read and write
26132D89000
direct allocation
page read and write
30B9000
heap
page read and write
830000
heap
page read and write
C000047000
direct allocation
page read and write
C000182000
direct allocation
page read and write
6EDF0000
unkown
page readonly
C000258000
direct allocation
page read and write
26159AC8000
direct allocation
page read and write
B95000
unkown
page execute and write copy
B95000
unkown
page execute and write copy
B2B25FE000
stack
page read and write
C0001BA000
direct allocation
page read and write
4FAF000
stack
page read and write
4ECE000
stack
page read and write
2899CDB0000
heap
page read and write
23F53640000
heap
page read and write
1D46C2C0000
heap
page read and write
26133650000
heap
page read and write
C000162000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
314E000
stack
page read and write
1E58C990000
heap
page read and write
1E58B8E9000
direct allocation
page read and write
C00024A000
direct allocation
page read and write
23F55380000
heap
page read and write
C000240000
direct allocation
page read and write
C000256000
direct allocation
page read and write
1D46C0D0000
trusted library allocation
page read and write
C000056000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
C000160000
direct allocation
page read and write
4F1000
unkown
page execute and write copy
C000098000
direct allocation
page read and write
4F0000
unkown
page readonly
3E0000
heap
page read and write
C000120000
direct allocation
page read and write
6EE06000
unkown
page readonly
C000110000
direct allocation
page read and write
C000246000
direct allocation
page read and write
AD0000
heap
page read and write
321D000
stack
page read and write
C00003A000
direct allocation
page read and write
2061BFFB000
heap
page read and write
23F536A0000
trusted library allocation
page read and write
C0000A6000
direct allocation
page read and write
1633AAE0000
heap
page read and write
23F53610000
heap
page read and write
C000162000
direct allocation
page read and write
23F55480000
heap
page read and write
4F0F000
stack
page read and write
C0002A4000
direct allocation
page read and write
C000112000
direct allocation
page read and write
2899D060000
direct allocation
page read and write
E73000
unkown
page execute and write copy
C00020E000
direct allocation
page read and write
4F1000
unkown
page execute read
1D46C150000
direct allocation
page read and write
BE0000
heap
page read and write
91E000
stack
page read and write
C00005C000
direct allocation
page read and write
507F000
stack
page read and write
C000025000
direct allocation
page read and write
C0002BC000
direct allocation
page read and write
206190F0000
heap
page read and write
E73000
unkown
page execute and write copy
31A8000
heap
page read and write
30BC000
heap
page read and write
C00023C000
direct allocation
page read and write
1D46A610000
heap
page read and write
AC7000
unkown
page read and write
B3373FE000
stack
page read and write
C000118000
direct allocation
page read and write
99E000
stack
page read and write
C000174000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
1E58CD62000
heap
page read and write
B95000
unkown
page readonly
6EDF1000
unkown
page execute read
FA6000
unkown
page execute and read and write
2061B51C000
heap
page read and write
1633A310000
heap
page read and write
C000260000
direct allocation
page read and write
4F0000
unkown
page readonly
FB4000
unkown
page execute and read and write
4F0000
unkown
page readonly
32C000
stack
page read and write
1633B6F4000
heap
page read and write
C000160000
direct allocation
page read and write
4BBF000
stack
page read and write
6EE06000
unkown
page readonly
FB1000
unkown
page execute and read and write
2DCE000
stack
page read and write
C00005C000
direct allocation
page read and write
C000075000
direct allocation
page read and write
3D0000
heap
page read and write
C000164000
direct allocation
page read and write
B95000
unkown
page readonly
C00011E000
direct allocation
page read and write
67F000
stack
page read and write
50BE000
stack
page read and write
E74000
unkown
page execute and read and write
C000246000
direct allocation
page read and write
B65000
unkown
page read and write
23F55B40000
heap
page read and write
2D8E000
stack
page read and write
C000286000
direct allocation
page read and write
C000152000
direct allocation
page read and write
B5667FF000
stack
page read and write
C00001C000
direct allocation
page read and write
1D46D264000
heap
page read and write
7E9000
unkown
page execute and write copy
C000264000
direct allocation
page read and write
2A28000
direct allocation
page execute and read and write
ADCDFF000
stack
page read and write
1E589F16000
heap
page read and write
2A3C000
direct allocation
page execute and read and write
1D46C160000
heap
page read and write
C00024F000
direct allocation
page read and write
C0002CC000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
E74000
unkown
page execute and read and write
2A28000
direct allocation
page execute and read and write
7FFB2B3C0000
direct allocation
page execute and read and write
7FF4AF9A0000
direct allocation
page execute and read and write
47C0000
heap
page read and write
321E000
stack
page read and write
C000084000
direct allocation
page read and write
26132D80000
trusted library allocation
page read and write
C000264000
direct allocation
page read and write
470F000
stack
page read and write
6EDF0000
unkown
page readonly
C0001BE000
direct allocation
page read and write
1633AB60000
heap
page read and write
C000000000
direct allocation
page read and write
2A3C000
direct allocation
page execute and read and write
2061ACC0000
direct allocation
page read and write
ADC9FE000
stack
page read and write
C00013C000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
59E000
heap
page read and write
C000282000
direct allocation
page read and write
C0002C6000
direct allocation
page read and write
28BC354D000
direct allocation
page read and write
1633B6F1000
heap
page read and write
C000100000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000035000
direct allocation
page read and write
1D46A5C0000
heap
page read and write
C000090000
direct allocation
page read and write
23F536A0000
trusted library allocation
page read and write
1D46CA60000
heap
page read and write
C00000C000
direct allocation
page read and write
C000260000
direct allocation
page read and write
2899D7D0000
heap
page read and write
1E5B2760000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C000045000
direct allocation
page read and write
2F2D000
heap
page read and write
2899B280000
heap
page read and write
C000260000
direct allocation
page read and write
E73000
unkown
page execute and write copy
4F0000
unkown
page readonly
1007F8000
stack
page read and write
2B9D000
unkown
page execute and read and write
C000220000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
7E9000
unkown
page execute and write copy
B3387FF000
stack
page read and write
C0002B8000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
C000056000
direct allocation
page read and write
26132F40000
heap
page read and write
C000035000
direct allocation
page read and write
10E5000
unkown
page execute and read and write
4CAE000
stack
page read and write
A48000
heap
page read and write
2BA5000
unkown
page execute and read and write
E01000
unkown
page execute and write copy
20641A55000
direct allocation
page read and write
C00023A000
direct allocation
page read and write
AC7000
unkown
page read and write
2BA2000
unkown
page execute and write copy
480F000
stack
page read and write
30BC000
heap
page read and write
C000246000
direct allocation
page read and write
2A3C000
direct allocation
page execute and read and write
4F0000
unkown
page readonly
C00007A000
direct allocation
page read and write
101BFE000
stack
page read and write
23F5513F000
direct allocation
page read and write
C000030000
direct allocation
page read and write
2061B4E0000
heap
page read and write
10E5000
unkown
page execute and read and write
E73000
unkown
page execute and write copy
1633A2E4000
direct allocation
page read and write
C000152000
direct allocation
page read and write
6EE0D000
unkown
page read and write
C000037000
direct allocation
page read and write
6EE0D000
unkown
page read and write
C000027000
direct allocation
page read and write
B0A000
heap
page read and write
E01000
unkown
page readonly
82E000
stack
page read and write
2061AD28000
direct allocation
page read and write
C000027000
direct allocation
page read and write
26132F0C000
direct allocation
page read and write
C000043000
direct allocation
page read and write
2A3C000
direct allocation
page execute and read and write
5060000
heap
page read and write
26132F20000
direct allocation
page read and write
2CFA000
heap
page read and write
C0001BE000
direct allocation
page read and write
6EE06000
unkown
page readonly
3190000
heap
page read and write
2CDC000
stack
page read and write
223F000
unkown
page execute and read and write
C0000CE000
direct allocation
page read and write
E74000
unkown
page execute and read and write
297A000
heap
page read and write
3010000
heap
page read and write
26131200000
trusted library allocation
page read and write
FB4000
unkown
page execute and read and write
C000075000
direct allocation
page read and write
C000027000
direct allocation
page read and write
4ECE000
stack
page read and write
C000114000
direct allocation
page read and write
1E58CD66000
heap
page read and write
28BC48BB000
heap
page read and write
2D40000
heap
page read and write
C00007E000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000027000
direct allocation
page read and write
1D46D262000
heap
page read and write
4850000
heap
page read and write
B2B3DFE000
stack
page read and write
305B000
heap
page read and write
C000114000
direct allocation
page read and write
28BC3410000
direct allocation
page read and write
C000238000
direct allocation
page read and write
C00020E000
direct allocation
page read and write
C000035000
direct allocation
page read and write
B14000
heap
page read and write
7AE000
stack
page read and write
2BA5000
unkown
page execute and write copy
475F000
stack
page read and write
1633B6FB000
heap
page read and write
FB9000
unkown
page execute and read and write
1D46CB9C000
heap
page read and write
C0002E4000
direct allocation
page read and write
28BC3510000
heap
page read and write
16361031000
direct allocation
page read and write
C2E000
unkown
page readonly
C000248000
direct allocation
page read and write
AC7000
unkown
page read and write
4F0000
unkown
page readonly
43E000
stack
page read and write
4520000
heap
page read and write
2061B460000
heap
page read and write
C00001C000
direct allocation
page read and write
2899B3A0000
heap
page read and write
B8D000
unkown
page read and write
400000
unkown
page readonly
36C000
stack
page read and write
C00016E000
direct allocation
page read and write
6EE06000
unkown
page readonly
1E589F10000
heap
page read and write
C00000E000
direct allocation
page read and write
C000240000
direct allocation
page read and write
2B9D000
unkown
page execute and read and write
C000180000
direct allocation
page read and write
C000186000
direct allocation
page read and write
47CE000
stack
page read and write
C0002A0000
direct allocation
page read and write
31A0000
heap
page read and write
C0000C0000
direct allocation
page read and write
C0002AE000
direct allocation
page read and write
28BC3EAC000
heap
page read and write
23F55400000
heap
page read and write
1633AB20000
heap
page read and write
2A3C000
direct allocation
page execute and read and write
C00008C000
direct allocation
page read and write
4B7E000
stack
page read and write
C25F7FE000
stack
page read and write
C000043000
direct allocation
page read and write
C000256000
direct allocation
page read and write
2BA5000
unkown
page execute and read and write
C000052000
direct allocation
page read and write
C000284000
direct allocation
page read and write
840000
heap
page read and write
1633A420000
heap
page read and write
2899CF34000
heap
page read and write
26133755000
heap
page read and write
C000166000
direct allocation
page read and write
4EEE000
stack
page read and write
C000152000
direct allocation
page read and write
E01000
unkown
page execute and write copy
AD0000
heap
page read and write
C000124000
direct allocation
page read and write
B2B31FF000
stack
page read and write
C0000FC000
direct allocation
page read and write
C000258000
direct allocation
page read and write
FA6000
unkown
page execute and read and write
2DE8000
heap
page read and write
BF6D7FE000
stack
page read and write
C00010C000
direct allocation
page read and write
3093000
heap
page read and write
23F53708000
heap
page read and write
C00006E000
direct allocation
page read and write
261331D0000
heap
page read and write
C000014000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
C0002BA000
direct allocation
page read and write
28BC3470000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C000037000
direct allocation
page read and write
6EDF0000
unkown
page readonly
B8D000
unkown
page read and write
C000122000
direct allocation
page read and write
3078000
heap
page read and write
B5E000
stack
page read and write
C00000C000
direct allocation
page read and write
E74000
unkown
page execute and read and write
1E58C090000
heap
page read and write
2B9D000
unkown
page execute and read and write
2BA5000
unkown
page execute and read and write
B5F000
unkown
page read and write
C000220000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
6EE06000
unkown
page readonly
C000192000
direct allocation
page read and write
1D46D264000
heap
page read and write
6EE0F000
unkown
page readonly
C000258000
direct allocation
page read and write
C000045000
direct allocation
page read and write
7E9000
unkown
page readonly
C000192000
direct allocation
page read and write
E01000
unkown
page readonly
2A28000
direct allocation
page execute and read and write
C000056000
direct allocation
page read and write
1D46A5D0000
heap
page read and write
C000008000
direct allocation
page read and write
B1F000
stack
page read and write
2D8E000
stack
page read and write
C0002B4000
direct allocation
page read and write
9E0000
heap
page read and write
C000000000
direct allocation
page read and write
2899CF42000
heap
page read and write
B95000
unkown
page execute and write copy
26132DE1000
heap
page read and write
2899CF40000
heap
page read and write
1013FF000
stack
page read and write
C0001BE000
direct allocation
page read and write
30BC000
heap
page read and write
2A04000
direct allocation
page execute and read and write
30AC000
heap
page read and write
C000037000
direct allocation
page read and write
7FFB2B3C0000
direct allocation
page execute and read and write
95E000
stack
page read and write
CA9AFFF000
stack
page read and write
206190F8000
heap
page read and write
C000075000
direct allocation
page read and write
FB9000
unkown
page execute and read and write
2970000
heap
page read and write
4F1000
unkown
page execute and write copy
E73000
unkown
page execute and write copy
23F536A9000
direct allocation
page read and write
6EE06000
unkown
page readonly
2E90000
heap
page read and write
6EDF0000
unkown
page readonly
C000166000
direct allocation
page read and write
4F0000
unkown
page readonly
FB9000
unkown
page execute and read and write
C00007E000
direct allocation
page read and write
2C7E000
stack
page read and write
C000035000
direct allocation
page read and write
1E58C910000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
23F55BB1000
heap
page read and write
C000043000
direct allocation
page read and write
26132C80000
heap
page read and write
C0002AC000
direct allocation
page read and write
2F18000
heap
page read and write
C2E000
unkown
page readonly
FB9000
unkown
page execute and read and write
1E58B8E4000
direct allocation
page read and write
C0002B2000
direct allocation
page read and write
C000132000
direct allocation
page read and write
478F000
stack
page read and write
59A000
heap
page read and write
C00023C000
direct allocation
page read and write
C000140000
direct allocation
page read and write
B95000
unkown
page readonly
B337FFF000
stack
page read and write
6EE0F000
unkown
page readonly
3090000
heap
page read and write
C0002CE000
direct allocation
page read and write
FE2000
unkown
page execute and read and write
C000118000
direct allocation
page read and write
C000056000
direct allocation
page read and write
C000045000
direct allocation
page read and write
C000110000
direct allocation
page read and write
30AC000
heap
page read and write
6EDF1000
unkown
page execute read
B14000
heap
page read and write
1E58B940000
heap
page read and write
AC7000
unkown
page execute and write copy
E01000
unkown
page readonly
C000102000
direct allocation
page read and write
712000
heap
page read and write
B2B41FF000
stack
page read and write
C000140000
direct allocation
page read and write
2061BC20000
heap
page read and write
7FFB2B3C0000
direct allocation
page execute and read and write
C000000000
direct allocation
page read and write
26131210000
heap
page read and write
C000252000
direct allocation
page read and write
C00027C000
direct allocation
page read and write
23F552F0000
heap
page read and write
C00003A000
direct allocation
page read and write
7FF448360000
direct allocation
page execute and read and write
C00024F000
direct allocation
page read and write
3C0000
heap
page read and write
C000020000
direct allocation
page read and write
70E000
stack
page read and write
C0000B2000
direct allocation
page read and write
1D46CB91000
heap
page read and write
1D46D360000
direct allocation
page read and write
7E9000
unkown
page readonly
6EE0D000
unkown
page read and write
2F4B000
heap
page read and write
28BC32C0000
heap
page read and write
28BC3545000
direct allocation
page read and write
23F55130000
direct allocation
page read and write
C000298000
direct allocation
page read and write
5A4000
heap
page read and write
C000027000
direct allocation
page read and write
1633ABE6000
heap
page read and write
20641A3F000
direct allocation
page read and write
FE2000
unkown
page execute and read and write
C000041000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
3018000
heap
page read and write
C000214000
direct allocation
page read and write
C000045000
direct allocation
page read and write
8AC000
stack
page read and write
309D000
heap
page read and write
26131200000
direct allocation
page read and write
4FFF000
stack
page read and write
B9F000
stack
page read and write
2D8E000
stack
page read and write
4BF0000
heap
page read and write
C0000B8000
direct allocation
page read and write
C0002C2000
direct allocation
page read and write
CA9ABFF000
stack
page read and write
63E000
stack
page read and write
C000256000
direct allocation
page read and write
B14000
heap
page read and write
7FFB2B3C0000
direct allocation
page execute and read and write
C00006E000
direct allocation
page read and write
C000043000
direct allocation
page read and write
26133690000
heap
page read and write
2899D0D0000
heap
page read and write
32D0000
direct allocation
page execute and read and write
C000027000
direct allocation
page read and write
4F6E000
stack
page read and write
E73000
unkown
page execute and write copy
C000041000
direct allocation
page read and write
E01000
unkown
page execute and write copy
C000248000
direct allocation
page read and write
7E9000
unkown
page execute and write copy
B5F000
unkown
page read and write
C00010C000
direct allocation
page read and write
7FF4BFC80000
direct allocation
page execute and read and write
C000220000
direct allocation
page read and write
9DE000
stack
page read and write
4CEF000
stack
page read and write
C000041000
direct allocation
page read and write
7E9000
unkown
page execute and write copy
C00007A000
direct allocation
page read and write
C000008000
direct allocation
page read and write
16360FFF000
direct allocation
page read and write
C00028E000
direct allocation
page read and write
1D46C170000
heap
page read and write
C0001B8000
direct allocation
page read and write
C000035000
direct allocation
page read and write
1633ABA5000
heap
page read and write
C00007A000
direct allocation
page read and write
BA5000
heap
page read and write
C000120000
direct allocation
page read and write
C0001AA000
direct allocation
page read and write
C000198000
direct allocation
page read and write
B14000
heap
page read and write
4F40000
heap
page read and write
2899CD90000
direct allocation
page read and write
A7C000
stack
page read and write
C000072000
direct allocation
page read and write
2899E07D000
direct allocation
page read and write
28BC3EA1000
heap
page read and write
C00028C000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000246000
direct allocation
page read and write
FB1000
unkown
page execute and read and write
1E58BA50000
heap
page read and write
C00007E000
direct allocation
page read and write
C0002E8000
direct allocation
page read and write
FB9000
unkown
page execute and read and write
23F566DC000
heap
page read and write
261335D0000
heap
page read and write
C000164000
direct allocation
page read and write
E73000
unkown
page execute and write copy
C000047000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
223F000
unkown
page execute and read and write
4F0000
unkown
page readonly
28BC35D0000
heap
page read and write
4ABF000
stack
page read and write
C00001C000
direct allocation
page read and write
C000045000
direct allocation
page read and write
1D46D3CD000
direct allocation
page read and write
FB1000
unkown
page execute and read and write
23F550D0000
direct allocation
page read and write
2899D890000
heap
page read and write
C000234000
direct allocation
page read and write
2899D350000
heap
page read and write
2BA5000
unkown
page execute and write copy
C000192000
direct allocation
page read and write
35D000
stack
page read and write
C0001EE000
direct allocation
page read and write
B5673FE000
stack
page read and write
C000238000
direct allocation
page read and write
C0002B0000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
74F000
stack
page read and write
28BC1AE0000
heap
page read and write
26132D80000
direct allocation
page read and write
B8D000
unkown
page read and write
7E9000
unkown
page execute and write copy
52F000
stack
page read and write
C000002000
direct allocation
page read and write
7E9000
unkown
page readonly
1D46C130000
direct allocation
page read and write
C25EFFE000
stack
page read and write
C000114000
direct allocation
page read and write
1633A1C0000
direct allocation
page read and write
C000240000
direct allocation
page read and write
4F1000
unkown
page execute read
AC7000
unkown
page execute and write copy
C000162000
direct allocation
page read and write
89E000
stack
page read and write
32D0000
direct allocation
page execute and read and write
FE2000
unkown
page execute and read and write
C000294000
direct allocation
page read and write
2899B3A8000
heap
page read and write
23F55250000
heap
page read and write
C000192000
direct allocation
page read and write
C000240000
direct allocation
page read and write
C00025C000
direct allocation
page read and write
E73000
unkown
page execute and write copy
B565FFF000
stack
page read and write
C00023A000
direct allocation
page read and write
CA9A7FE000
stack
page read and write
28BC48B8000
heap
page read and write
B5F000
unkown
page read and write
B8D000
unkown
page read and write
C000122000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
318E000
stack
page read and write
28BC36E0000
heap
page read and write
C00012A000
direct allocation
page read and write
1E58C210000
heap
page read and write
7E9000
unkown
page execute and write copy
C000180000
direct allocation
page read and write
304A000
heap
page read and write
C000118000
direct allocation
page read and write
C000072000
direct allocation
page read and write
FB4000
unkown
page execute and read and write
26132F50000
heap
page read and write
2A28000
direct allocation
page execute and read and write
C00006E000
direct allocation
page read and write
3195000
heap
page read and write
28BC3EF5000
heap
page read and write
E73000
unkown
page execute and write copy
B2B35FF000
stack
page read and write
1633A250000
heap
page read and write
2BA5000
unkown
page execute and read and write
2BA5000
unkown
page execute and read and write
1E5B276F000
direct allocation
page read and write
FB1000
unkown
page execute and read and write
28BC341D000
direct allocation
page read and write
B95000
unkown
page execute and write copy
CA9B3FE000
stack
page read and write
BF6DFFF000
stack
page read and write
C000041000
direct allocation
page read and write
1E58CD65000
heap
page read and write
AC7000
unkown
page execute and write copy
560000
heap
page read and write
C000100000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
7FF457400000
direct allocation
page execute and read and write
2899B360000
heap
page read and write
C000072000
direct allocation
page read and write
C000238000
direct allocation
page read and write
FB1000
unkown
page execute and read and write
2DE0000
heap
page read and write
1E58C294000
heap
page read and write
E01000
unkown
page readonly
B65000
unkown
page read and write
C0001CE000
direct allocation
page read and write
5AC000
heap
page read and write
C000234000
direct allocation
page read and write
26133710000
heap
page read and write
C00003A000
direct allocation
page read and write
C000160000
direct allocation
page read and write
23F55A40000
heap
page read and write
C000214000
direct allocation
page read and write
C0001EE000
direct allocation
page read and write
1633A2F0000
direct allocation
page read and write
69E000
heap
page read and write
C25F3FE000
stack
page read and write
223F000
unkown
page execute and read and write
C0002C4000
direct allocation
page read and write
C000037000
direct allocation
page read and write
10E5000
unkown
page execute and read and write
4E8F000
stack
page read and write
B1E000
stack
page read and write
2A28000
direct allocation
page execute and read and write
C000047000
direct allocation
page read and write
C000190000
direct allocation
page read and write
2061B3A0000
heap
page read and write
1E58C1D0000
heap
page read and write
FB9000
unkown
page execute and read and write
1E58CD66000
heap
page read and write
2899CD90000
trusted library allocation
page read and write
C0000EE000
direct allocation
page read and write
5A3000
heap
page read and write
E74000
unkown
page execute and read and write
7E9000
unkown
page execute and write copy
C000214000
direct allocation
page read and write
C000166000
direct allocation
page read and write
C000256000
direct allocation
page read and write
C000056000
direct allocation
page read and write
2061AC20000
heap
page read and write
C000110000
direct allocation
page read and write
C000114000
direct allocation
page read and write
5AC000
heap
page read and write
26131160000
heap
page read and write
C000132000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
4820000
heap
page read and write
C00016E000
direct allocation
page read and write
C2E000
unkown
page readonly
C000075000
direct allocation
page read and write
C000160000
direct allocation
page read and write
6EDF0000
unkown
page readonly
C000024000
direct allocation
page read and write
C000180000
direct allocation
page read and write
1633A320000
heap
page read and write
308E000
heap
page read and write
C00010C000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
28BC3520000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
1E58C8F0000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
2BA2000
unkown
page execute and write copy
CA9BBFE000
stack
page read and write
3070000
heap
page read and write
C000041000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
C0001EE000
direct allocation
page read and write
5AC000
heap
page read and write
AC7000
unkown
page execute and write copy
C00001A000
direct allocation
page read and write
B2B21F9000
stack
page read and write
C00026A000
direct allocation
page read and write
1633A3A0000
heap
page read and write
28BC3410000
trusted library allocation
page read and write
680000
heap
page read and write
C25E3F9000
stack
page read and write
2A18000
direct allocation
page execute and read and write
845000
heap
page read and write
2061BFF0000
heap
page read and write
C000242000
direct allocation
page read and write
26132F00000
direct allocation
page read and write
4A0000
heap
page read and write
2BA5000
unkown
page execute and write copy
C000025000
direct allocation
page read and write
C000118000
direct allocation
page read and write
C000164000
direct allocation
page read and write
C000047000
direct allocation
page read and write
2899CF42000
heap
page read and write
28BC352F000
direct allocation
page read and write
2899D0C0000
heap
page read and write
C0000E6000
direct allocation
page read and write
BF6DBFE000
stack
page read and write
23F55174000
heap
page read and write
B336FF9000
stack
page read and write
C00029D000
direct allocation
page read and write
308E000
heap
page read and write
C000122000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000234000
direct allocation
page read and write
C00023C000
direct allocation
page read and write
C000037000
direct allocation
page read and write
502F000
stack
page read and write
2899D88C000
heap
page read and write
C0002A8000
direct allocation
page read and write
A3C000
stack
page read and write
B65000
unkown
page read and write
26133ED0000
heap
page read and write
4E0F000
stack
page read and write
C000174000
direct allocation
page read and write
206419F0000
direct allocation
page read and write
3280000
heap
page read and write
26133590000
heap
page read and write
2899D040000
direct allocation
page read and write
C25EBFE000
stack
page read and write
28BC33E0000
heap
page read and write
1633AB5C000
heap
page read and write
C000072000
direct allocation
page read and write
C0001A0000
direct allocation
page read and write
2D5C000
stack
page read and write
C000047000
direct allocation
page read and write
2A3C000
direct allocation
page execute and read and write
C000072000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C1E000
stack
page read and write
1E58B8E0000
trusted library allocation
page read and write
23F55B80000
heap
page read and write
B14000
heap
page read and write
C000102000
direct allocation
page read and write
28BC48B5000
heap
page read and write
B9E000
stack
page read and write
B338BFE000
stack
page read and write
ADC5FE000
stack
page read and write
C0000DE000
direct allocation
page read and write
26159AA0000
direct allocation
page read and write
C000166000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C0002A2000
direct allocation
page read and write
6EE0D000
unkown
page read and write
417000
unkown
page execute and write copy
7FF404380000
direct allocation
page execute and read and write
6EE0F000
unkown
page readonly
C00010C000
direct allocation
page read and write
C000043000
direct allocation
page read and write
C000030000
direct allocation
page read and write
57D000
heap
page read and write
99E000
stack
page read and write
26132DE9000
heap
page read and write
B14000
heap
page read and write
C000082000
direct allocation
page read and write
2A24000
direct allocation
page execute and read and write
6FD000
heap
page read and write
C000092000
direct allocation
page read and write
2CBC000
stack
page read and write
6EE0F000
unkown
page readonly
4F0000
unkown
page readonly
C00023C000
direct allocation
page read and write
2F5C000
heap
page read and write
2899CEB9000
direct allocation
page read and write
C000234000
direct allocation
page read and write
5AC000
heap
page read and write
2A3C000
direct allocation
page execute and read and write
1E589F00000
heap
page read and write
2BA5000
unkown
page execute and write copy
1633B6FF000
heap
page read and write
2B9D000
unkown
page execute and read and write
23F53530000
heap
page read and write
2F10000
heap
page read and write
8EC000
stack
page read and write
C0000A2000
direct allocation
page read and write
B2B39FF000
stack
page read and write
C000174000
direct allocation
page read and write
309C000
heap
page read and write
2D20000
heap
page read and write
AC7000
unkown
page execute and write copy
4F1000
unkown
page execute and write copy
C0001B6000
direct allocation
page read and write
1D46C270000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
4A5000
heap
page read and write
1E58C190000
heap
page read and write
2061AD60000
heap
page read and write
2A14000
direct allocation
page execute and read and write
C000242000
direct allocation
page read and write
C000246000
direct allocation
page read and write
30B1000
heap
page read and write
4C20000
heap
page read and write
C000220000
direct allocation
page read and write
261311D0000
heap
page read and write
FB9000
unkown
page execute and read and write
14C000
stack
page read and write
4F1000
unkown
page execute read
C0000B0000
direct allocation
page read and write
AC7000
unkown
page execute and write copy
2BA5000
unkown
page execute and read and write
2DE0000
heap
page read and write
C000100000
direct allocation
page read and write
C000264000
direct allocation
page read and write
2A28000
direct allocation
page execute and read and write
2899D750000
heap
page read and write
C000180000
direct allocation
page read and write
1E58B9C4000
heap
page read and write
C0000A4000
direct allocation
page read and write
C000162000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
2A3C000
direct allocation
page execute and read and write
5A8000
heap
page read and write
C00003A000
direct allocation
page read and write
568000
heap
page read and write
AC7000
unkown
page execute and write copy
C00010A000
direct allocation
page read and write
C000012000
direct allocation
page read and write
6EDF0000
unkown
page readonly
1E58C0D0000
heap
page read and write
C000254000
direct allocation
page read and write
2899CEB4000
direct allocation
page read and write
AC7000
unkown
page read and write
26132F60000
heap
page read and write
30B0000
heap
page read and write
4F0000
unkown
page readonly
1E589F1C000
heap
page read and write
C000254000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C00026C000
direct allocation
page read and write
C000194000
direct allocation
page read and write
2061ACB0000
heap
page read and write
C00023A000
direct allocation
page read and write
C000254000
direct allocation
page read and write
26159AA9000
direct allocation
page read and write
1633A2D0000
direct allocation
page read and write
1D46C138000
direct allocation
page read and write
B8D000
unkown
page read and write
ADBDF8000
stack
page read and write
C000260000
direct allocation
page read and write
7FFB2B3C0000
direct allocation
page execute and read and write
C00022A000
direct allocation
page read and write
B14000
heap
page read and write
2061ADE0000
heap
page read and write
2BA5000
unkown
page execute and write copy
C25FBFE000
stack
page read and write
C00016E000
direct allocation
page read and write
26132DEB000
heap
page read and write
C000192000
direct allocation
page read and write
C000035000
direct allocation
page read and write
1633B6F6000
heap
page read and write
500F000
stack
page read and write
C00012A000
direct allocation
page read and write
2C7C000
stack
page read and write
1D46D3AF000
direct allocation
page read and write
3278000
heap
page read and write
C000246000
direct allocation
page read and write
C000242000
direct allocation
page read and write
688000
heap
page read and write
C00013C000
direct allocation
page read and write
C000025000
direct allocation
page read and write
C0002DA000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
2B9D000
unkown
page execute and read and write
C00024F000
direct allocation
page read and write
C000027000
direct allocation
page read and write
C000047000
direct allocation
page read and write
28BC3DF0000
heap
page read and write
3041000
heap
page read and write
C000027000
direct allocation
page read and write
C000052000
direct allocation
page read and write
C000164000
direct allocation
page read and write
16338720000
direct allocation
page read and write
32EC000
heap
page read and write
223F000
unkown
page execute and read and write
C000072000
direct allocation
page read and write
4F0F000
stack
page read and write
C000041000
direct allocation
page read and write
1E58B930000
heap
page read and write
C00000C000
direct allocation
page read and write
B65000
unkown
page read and write
72B000
heap
page read and write
302D000
heap
page read and write
There are 1708 hidden memdumps, click here to show them.