IOC Report
wKj1CBkbos.exe

loading gif

Files

File Path
Type
Category
Malicious
wKj1CBkbos.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\52cheatand52rat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Lunch LaCheat.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Lunch LaCheatV2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Primordial Crack.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\windows defender.bat
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\52cheatand52rat.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wKj1CBkbos.exe
"C:\Users\user\Desktop\wKj1CBkbos.exe"
malicious
C:\Users\user\AppData\Local\Temp\52cheatand52rat.exe
"C:\Users\user\AppData\Local\Temp\52cheatand52rat.exe"
malicious
C:\Users\user\AppData\Local\Temp\Primordial Crack.exe
"C:\Users\user\AppData\Local\Temp\Primordial Crack.exe"
malicious
C:\Users\user\AppData\Local\Temp\Lunch LaCheatV2.exe
"C:\Users\user\AppData\Local\Temp\Lunch LaCheatV2.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\windows defender.bat" "
malicious
C:\Windows\SysWOW64\reg.exe
reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Mpuser" /v "MpEnablePus" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\windows defender.bat" "
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Mpuser" /v "MpEnablePus" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
malicious
C:\Windows\System32\wbem\WMIC.exe
"wmic.exe" csproduct get uuid
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 34 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/Blank-c/Umbral-Stealer
unknown
https://discord.com/api/v10/users/
unknown
http://crl.microsoft
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/json/?fields=225545
unknown
http://ip-api.com/line/?fields=hostingI7AB5C494-39F5-4941-9163-47F54D6D5016I032E02B4-0499-05C3-0806-
unknown
https://discordapp.com/api/v9/users/
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
bg.microsoft.map.fastly.net
199.232.214.172
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiVirus
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Mpuser
MpEnablePus
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiVirus
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Mpuser
MpEnablePus
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting
DisableEnhancedNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
DisableBlockAtFirstSeen
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
SpynetReporting
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
SubmitSamplesConsent
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Autologger\DefenderApiLogger
Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Autologger\DefenderAuditLogger
Start
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1BC02442000
unkown
page readonly
malicious
408000
unkown
page readonly
malicious
13AC000
heap
page read and write
malicious
1746BACB000
heap
page read and write
36E1000
heap
page read and write
E33000
unkown
page execute read
670000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
400000
unkown
page readonly
36E1000
heap
page read and write
36E1000
heap
page read and write
2D7D000
stack
page read and write
1C64000
heap
page read and write
29B90FE000
stack
page read and write
3AD000
stack
page read and write
36E1000
heap
page read and write
5A0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2AF0000
heap
page read and write
1EAF000
stack
page read and write
2998000
heap
page read and write
E08000
unkown
page readonly
5B9F000
stack
page read and write
1BC043E0000
trusted library allocation
page read and write
36E1000
heap
page read and write
1F20000
heap
page read and write
1600000
heap
page read and write
2EF0000
heap
page read and write
335F000
stack
page read and write
36E1000
heap
page read and write
1449000
heap
page read and write
1C64000
heap
page read and write
1BC1C9C0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2F9E000
stack
page read and write
36E1000
heap
page read and write
610000
heap
page read and write
7FFD34360000
trusted library allocation
page execute and read and write
3B1D000
heap
page read and write
511E000
stack
page read and write
36E1000
heap
page read and write
1746D276000
heap
page read and write
1BC1CBA0000
heap
page execute and read and write
1746D272000
heap
page read and write
2CA0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
41A1000
heap
page read and write
36E1000
heap
page read and write
FE4F7E000
stack
page read and write
1BC04409000
trusted library allocation
page read and write
36E1000
heap
page read and write
1BC043A4000
trusted library allocation
page read and write
1BC0437E000
trusted library allocation
page read and write
36E1000
heap
page read and write
770000
heap
page read and write
7FFD341EC000
trusted library allocation
page execute and read and write
1C64000
heap
page read and write
3240000
heap
page read and write
FE4EFF000
stack
page read and write
36E1000
heap
page read and write
7FFD341BB000
trusted library allocation
page execute and read and write
158E000
stack
page read and write
1746B380000
heap
page read and write
333E000
stack
page read and write
2E80000
heap
page read and write
32C8000
heap
page read and write
36E1000
heap
page read and write
139E000
heap
page read and write
36E1000
heap
page read and write
3118000
heap
page read and write
36E1000
heap
page read and write
9B000
stack
page read and write
7FF4B31A0000
trusted library allocation
page execute and read and write
3220000
heap
page read and write
2BF0000
heap
page read and write
1BC1430D000
trusted library allocation
page read and write
3F0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
327D000
stack
page read and write
3120000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
145E000
stack
page read and write
1746B39B000
heap
page read and write
36E1000
heap
page read and write
1BC043B8000
trusted library allocation
page read and write
680000
heap
page read and write
1BC025E3000
heap
page read and write
1746D284000
heap
page read and write
760000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
295D000
stack
page read and write
1746B90C000
heap
page read and write
2890000
heap
page read and write
3910000
trusted library allocation
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
29B7D7E000
stack
page read and write
1746B365000
heap
page read and write
3350000
heap
page read and write
36E1000
heap
page read and write
1D0000
heap
page read and write
1746BAC5000
heap
page read and write
143C000
heap
page read and write
2FCF000
stack
page read and write
36E1000
heap
page read and write
7FFD34330000
trusted library allocation
page read and write
66D000
stack
page read and write
34F0000
heap
page read and write
3A60000
heap
page read and write
2EDE000
stack
page read and write
2BDD000
stack
page read and write
38DF000
stack
page read and write
180000
heap
page read and write
155F000
stack
page read and write
2E40000
heap
page read and write
36E1000
heap
page read and write
2F5D000
stack
page read and write
36E1000
heap
page read and write
28FD000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
34CF000
stack
page read and write
760000
heap
page read and write
1BC1CA1C000
heap
page read and write
690000
heap
page read and write
2AED000
stack
page read and write
2C60000
heap
page read and write
1746B2E0000
heap
page read and write
11D5000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1465000
heap
page read and write
36E1000
heap
page read and write
1746B397000
heap
page read and write
36E1000
heap
page read and write
4F9F000
stack
page read and write
4FD000
stack
page read and write
1C64000
heap
page read and write
1220000
heap
page read and write
3570000
heap
page read and write
1BC02830000
heap
page read and write
576F000
stack
page read and write
1746B919000
heap
page read and write
29FF000
stack
page read and write
36E1000
heap
page read and write
2ED000
stack
page read and write
36E1000
heap
page read and write
29B7D33000
stack
page read and write
2DC0000
heap
page read and write
1746B397000
heap
page read and write
1746B330000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
299D000
stack
page read and write
36E1000
heap
page read and write
355E000
stack
page read and write
29B8EFD000
stack
page read and write
1746B901000
heap
page read and write
36E1000
heap
page read and write
3A0000
heap
page read and write
122E000
stack
page read and write
36E1000
heap
page read and write
1BC025DC000
heap
page read and write
2FDE000
stack
page read and write
6AD000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
7FFD341AD000
trusted library allocation
page execute and read and write
1BC1C9D7000
heap
page read and write
7FFD34194000
trusted library allocation
page read and write
36E1000
heap
page read and write
409000
unkown
page readonly
33F0000
heap
page read and write
36E1000
heap
page read and write
3220000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
141E000
heap
page read and write
7FFD341A3000
trusted library allocation
page read and write
36E1000
heap
page read and write
1746B8F7000
heap
page read and write
2DBF000
stack
page read and write
36E1000
heap
page read and write
7FFD34340000
trusted library allocation
page read and write
1BC025B2000
heap
page read and write
1746B3A2000
heap
page read and write
1C64000
heap
page read and write
3310000
heap
page read and write
1BC029B5000
heap
page read and write
34F8000
heap
page read and write
36E1000
heap
page read and write
141E000
heap
page read and write
2C8D000
stack
page read and write
310E000
stack
page read and write
13BE000
heap
page read and write
9B000
stack
page read and write
36E1000
heap
page read and write
401000
unkown
page execute read
36E1000
heap
page read and write
1BC04375000
trusted library allocation
page read and write
1746B3A4000
heap
page read and write
36E1000
heap
page read and write
1746B8F8000
heap
page read and write
4B0000
heap
page read and write
1746BACA000
heap
page read and write
1EF0000
trusted library allocation
page read and write
1746B90C000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2C58000
heap
page read and write
37DE000
stack
page read and write
2BDE000
stack
page read and write
1746B5A0000
heap
page read and write
5A5F000
stack
page read and write
710000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
2D1F000
stack
page read and write
433000
unkown
page execute read
36E1000
heap
page read and write
1B67000
unkown
page readonly
36E1000
heap
page read and write
3110000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
2F1F000
stack
page read and write
33F0000
heap
page read and write
1640000
heap
page read and write
3008000
heap
page read and write
36E1000
heap
page read and write
1746B391000
heap
page read and write
7FFD341B0000
trusted library allocation
page read and write
6BE000
stack
page read and write
E09000
unkown
page readonly
326E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2F2D000
stack
page read and write
1746B373000
heap
page read and write
29B87FE000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
660000
heap
page read and write
1C64000
heap
page read and write
1746D273000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
1746B904000
heap
page read and write
36E1000
heap
page read and write
2F1E000
stack
page read and write
36E1000
heap
page read and write
1746B342000
heap
page read and write
143E000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B91A000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
34A0000
heap
page read and write
2C00000
heap
page read and write
2F10000
heap
page read and write
2B0E000
stack
page read and write
1746B375000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
7FFD34333000
trusted library allocation
page read and write
36E1000
heap
page read and write
34AF000
stack
page read and write
281F000
stack
page read and write
1BC043F4000
trusted library allocation
page read and write
2BA0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2D50000
heap
page read and write
36E1000
heap
page read and write
1746B3A9000
heap
page read and write
36E1000
heap
page read and write
11EE000
stack
page read and write
6F0000
heap
page read and write
2BF8000
heap
page read and write
4E5F000
stack
page read and write
32F0000
heap
page read and write
36E1000
heap
page read and write
19B000
stack
page read and write
36E1000
heap
page read and write
1746B38A000
heap
page read and write
1746B5A5000
heap
page read and write
36E1000
heap
page read and write
4721000
heap
page read and write
1746B8F0000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
1746B347000
heap
page read and write
1CD4000
heap
page read and write
36E1000
heap
page read and write
2F4F000
stack
page read and write
1746D27E000
heap
page read and write
2830000
heap
page read and write
1F0000
heap
page read and write
33B0000
heap
page read and write
323D000
stack
page read and write
1746BAC0000
heap
page read and write
1BC02510000
heap
page read and write
3A70000
heap
page read and write
404000
unkown
page read and write
36E1000
heap
page read and write
3A67000
heap
page read and write
50DF000
stack
page read and write
53F000
stack
page read and write
2A30000
heap
page read and write
36E1000
heap
page read and write
2D3D000
stack
page read and write
36E1000
heap
page read and write
1746B300000
trusted library allocation
page read and write
36E1000
heap
page read and write
2A7F000
stack
page read and write
1746B919000
heap
page read and write
346E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
32F0000
heap
page read and write
EBA000
unkown
page execute read
1746B366000
heap
page read and write
36E1000
heap
page read and write
1C70000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
6BD000
stack
page read and write
1C64000
heap
page read and write
1E0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
5FE000
stack
page read and write
3360000
heap
page read and write
11A0000
heap
page read and write
520000
heap
page read and write
28C0000
heap
page read and write
33C8000
heap
page read and write
1BC042F0000
heap
page execute and read and write
3310000
heap
page read and write
39A0000
heap
page read and write
1C64000
heap
page read and write
43D000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746BAC3000
heap
page read and write
401000
unkown
page execute read
36E1000
heap
page read and write
36E1000
heap
page read and write
3A11000
heap
page read and write
36E1000
heap
page read and write
7FFD342B0000
trusted library allocation
page execute and read and write
1BC1C9C7000
heap
page read and write
53D000
stack
page read and write
3720000
heap
page read and write
28D0000
heap
page read and write
1C64000
heap
page read and write
6DF000
stack
page read and write
33AE000
stack
page read and write
405000
unkown
page write copy
36E1000
heap
page read and write
1746B902000
heap
page read and write
3ED000
stack
page read and write
1CC8000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
562E000
stack
page read and write
1BC043AC000
trusted library allocation
page read and write
618000
heap
page read and write
404000
unkown
page read and write
2C70000
heap
page read and write
1746B5AB000
heap
page read and write
36E1000
heap
page read and write
1BC027E0000
trusted library allocation
page read and write
2ECE000
stack
page read and write
1746BAC7000
heap
page read and write
69E000
stack
page read and write
36E1000
heap
page read and write
28C8000
heap
page read and write
310E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
7FFD34240000
trusted library allocation
page read and write
36E1000
heap
page read and write
67D000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B3AF000
heap
page read and write
1746B36A000
heap
page read and write
36E0000
heap
page read and write
33F8000
heap
page read and write
4E0000
heap
page read and write
36E1000
heap
page read and write
1746D27D000
heap
page read and write
4FDE000
stack
page read and write
36E1000
heap
page read and write
2D50000
heap
page read and write
36E1000
heap
page read and write
566E000
stack
page read and write
552E000
stack
page read and write
6AD000
stack
page read and write
1746B3A4000
heap
page read and write
36E1000
heap
page read and write
11D0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2F40000
heap
page read and write
1746B368000
heap
page read and write
124F000
heap
page read and write
36E1000
heap
page read and write
521F000
stack
page read and write
6E0000
heap
page read and write
1C64000
heap
page read and write
9B000
stack
page read and write
75E000
stack
page read and write
36E1000
heap
page read and write
2ED0000
heap
page read and write
720000
heap
page read and write
2F00000
heap
page read and write
36E1000
heap
page read and write
38DF000
stack
page read and write
36E1000
heap
page read and write
1BC025B0000
heap
page read and write
1746B5AE000
heap
page read and write
122A000
heap
page read and write
1746B39D000
heap
page read and write
36E1000
heap
page read and write
1BC02579000
heap
page read and write
2DE0000
heap
page read and write
122E000
heap
page read and write
36E1000
heap
page read and write
2EAD000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
331E000
stack
page read and write
36E1000
heap
page read and write
7FFD341B4000
trusted library allocation
page read and write
75E000
stack
page read and write
36E1000
heap
page read and write
1746B430000
trusted library allocation
page read and write
1C64000
heap
page read and write
1C0000
heap
page read and write
36E1000
heap
page read and write
369E000
stack
page read and write
36E1000
heap
page read and write
600000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2CDE000
stack
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
DD000
stack
page read and write
2F0F000
stack
page read and write
1746B383000
heap
page read and write
34CE000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
28B0000
heap
page read and write
13C6000
heap
page read and write
1C64000
heap
page read and write
325D000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2E54000
heap
page read and write
36F0000
heap
page read and write
390000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B922000
heap
page read and write
36E1000
heap
page read and write
29B86FE000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
5A8000
heap
page read and write
36E1000
heap
page read and write
314F000
stack
page read and write
5BDC000
stack
page read and write
2A90000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
391C000
stack
page read and write
3518000
heap
page read and write
3A1C000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1429000
heap
page read and write
36E1000
heap
page read and write
63F000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1BC02570000
heap
page read and write
1746B373000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2FE0000
heap
page read and write
19B000
stack
page read and write
1BC043A0000
trusted library allocation
page read and write
36E1000
heap
page read and write
47D000
stack
page read and write
2FAD000
stack
page read and write
2A98000
heap
page read and write
2B20000
heap
page read and write
1BC043DA000
trusted library allocation
page read and write
36E1000
heap
page read and write
1BC02440000
unkown
page readonly
1BC0247C000
unkown
page readonly
1746B90C000
heap
page read and write
29B80FE000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1C7A000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2F60000
heap
page read and write
3940000
heap
page read and write
1C64000
heap
page read and write
2A3E000
stack
page read and write
535C000
stack
page read and write
3058000
heap
page read and write
640000
heap
page read and write
1BC0437C000
trusted library allocation
page read and write
3510000
heap
page read and write
37C0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
77E000
stack
page read and write
2E3D000
stack
page read and write
2B2D000
stack
page read and write
1443000
heap
page read and write
36E1000
heap
page read and write
3A00000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2C7D000
stack
page read and write
1F0000
heap
page read and write
1B67000
unkown
page readonly
36E1000
heap
page read and write
7FFD34192000
trusted library allocation
page read and write
65E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B38C000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
1443000
heap
page read and write
720000
heap
page read and write
2F8E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B374000
heap
page read and write
2FF0000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
1429000
heap
page read and write
1746B3AF000
heap
page read and write
7FFD34246000
trusted library allocation
page read and write
1432000
heap
page read and write
1C64000
heap
page read and write
3370000
heap
page read and write
36E1000
heap
page read and write
1746B5AD000
heap
page read and write
1BC025A0000
heap
page read and write
2D10000
heap
page read and write
29B0000
heap
page read and write
2898000
heap
page read and write
2A7E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B8FE000
heap
page read and write
1746B398000
heap
page read and write
540000
heap
page read and write
36E1000
heap
page read and write
7FFD34250000
trusted library allocation
page execute and read and write
36E1000
heap
page read and write
43D000
stack
page read and write
2870000
heap
page read and write
36E1000
heap
page read and write
540000
heap
page read and write
3660000
heap
page read and write
1C64000
heap
page read and write
595E000
stack
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
400000
unkown
page readonly
307D000
stack
page read and write
1BC1C9D5000
heap
page read and write
2F30000
heap
page read and write
49D000
stack
page read and write
2EED000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
7FFD34193000
trusted library allocation
page execute and read and write
28B8000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B396000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2EED000
stack
page read and write
2C90000
heap
page read and write
28BF000
stack
page read and write
31F0000
heap
page read and write
4CAE000
stack
page read and write
1746B8FF000
heap
page read and write
13E5000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
7FFD34370000
trusted library allocation
page execute and read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
FE4E78000
stack
page read and write
3180000
heap
page read and write
1746B381000
heap
page read and write
1746B338000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2CF0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2F90000
heap
page read and write
2FE0000
heap
page read and write
7FFD34335000
trusted library allocation
page read and write
FE507E000
stack
page read and write
1746D27E000
heap
page read and write
1590000
heap
page read and write
36E1000
heap
page read and write
1390000
heap
page read and write
3510000
heap
page read and write
1C64000
heap
page read and write
3000000
heap
page read and write
333F000
stack
page read and write
1746B925000
heap
page read and write
1C64000
heap
page read and write
5FE000
stack
page read and write
19B000
stack
page read and write
32FE000
stack
page read and write
1BC025DE000
heap
page read and write
36E1000
heap
page read and write
2D20000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
1746D284000
heap
page read and write
36E1000
heap
page read and write
30E0000
heap
page read and write
1746B2C0000
heap
page read and write
36E1000
heap
page read and write
73F000
stack
page read and write
6F0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
29B8AFB000
stack
page read and write
36E1000
heap
page read and write
1746B922000
heap
page read and write
1C40000
heap
page read and write
36E1000
heap
page read and write
76E000
stack
page read and write
36E1000
heap
page read and write
2F8D000
stack
page read and write
1C64000
heap
page read and write
1746B347000
heap
page read and write
770000
heap
page read and write
1746D271000
heap
page read and write
1746B398000
heap
page read and write
285E000
stack
page read and write
2E50000
heap
page read and write
1746B90C000
heap
page read and write
281E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B923000
heap
page read and write
2AC0000
heap
page read and write
1C64000
heap
page read and write
2F6D000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
32F8000
heap
page read and write
1833000
unkown
page execute read
7FFD3424C000
trusted library allocation
page execute and read and write
1746B384000
heap
page read and write
29B8CFD000
stack
page read and write
1746BACA000
heap
page read and write
36E1000
heap
page read and write
76E000
stack
page read and write
3110000
heap
page read and write
29B81FF000
stack
page read and write
36E1000
heap
page read and write
1BC029B0000
heap
page read and write
650000
heap
page read and write
1746B390000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
3A05000
heap
page read and write
1C64000
heap
page read and write
770000
heap
page read and write
528000
heap
page read and write
1463000
heap
page read and write
36E1000
heap
page read and write
408000
unkown
page execute read
12A1000
heap
page read and write
2D30000
heap
page read and write
2D9F000
stack
page read and write
2B9F000
stack
page read and write
36E1000
heap
page read and write
1BC02500000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
6CF000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
32D000
stack
page read and write
314F000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746BAC2000
heap
page read and write
710000
heap
page read and write
32C0000
heap
page read and write
3050000
heap
page read and write
365F000
stack
page read and write
1C64000
heap
page read and write
1746B919000
heap
page read and write
2C00000
heap
page read and write
7FFD34276000
trusted library allocation
page execute and read and write
4FE000
stack
page read and write
2D58000
heap
page read and write
7FFD341BD000
trusted library allocation
page execute and read and write
591F000
stack
page read and write
29B89FF000
stack
page read and write
36E1000
heap
page read and write
132F000
stack
page read and write
2C9F000
stack
page read and write
4D5B000
heap
page read and write
16A0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
12AA000
heap
page read and write
1746B570000
heap
page read and write
36E1000
heap
page read and write
29B83FC000
stack
page read and write
1C9F000
heap
page read and write
34B0000
heap
page read and write
1746B1E0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2C28000
heap
page read and write
139A000
heap
page read and write
3390000
heap
page read and write
74F000
stack
page read and write
1C64000
heap
page read and write
66D000
stack
page read and write
30C0000
heap
page read and write
29B8BFE000
stack
page read and write
1746B919000
heap
page read and write
1B21000
unkown
page execute read
2D7E000
stack
page read and write
2FDF000
stack
page read and write
33D000
stack
page read and write
3CFC000
heap
page read and write
36E1000
heap
page read and write
FE50FE000
stack
page read and write
2F50000
heap
page read and write
36E1000
heap
page read and write
1746BAC7000
heap
page read and write
29B8FF6000
stack
page read and write
EBA000
unkown
page execute read
1BC14301000
trusted library allocation
page read and write
141F000
stack
page read and write
36E1000
heap
page read and write
1746B300000
trusted library allocation
page read and write
1F30000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1434000
heap
page read and write
1746B38D000
heap
page read and write
29B88FD000
stack
page read and write
1C65000
heap
page read and write
2FD000
stack
page read and write
309F000
stack
page read and write
29B82FE000
stack
page read and write
36E1000
heap
page read and write
3A5C000
heap
page read and write
581E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
29F0000
heap
page read and write
1746D284000
heap
page read and write
36E1000
heap
page read and write
1421000
heap
page read and write
1BC043DE000
trusted library allocation
page read and write
2C20000
heap
page read and write
36E1000
heap
page read and write
13AE000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1746B3AF000
heap
page read and write
36E1000
heap
page read and write
2F48000
heap
page read and write
4D5E000
stack
page read and write
4933000
heap
page read and write
3210000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
33F8000
heap
page read and write
1746B908000
heap
page read and write
29BD000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
7FFD3419D000
trusted library allocation
page execute and read and write
3070000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1BC02576000
heap
page read and write
36E1000
heap
page read and write
3300000
heap
page read and write
1C64000
heap
page read and write
1746B90C000
heap
page read and write
1746D27E000
heap
page read and write
1BC04379000
trusted library allocation
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
1424000
heap
page read and write
2EA8000
heap
page read and write
1EEE000
stack
page read and write
2A3F000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
5A9E000
stack
page read and write
36E1000
heap
page read and write
2F3E000
stack
page read and write
36E1000
heap
page read and write
342F000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
336E000
stack
page read and write
1C64000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
1746B904000
heap
page read and write
3380000
heap
page read and write
379F000
stack
page read and write
1746BACA000
heap
page read and write
1746D286000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
5CDC000
stack
page read and write
1746B923000
heap
page read and write
36E1000
heap
page read and write
142C000
heap
page read and write
1C64000
heap
page read and write
2B1E000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
337F000
stack
page read and write
143E000
heap
page read and write
329D000
stack
page read and write
5B0000
heap
page read and write
1426000
heap
page read and write
6FD000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
11D000
stack
page read and write
3310000
heap
page read and write
36E1000
heap
page read and write
570000
heap
page read and write
400000
unkown
page readonly
137E000
stack
page read and write
2BF0000
heap
page read and write
47D000
stack
page read and write
1BC02790000
trusted library allocation
page read and write
1C7E000
heap
page read and write
2BED000
stack
page read and write
36E1000
heap
page read and write
3EE000
stack
page read and write
1746B393000
heap
page read and write
1BC02770000
trusted library allocation
page read and write
1BC043CA000
trusted library allocation
page read and write
31E0000
heap
page read and write
1BC04301000
trusted library allocation
page read and write
10C0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2B50000
heap
page read and write
2C50000
heap
page read and write
FE4FFE000
stack
page read and write
1DAE000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2F20000
heap
page read and write
36E1000
heap
page read and write
2CC8000
heap
page read and write
1746BACE000
heap
page read and write
1BC043AE000
trusted library allocation
page read and write
36E1000
heap
page read and write
33C0000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2CB0000
heap
page read and write
1610000
heap
page read and write
1BC0440E000
trusted library allocation
page read and write
11E0000
heap
page read and write
36E1000
heap
page read and write
3078000
heap
page read and write
7FFD34350000
trusted library allocation
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
1646000
heap
page read and write
36E1000
heap
page read and write
1746B8FC000
heap
page read and write
36E1000
heap
page read and write
1746B3AA000
heap
page read and write
2960000
heap
page read and write
1746B929000
heap
page read and write
2A00000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
144B000
heap
page read and write
34EF000
stack
page read and write
1746D274000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
29B8DFB000
stack
page read and write
327E000
stack
page read and write
36E1000
heap
page read and write
1746BAC4000
heap
page read and write
36E1000
heap
page read and write
404000
unkown
page read and write
2F7F000
stack
page read and write
70F000
stack
page read and write
362F000
stack
page read and write
2B4F000
stack
page read and write
281F000
stack
page read and write
2B90000
heap
page read and write
36E1000
heap
page read and write
1746BACE000
heap
page read and write
32A0000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
1746B905000
heap
page read and write
1746B919000
heap
page read and write
2838000
heap
page read and write
36E1000
heap
page read and write
3200000
heap
page read and write
36E1000
heap
page read and write
1BC1CA1E000
heap
page read and write
36E1000
heap
page read and write
167E000
stack
page read and write
36E1000
heap
page read and write
2F4D000
stack
page read and write
1BC02550000
heap
page read and write
1C64000
heap
page read and write
2CC0000
heap
page read and write
3360000
heap
page read and write
1746BA60000
heap
page read and write
36E1000
heap
page read and write
3210000
heap
page read and write
36E1000
heap
page read and write
2EA0000
heap
page read and write
6FF000
stack
page read and write
36E1000
heap
page read and write
1746B39E000
heap
page read and write
2C3D000
stack
page read and write
2E00000
heap
page read and write
1746B430000
trusted library allocation
page read and write
29B85FE000
stack
page read and write
36E1000
heap
page read and write
2D1E000
stack
page read and write
1C64000
heap
page read and write
303D000
stack
page read and write
36E1000
heap
page read and write
28D8000
heap
page read and write
1746D270000
heap
page read and write
2ECF000
stack
page read and write
28BD000
stack
page read and write
400000
unkown
page readonly
36E1000
heap
page read and write
73D000
stack
page read and write
3A50000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2CCD000
stack
page read and write
1BC02530000
heap
page read and write
36E1000
heap
page read and write
7FFD341AC000
trusted library allocation
page read and write
36E1000
heap
page read and write
34B8000
heap
page read and write
144B000
heap
page read and write
36E1000
heap
page read and write
1746B38F000
heap
page read and write
700000
heap
page read and write
2E8E000
stack
page read and write
1BC14306000
trusted library allocation
page read and write
4E9E000
stack
page read and write
580000
heap
page read and write
1C64000
heap
page read and write
32B0000
heap
page read and write
2990000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
335F000
stack
page read and write
18BA000
unkown
page execute read
1B21000
unkown
page execute read
36E1000
heap
page read and write
1BC02440000
unkown
page readonly
29B84FE000
stack
page read and write
2BE0000
heap
page read and write
1BC02835000
heap
page read and write
36E1000
heap
page read and write
2F9D000
stack
page read and write
1C64000
heap
page read and write
1746B372000
heap
page read and write
2D00000
heap
page read and write
36E1000
heap
page read and write
525C000
stack
page read and write
29FD000
stack
page read and write
1BC02960000
heap
page read and write
2850000
heap
page read and write
42D000
unkown
page read and write
35D0000
heap
page read and write
1C64000
heap
page read and write
1C8C000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
1BC0264E000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
1C60000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
3DE000
stack
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
3E0000
heap
page read and write
36E1000
heap
page read and write
330E000
stack
page read and write
36E1000
heap
page read and write
4DD000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
16A6000
heap
page read and write
3340000
heap
page read and write
323F000
stack
page read and write
2B9D000
stack
page read and write
1746B91C000
heap
page read and write
1C64000
heap
page read and write
2BDE000
stack
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
36E1000
heap
page read and write
2DF0000
heap
page read and write
36E1000
heap
page read and write
1433000
heap
page read and write
2E90000
heap
page read and write
36E1000
heap
page read and write
1746B398000
heap
page read and write
36E1000
heap
page read and write
1C64000
heap
page read and write
36E1000
heap
page read and write
There are 1111 hidden memdumps, click here to show them.