Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
BraveCrashHandler64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\12605RR4.bat
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\BraveCrashHandler64.exe
|
"C:\Users\user\Desktop\BraveCrashHandler64.exe"
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Users\user\AppData\Local\Temp\RuntimeBrooker.exe
|
"C:\Users\user~1\AppData\Local\Temp\RuntimeBrooker.exe" -email ennareichmann@outlook.com -password Kamus@1993 -device-name
M2403 -accept-tos
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c ""C:\Users\user~1\AppData\Local\Temp\12605RR4.bat" "C:\Users\user\Desktop\BraveCrashHandler64.exe""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\chcp.com
|
chcp 1252
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /i "RuntimeBrooker.exe"
|
There are 27 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.iproyal.comt
|
unknown
|
||
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==8
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crlGo
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html0
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://www.firmaprofesional.com/cps0
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl=
|
unknown
|
||
https://enigmaprotector.com/taggant/spv.crl0
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl0
|
unknown
|
||
https://api.iproyal.com1714047682worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
|
unknown
|
||
https://api.iproyal.com/https://api6.my-ip.io/ipidna:
|
unknown
|
||
http://crl.securetrust.com/STCA.crl0
|
unknown
|
||
https://enigmaprotector.com/taggant/user.crl0
|
unknown
|
||
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==kqGk19
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
|
unknown
|
||
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==ExesL3jCExiRYi82g3ylkSM5T1
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl
|
unknown
|
||
http://ocsp.accv.es
|
unknown
|
||
https://api.iproyal.com1714053689worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
|
unknown
|
||
http://cps.chambersign.org/cps/chambersignroot.html0
|
unknown
|
||
http://policy.camerfirma.com0
|
unknown
|
||
http://crl.certigna.fr/certignarootca.crl
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.accv.es/legislacion_c.htm0U
|
unknown
|
||
https://api.iproyal.com1714047672worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
http://ocsp.accv.es0
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0B1
|
unknown
|
||
https://api.iproyal.com/v1/users/login
|
unknown
|
||
https://api.iproyal.com1714047675worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllCommon
|
unknown
|
||
https://api.iproyal.com1714047687worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
|
unknown
|
||
https://api.iproyal.comCommonProgramFiles=C:
|
unknown
|
||
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==AfWgpX0XnpfyEMMJtmlM3HjxKy
|
unknown
|
||
https://api.iproyal.com1714047679worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
|
unknown
|
||
https://api.iproyal.com/v1/users/loginPost
|
unknown
|
||
https://www.catcert.net/verarrel
|
unknown
|
||
http://crl.securetrust.com/STCA.crl
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://crl.chambersign.org/chambersignroot.crl0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
https://api.iproyal.com/v1/users/loginPSwCB0VWbAAlZBEwPQBeOA4tBxw9M1FYCQ==7m9fHZvLPTY2pWRLrSiq0MGQOl
|
unknown
|
||
http://crl.certigna.fr/certignarootca.crlhttp://crl.dhimyotis.com/certignarootca.crl
|
unknown
|
||
https://www.catcert.net/verarrel05
|
unknown
|
||
http://crl.certigna.fr/certignarootca.crl01
|
unknown
|
||
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
|
unknown
|
||
http://ocsp.accv.esTWCA
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
http://www.cert.fnmt.es/dpcs/0
|
unknown
|
||
https://api.iproyal.com
|
unknown
|
||
https://api.iproyal.com1714053685worldIsShitty?api.iproyal.com:443tcpapi.iproyal.comws2_32.dllSystem
|
unknown
|
There are 49 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.iproyal.com
|
193.228.196.69
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.228.196.69
|
api.iproyal.com
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000242000
|
direct allocation
|
page read and write
|
||
28BC3D70000
|
heap
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C0002E0000
|
direct allocation
|
page read and write
|
||
C000296000
|
direct allocation
|
page read and write
|
||
1E5B278D000
|
direct allocation
|
page read and write
|
||
2061B565000
|
heap
|
page read and write
|
||
B95000
|
unkown
|
page readonly
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
B95000
|
unkown
|
page readonly
|
||
2061ACC9000
|
direct allocation
|
page read and write
|
||
C00029B000
|
direct allocation
|
page read and write
|
||
C00019C000
|
direct allocation
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and read and write
|
||
2899CEBD000
|
direct allocation
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
BF6D3FF000
|
stack
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
101FFE000
|
stack
|
page read and write
|
||
C0002AA000
|
direct allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
C000238000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
16361070000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
7FFB2B3C0000
|
direct allocation
|
page execute and read and write
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C0002A4000
|
direct allocation
|
page read and write
|
||
223F000
|
unkown
|
page execute and read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
2899D0E0000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
30B8000
|
heap
|
page read and write
|
||
26132D84000
|
direct allocation
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
1D46CB20000
|
heap
|
page read and write
|
||
26159AC4000
|
direct allocation
|
page read and write
|
||
2061BFFC000
|
heap
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
CA9BFFF000
|
stack
|
page read and write
|
||
28BC32A0000
|
heap
|
page read and write
|
||
1D46CAE0000
|
heap
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
C0002C0000
|
direct allocation
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
1D46C460000
|
heap
|
page read and write
|
||
2061AB90000
|
heap
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
23F536A0000
|
direct allocation
|
page read and write
|
||
7FF4B17A0000
|
direct allocation
|
page execute and read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
3068000
|
heap
|
page read and write
|
||
26132D8B000
|
direct allocation
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
2DD0000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C0002A0000
|
direct allocation
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
23F566D8000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page execute and write copy
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
C00023C000
|
direct allocation
|
page read and write
|
||
2899E0A0000
|
heap
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
B5F000
|
unkown
|
page read and write
|
||
1D46CC27000
|
heap
|
page read and write
|
||
B337BFE000
|
stack
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
26132FD0000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
1D46C660000
|
heap
|
page read and write
|
||
1633B320000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
2061AD50000
|
heap
|
page read and write
|
||
B95000
|
unkown
|
page execute and write copy
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
B2B2DFF000
|
stack
|
page read and write
|
||
C000244000
|
direct allocation
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
16338758000
|
heap
|
page read and write
|
||
223F000
|
unkown
|
page execute and read and write
|
||
C000292000
|
direct allocation
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
414000
|
unkown
|
page execute and write copy
|
||
2D4E000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
2899CD40000
|
heap
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
6BA000
|
heap
|
page read and write
|
||
2061ACCD000
|
direct allocation
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
C00026C000
|
direct allocation
|
page read and write
|
||
26159AA7000
|
direct allocation
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
26132DE9000
|
heap
|
page read and write
|
||
23F55A80000
|
heap
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
CA9B7FE000
|
stack
|
page read and write
|
||
2061BFF8000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
B566BFE000
|
stack
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
7EF000
|
stack
|
page read and write
|
||
C000280000
|
direct allocation
|
page read and write
|
||
4F2F000
|
stack
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
28BC1818000
|
heap
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
28BC3478000
|
direct allocation
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
1633A1C0000
|
trusted library allocation
|
page read and write
|
||
309A000
|
heap
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C0002D4000
|
direct allocation
|
page read and write
|
||
23F55C05000
|
heap
|
page read and write
|
||
2DD5000
|
heap
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
7FFB2B3C0000
|
direct allocation
|
page execute and read and write
|
||
2DE5000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
BF6E3FE000
|
stack
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
CA9A3FF000
|
stack
|
page read and write
|
||
ADD1FE000
|
stack
|
page read and write
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C00024F000
|
direct allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
1633A1C4000
|
direct allocation
|
page read and write
|
||
23F566D6000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
16360FFD000
|
direct allocation
|
page read and write
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
309A000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
C00023C000
|
direct allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
1E58B9D0000
|
heap
|
page read and write
|
||
2899E05F000
|
direct allocation
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
C00027E000
|
direct allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
2899D850000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
B565BF9000
|
stack
|
page read and write
|
||
B95000
|
unkown
|
page readonly
|
||
2DC0000
|
heap
|
page read and write
|
||
1633AB51000
|
heap
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
1D46CB60000
|
heap
|
page read and write
|
||
B567BFF000
|
stack
|
page read and write
|
||
AC7000
|
unkown
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
C0001F8000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
1633A9E0000
|
heap
|
page read and write
|
||
2D1C000
|
stack
|
page read and write
|
||
2899D150000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
C0001B4000
|
direct allocation
|
page read and write
|
||
C000248000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
2061ACC0000
|
trusted library allocation
|
page read and write
|
||
C0002BE000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
2899D070000
|
direct allocation
|
page read and write
|
||
C000075000
|
direct allocation
|
page read and write
|
||
2899CE30000
|
heap
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
28BC1810000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
28BC36F0000
|
heap
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
C000242000
|
direct allocation
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
28BC3490000
|
direct allocation
|
page read and write
|
||
16338720000
|
trusted library allocation
|
page read and write
|
||
261336D0000
|
heap
|
page read and write
|
||
2061ABA0000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
C000114000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
B5F000
|
unkown
|
page read and write
|
||
C0001BC000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
7FFB2B3C0000
|
direct allocation
|
page execute and read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
1E58B9B0000
|
direct allocation
|
page read and write
|
||
23F55300000
|
heap
|
page read and write
|
||
32D0000
|
direct allocation
|
page execute and read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
B2C000
|
stack
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
1E58BCD0000
|
heap
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
C00019E000
|
direct allocation
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
28BC3EB0000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
28BC3E30000
|
heap
|
page read and write
|
||
30BC000
|
heap
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
2899D810000
|
heap
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
C000112000
|
direct allocation
|
page read and write
|
||
16338750000
|
heap
|
page read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
1E58B920000
|
heap
|
page read and write
|
||
32A8000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
28BC3419000
|
direct allocation
|
page read and write
|
||
C000294000
|
direct allocation
|
page read and write
|
||
31D1000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
C000264000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
50FF000
|
stack
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
2899D881000
|
heap
|
page read and write
|
||
23F55BC0000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
28BC3E70000
|
heap
|
page read and write
|
||
16338680000
|
heap
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
1D46C0D9000
|
direct allocation
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
309A000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
2613370C000
|
heap
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
28BC3700000
|
heap
|
page read and write
|
||
2B9D000
|
unkown
|
page execute and read and write
|
||
474E000
|
stack
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
C25FFFE000
|
stack
|
page read and write
|
||
1E58B8ED000
|
direct allocation
|
page read and write
|
||
1D46D260000
|
heap
|
page read and write
|
||
28BC3D30000
|
heap
|
page read and write
|
||
C0002D6000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
B65000
|
unkown
|
page read and write
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
2899CF30000
|
heap
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
2061B5A6000
|
heap
|
page read and write
|
||
C0001B8000
|
direct allocation
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
28BC48B5000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
C2603FE000
|
stack
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
C000037000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
5A2000
|
heap
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
E01000
|
unkown
|
page readonly
|
||
C000242000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
C000248000
|
direct allocation
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
32DC000
|
heap
|
page read and write
|
||
28BC48B3000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
ADD9FE000
|
stack
|
page read and write
|
||
30AC000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
28BC34C0000
|
direct allocation
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
1633A240000
|
heap
|
page read and write
|
||
FB4000
|
unkown
|
page execute and read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
32D0000
|
direct allocation
|
page execute and read and write
|
||
1D46D410000
|
heap
|
page read and write
|
||
2899CF4F000
|
heap
|
page read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
1E589DC0000
|
heap
|
page read and write
|
||
1E58C8F8000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
100FFE000
|
stack
|
page read and write
|
||
1E58B9C0000
|
heap
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
C00026C000
|
direct allocation
|
page read and write
|
||
2899D048000
|
direct allocation
|
page read and write
|
||
2C9C000
|
stack
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
2061B520000
|
heap
|
page read and write
|
||
FB4000
|
unkown
|
page execute and read and write
|
||
23F536A4000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
FB4000
|
unkown
|
page execute and read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
B5F000
|
unkown
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
E73000
|
unkown
|
page execute and write copy
|
||
E74000
|
unkown
|
page execute and read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
1D46A618000
|
heap
|
page read and write
|
||
206190D0000
|
heap
|
page read and write
|
||
2061B3E0000
|
heap
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
26132DD0000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page readonly
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
1D46C3D0000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
16338730000
|
heap
|
page read and write
|
||
1633A620000
|
heap
|
page read and write
|
||
63C000
|
stack
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
2CCD000
|
heap
|
page read and write
|
||
23F55C45000
|
heap
|
page read and write
|
||
26131150000
|
heap
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
ADD5FD000
|
stack
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
1E58CD64000
|
heap
|
page read and write
|
||
1D46C1F0000
|
heap
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
2A14000
|
direct allocation
|
page execute and read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
23F56300000
|
heap
|
page read and write
|
||
28BC34A0000
|
direct allocation
|
page read and write
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
2061AB94000
|
heap
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
1E58C253000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
C00028E000
|
direct allocation
|
page read and write
|
||
C0001AC000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
C000276000
|
direct allocation
|
page read and write
|
||
C000258000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
2061ACC0000
|
trusted library allocation
|
page read and write
|
||
C000220000
|
direct allocation
|
page read and write
|
||
C000248000
|
direct allocation
|
page read and write
|
||
1D46C164000
|
heap
|
page read and write
|
||
C000075000
|
direct allocation
|
page read and write
|
||
B3383FF000
|
stack
|
page read and write
|
||
1FD000
|
stack
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
28BC3770000
|
heap
|
page read and write
|
||
23F536AD000
|
direct allocation
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
C0001AC000
|
direct allocation
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
CA99FF9000
|
stack
|
page read and write
|
||
B5F000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
FB4000
|
unkown
|
page execute and read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
1D46C0D4000
|
direct allocation
|
page read and write
|
||
2899CEB0000
|
direct allocation
|
page read and write
|
||
2061BFFF000
|
heap
|
page read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
C0001C0000
|
direct allocation
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
C000258000
|
direct allocation
|
page read and write
|
||
26133797000
|
heap
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
23F55310000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
C000008000
|
direct allocation
|
page read and write
|
||
1E5B2785000
|
direct allocation
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
206190A0000
|
heap
|
page read and write
|
||
B6C000
|
stack
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C25E7FF000
|
stack
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C000082000
|
direct allocation
|
page read and write
|
||
C000264000
|
direct allocation
|
page read and write
|
||
FB4000
|
unkown
|
page execute and read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
1D46D3C5000
|
direct allocation
|
page read and write
|
||
BF6CFF9000
|
stack
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
1E589ED0000
|
heap
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
AC7000
|
unkown
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
2B9D000
|
unkown
|
page execute and read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
E01000
|
unkown
|
page readonly
|
||
C000118000
|
direct allocation
|
page read and write
|
||
1E58BAD0000
|
heap
|
page read and write
|
||
7FF4DC000000
|
direct allocation
|
page execute and read and write
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
B95000
|
unkown
|
page readonly
|
||
23F550C0000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
23F550F0000
|
direct allocation
|
page read and write
|
||
30BC000
|
heap
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
2A24000
|
direct allocation
|
page execute and read and write
|
||
C0001A6000
|
direct allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
1E58C20C000
|
heap
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
C0002D8000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
2899D710000
|
heap
|
page read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
28BC3970000
|
heap
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
C000174000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
16360FF0000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C00024F000
|
direct allocation
|
page read and write
|
||
26132DEB000
|
heap
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
26132F04000
|
direct allocation
|
page read and write
|
||
1E58C150000
|
heap
|
page read and write
|
||
23F55680000
|
heap
|
page read and write
|
||
B95000
|
unkown
|
page readonly
|
||
223F000
|
unkown
|
page execute and read and write
|
||
C000287000
|
direct allocation
|
page read and write
|
||
1E58C930000
|
direct allocation
|
page read and write
|
||
20619090000
|
heap
|
page read and write
|
||
163386C0000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
1633A1C9000
|
direct allocation
|
page read and write
|
||
B1B000
|
heap
|
page read and write
|
||
28BC3414000
|
direct allocation
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
2899CF4A000
|
heap
|
page read and write
|
||
C000075000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
28BC33E4000
|
heap
|
page read and write
|
||
23F5515D000
|
direct allocation
|
page read and write
|
||
28BC3F37000
|
heap
|
page read and write
|
||
B65000
|
unkown
|
page read and write
|
||
28BC17F0000
|
heap
|
page read and write
|
||
2B9D000
|
unkown
|
page execute and read and write
|
||
32D8000
|
direct allocation
|
page execute and read and write
|
||
AC7000
|
unkown
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
10C000
|
stack
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
B65000
|
unkown
|
page read and write
|
||
C000220000
|
direct allocation
|
page read and write
|
||
C00019A000
|
direct allocation
|
page read and write
|
||
B95000
|
unkown
|
page execute and write copy
|
||
B5677FE000
|
stack
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
1D46CBA0000
|
heap
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
B14000
|
heap
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
5070000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
1D46D262000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
B14000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
1D46C0DD000
|
direct allocation
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C000285000
|
direct allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
C00026C000
|
direct allocation
|
page read and write
|
||
23F55BBC000
|
heap
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
31D000
|
stack
|
page read and write
|
||
1027FE000
|
stack
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
31D5000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
C000090000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
BF6EFFE000
|
stack
|
page read and write
|
||
1E58C201000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
6EE06000
|
unkown
|
page readonly
|
||
C000043000
|
direct allocation
|
page read and write
|
||
B3377FF000
|
stack
|
page read and write
|
||
B65000
|
unkown
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and read and write
|
||
59A000
|
heap
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
C000030000
|
direct allocation
|
page read and write
|
||
26132DD4000
|
heap
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
BF6EBFE000
|
stack
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
223F000
|
unkown
|
page execute and read and write
|
||
23F55B00000
|
heap
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
23F53700000
|
heap
|
page read and write
|
||
BF6E7FE000
|
stack
|
page read and write
|
||
B5F000
|
unkown
|
page read and write
|
||
28BC3340000
|
heap
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
2DEF000
|
stack
|
page read and write
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
A90000
|
heap
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
26131190000
|
heap
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
16338734000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
C000045000
|
direct allocation
|
page read and write
|
||
32BD000
|
heap
|
page read and write
|
||
2899CDA0000
|
heap
|
page read and write
|
||
59F000
|
heap
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
C000258000
|
direct allocation
|
page read and write
|
||
B8D000
|
unkown
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
B566FFF000
|
stack
|
page read and write
|
||
B95000
|
unkown
|
page execute and write copy
|
||
C000238000
|
direct allocation
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
30AC000
|
heap
|
page read and write
|
||
23F55155000
|
direct allocation
|
page read and write
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
1D46C0D0000
|
direct allocation
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
1017FE000
|
stack
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
B338FFF000
|
stack
|
page read and write
|
||
23F550A0000
|
direct allocation
|
page read and write
|
||
57D000
|
heap
|
page read and write
|
||
1633AA20000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
2A24000
|
direct allocation
|
page execute and read and write
|
||
B2B29FE000
|
stack
|
page read and write
|
||
2061AD20000
|
direct allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
C000052000
|
direct allocation
|
page read and write
|
||
B8D000
|
unkown
|
page read and write
|
||
20641A5D000
|
direct allocation
|
page read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
E01000
|
unkown
|
page readonly
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
2CB8000
|
heap
|
page read and write
|
||
1D46C080000
|
heap
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
23F566DE000
|
heap
|
page read and write
|
||
26132D00000
|
heap
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
C000234000
|
direct allocation
|
page read and write
|
||
30AC000
|
heap
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
1D46C0D0000
|
trusted library allocation
|
page read and write
|
||
C000272000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
28BC3410000
|
trusted library allocation
|
page read and write
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
C00024F000
|
direct allocation
|
page read and write
|
||
C000194000
|
direct allocation
|
page read and write
|
||
C000270000
|
direct allocation
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
C000075000
|
direct allocation
|
page read and write
|
||
57F000
|
heap
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
2061ACC4000
|
direct allocation
|
page read and write
|
||
2899CEB0000
|
trusted library allocation
|
page read and write
|
||
1D46CBE5000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
C000110000
|
direct allocation
|
page read and write
|
||
B8D000
|
unkown
|
page read and write
|
||
26159AE0000
|
direct allocation
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
4B3F000
|
stack
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000234000
|
direct allocation
|
page read and write
|
||
2899E075000
|
direct allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
23F550A8000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
2061B511000
|
heap
|
page read and write
|
||
2899D914000
|
heap
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
B95000
|
unkown
|
page execute and write copy
|
||
1E589EA0000
|
heap
|
page read and write
|
||
1D46D3A0000
|
direct allocation
|
page read and write
|
||
C000290000
|
direct allocation
|
page read and write
|
||
1E58B8E0000
|
direct allocation
|
page read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
32D0000
|
direct allocation
|
page execute and read and write
|
||
AC0000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2977000
|
heap
|
page read and write
|
||
26133701000
|
heap
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
2061AD40000
|
direct allocation
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
6AD000
|
unkown
|
page execute and write copy
|
||
7FF3FF730000
|
direct allocation
|
page execute and read and write
|
||
1D46CA20000
|
heap
|
page read and write
|
||
C0001C2000
|
direct allocation
|
page read and write
|
||
B5663FE000
|
stack
|
page read and write
|
||
26131218000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
16338690000
|
heap
|
page read and write
|
||
3238000
|
heap
|
page read and write
|
||
B95000
|
unkown
|
page execute and write copy
|
||
C000264000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
20641A30000
|
direct allocation
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
C000238000
|
direct allocation
|
page read and write
|
||
1633AAA0000
|
heap
|
page read and write
|
||
C000274000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
23F55170000
|
heap
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
2061B4A0000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
2061BBE0000
|
direct allocation
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
2899E050000
|
direct allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
E01000
|
unkown
|
page execute and write copy
|
||
C00026C000
|
direct allocation
|
page read and write
|
||
AC7000
|
unkown
|
page read and write
|
||
C0000EE000
|
direct allocation
|
page read and write
|
||
100BFE000
|
stack
|
page read and write
|
||
C000196000
|
direct allocation
|
page read and write
|
||
67C000
|
stack
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
ADC1FE000
|
stack
|
page read and write
|
||
2061AFE0000
|
heap
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
1E58B8E0000
|
trusted library allocation
|
page read and write
|
||
1D46C3E0000
|
heap
|
page read and write
|
||
1023FE000
|
stack
|
page read and write
|
||
26159AC0000
|
direct allocation
|
page read and write
|
||
23F566D9000
|
heap
|
page read and write
|
||
30BC000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
4F1000
|
unkown
|
page execute read
|
||
C000248000
|
direct allocation
|
page read and write
|
||
26132D89000
|
direct allocation
|
page read and write
|
||
30B9000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
C000258000
|
direct allocation
|
page read and write
|
||
26159AC8000
|
direct allocation
|
page read and write
|
||
B95000
|
unkown
|
page execute and write copy
|
||
B95000
|
unkown
|
page execute and write copy
|
||
B2B25FE000
|
stack
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
2899CDB0000
|
heap
|
page read and write
|
||
23F53640000
|
heap
|
page read and write
|
||
1D46C2C0000
|
heap
|
page read and write
|
||
26133650000
|
heap
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
1E58C990000
|
heap
|
page read and write
|
||
1E58B8E9000
|
direct allocation
|
page read and write
|
||
C00024A000
|
direct allocation
|
page read and write
|
||
23F55380000
|
heap
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
1D46C0D0000
|
trusted library allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
C000098000
|
direct allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
3E0000
|
heap
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
321D000
|
stack
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
2061BFFB000
|
heap
|
page read and write
|
||
23F536A0000
|
trusted library allocation
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
1633AAE0000
|
heap
|
page read and write
|
||
23F53610000
|
heap
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
23F55480000
|
heap
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
C0002A4000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
2899D060000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
1D46C150000
|
direct allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
507F000
|
stack
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
C0002BC000
|
direct allocation
|
page read and write
|
||
206190F0000
|
heap
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
31A8000
|
heap
|
page read and write
|
||
30BC000
|
heap
|
page read and write
|
||
C00023C000
|
direct allocation
|
page read and write
|
||
1D46A610000
|
heap
|
page read and write
|
||
AC7000
|
unkown
|
page read and write
|
||
B3373FE000
|
stack
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
1E58CD62000
|
heap
|
page read and write
|
||
B95000
|
unkown
|
page readonly
|
||
6EDF1000
|
unkown
|
page execute read
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
2061B51C000
|
heap
|
page read and write
|
||
1633A310000
|
heap
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
FB4000
|
unkown
|
page execute and read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
32C000
|
stack
|
page read and write
|
||
1633B6F4000
|
heap
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C000075000
|
direct allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
B95000
|
unkown
|
page readonly
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
67F000
|
stack
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
B65000
|
unkown
|
page read and write
|
||
23F55B40000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
C000286000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
B5667FF000
|
stack
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
1D46D264000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
C000264000
|
direct allocation
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
ADCDFF000
|
stack
|
page read and write
|
||
1E589F16000
|
heap
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
1D46C160000
|
heap
|
page read and write
|
||
C00024F000
|
direct allocation
|
page read and write
|
||
C0002CC000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
7FFB2B3C0000
|
direct allocation
|
page execute and read and write
|
||
7FF4AF9A0000
|
direct allocation
|
page execute and read and write
|
||
47C0000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
26132D80000
|
trusted library allocation
|
page read and write
|
||
C000264000
|
direct allocation
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
1633AB60000
|
heap
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
2061ACC0000
|
direct allocation
|
page read and write
|
||
ADC9FE000
|
stack
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
C000282000
|
direct allocation
|
page read and write
|
||
C0002C6000
|
direct allocation
|
page read and write
|
||
28BC354D000
|
direct allocation
|
page read and write
|
||
1633B6F1000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
1D46A5C0000
|
heap
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
23F536A0000
|
trusted library allocation
|
page read and write
|
||
1D46CA60000
|
heap
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
2899D7D0000
|
heap
|
page read and write
|
||
1E5B2760000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
2F2D000
|
heap
|
page read and write
|
||
2899B280000
|
heap
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
4F0000
|
unkown
|
page readonly
|
||
1007F8000
|
stack
|
page read and write
|
||
2B9D000
|
unkown
|
page execute and read and write
|
||
C000220000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
B3387FF000
|
stack
|
page read and write
|
||
C0002B8000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
26132F40000
|
heap
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
20641A55000
|
direct allocation
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
AC7000
|
unkown
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
480F000
|
stack
|
page read and write
|
||
30BC000
|
heap
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
101BFE000
|
stack
|
page read and write
|
||
23F5513F000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
2061B4E0000
|
heap
|
page read and write
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
1633A2E4000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page readonly
|
||
82E000
|
stack
|
page read and write
|
||
2061AD28000
|
direct allocation
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
26132F0C000
|
direct allocation
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
5060000
|
heap
|
page read and write
|
||
26132F20000
|
direct allocation
|
page read and write
|
||
2CFA000
|
heap
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
3190000
|
heap
|
page read and write
|
||
2CDC000
|
stack
|
page read and write
|
||
223F000
|
unkown
|
page execute and read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
297A000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
26131200000
|
trusted library allocation
|
page read and write
|
||
FB4000
|
unkown
|
page execute and read and write
|
||
C000075000
|
direct allocation
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
1E58CD66000
|
heap
|
page read and write
|
||
28BC48BB000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
1D46D262000
|
heap
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
B2B3DFE000
|
stack
|
page read and write
|
||
305B000
|
heap
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
28BC3410000
|
direct allocation
|
page read and write
|
||
C000238000
|
direct allocation
|
page read and write
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
475F000
|
stack
|
page read and write
|
||
1633B6FB000
|
heap
|
page read and write
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
1D46CB9C000
|
heap
|
page read and write
|
||
C0002E4000
|
direct allocation
|
page read and write
|
||
28BC3510000
|
heap
|
page read and write
|
||
16361031000
|
direct allocation
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
C000248000
|
direct allocation
|
page read and write
|
||
AC7000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
43E000
|
stack
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
2061B460000
|
heap
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
2899B3A0000
|
heap
|
page read and write
|
||
B8D000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
36C000
|
stack
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
1E589F10000
|
heap
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
2B9D000
|
unkown
|
page execute and read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
C0002A0000
|
direct allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C0002AE000
|
direct allocation
|
page read and write
|
||
28BC3EAC000
|
heap
|
page read and write
|
||
23F55400000
|
heap
|
page read and write
|
||
1633AB20000
|
heap
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
C25F7FE000
|
stack
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C000284000
|
direct allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1633A420000
|
heap
|
page read and write
|
||
2899CF34000
|
heap
|
page read and write
|
||
26133755000
|
heap
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
AD0000
|
heap
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
B2B31FF000
|
stack
|
page read and write
|
||
C0000FC000
|
direct allocation
|
page read and write
|
||
C000258000
|
direct allocation
|
page read and write
|
||
FA6000
|
unkown
|
page execute and read and write
|
||
2DE8000
|
heap
|
page read and write
|
||
BF6D7FE000
|
stack
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
3093000
|
heap
|
page read and write
|
||
23F53708000
|
heap
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
261331D0000
|
heap
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C0002BA000
|
direct allocation
|
page read and write
|
||
28BC3470000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
B8D000
|
unkown
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
3078000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
1E58C090000
|
heap
|
page read and write
|
||
2B9D000
|
unkown
|
page execute and read and write
|
||
2BA5000
|
unkown
|
page execute and read and write
|
||
B5F000
|
unkown
|
page read and write
|
||
C000220000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
C000192000
|
direct allocation
|
page read and write
|
||
1D46D264000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
C000258000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
C000192000
|
direct allocation
|
page read and write
|
||
E01000
|
unkown
|
page readonly
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
1D46A5D0000
|
heap
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
B1F000
|
stack
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
C0002B4000
|
direct allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
2899CF42000
|
heap
|
page read and write
|
||
B95000
|
unkown
|
page execute and write copy
|
||
26132DE1000
|
heap
|
page read and write
|
||
2899CF40000
|
heap
|
page read and write
|
||
1013FF000
|
stack
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
30BC000
|
heap
|
page read and write
|
||
2A04000
|
direct allocation
|
page execute and read and write
|
||
30AC000
|
heap
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
7FFB2B3C0000
|
direct allocation
|
page execute and read and write
|
||
95E000
|
stack
|
page read and write
|
||
CA9AFFF000
|
stack
|
page read and write
|
||
206190F8000
|
heap
|
page read and write
|
||
C000075000
|
direct allocation
|
page read and write
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
2970000
|
heap
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
E73000
|
unkown
|
page execute and write copy
|
||
23F536A9000
|
direct allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
2E90000
|
heap
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
C000166000
|
direct allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
1E58C910000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
23F55BB1000
|
heap
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
26132C80000
|
heap
|
page read and write
|
||
C0002AC000
|
direct allocation
|
page read and write
|
||
2F18000
|
heap
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
1E58B8E4000
|
direct allocation
|
page read and write
|
||
C0002B2000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
C00023C000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
B95000
|
unkown
|
page readonly
|
||
B337FFF000
|
stack
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
3090000
|
heap
|
page read and write
|
||
C0002CE000
|
direct allocation
|
page read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
30AC000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
B14000
|
heap
|
page read and write
|
||
1E58B940000
|
heap
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
E01000
|
unkown
|
page readonly
|
||
C000102000
|
direct allocation
|
page read and write
|
||
712000
|
heap
|
page read and write
|
||
B2B41FF000
|
stack
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
2061BC20000
|
heap
|
page read and write
|
||
7FFB2B3C0000
|
direct allocation
|
page execute and read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
26131210000
|
heap
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
C00027C000
|
direct allocation
|
page read and write
|
||
23F552F0000
|
heap
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
7FF448360000
|
direct allocation
|
page execute and read and write
|
||
C00024F000
|
direct allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
1D46CB91000
|
heap
|
page read and write
|
||
1D46D360000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
6EE0D000
|
unkown
|
page read and write
|
||
2F4B000
|
heap
|
page read and write
|
||
28BC32C0000
|
heap
|
page read and write
|
||
28BC3545000
|
direct allocation
|
page read and write
|
||
23F55130000
|
direct allocation
|
page read and write
|
||
C000298000
|
direct allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
1633ABE6000
|
heap
|
page read and write
|
||
20641A3F000
|
direct allocation
|
page read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
3018000
|
heap
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
8AC000
|
stack
|
page read and write
|
||
309D000
|
heap
|
page read and write
|
||
26131200000
|
direct allocation
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
B9F000
|
stack
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C0002C2000
|
direct allocation
|
page read and write
|
||
CA9ABFF000
|
stack
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
7FFB2B3C0000
|
direct allocation
|
page execute and read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
26133690000
|
heap
|
page read and write
|
||
2899D0D0000
|
heap
|
page read and write
|
||
32D0000
|
direct allocation
|
page execute and read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
C000041000
|
direct allocation
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
C000248000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
B5F000
|
unkown
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
7FF4BFC80000
|
direct allocation
|
page execute and read and write
|
||
C000220000
|
direct allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
4CEF000
|
stack
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
16360FFF000
|
direct allocation
|
page read and write
|
||
C00028E000
|
direct allocation
|
page read and write
|
||
1D46C170000
|
heap
|
page read and write
|
||
C0001B8000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
1633ABA5000
|
heap
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
2899CD90000
|
direct allocation
|
page read and write
|
||
A7C000
|
stack
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
2899E07D000
|
direct allocation
|
page read and write
|
||
28BC3EA1000
|
heap
|
page read and write
|
||
C00028C000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
1E58BA50000
|
heap
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
C0002E8000
|
direct allocation
|
page read and write
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
23F566DC000
|
heap
|
page read and write
|
||
261335D0000
|
heap
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
C000047000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
223F000
|
unkown
|
page execute and read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
28BC35D0000
|
heap
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
1D46D3CD000
|
direct allocation
|
page read and write
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
23F550D0000
|
direct allocation
|
page read and write
|
||
2899D890000
|
heap
|
page read and write
|
||
C000234000
|
direct allocation
|
page read and write
|
||
2899D350000
|
heap
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
C000192000
|
direct allocation
|
page read and write
|
||
35D000
|
stack
|
page read and write
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
B5673FE000
|
stack
|
page read and write
|
||
C000238000
|
direct allocation
|
page read and write
|
||
C0002B0000
|
direct allocation
|
page read and write
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
28BC1AE0000
|
heap
|
page read and write
|
||
26132D80000
|
direct allocation
|
page read and write
|
||
B8D000
|
unkown
|
page read and write
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
52F000
|
stack
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
1D46C130000
|
direct allocation
|
page read and write
|
||
C25EFFE000
|
stack
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
1633A1C0000
|
direct allocation
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
C000162000
|
direct allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
32D0000
|
direct allocation
|
page execute and read and write
|
||
FE2000
|
unkown
|
page execute and read and write
|
||
C000294000
|
direct allocation
|
page read and write
|
||
2899B3A8000
|
heap
|
page read and write
|
||
23F55250000
|
heap
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
C00025C000
|
direct allocation
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
B565FFF000
|
stack
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
CA9A7FE000
|
stack
|
page read and write
|
||
28BC48B8000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page read and write
|
||
B8D000
|
unkown
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
28BC36E0000
|
heap
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
1E58C210000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
C000180000
|
direct allocation
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
FB4000
|
unkown
|
page execute and read and write
|
||
26132F50000
|
heap
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
3195000
|
heap
|
page read and write
|
||
28BC3EF5000
|
heap
|
page read and write
|
||
E73000
|
unkown
|
page execute and write copy
|
||
B2B35FF000
|
stack
|
page read and write
|
||
1633A250000
|
heap
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and read and write
|
||
2BA5000
|
unkown
|
page execute and read and write
|
||
1E5B276F000
|
direct allocation
|
page read and write
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
28BC341D000
|
direct allocation
|
page read and write
|
||
B95000
|
unkown
|
page execute and write copy
|
||
CA9B3FE000
|
stack
|
page read and write
|
||
BF6DFFF000
|
stack
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
1E58CD65000
|
heap
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
560000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
7FF457400000
|
direct allocation
|
page execute and read and write
|
||
2899B360000
|
heap
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C000238000
|
direct allocation
|
page read and write
|
||
FB1000
|
unkown
|
page execute and read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
1E58C294000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page readonly
|
||
B65000
|
unkown
|
page read and write
|
||
C0001CE000
|
direct allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
C000234000
|
direct allocation
|
page read and write
|
||
26133710000
|
heap
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
23F55A40000
|
heap
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
1633A2F0000
|
direct allocation
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
C25F3FE000
|
stack
|
page read and write
|
||
223F000
|
unkown
|
page execute and read and write
|
||
C0002C4000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
C000190000
|
direct allocation
|
page read and write
|
||
2061B3A0000
|
heap
|
page read and write
|
||
1E58C1D0000
|
heap
|
page read and write
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
1E58CD66000
|
heap
|
page read and write
|
||
2899CD90000
|
trusted library allocation
|
page read and write
|
||
C0000EE000
|
direct allocation
|
page read and write
|
||
5A3000
|
heap
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
7E9000
|
unkown
|
page execute and write copy
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
2061AC20000
|
heap
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
26131160000
|
heap
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
C2E000
|
unkown
|
page readonly
|
||
C000075000
|
direct allocation
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
C000024000
|
direct allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
1633A320000
|
heap
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
28BC3520000
|
direct allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
1E58C8F0000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
2BA2000
|
unkown
|
page execute and write copy
|
||
CA9BBFE000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
B2B21F9000
|
stack
|
page read and write
|
||
C00026A000
|
direct allocation
|
page read and write
|
||
1633A3A0000
|
heap
|
page read and write
|
||
28BC3410000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
C25E3F9000
|
stack
|
page read and write
|
||
2A18000
|
direct allocation
|
page execute and read and write
|
||
845000
|
heap
|
page read and write
|
||
2061BFF0000
|
heap
|
page read and write
|
||
C000242000
|
direct allocation
|
page read and write
|
||
26132F00000
|
direct allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
C000025000
|
direct allocation
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
2899CF42000
|
heap
|
page read and write
|
||
28BC352F000
|
direct allocation
|
page read and write
|
||
2899D0C0000
|
heap
|
page read and write
|
||
C0000E6000
|
direct allocation
|
page read and write
|
||
BF6DBFE000
|
stack
|
page read and write
|
||
23F55174000
|
heap
|
page read and write
|
||
B336FF9000
|
stack
|
page read and write
|
||
C00029D000
|
direct allocation
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000234000
|
direct allocation
|
page read and write
|
||
C00023C000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
2899D88C000
|
heap
|
page read and write
|
||
C0002A8000
|
direct allocation
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
B65000
|
unkown
|
page read and write
|
||
26133ED0000
|
heap
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
206419F0000
|
direct allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
26133590000
|
heap
|
page read and write
|
||
2899D040000
|
direct allocation
|
page read and write
|
||
C25EBFE000
|
stack
|
page read and write
|
||
28BC33E0000
|
heap
|
page read and write
|
||
1633AB5C000
|
heap
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C0001A0000
|
direct allocation
|
page read and write
|
||
2D5C000
|
stack
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
1E58B8E0000
|
trusted library allocation
|
page read and write
|
||
23F55B80000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
28BC48B5000
|
heap
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
B338BFE000
|
stack
|
page read and write
|
||
ADC5FE000
|
stack
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
26159AA0000
|
direct allocation
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
C0002A2000
|
direct allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
417000
|
unkown
|
page execute and write copy
|
||
7FF404380000
|
direct allocation
|
page execute and read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
57D000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
26132DE9000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
C000082000
|
direct allocation
|
page read and write
|
||
2A24000
|
direct allocation
|
page execute and read and write
|
||
6FD000
|
heap
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
2CBC000
|
stack
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
4F0000
|
unkown
|
page readonly
|
||
C00023C000
|
direct allocation
|
page read and write
|
||
2F5C000
|
heap
|
page read and write
|
||
2899CEB9000
|
direct allocation
|
page read and write
|
||
C000234000
|
direct allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
1E589F00000
|
heap
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
1633B6FF000
|
heap
|
page read and write
|
||
2B9D000
|
unkown
|
page execute and read and write
|
||
23F53530000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
8EC000
|
stack
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
B2B39FF000
|
stack
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
309C000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
1D46C270000
|
direct allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
4A5000
|
heap
|
page read and write
|
||
1E58C190000
|
heap
|
page read and write
|
||
2061AD60000
|
heap
|
page read and write
|
||
2A14000
|
direct allocation
|
page execute and read and write
|
||
C000242000
|
direct allocation
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
30B1000
|
heap
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
C000220000
|
direct allocation
|
page read and write
|
||
261311D0000
|
heap
|
page read and write
|
||
FB9000
|
unkown
|
page execute and read and write
|
||
14C000
|
stack
|
page read and write
|
||
4F1000
|
unkown
|
page execute read
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
2BA5000
|
unkown
|
page execute and read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C000264000
|
direct allocation
|
page read and write
|
||
2A28000
|
direct allocation
|
page execute and read and write
|
||
2899D750000
|
heap
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
1E58B9C4000
|
heap
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
2A3C000
|
direct allocation
|
page execute and read and write
|
||
5A8000
|
heap
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
568000
|
heap
|
page read and write
|
||
AC7000
|
unkown
|
page execute and write copy
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
1E58C0D0000
|
heap
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
2899CEB4000
|
direct allocation
|
page read and write
|
||
AC7000
|
unkown
|
page read and write
|
||
26132F60000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
1E589F1C000
|
heap
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C00026C000
|
direct allocation
|
page read and write
|
||
C000194000
|
direct allocation
|
page read and write
|
||
2061ACB0000
|
heap
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
26159AA9000
|
direct allocation
|
page read and write
|
||
1633A2D0000
|
direct allocation
|
page read and write
|
||
1D46C138000
|
direct allocation
|
page read and write
|
||
B8D000
|
unkown
|
page read and write
|
||
ADBDF8000
|
stack
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
7FFB2B3C0000
|
direct allocation
|
page execute and read and write
|
||
C00022A000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
2061ADE0000
|
heap
|
page read and write
|
||
2BA5000
|
unkown
|
page execute and write copy
|
||
C25FBFE000
|
stack
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
26132DEB000
|
heap
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
1633B6F6000
|
heap
|
page read and write
|
||
500F000
|
stack
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
1D46D3AF000
|
direct allocation
|
page read and write
|
||
3278000
|
heap
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
C000242000
|
direct allocation
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
C0002DA000
|
direct allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
2B9D000
|
unkown
|
page execute and read and write
|
||
C00024F000
|
direct allocation
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
28BC3DF0000
|
heap
|
page read and write
|
||
3041000
|
heap
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
16338720000
|
direct allocation
|
page read and write
|
||
32EC000
|
heap
|
page read and write
|
||
223F000
|
unkown
|
page execute and read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
1E58B930000
|
heap
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
B65000
|
unkown
|
page read and write
|
||
72B000
|
heap
|
page read and write
|
||
302D000
|
heap
|
page read and write
|
There are 1708 hidden memdumps, click here to show them.