IOC Report
SS Bottmac Engineers Pvt. Ltd..exe

loading gif

Files

File Path
Type
Category
Malicious
SS Bottmac Engineers Pvt. Ltd..exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SS Bottmac Engineers Pvt. Ltd..exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp960E.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\RTUZKYTc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\RTUZKYTc.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RTUZKYTc.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0ew04031.law.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1yxebe5j.g1k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a1kkwmex.kdj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a5jfgk3a.q4t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bkgarccn.ioz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bpb5ezlb.ysp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bzs115o5.hoc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c0iehe5c.4dv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5lurcm3.c5a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cz0l5p2n.qac.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ean0vdtf.cj0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ejpbso42.ox5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jasetlow.33p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l01lomss.d32.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qjd0u0bu.ogr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sshyzuwv.2ym.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uglp4bwk.rkm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xzxixvx3.t3m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yh5iqusp.cvx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yuahbm3e.mei.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2E66.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpAD5E.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpE6A.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SS Bottmac Engineers Pvt. Ltd..lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 08:31:24 2024, mtime=Thu Oct 31 08:31:25 2024, atime=Thu Oct 31 08:31:25 2024, length=575496, window=hide
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SS Bottmac Engineers Pvt. Ltd..exe
"C:\Users\user\Desktop\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RTUZKYTc.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RTUZKYTc" /XML "C:\Users\user\AppData\Local\Temp\tmp960E.tmp"
malicious
C:\Users\user\Desktop\SS Bottmac Engineers Pvt. Ltd..exe
"C:\Users\user\Desktop\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Users\user\AppData\Roaming\RTUZKYTc.exe
C:\Users\user\AppData\Roaming\RTUZKYTc.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SS Bottmac Engineers Pvt. Ltd..exe'
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RTUZKYTc" /XML "C:\Users\user\AppData\Local\Temp\tmpAD5E.tmp"
malicious
C:\Users\user\AppData\Roaming\RTUZKYTc.exe
"C:\Users\user\AppData\Roaming\RTUZKYTc.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SS Bottmac Engineers Pvt. Ltd..exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe'
malicious
C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe
"C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RTUZKYTc" /XML "C:\Users\user\AppData\Local\Temp\tmpE6A.tmp"
malicious
C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe
"C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe
"C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe
"C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RTUZKYTc" /XML "C:\Users\user\AppData\Local\Temp\tmp2E66.tmp"
malicious
C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe
"C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe
"C:\Users\user\AppData\Roaming\SS Bottmac Engineers Pvt. Ltd..exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
kanrplest.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://github.com/Pester/Pester
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kanrplest.duckdns.org
104.223.35.76
malicious

IPs

IP
Domain
Country
Malicious
104.223.35.76
kanrplest.duckdns.org
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SS Bottmac Engineers Pvt. Ltd.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
32B2000
trusted library allocation
page read and write
malicious
3314000
trusted library allocation
page read and write
malicious
3682000
trusted library allocation
page read and write
malicious
31E4000
trusted library allocation
page read and write
malicious
3182000
trusted library allocation
page read and write
malicious
3161000
trusted library allocation
page read and write
malicious
36E4000
trusted library allocation
page read and write
malicious
A5E000
stack
page read and write
16B0000
trusted library allocation
page read and write
360C000
heap
page read and write
5900000
trusted library allocation
page read and write
2F9E000
trusted library allocation
page read and write
1922000
trusted library allocation
page read and write
659F000
stack
page read and write
7390000
trusted library allocation
page read and write
720E000
stack
page read and write
781B000
stack
page read and write
708A000
heap
page read and write
1511000
heap
page read and write
6EDF000
stack
page read and write
7380000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
5930000
heap
page read and write
108A000
stack
page read and write
15D2000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
1912000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
6998000
trusted library allocation
page read and write
79AE000
stack
page read and write
16C4000
trusted library allocation
page read and write
7A81000
trusted library allocation
page read and write
4DFE000
trusted library allocation
page read and write
FA0000
heap
page read and write
15AD000
trusted library allocation
page execute and read and write
5900000
heap
page read and write
4E6C000
stack
page read and write
5710000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
5965000
heap
page read and write
4AA4000
trusted library allocation
page read and write
71CE000
stack
page read and write
1449000
heap
page read and write
5950000
heap
page read and write
333A000
heap
page read and write
8A27000
heap
page read and write
4139000
trusted library allocation
page read and write
485A000
trusted library allocation
page read and write
59B2000
heap
page read and write
EF7000
stack
page read and write
659D000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
50DF000
stack
page read and write
1200000
trusted library allocation
page read and write
122B000
trusted library allocation
page execute and read and write
3250000
heap
page read and write
79AC000
heap
page read and write
4E60000
trusted library allocation
page read and write
79AE000
stack
page read and write
56C2000
trusted library allocation
page read and write
776C000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
74DF000
stack
page read and write
5A5E000
stack
page read and write
1898000
trusted library allocation
page read and write
5880000
trusted library allocation
page execute and read and write
29F0000
heap
page read and write
273D000
stack
page read and write
510E000
stack
page read and write
32F0000
heap
page read and write
5744000
trusted library allocation
page read and write
56A0000
heap
page read and write
1927000
trusted library allocation
page execute and read and write
61CF000
trusted library allocation
page read and write
6BAE000
stack
page read and write
7AF8000
heap
page read and write
8948000
heap
page read and write
5970000
heap
page read and write
D70000
unkown
page readonly
30E5000
trusted library allocation
page read and write
E347000
trusted library allocation
page read and write
7FE0000
heap
page read and write
7BAE000
heap
page read and write
7E10000
trusted library allocation
page read and write
6049000
trusted library allocation
page read and write
32C6000
heap
page read and write
4DAC000
trusted library allocation
page read and write
E92C000
stack
page read and write
ED8000
heap
page read and write
639E000
stack
page read and write
1588000
heap
page read and write
7FDC000
heap
page read and write
51CE000
stack
page read and write
2C3A000
stack
page read and write
6596000
trusted library allocation
page read and write
159E000
stack
page read and write
755A000
stack
page read and write
15CA000
trusted library allocation
page execute and read and write
1970000
trusted library allocation
page read and write
2AA0000
heap
page read and write
1710000
trusted library allocation
page read and write
2CF0000
heap
page read and write
2F3C000
stack
page read and write
62F0000
heap
page read and write
5A8E000
stack
page read and write
5820000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
8940000
trusted library allocation
page execute and read and write
76A0000
heap
page read and write
A10000
heap
page read and write
2F80000
heap
page read and write
3B51000
trusted library allocation
page read and write
89F7000
heap
page read and write
EE1E000
stack
page read and write
15C0000
trusted library allocation
page read and write
7C1E000
stack
page read and write
6BF0000
heap
page read and write
EC90000
heap
page read and write
6AEB000
stack
page read and write
4E8B000
trusted library allocation
page read and write
369D000
trusted library allocation
page execute and read and write
109D000
trusted library allocation
page execute and read and write
4760000
heap
page execute and read and write
7004000
heap
page read and write
16F2000
trusted library allocation
page read and write
191A000
trusted library allocation
page execute and read and write
5DA5000
heap
page read and write
531E000
stack
page read and write
87A0000
heap
page read and write
2A44000
trusted library allocation
page read and write
E07000
heap
page read and write
4F6F000
stack
page read and write
2FAC000
trusted library allocation
page read and write
15D7000
trusted library allocation
page execute and read and write
62DE000
stack
page read and write
85DE000
stack
page read and write
4F3E000
stack
page read and write
7B15000
heap
page read and write
D84000
trusted library allocation
page read and write
89A0000
heap
page read and write
56AC000
heap
page read and write
1828000
heap
page read and write
16E3000
trusted library allocation
page execute and read and write
2F0D000
stack
page read and write
5992000
heap
page read and write
11F3000
trusted library allocation
page execute and read and write
92AC000
stack
page read and write
74EE000
stack
page read and write
3818000
heap
page read and write
58DE000
trusted library allocation
page read and write
65B9000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
3586000
heap
page read and write
350E000
stack
page read and write
15D2000
heap
page read and write
2F70000
heap
page read and write
1946000
heap
page read and write
11AF000
stack
page read and write
B52B000
trusted library allocation
page read and write
4135000
trusted library allocation
page read and write
56D2000
heap
page read and write
8790000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
C20000
heap
page read and write
C73000
heap
page read and write
36A0000
trusted library allocation
page read and write
EE5E000
stack
page read and write
4705000
heap
page execute and read and write
4525000
trusted library allocation
page read and write
D3E000
stack
page read and write
88C0000
trusted library allocation
page read and write
8EAD000
stack
page read and write
7A9C000
trusted library allocation
page read and write
2ACB000
heap
page read and write
8FAE000
stack
page read and write
4D90000
heap
page readonly
3394000
heap
page read and write
557E000
stack
page read and write
1300000
heap
page read and write
29CE000
stack
page read and write
7AAE000
stack
page read and write
8BB0000
trusted library allocation
page read and write
128A000
heap
page read and write
5B3E000
stack
page read and write
7CCE000
stack
page read and write
81C0000
trusted library allocation
page read and write
902E000
stack
page read and write
6F70000
trusted library allocation
page read and write
59CA000
heap
page read and write
EF5F000
stack
page read and write
7EE7000
trusted library allocation
page read and write
5648000
trusted library allocation
page read and write
8F2E000
stack
page read and write
37B8000
trusted library allocation
page read and write
75C0000
heap
page read and write
7F90000
heap
page read and write
4EBE000
stack
page read and write
4A5A000
trusted library allocation
page read and write
F0E000
stack
page read and write
7E1B000
trusted library allocation
page read and write
3180000
trusted library allocation
page execute and read and write
54D5000
heap
page read and write
BCF000
stack
page read and write
187F000
unkown
page read and write
47CA000
trusted library allocation
page read and write
7FD2000
heap
page read and write
11E0000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
1606000
heap
page read and write
861F000
stack
page read and write
10AD000
trusted library allocation
page execute and read and write
646A000
stack
page read and write
2A6A000
trusted library allocation
page execute and read and write
2A43000
trusted library allocation
page execute and read and write
7CFB000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
7706000
heap
page read and write
1940000
heap
page read and write
176E000
stack
page read and write
7B30000
trusted library allocation
page execute and read and write
2A4D000
trusted library allocation
page execute and read and write
8F6D000
stack
page read and write
7B7E000
stack
page read and write
5BF0000
heap
page read and write
4DC0000
heap
page read and write
8B90000
trusted library allocation
page read and write
75AA000
stack
page read and write
6B2E000
stack
page read and write
1187000
stack
page read and write
7F30000
trusted library allocation
page read and write
52DF000
stack
page read and write
16F0000
trusted library allocation
page read and write
2AC0000
heap
page read and write
700A000
heap
page read and write
79A1000
heap
page read and write
2A30000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
52FE000
stack
page read and write
5680000
heap
page execute and read and write
7340000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page execute and read and write
16FA000
trusted library allocation
page execute and read and write
4009000
trusted library allocation
page read and write
759D000
stack
page read and write
795E000
stack
page read and write
8920000
trusted library allocation
page read and write
58B0000
heap
page read and write
56FF000
trusted library allocation
page read and write
70FF000
heap
page read and write
7DF0000
trusted library allocation
page read and write
84DE000
stack
page read and write
7E30000
heap
page read and write
7CE0000
trusted library allocation
page read and write
3380000
heap
page read and write
591F000
trusted library allocation
page read and write
6F90000
heap
page read and write
2F40000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page execute and read and write
73F0000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
109E000
stack
page read and write
4CE5000
trusted library allocation
page execute and read and write
2A70000
heap
page read and write
5771000
trusted library allocation
page read and write
7A1E000
heap
page read and write
E9AE000
stack
page read and write
4EAE000
trusted library allocation
page read and write
140D000
trusted library allocation
page execute and read and write
2FE0000
heap
page read and write
E345000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
6F60000
heap
page execute and read and write
4580000
heap
page read and write
76EC000
stack
page read and write
55E0000
trusted library allocation
page read and write
AA3000
trusted library allocation
page execute and read and write
5450000
trusted library allocation
page execute and read and write
C20000
heap
page read and write
7D40000
trusted library allocation
page read and write
58A0000
trusted library allocation
page execute and read and write
57DB000
trusted library allocation
page read and write
4E4C000
stack
page read and write
E45000
heap
page read and write
2B10000
heap
page execute and read and write
30DF000
stack
page read and write
7770000
trusted library allocation
page execute and read and write
1390000
heap
page read and write
A0E000
stack
page read and write
66FD000
stack
page read and write
6664000
heap
page read and write
4D8E000
stack
page read and write
58B0000
trusted library allocation
page read and write
146E000
heap
page read and write
657B000
trusted library allocation
page read and write
1435000
heap
page read and write
7D90000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
2D30000
heap
page read and write
AF37000
trusted library allocation
page read and write
5928000
trusted library allocation
page read and write
6DEB000
stack
page read and write
89B6000
heap
page read and write
4D6E000
stack
page read and write
1270000
heap
page read and write
8D6E000
stack
page read and write
1200000
heap
page read and write
45A000
stack
page read and write
8F7E000
stack
page read and write
7D50000
trusted library allocation
page read and write
8F3D000
stack
page read and write
5650000
trusted library allocation
page read and write
5630000
trusted library allocation
page execute and read and write
657E000
trusted library allocation
page read and write
5730000
heap
page read and write
1227000
trusted library allocation
page execute and read and write
524C000
stack
page read and write
78CF000
stack
page read and write
7932000
heap
page read and write
30E0000
trusted library allocation
page read and write
450E000
stack
page read and write
7D30000
trusted library allocation
page read and write
F10000
heap
page read and write
2D0E000
stack
page read and write
7A70000
trusted library allocation
page read and write
7460000
heap
page read and write
1530000
heap
page read and write
65B0000
trusted library allocation
page read and write
78AE000
stack
page read and write
447C000
stack
page read and write
F80000
trusted library allocation
page read and write
55B6000
trusted library allocation
page read and write
4B6E000
trusted library allocation
page read and write
735E000
stack
page read and write
B37000
stack
page read and write
1250000
heap
page read and write
5021000
trusted library allocation
page read and write
277A000
stack
page read and write
E340000
trusted library allocation
page read and write
474D000
stack
page read and write
2C20000
heap
page read and write
4FA1000
trusted library allocation
page read and write
795C000
trusted library allocation
page read and write
89A4000
heap
page read and write
7CB0000
trusted library allocation
page read and write
4FF9000
trusted library allocation
page read and write
4DCE000
stack
page read and write
D10000
heap
page read and write
119F000
stack
page read and write
5A14000
heap
page read and write
609E000
stack
page read and write
7F170000
trusted library allocation
page execute and read and write
838E000
stack
page read and write
5490000
trusted library allocation
page read and write
5B00000
heap
page read and write
E82B000
stack
page read and write
706E000
heap
page read and write
318E000
trusted library allocation
page read and write
6E9E000
stack
page read and write
7F40000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
5B4E000
stack
page read and write
4E50000
trusted library allocation
page execute and read and write
751E000
stack
page read and write
2DE0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7B7B000
heap
page read and write
36C0000
heap
page read and write
15A4000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
649E000
stack
page read and write
EC4C000
stack
page read and write
8B70000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
8F8000
stack
page read and write
5733000
trusted library allocation
page read and write
F1DC000
stack
page read and write
15C2000
trusted library allocation
page read and write
7B77000
heap
page read and write
4025000
trusted library allocation
page read and write
2D69000
heap
page read and write
2FFD000
stack
page read and write
1290000
heap
page read and write
34F0000
heap
page execute and read and write
5922000
trusted library allocation
page read and write
8E7D000
stack
page read and write
5BEE000
stack
page read and write
5150000
heap
page execute and read and write
894C000
heap
page read and write
576D000
trusted library allocation
page read and write
6F98000
heap
page read and write
317C000
stack
page read and write
608C000
trusted library allocation
page read and write
16BE000
stack
page read and write
3240000
trusted library allocation
page read and write
59B0000
trusted library section
page readonly
2FB0000
heap
page read and write
7850000
trusted library allocation
page read and write
2CCE000
unkown
page read and write
576F000
trusted library allocation
page read and write
17A0000
heap
page read and write
7A31000
heap
page read and write
788E000
stack
page read and write
8EBB000
stack
page read and write
13A0000
heap
page read and write
78C0000
trusted library allocation
page read and write
69D0000
heap
page read and write
C25000
heap
page read and write
2F38000
stack
page read and write
16C0000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
32C0000
heap
page read and write
4FEC000
stack
page read and write
57C3000
heap
page read and write
78F0000
heap
page execute and read and write
3520000
heap
page read and write
55EE000
trusted library allocation
page read and write
649E000
stack
page read and write
59D0000
trusted library allocation
page execute and read and write
32E0000
heap
page read and write
354B000
heap
page read and write
D9A000
trusted library allocation
page execute and read and write
7074000
heap
page read and write
10CB000
trusted library allocation
page execute and read and write
8972000
heap
page read and write
4131000
trusted library allocation
page read and write
4FCE000
stack
page read and write
55AE000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
13A0000
heap
page read and write
3213000
heap
page read and write
45CD000
stack
page read and write
573B000
trusted library allocation
page read and write
7FA4000
heap
page read and write
6949000
stack
page read and write
884E000
stack
page read and write
12F1000
heap
page read and write
5799000
trusted library allocation
page read and write
188F000
stack
page read and write
5BE6000
trusted library allocation
page read and write
1430000
heap
page read and write
6700000
trusted library allocation
page read and write
1266000
trusted library allocation
page read and write
1093000
trusted library allocation
page execute and read and write
880D000
stack
page read and write
7F92000
heap
page read and write
7EEA000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
62E0000
heap
page read and write
16E0000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
5A08000
heap
page read and write
6148000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
703E000
heap
page read and write
16F0000
heap
page read and write
8330000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page execute and read and write
75B0000
heap
page read and write
6569000
stack
page read and write
7D80000
trusted library allocation
page read and write
7DD0000
heap
page read and write
13AE000
heap
page read and write
2AA0000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
11B0000
heap
page read and write
2D7E000
stack
page read and write
36A7000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
464E000
stack
page read and write
33D0000
heap
page read and write
5DDF000
stack
page read and write
4994000
trusted library allocation
page read and write
15A3000
trusted library allocation
page execute and read and write
1240000
trusted library allocation
page execute and read and write
4D5A000
trusted library allocation
page read and write
55BD000
trusted library allocation
page read and write
3350000
heap
page read and write
619F000
stack
page read and write
16E4000
trusted library allocation
page read and write
1815000
trusted library allocation
page read and write
DA7000
trusted library allocation
page execute and read and write
79FD000
heap
page read and write
5737000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
57CB000
stack
page read and write
30F6000
trusted library allocation
page read and write
3680000
trusted library allocation
page read and write
494A000
trusted library allocation
page read and write
1290000
heap
page read and write
E8A000
heap
page read and write
133E000
stack
page read and write
752E000
stack
page read and write
D80000
trusted library allocation
page read and write
2AF0000
heap
page readonly
4545000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
6D6C000
stack
page read and write
36AB000
trusted library allocation
page read and write
8A08000
heap
page read and write
11EE000
stack
page read and write
7DB0000
trusted library allocation
page read and write
8D13000
trusted library allocation
page read and write
7A77000
trusted library allocation
page read and write
7FAC000
heap
page read and write
ED0000
trusted library allocation
page read and write
3528000
heap
page read and write
15B4000
heap
page read and write
35B9000
heap
page read and write
1903000
trusted library allocation
page read and write
8490000
trusted library allocation
page execute and read and write
567E000
stack
page read and write
1360000
heap
page read and write
2A72000
trusted library allocation
page read and write
DF4000
heap
page read and write
2E3B000
stack
page read and write
1510000
trusted library allocation
page read and write
8192000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
2F7D000
stack
page read and write
3690000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
12B4000
heap
page read and write
15DB000
trusted library allocation
page execute and read and write
8B60000
trusted library allocation
page read and write
6980000
trusted library allocation
page read and write
89F3000
heap
page read and write
73B0000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
792E000
stack
page read and write
4C12000
trusted library allocation
page read and write
5504000
trusted library allocation
page read and write
652E000
stack
page read and write
283E000
unkown
page read and write
298D000
stack
page read and write
3234000
trusted library allocation
page read and write
159E000
stack
page read and write
8850000
heap
page read and write
30F0000
trusted library allocation
page read and write
1550000
heap
page read and write
4E0E000
stack
page read and write
739E000
stack
page read and write
4BC000
stack
page read and write
65B0000
heap
page read and write
73DF000
stack
page read and write
706C000
heap
page read and write
3450000
trusted library allocation
page read and write
7AAE000
stack
page read and write
7C4E000
stack
page read and write
36B0000
trusted library allocation
page read and write
15F9000
heap
page read and write
12A0000
heap
page read and write
6DAE000
stack
page read and write
7D40000
trusted library allocation
page read and write
B526000
trusted library allocation
page read and write
460B000
stack
page read and write
6021000
trusted library allocation
page read and write
8934000
heap
page read and write
36A9000
trusted library allocation
page read and write
756E000
stack
page read and write
5750000
trusted library allocation
page read and write
2C0E000
stack
page read and write
175E000
stack
page read and write
7BF0000
trusted library allocation
page read and write
32BF000
stack
page read and write
52DE000
stack
page read and write
10B0000
trusted library allocation
page read and write
8FEF000
stack
page read and write
7C9D000
stack
page read and write
D30000
heap
page read and write
16D0000
trusted library allocation
page read and write
586B000
stack
page read and write
D00000
heap
page read and write
5FE000
stack
page read and write
5AA0000
trusted library allocation
page read and write
ECD000
stack
page read and write
49BC000
trusted library allocation
page read and write
54C2000
trusted library allocation
page read and write
2A80000
heap
page read and write
16F7000
trusted library allocation
page execute and read and write
49DF000
trusted library allocation
page read and write
322E000
stack
page read and write
3557000
heap
page read and write
5470000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
AC0000
heap
page read and write
1320000
heap
page read and write
73ED000
stack
page read and write
4111000
trusted library allocation
page read and write
323D000
stack
page read and write
7CF0000
trusted library allocation
page read and write
1420000
heap
page read and write
4935000
trusted library allocation
page read and write
55B1000
trusted library allocation
page read and write
3673000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
952E000
stack
page read and write
EB0E000
stack
page read and write
890E000
stack
page read and write
74EE000
stack
page read and write
4EDF000
trusted library allocation
page read and write
514E000
stack
page read and write
3293000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
334E000
stack
page read and write
8A62000
heap
page read and write
2D9A000
heap
page read and write
2A3E000
unkown
page read and write
2F9F000
stack
page read and write
5DB0000
trusted library allocation
page execute and read and write
2DF2000
heap
page read and write
BE0000
heap
page read and write
53FE000
stack
page read and write
5CDE000
stack
page read and write
70D6000
heap
page read and write
1240000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
44BC000
stack
page read and write
7B20000
trusted library allocation
page read and write
EB5E000
stack
page read and write
1080000
trusted library allocation
page read and write
1157000
stack
page read and write
2F17000
trusted library allocation
page read and write
2840000
heap
page read and write
77DE000
stack
page read and write
7AB0000
heap
page read and write
5BAE000
stack
page read and write
F0DC000
stack
page read and write
1910000
trusted library allocation
page read and write
104E000
stack
page read and write
8519000
stack
page read and write
93B0000
trusted library allocation
page read and write
2B2A000
heap
page read and write
58B6000
trusted library allocation
page read and write
2790000
heap
page execute and read and write
906F000
stack
page read and write
7760000
trusted library allocation
page read and write
36AD000
trusted library allocation
page read and write
10E0000
heap
page read and write
5988000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
61D8000
trusted library allocation
page read and write
5954000
heap
page read and write
5A60000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
7EFA0000
trusted library allocation
page execute and read and write
7FE8000
heap
page read and write
5740000
trusted library allocation
page read and write
7F9A8000
trusted library allocation
page execute and read and write
100E000
stack
page read and write
54DE000
stack
page read and write
7C8E000
stack
page read and write
585C000
stack
page read and write
6420000
heap
page read and write
87A0000
heap
page read and write
143E000
heap
page read and write
330E000
stack
page read and write
2FCD000
stack
page read and write
138E000
stack
page read and write
10BA000
trusted library allocation
page execute and read and write
5670000
heap
page read and write
135E000
heap
page read and write
5890000
heap
page read and write
88E0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
8042000
heap
page read and write
7FA0000
heap
page read and write
70E0000
heap
page read and write
10A0000
trusted library allocation
page read and write
4E4A000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page execute and read and write
3190000
trusted library allocation
page read and write
859D000
stack
page read and write
32A0000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
C86000
heap
page read and write
7CC0000
trusted library allocation
page execute and read and write
8D9F000
stack
page read and write
5733000
heap
page read and write
5A70000
trusted library allocation
page execute and read and write
7A7A000
trusted library allocation
page read and write
5968000
heap
page read and write
780E000
stack
page read and write
8D10000
trusted library allocation
page read and write
27E0000
heap
page read and write
1800000
trusted library allocation
page read and write
3810000
heap
page read and write
AC5000
heap
page read and write
7939000
heap
page read and write
5A66000
heap
page read and write
558D000
trusted library allocation
page read and write
3120000
heap
page execute and read and write
5A80000
trusted library allocation
page execute and read and write
2951000
trusted library allocation
page read and write
1707000
trusted library allocation
page execute and read and write
59D0000
heap
page read and write
3341000
trusted library allocation
page read and write
E667000
trusted library allocation
page read and write
72CE000
stack
page read and write
32D0000
trusted library allocation
page read and write
2E25000
heap
page read and write
7A13000
heap
page read and write
1980000
heap
page read and write
5779000
trusted library allocation
page read and write
7ECD000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
3310000
heap
page read and write
17E0000
trusted library allocation
page read and write
587E000
stack
page read and write
7993000
heap
page read and write
BDA000
trusted library allocation
page execute and read and write
54C0000
heap
page read and write
EAE0000
trusted library allocation
page execute and read and write
5694000
heap
page read and write
7B87000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
89AC000
heap
page read and write
58D0000
heap
page read and write
59F0000
heap
page execute and read and write
7830000
trusted library section
page read and write
7B80000
trusted library allocation
page read and write
1820000
heap
page read and write
F8A000
stack
page read and write
5910000
trusted library allocation
page execute and read and write
12C2000
heap
page read and write
69E0000
trusted library allocation
page execute and read and write
E660000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
8FFE000
stack
page read and write
2FB0000
trusted library allocation
page read and write
2F15000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page read and write
6591000
trusted library allocation
page read and write
50F8000
trusted library allocation
page read and write
2B40000
heap
page read and write
7A6E000
stack
page read and write
87CD000
trusted library allocation
page read and write
1295000
heap
page read and write
12A0000
heap
page read and write
4F90000
heap
page execute and read and write
E960000
trusted library allocation
page execute and read and write
3890000
trusted library allocation
page read and write
3100000
heap
page read and write
5138000
trusted library allocation
page read and write
27AA000
stack
page read and write
61DE000
stack
page read and write
32D7000
heap
page read and write
2DC0000
heap
page read and write
30CE000
stack
page read and write
4CE2000
trusted library allocation
page read and write
E8E000
stack
page read and write
C58000
heap
page read and write
2B20000
heap
page execute and read and write
7DC0000
trusted library allocation
page read and write
CC2000
heap
page read and write
1916000
trusted library allocation
page execute and read and write
11B0000
heap
page read and write
5680000
trusted library allocation
page read and write
8944000
heap
page read and write
10C0000
trusted library allocation
page read and write
7B40000
heap
page read and write
7DA0000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
6990000
trusted library allocation
page read and write
7028000
heap
page read and write
1456000
heap
page read and write
15AA000
heap
page read and write
6158000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
79FB000
heap
page read and write
7B34000
heap
page read and write
3410000
trusted library allocation
page read and write
642E000
stack
page read and write
454F000
stack
page read and write
E57E000
stack
page read and write
48C6000
trusted library allocation
page read and write
E83000
heap
page read and write
287F000
unkown
page read and write
3347000
heap
page read and write
7F110000
trusted library allocation
page execute and read and write
52CC000
stack
page read and write
10AF000
stack
page read and write
5A1C000
heap
page read and write
57D0000
trusted library allocation
page execute and read and write
BE7000
trusted library allocation
page execute and read and write
D73000
trusted library allocation
page execute and read and write
7DE0000
trusted library allocation
page execute and read and write
8A51000
heap
page read and write
8780000
trusted library allocation
page execute and read and write
5660000
heap
page read and write
7415000
heap
page execute and read and write
7A8E000
trusted library allocation
page read and write
29DD000
stack
page read and write
32D0000
heap
page read and write
574C000
trusted library allocation
page read and write
5A5E000
stack
page read and write
AB0000
trusted library allocation
page read and write
D96000
trusted library allocation
page execute and read and write
4EFE000
stack
page read and write
16D0000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
380C000
stack
page read and write
4F79000
stack
page read and write
88B2000
trusted library allocation
page read and write
58A0000
trusted library allocation
page execute and read and write
59BD000
stack
page read and write
782C000
stack
page read and write
8938000
heap
page read and write
FF0000
heap
page read and write
5C5E000
stack
page read and write
5AB0000
heap
page execute and read and write
5DA0000
heap
page read and write
899C000
heap
page read and write
6640000
heap
page read and write
2EFC000
stack
page read and write
455A000
trusted library allocation
page read and write
6B10000
heap
page read and write
4E94000
trusted library allocation
page read and write
5440000
heap
page read and write
1700000
trusted library allocation
page read and write
5A53000
heap
page read and write
5CED000
stack
page read and write
E9B000
heap
page read and write
7886000
heap
page read and write
1640000
trusted library allocation
page execute and read and write
2F60000
trusted library allocation
page read and write
3210000
heap
page read and write
5FA9000
trusted library allocation
page read and write
DEF000
heap
page read and write
553E000
stack
page read and write
DD0000
heap
page read and write
789F000
stack
page read and write
4700000
heap
page execute and read and write
83CE000
stack
page read and write
3480000
trusted library allocation
page read and write
C50000
heap
page read and write
36BA000
trusted library allocation
page execute and read and write
128E000
stack
page read and write
17F0000
heap
page read and write
749E000
stack
page read and write
E89E000
stack
page read and write
327E000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
4045000
trusted library allocation
page read and write
2E28000
heap
page read and write
5670000
trusted library allocation
page execute and read and write
8470000
trusted library allocation
page read and write
3694000
trusted library allocation
page read and write
4E70000
trusted library allocation
page execute and read and write
141D000
trusted library allocation
page execute and read and write
88C0000
heap
page read and write
12F7000
stack
page read and write
2F73000
heap
page read and write
F2DE000
stack
page read and write
7350000
trusted library allocation
page read and write
8E60000
trusted library allocation
page execute and read and write
41D000
stack
page read and write
1403000
trusted library allocation
page execute and read and write
7B19000
heap
page read and write
D60000
trusted library allocation
page read and write
8770000
heap
page read and write
12EE000
stack
page read and write
778E000
stack
page read and write
58E0000
trusted library allocation
page execute and read and write
7A90000
trusted library allocation
page read and write
889E000
stack
page read and write
33A2000
heap
page read and write
16F2000
trusted library allocation
page read and write
40C000
remote allocation
page execute and read and write
5468000
trusted library allocation
page read and write
730D000
stack
page read and write
5688000
trusted library allocation
page read and write
36C7000
heap
page read and write
5962000
heap
page read and write
2D90000
heap
page read and write
69C0000
trusted library allocation
page execute and read and write
54D0000
heap
page read and write
1770000
trusted library allocation
page execute and read and write
5B80000
heap
page read and write
1702000
trusted library allocation
page read and write
6630000
heap
page read and write
B330000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
6F1E000
stack
page read and write
59C0000
heap
page read and write
5930000
trusted library allocation
page read and write
3236000
trusted library allocation
page read and write
5830000
heap
page read and write
5FC9000
trusted library allocation
page read and write
BA90000
trusted library section
page read and write
498A000
trusted library allocation
page read and write
D74000
trusted library allocation
page read and write
358F000
heap
page read and write
4FDF000
stack
page read and write
E60000
heap
page read and write
2DF0000
heap
page read and write
190D000
trusted library allocation
page execute and read and write
8FED000
stack
page read and write
805D000
heap
page read and write
8B32000
trusted library allocation
page read and write
1255000
heap
page read and write
662F000
stack
page read and write
6FBF000
heap
page read and write
2ECC000
stack
page read and write
13F0000
trusted library allocation
page read and write
7C5E000
stack
page read and write
7F4B0000
trusted library allocation
page execute and read and write
4E85000
heap
page execute and read and write
570000
heap
page read and write
7ABC000
heap
page read and write
541E000
stack
page read and write
8940000
heap
page read and write
17C0000
trusted library allocation
page execute and read and write
10E5000
heap
page read and write
1270000
heap
page read and write
5927000
trusted library allocation
page read and write
784F000
stack
page read and write
2D20000
trusted library allocation
page read and write
87B0000
trusted library allocation
page execute and read and write
7BA7000
heap
page read and write
2D4F000
stack
page read and write
8CD0000
trusted library allocation
page read and write
7E32000
trusted library allocation
page read and write
581E000
stack
page read and write
344A000
trusted library allocation
page execute and read and write
5C70000
trusted library allocation
page execute and read and write
7B8A000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
731E000
stack
page read and write
7F188000
trusted library allocation
page execute and read and write
7D20000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
6570000
trusted library allocation
page read and write
2D1E000
stack
page read and write
36C8000
trusted library allocation
page read and write
136E000
heap
page read and write
1094000
trusted library allocation
page read and write
89CA000
heap
page read and write
8EFE000
stack
page read and write
44C3000
trusted library allocation
page read and write
6BEA000
stack
page read and write
99B000
stack
page read and write
16EE000
stack
page read and write
11F4000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
913E000
stack
page read and write
8A20000
heap
page read and write
76AE000
heap
page read and write
57B0000
trusted library section
page readonly
614B000
trusted library allocation
page read and write
EDCE000
stack
page read and write
405A000
trusted library allocation
page read and write
903E000
stack
page read and write
5920000
trusted library allocation
page read and write
8EE9000
stack
page read and write
8CE3000
trusted library allocation
page read and write
1920000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page execute and read and write
7AA0000
trusted library allocation
page execute and read and write
3253000
heap
page read and write
3230000
heap
page read and write
160A000
heap
page read and write
745B000
stack
page read and write
2E50000
heap
page read and write
7AEE000
stack
page read and write
2B0A000
heap
page read and write
81D0000
trusted library allocation
page read and write
5CFD000
stack
page read and write
5A90000
trusted library allocation
page read and write
887E000
stack
page read and write
5974000
heap
page read and write
31A5000
trusted library allocation
page read and write
4A0E000
trusted library allocation
page read and write
C79000
heap
page read and write
3477000
heap
page read and write
176F000
stack
page read and write
7A19000
heap
page read and write
5462000
trusted library allocation
page read and write
C00000
heap
page read and write
31EF000
trusted library allocation
page read and write
8063000
heap
page read and write
5A04000
heap
page read and write
8045000
heap
page read and write
59AC000
stack
page read and write
4A4D000
stack
page read and write
2A5E000
unkown
page read and write
7BE0000
heap
page execute and read and write
BD6000
trusted library allocation
page execute and read and write
89D2000
heap
page read and write
1780000
heap
page read and write
6FDD000
heap
page read and write
1204000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
6582000
trusted library allocation
page read and write
2FF0000
heap
page execute and read and write
7860000
trusted library allocation
page execute and read and write
74C6000
heap
page read and write
772E000
stack
page read and write
8930000
heap
page read and write
496A000
trusted library allocation
page read and write
7410000
heap
page execute and read and write
48AC000
trusted library allocation
page read and write
658E000
trusted library allocation
page read and write
B520000
trusted library allocation
page read and write
79B0000
heap
page read and write
7730000
heap
page read and write
3260000
trusted library allocation
page read and write
7751000
trusted library allocation
page read and write
121A000
trusted library allocation
page execute and read and write
E6CE000
stack
page read and write
614F000
trusted library allocation
page read and write
59BB000
heap
page read and write
8055000
heap
page read and write
4D00000
trusted library allocation
page read and write
5910000
heap
page execute and read and write
32B0000
trusted library allocation
page read and write
155F000
stack
page read and write
7A20000
trusted library allocation
page execute and read and write
2FB4000
trusted library allocation
page read and write
785E000
stack
page read and write
54B0000
trusted library section
page readonly
142E000
heap
page read and write
11F0000
heap
page read and write
5938000
heap
page read and write
8FBE000
stack
page read and write
327E000
stack
page read and write
4EA8000
trusted library allocation
page read and write
25E0000
heap
page read and write
8990000
heap
page read and write
93AC000
stack
page read and write
DFC000
unkown
page readonly
16FB000
trusted library allocation
page execute and read and write
2AEE000
stack
page read and write
5BF5000
heap
page read and write
36A9000
trusted library allocation
page read and write
136E000
stack
page read and write
592E000
stack
page read and write
7BAE000
stack
page read and write
7016000
heap
page read and write
3430000
trusted library allocation
page read and write
10C2000
trusted library allocation
page read and write
51D0000
heap
page execute and read and write
7310000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
6F5E000
stack
page read and write
7F20000
trusted library allocation
page read and write
1387000
heap
page read and write
E68000
heap
page read and write
16DD000
trusted library allocation
page execute and read and write
2A60000
trusted library allocation
page read and write
5620000
heap
page read and write
8CE0000
trusted library allocation
page read and write
2A87000
heap
page read and write
2D5D000
heap
page read and write
32A3000
trusted library allocation
page read and write
2D38000
heap
page read and write
5698000
heap
page read and write
70A1000
heap
page read and write
DAB000
trusted library allocation
page execute and read and write
8E20000
trusted library allocation
page read and write
70D0000
heap
page read and write
7D70000
trusted library allocation
page read and write
32F4000
trusted library allocation
page read and write
1488000
trusted library allocation
page read and write
27B0000
heap
page execute and read and write
762E000
stack
page read and write
7B2F000
heap
page read and write
2FA1000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
105A000
stack
page read and write
1410000
heap
page read and write
5460000
trusted library allocation
page read and write
89A8000
heap
page read and write
5AE0000
trusted library allocation
page execute and read and write
30D0000
trusted library allocation
page read and write
74AD000
stack
page read and write
128E000
heap
page read and write
5B7E000
stack
page read and write
5620000
trusted library allocation
page read and write
93E0000
trusted library allocation
page execute and read and write
669F000
stack
page read and write
16E0000
trusted library allocation
page read and write
8D5E000
stack
page read and write
5870000
trusted library section
page readonly
7A80000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
5642000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
7997000
heap
page read and write
962E000
stack
page read and write
1400000
trusted library allocation
page read and write
4771000
trusted library allocation
page read and write
34CE000
stack
page read and write
5010000
heap
page execute and read and write
66B0000
heap
page read and write
1350000
trusted library allocation
page read and write
883D000
stack
page read and write
28FF000
stack
page read and write
93F0000
heap
page read and write
4F2E000
stack
page read and write
2FB6000
trusted library allocation
page read and write
4E0C000
stack
page read and write
5880000
heap
page read and write
6710000
heap
page read and write
D20000
heap
page read and write
E5BD000
stack
page read and write
7F5A0000
trusted library allocation
page execute and read and write
2B00000
heap
page read and write
30EE000
trusted library allocation
page read and write
4175000
trusted library allocation
page read and write
56BE000
trusted library allocation
page read and write
10B6000
trusted library allocation
page execute and read and write
4F7000
stack
page read and write
5AA6000
trusted library allocation
page read and write
BEB000
trusted library allocation
page execute and read and write
196B000
stack
page read and write
2FD0000
heap
page read and write
1410000
trusted library allocation
page read and write
DFA000
heap
page read and write
16F7000
heap
page read and write
1050000
heap
page read and write
123E000
stack
page read and write
15B6000
heap
page read and write
13BF000
heap
page read and write
57C0000
heap
page read and write
794E000
stack
page read and write
15BD000
trusted library allocation
page execute and read and write
36EF000
trusted library allocation
page read and write
6137000
trusted library allocation
page read and write
2A10000
heap
page read and write
D35000
heap
page read and write
170B000
trusted library allocation
page execute and read and write
65FE000
stack
page read and write
A90000
trusted library allocation
page read and write
2E21000
heap
page read and write
7D90000
trusted library allocation
page read and write
EAAE000
stack
page read and write
A3B000
stack
page read and write
EA0E000
stack
page read and write
11F0000
trusted library allocation
page read and write
58C0000
heap
page read and write
16C3000
trusted library allocation
page execute and read and write
3388000
heap
page read and write
1537000
heap
page read and write
6B6E000
stack
page read and write
D72000
unkown
page readonly
7F990000
trusted library allocation
page execute and read and write
4D4E000
stack
page read and write
B33B000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
724E000
stack
page read and write
F4E000
stack
page read and write
313E000
stack
page read and write
8BA0000
trusted library allocation
page read and write
1580000
heap
page read and write
50FE000
trusted library allocation
page read and write
1340000
heap
page read and write
7D0D000
stack
page read and write
B5A000
stack
page read and write
4E30000
heap
page read and write
728E000
stack
page read and write
E662000
trusted library allocation
page read and write
48FE000
trusted library allocation
page read and write
2B30000
trusted library allocation
page execute and read and write
7320000
trusted library allocation
page execute and read and write
105E000
stack
page read and write
791E000
stack
page read and write
1428000
heap
page read and write
5BE0000
trusted library allocation
page read and write
7F9C000
heap
page read and write
1393000
heap
page read and write
331F000
trusted library allocation
page read and write
78BE000
stack
page read and write
B450000
trusted library allocation
page read and write
56F9000
heap
page read and write
746D000
stack
page read and write
5443000
trusted library allocation
page read and write
276D000
stack
page read and write
E6BE000
stack
page read and write
7E16000
trusted library allocation
page read and write
3693000
trusted library allocation
page execute and read and write
79A9000
heap
page read and write
7967000
heap
page read and write
4E80000
heap
page execute and read and write
5A42000
heap
page read and write
2B8F000
unkown
page read and write
3281000
trusted library allocation
page read and write
77CD000
stack
page read and write
893C000
heap
page read and write
31A0000
heap
page execute and read and write
65A0000
heap
page read and write
8E30000
trusted library allocation
page execute and read and write
EC5E000
stack
page read and write
779A000
stack
page read and write
7E20000
heap
page read and write
89ED000
heap
page read and write
5BA0000
trusted library allocation
page read and write
33FC000
stack
page read and write
5A06000
trusted library allocation
page read and write
65A2000
trusted library allocation
page read and write
2B1E000
stack
page read and write
66A0000
heap
page read and write
2980000
heap
page read and write
50C0000
trusted library allocation
page read and write
2DDF000
stack
page read and write
124D000
stack
page read and write
2FD0000
heap
page execute and read and write
8B50000
trusted library allocation
page execute and read and write
545E000
stack
page read and write
7D50000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
5178000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page execute and read and write
CBF000
heap
page read and write
2C31000
trusted library allocation
page read and write
5C90000
heap
page read and write
89AC000
heap
page read and write
87CB000
trusted library allocation
page read and write
5721000
heap
page read and write
7F5B8000
trusted library allocation
page execute and read and write
855E000
stack
page read and write
7BC0000
trusted library allocation
page execute and read and write
500E000
stack
page read and write
2C28000
heap
page read and write
81B0000
trusted library allocation
page execute and read and write
16ED000
trusted library allocation
page execute and read and write
5940000
heap
page execute and read and write
1369000
heap
page read and write
16EA000
trusted library allocation
page execute and read and write
3452000
trusted library allocation
page read and write
169E000
stack
page read and write
7EE40000
trusted library allocation
page execute and read and write
61B8000
trusted library allocation
page read and write
7B93000
heap
page read and write
659E000
stack
page read and write
7BDE000
stack
page read and write
4501000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
342D000
trusted library allocation
page execute and read and write
5918000
trusted library allocation
page read and write
2D3F000
unkown
page read and write
75DB000
stack
page read and write
3420000
trusted library allocation
page read and write
4482000
trusted library allocation
page read and write
7920000
heap
page read and write
3385000
heap
page read and write
EC80000
trusted library allocation
page execute and read and write
2BCE000
stack
page read and write
57AB000
stack
page read and write
2B51000
trusted library allocation
page read and write
2B5D000
trusted library allocation
page read and write
543E000
stack
page read and write
2B46000
heap
page read and write
30FD000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1264000
trusted library allocation
page read and write
E3AE000
stack
page read and write
1216000
trusted library allocation
page execute and read and write
7E7D000
stack
page read and write
10C7000
trusted library allocation
page execute and read and write
5930000
trusted library allocation
page read and write
2A9F000
unkown
page read and write
468E000
stack
page read and write
BD0000
heap
page read and write
2F10000
trusted library allocation
page read and write
79E8000
heap
page read and write
73D0000
trusted library allocation
page read and write
4DA8000
trusted library allocation
page read and write
51DE000
stack
page read and write
2CD0000
heap
page read and write
4CD4000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
87C0000
trusted library allocation
page read and write
7B1E000
heap
page read and write
294E000
stack
page read and write
1660000
heap
page read and write
2C80000
heap
page read and write
15C6000
trusted library allocation
page execute and read and write
2D90000
heap
page read and write
4EE0000
heap
page read and write
1662000
heap
page read and write
33AD000
heap
page read and write
28BE000
stack
page read and write
AA4000
trusted library allocation
page read and write
555E000
stack
page read and write
2DC3000
heap
page read and write
5CE1000
trusted library allocation
page read and write
2B20000
heap
page read and write
7D60000
trusted library allocation
page read and write
10B2000
trusted library allocation
page read and write
572F000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
7B2B000
trusted library allocation
page read and write
12A7000
heap
page read and write
16E6000
trusted library allocation
page execute and read and write
7964000
heap
page read and write
7D80000
trusted library allocation
page read and write
8880000
heap
page read and write
1395000
heap
page read and write
57EB000
trusted library allocation
page read and write
2F07000
stack
page read and write
BDE000
stack
page read and write
F50000
trusted library allocation
page execute and read and write
18FC000
stack
page read and write
5D2E000
stack
page read and write
5000000
heap
page read and write
16E2000
trusted library allocation
page read and write
7F8D0000
trusted library allocation
page execute and read and write
2C1E000
stack
page read and write
27FE000
stack
page read and write
7820000
heap
page read and write
87D0000
trusted library allocation
page read and write
177E000
stack
page read and write
775E000
stack
page read and write
1650000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
4341000
trusted library allocation
page read and write
4FAE000
stack
page read and write
5082000
trusted library allocation
page read and write
163E000
stack
page read and write
7D10000
trusted library allocation
page read and write
DD8000
heap
page read and write
192B000
trusted library allocation
page execute and read and write
7ECB000
trusted library allocation
page read and write
5BE000
stack
page read and write
4CE0000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
179B000
stack
page read and write
6977000
trusted library allocation
page read and write
7011000
heap
page read and write
78DE000
stack
page read and write
B336000
trusted library allocation
page read and write
8A1D000
heap
page read and write
6970000
trusted library allocation
page read and write
3286000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
2AE0000
heap
page read and write
35A4000
heap
page read and write
75E0000
heap
page read and write
33CF000
stack
page read and write
16F0000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
1404000
trusted library allocation
page read and write
B90000
heap
page read and write
2B00000
trusted library allocation
page read and write
1400000
heap
page read and write
7360000
heap
page read and write
8D0000
heap
page read and write
2C20000
heap
page read and write
5853000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
8A45000
heap
page read and write
615E000
stack
page read and write
3951000
trusted library allocation
page read and write
7B2A000
heap
page read and write
333E000
stack
page read and write
7D60000
trusted library allocation
page read and write
8D2E000
stack
page read and write
3455000
trusted library allocation
page execute and read and write
CF8000
stack
page read and write
784E000
stack
page read and write
6D2D000
stack
page read and write
3230000
trusted library allocation
page read and write
61C9000
trusted library allocation
page read and write
EECF000
stack
page read and write
2B40000
heap
page read and write
58B000
stack
page read and write
1668000
heap
page read and write
16CD000
trusted library allocation
page execute and read and write
59E0000
trusted library allocation
page execute and read and write
78B0000
trusted library allocation
page read and write
4AEF000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
4EAC000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
1198000
stack
page read and write
139D000
heap
page read and write
7EBF000
stack
page read and write
3318000
heap
page read and write
7EF0000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
4C0000
heap
page read and write
3423000
trusted library allocation
page execute and read and write
4C6E000
stack
page read and write
17D0000
trusted library allocation
page read and write
144B000
heap
page read and write
3470000
heap
page read and write
56C6000
trusted library allocation
page read and write
5FA1000
trusted library allocation
page read and write
702E000
heap
page read and write
57ED000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
1988000
heap
page read and write
147F000
stack
page read and write
7A5F000
stack
page read and write
8D00000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
514B000
stack
page read and write
3510000
heap
page readonly
15D0000
trusted library allocation
page read and write
684C000
stack
page read and write
7BEE000
stack
page read and write
EB4C000
stack
page read and write
2A75000
trusted library allocation
page execute and read and write
7B75000
heap
page read and write
C40000
trusted library allocation
page execute and read and write
15B0000
trusted library allocation
page read and write
27F0000
heap
page read and write
13E3000
heap
page read and write
58FE000
stack
page read and write
77BE000
stack
page read and write
8340000
trusted library allocation
page read and write
E665000
trusted library allocation
page read and write
6576000
trusted library allocation
page read and write
7B2D000
trusted library allocation
page read and write
283E000
stack
page read and write
77ED000
stack
page read and write
74AB000
stack
page read and write
1280000
heap
page read and write
30F0000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
109B000
stack
page read and write
7960000
trusted library allocation
page execute and read and write
4509000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
1390000
heap
page read and write
4C4E000
stack
page read and write
E4F000
stack
page read and write
BC0000
heap
page read and write
13B0000
heap
page read and write
6574000
trusted library allocation
page read and write
E4E000
stack
page read and write
F90000
heap
page read and write
8343000
trusted library allocation
page read and write
5F0000
heap
page read and write
16F6000
trusted library allocation
page execute and read and write
5748000
trusted library allocation
page read and write
2E2A000
heap
page read and write
5C95000
heap
page read and write
C00000
heap
page read and write
AB4000
trusted library allocation
page read and write
3396000
heap
page read and write
There are 1452 hidden memdumps, click here to show them.