IOC Report
CraxsRAT v7.6 Cracked.exe

loading gif

Files

File Path
Type
Category
Malicious
CraxsRAT v7.6 Cracked.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\CraxsRAT v7.6 Cracked.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\CraxsRat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender Notification.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0e75fed00639ea9e725255499292dcdd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Windows Defender Notification.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CraxsRat.exe_f37025f379d72059c96545738d919e619031a9_bd7d1bf4_3b75dbd8-f3da-456c-92ab-32cb98bcbba9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDBE6.tmp.dmp
Mini DuMP crash report, 16 streams, Wed Nov 6 06:31:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDCE1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD11.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender Notification.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0zovxly1.x0b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2weuu5re.5jx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4q35em12.mif.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_anyknk1m.0uf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3t1sw2b.jkr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fhqpwo2r.yoh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gm4jzmdz.acl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h53dt4lu.m53.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hnjfqkpi.v4i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jyjfiawj.irx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mdpziknj.hqn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mey14p4l.3bu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_noxmwwun.okb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2frp4tu.ofe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yq2b5tgk.wwp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z23shyow.2ux.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Notification.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Nov 6 05:35:14 2024, mtime=Wed Nov 6 05:35:14 2024, atime=Wed Nov 6 05:35:14 2024, length=77312, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CraxsRAT v7.6 Cracked.exe
"C:\Users\user\Desktop\CraxsRAT v7.6 Cracked.exe"
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
"C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe"
malicious
C:\Users\user\AppData\Local\Temp\CraxsRat.exe
"C:\Users\user\AppData\Local\Temp\CraxsRat.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe" "Windows Defender Real Time Protection.exe" ENABLE
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
"C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
"C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender Notification.exe
"C:\Users\user\AppData\Local\Temp\Windows Defender Notification.exe"
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe
"C:\Users\user\AppData\Local\Temp\Windows Defender Real Time Protection.exe" ..
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Windows Defender Notification.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender Notification.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Windows Defender Notification.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender Notification.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Notification" /tr "C:\Users\user\AppData\Roaming\Windows Defender Notification.exe"
malicious
C:\Users\user\AppData\Roaming\Windows Defender Notification.exe
"C:\Users\user\AppData\Roaming\Windows Defender Notification.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1864 -s 800
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.145.41.178
malicious

IPs

IP
Domain
Country
Malicious
45.145.41.178
unknown
Moldova Republic of
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
0e75fed00639ea9e725255499292dcdd
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Defender Notification
malicious
HKEY_CURRENT_USER\SOFTWARE\0e75fed00639ea9e725255499292dcdd
hp
HKEY_CURRENT_USER\SOFTWARE\0e75fed00639ea9e725255499292dcdd
i
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
0e75fed00639ea9e725255499292dcdd
HKEY_CURRENT_USER\SOFTWARE\0e75fed00639ea9e725255499292dcdd
kl
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
ProgramId
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
FileId
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
LowerCaseLongPath
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
LongPathHash
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
Name
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
OriginalFileName
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
Publisher
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
Version
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
BinFileVersion
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
BinaryType
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
ProductName
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
ProductVersion
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
LinkDate
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
BinProductVersion
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
AppxPackageFullName
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
AppxPackageRelativeId
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
Size
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
Language
\REGISTRY\A\{2f49a8ad-ed95-6542-212e-2e238f00e837}\Root\InventoryApplicationFile\craxsrat.exe|9b1b41567a0e9228
Usn
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
412000
unkown
page readonly
malicious
A32000
unkown
page readonly
malicious
2FF6000
trusted library allocation
page read and write
malicious
82E1000
trusted library allocation
page read and write
malicious
7E990FE000
stack
page read and write
7FF848E3B000
trusted library allocation
page read and write
19EE7FF5000
heap
page read and write
7AE000
stack
page read and write
112A000
trusted library allocation
page execute and read and write
19ED047E000
trusted library allocation
page read and write
19ED07C3000
trusted library allocation
page read and write
19ECDD43000
heap
page read and write
15547810000
heap
page read and write
323A000
unkown
page readonly
223FC430000
heap
page read and write
8785FCE000
stack
page read and write
19ECDD00000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
7FF84927D000
trusted library allocation
page read and write
87849CE000
stack
page read and write
2E77000
unkown
page readonly
3305000
trusted library allocation
page read and write
C371000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
3C19EFF000
stack
page read and write
1600000
heap
page read and write
160C000
trusted library allocation
page execute and read and write
E49000
heap
page read and write
19EE8029000
heap
page read and write
770000
unkown
page readonly
22381E02000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
28728ED0000
heap
page read and write
30F4000
trusted library allocation
page read and write
E30000
heap
page read and write
7FF848FA2000
trusted library allocation
page read and write
5CF0000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF849182000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
28728EE1000
heap
page read and write
20F1FE49000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
5D1B000
stack
page read and write
7FF849210000
trusted library allocation
page read and write
313C000
trusted library allocation
page read and write
3135000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
5A50000
heap
page read and write
3C19BFF000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
AA2E000
stack
page read and write
3C1B1CE000
stack
page read and write
3291000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
19ED1152000
trusted library allocation
page read and write
50AE000
heap
page read and write
1450000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
15547276000
heap
page read and write
DB9000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
576C000
stack
page read and write
1279000
heap
page read and write
22381217000
trusted library allocation
page read and write
7E996FE000
stack
page read and write
DB8000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1B15E000
stack
page read and write
13C0000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
2870ECD3000
heap
page read and write
7FF848FD1000
trusted library allocation
page read and write
7FF849182000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
63F8000
heap
page read and write
155307D2000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
DB6000
stack
page read and write
223FC1D0000
heap
page read and write
1100000
trusted library allocation
page read and write
2870EE70000
trusted library allocation
page read and write
21BCD4B8000
heap
page read and write
1050000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
10C2000
trusted library allocation
page execute and read and write
6370000
heap
page read and write
19EDFB37000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
11DF000
stack
page read and write
28728734000
heap
page read and write
63A7000
trusted library allocation
page execute and read and write
7FF849060000
trusted library allocation
page read and write
DE5000
heap
page read and write
13293000
trusted library allocation
page read and write
1040000
heap
page read and write
3309000
trusted library allocation
page read and write
ACEE000
stack
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
7FF849153000
trusted library allocation
page read and write
109A000
trusted library allocation
page execute and read and write
1580000
heap
page read and write
1552FC48000
trusted library allocation
page read and write
20F1BC10000
unkown
page readonly
223811E2000
trusted library allocation
page read and write
F36000
heap
page read and write
AF71000
trusted library allocation
page read and write
19EE7D70000
heap
page execute and read and write
223F9F8C000
heap
page read and write
19EDFB5F000
trusted library allocation
page read and write
19EDFB35000
trusted library allocation
page read and write
3218000
unkown
page readonly
7FF848E3B000
trusted library allocation
page read and write
19ED110D000
trusted library allocation
page read and write
19EE8041000
heap
page read and write
1552D37F000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
11E7000
trusted library allocation
page execute and read and write
1552D4FA000
heap
page read and write
7FF848FA2000
trusted library allocation
page read and write
EEC574E000
stack
page read and write
970000
heap
page execute and read and write
6340000
trusted library allocation
page read and write
EEC55CC000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
22390021000
trusted library allocation
page read and write
DD3000
heap
page read and write
1552ED20000
trusted library allocation
page read and write
15BE000
stack
page read and write
DE7000
heap
page read and write
1122000
trusted library allocation
page execute and read and write
1B49B000
heap
page read and write
106E000
stack
page read and write
32F1000
trusted library allocation
page read and write
9A0000
heap
page read and write
E4A000
heap
page read and write
2871204D000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
1492000
heap
page read and write
7FF84918C000
trusted library allocation
page read and write
155307F2000
trusted library allocation
page read and write
19ECF780000
trusted library allocation
page read and write
D98000
heap
page read and write
940000
trusted library allocation
page read and write
28720799000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
1553F1DE000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
19EE7E09000
heap
page read and write
7E991FF000
stack
page read and write
D6B000
heap
page read and write
6230000
heap
page read and write
19EE7855000
heap
page read and write
19ECDCD4000
heap
page read and write
223FC169000
heap
page read and write
1210000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
DDC000
heap
page read and write
8785DCE000
stack
page read and write
FC9000
stack
page read and write
2870EC3B000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849174000
trusted library allocation
page read and write
53AE000
stack
page read and write
D161000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
22381E22000
trusted library allocation
page read and write
10EA000
heap
page read and write
51D3000
heap
page read and write
DD9000
heap
page read and write
79E000
stack
page read and write
3244000
unkown
page readonly
548E000
stack
page read and write
35F8000
unkown
page readonly
22390001000
trusted library allocation
page read and write
223FBFF1000
heap
page read and write
2572000
unkown
page readonly
7FF849150000
trusted library allocation
page read and write
155474E0000
heap
page read and write
7DF43EEC0000
trusted library allocation
page execute and read and write
28729013000
heap
page read and write
5200000
trusted library allocation
page execute and read and write
5C7A000
unkown
page readonly
DB6000
heap
page read and write
5B30000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
532A000
stack
page read and write
EEC56CC000
stack
page read and write
BE0000
heap
page read and write
1554724F000
heap
page read and write
1C4EE000
stack
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
2870EC64000
heap
page read and write
28720A31000
trusted library allocation
page read and write
54F0000
trusted library allocation
page execute and read and write
22381004000
trusted library allocation
page read and write
2870EF50000
heap
page read and write
2870EC62000
heap
page read and write
50B3000
heap
page read and write
3C1A177000
stack
page read and write
1BEEA000
stack
page read and write
20F1FE20000
heap
page read and write
3FE1000
trusted library allocation
page read and write
1553F1D4000
trusted library allocation
page read and write
17BD000
stack
page read and write
28729033000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
1106000
trusted library allocation
page execute and read and write
19EDFB3F000
trusted library allocation
page read and write
8785ECC000
stack
page read and write
87850F9000
stack
page read and write
DE3000
heap
page read and write
20F1FE61000
heap
page read and write
19EDF851000
trusted library allocation
page read and write
22390437000
trusted library allocation
page read and write
1020000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
55C0000
heap
page read and write
7FF848FC9000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
DCD000
heap
page read and write
19ED116F000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
223FBFC0000
heap
page read and write
13DE000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
223FBA40000
heap
page read and write
17F5000
heap
page read and write
EEC554E000
stack
page read and write
2FAE000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
580E000
stack
page read and write
19ECF6F5000
heap
page read and write
1553F1EF000
trusted library allocation
page read and write
1240000
heap
page read and write
1552D37B000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
155474E8000
heap
page read and write
28710731000
trusted library allocation
page read and write
50A2000
heap
page read and write
8784D79000
stack
page read and write
8785CCE000
stack
page read and write
57AB000
stack
page read and write
1BB34000
stack
page read and write
15530238000
trusted library allocation
page read and write
1C1EE000
stack
page read and write
DAE000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
DAC000
heap
page read and write
163B000
trusted library allocation
page execute and read and write
363C000
unkown
page readonly
50B3000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
E5A000
heap
page read and write
3467000
unkown
page readonly
7FF849002000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7FF848FC1000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
D95000
heap
page read and write
9C9284E000
stack
page read and write
7FF848E04000
trusted library allocation
page read and write
223FC2D4000
heap
page read and write
1117000
trusted library allocation
page execute and read and write
1552EF62000
trusted library allocation
page read and write
15547670000
heap
page read and write
10A6000
trusted library allocation
page execute and read and write
15C0000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
19ECDED0000
heap
page read and write
9C915EE000
stack
page read and write
1BCE0000
heap
page read and write
7DF4DF440000
trusted library allocation
page execute and read and write
22381783000
trusted library allocation
page read and write
13A0000
heap
page read and write
19ED0B99000
trusted library allocation
page read and write
20F1FF60000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
2681000
trusted library allocation
page read and write
136A000
trusted library allocation
page execute and read and write
28728D66000
heap
page execute and read and write
22380CC2000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
155474F4000
heap
page read and write
635A000
trusted library allocation
page execute and read and write
57AE000
stack
page read and write
B971000
trusted library allocation
page read and write
A3D000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
10B7000
trusted library allocation
page execute and read and write
7E98FFF000
stack
page read and write
BDE000
stack
page read and write
7FF848FDA000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
21BCD460000
heap
page read and write
4F2E000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
1552FACA000
trusted library allocation
page read and write
50BC000
stack
page read and write
E49000
heap
page read and write
1605000
heap
page read and write
11C6000
heap
page read and write
1265000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
EEC44F9000
stack
page read and write
10BE000
heap
page read and write
51F0000
trusted library allocation
page read and write
3C1A5FB000
stack
page read and write
10D5000
heap
page read and write
223F9F9F000
heap
page read and write
7FF849004000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
A32E000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
BF5000
heap
page read and write
D81000
heap
page read and write
13F4000
heap
page read and write
7FF848FD4000
trusted library allocation
page read and write
E5C000
heap
page read and write
DD3000
heap
page read and write
15BF000
stack
page read and write
8784C7E000
stack
page read and write
7FF849270000
trusted library allocation
page read and write
E90000
heap
page read and write
28711A38000
trusted library allocation
page read and write
8784902000
stack
page read and write
9C91A7D000
stack
page read and write
584E000
stack
page read and write
28728D70000
heap
page read and write
9FA000
heap
page read and write
4AB0000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
6570000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
15547306000
heap
page read and write
170F000
stack
page read and write
538F000
stack
page read and write
D60000
heap
page read and write
100E000
stack
page read and write
7FF849290000
trusted library allocation
page read and write
19ECF770000
heap
page execute and read and write
1552D352000
heap
page read and write
59B0000
trusted library allocation
page execute and read and write
EF6000
stack
page read and write
EEC467E000
stack
page read and write
19EE81D0000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
223810F7000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
833C000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
19EDFB50000
trusted library allocation
page read and write
6AB000
stack
page read and write
223FBB50000
heap
page read and write
28720A1E000
trusted library allocation
page read and write
28729021000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
9311000
trusted library allocation
page read and write
7FF849188000
trusted library allocation
page read and write
DD8000
heap
page read and write
28720A40000
trusted library allocation
page read and write
7FF849174000
trusted library allocation
page read and write
878517E000
stack
page read and write
7FF849230000
trusted library allocation
page execute and read and write
E0F000
heap
page read and write
13E0000
heap
page read and write
1590000
heap
page read and write
28720A18000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
2870EEF0000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
2870EF80000
heap
page read and write
271D000
trusted library allocation
page read and write
53BE000
stack
page read and write
7FF849260000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
1420000
heap
page read and write
555B000
stack
page read and write
16A0000
heap
page execute and read and write
D81000
heap
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
EEC54CE000
stack
page read and write
223F9F20000
heap
page read and write
1553EF57000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
3222000
unkown
page readonly
1BC5E000
stack
page read and write
20F1FE2C000
heap
page read and write
20F1FFE0000
heap
page read and write
7FF849188000
trusted library allocation
page read and write
223FC110000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
4007000
trusted library allocation
page read and write
223FC1E8000
heap
page read and write
5950000
heap
page read and write
1C1F0000
heap
page read and write
223FBB44000
heap
page read and write
223FC155000
heap
page read and write
E53000
heap
page read and write
137E000
stack
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
330C000
trusted library allocation
page read and write
1137000
trusted library allocation
page execute and read and write
426000
unkown
page readonly
20F1C612000
unkown
page readonly
155472F7000
heap
page read and write
20F20060000
heap
page read and write
AB6E000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
28728BD0000
heap
page read and write
DE6000
heap
page read and write
26DD000
trusted library allocation
page read and write
6392000
trusted library allocation
page execute and read and write
7FF848FD1000
trusted library allocation
page read and write
3629000
unkown
page readonly
1B053000
heap
page read and write
2870EE10000
heap
page read and write
2872900A000
heap
page read and write
223804CD000
trusted library allocation
page read and write
2870EC1B000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF849190000
trusted library allocation
page read and write
28729031000
heap
page read and write
223FC26C000
heap
page read and write
19ED0BBF000
trusted library allocation
page read and write
30BA000
unkown
page readonly
287116AB000
trusted library allocation
page read and write
410000
unkown
page readonly
2238188F000
trusted library allocation
page read and write
223FB850000
trusted library allocation
page read and write
AA6E000
stack
page read and write
1553EF19000
trusted library allocation
page read and write
19ECDCC8000
heap
page read and write
10A5000
heap
page read and write
3C1B04C000
stack
page read and write
28711304000
trusted library allocation
page read and write
9C92ACC000
stack
page read and write
9C915AE000
stack
page read and write
3235000
unkown
page readonly
9C914A3000
stack
page read and write
3624000
unkown
page readonly
E09000
heap
page read and write
E0A000
heap
page read and write
DD9000
heap
page read and write
B30000
heap
page read and write
2870EC21000
heap
page read and write
ADEE000
stack
page read and write
DBA000
heap
page read and write
19ECF840000
heap
page read and write
20F1BC10000
unkown
page readonly
DB7000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
10CA000
trusted library allocation
page execute and read and write
1630000
trusted library allocation
page read and write
223FC2B6000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
BF0000
heap
page read and write
2870EDB0000
heap
page read and write
7FF849240000
trusted library allocation
page execute and read and write
19ED1132000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
9C9197F000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
DB1000
heap
page read and write
5DF0000
heap
page read and write
E11000
heap
page read and write
405E000
unkown
page readonly
20F1FDE0000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
3C1A47E000
stack
page read and write
7FF84918A000
trusted library allocation
page read and write
3C1A0FE000
stack
page read and write
223F9F00000
heap
page read and write
223FBB48000
heap
page read and write
19ECDCFC000
heap
page read and write
DD6000
heap
page read and write
1552D3C7000
heap
page read and write
19EE800D000
heap
page read and write
561000
stack
page read and write
20F1FD20000
heap
page read and write
19EE7DE7000
heap
page read and write
22381869000
trusted library allocation
page read and write
19ECE095000
heap
page read and write
1700000
trusted library allocation
page read and write
DB6000
heap
page read and write
1554764E000
heap
page read and write
EEC564C000
stack
page read and write
1552ED63000
heap
page read and write
223FA060000
heap
page read and write
2872901A000
heap
page read and write
155473A0000
trusted library allocation
page read and write
223FBADA000
heap
page read and write
E49000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
28720A16000
trusted library allocation
page read and write
2870EF85000
heap
page read and write
19ECF740000
heap
page readonly
5970000
trusted library allocation
page execute and read and write
7FF849240000
trusted library allocation
page execute and read and write
155474F8000
heap
page read and write
15D0000
trusted library allocation
page read and write
ECB000
stack
page read and write
223FC14D000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
502F000
stack
page read and write
7FF849008000
trusted library allocation
page read and write
3C1AFCE000
stack
page read and write
1109000
heap
page read and write
1410000
trusted library allocation
page execute and read and write
7FF849179000
trusted library allocation
page read and write
223902EC000
trusted library allocation
page read and write
22380D6E000
trusted library allocation
page read and write
A92E000
stack
page read and write
7FF849004000
trusted library allocation
page read and write
1244000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
1890000
heap
page read and write
1287000
heap
page read and write
103A000
trusted library allocation
page execute and read and write
633F000
stack
page read and write
287116A5000
trusted library allocation
page read and write
15E2000
trusted library allocation
page execute and read and write
E0A000
heap
page read and write
139E000
stack
page read and write
223FBB4C000
heap
page read and write
1172000
unkown
page readonly
9C9187E000
stack
page read and write
E0A000
heap
page read and write
20F1BC12000
unkown
page readonly
19ECDEB0000
heap
page read and write
1552D460000
heap
page readonly
223810C0000
trusted library allocation
page read and write
A30000
unkown
page readonly
2870EF40000
heap
page execute and read and write
1486000
heap
page read and write
8784CFE000
stack
page read and write
8784DFE000
stack
page read and write
5B2E000
stack
page read and write
7DF43EEB0000
trusted library allocation
page execute and read and write
7FF849006000
trusted library allocation
page read and write
223FA0A0000
heap
page read and write
364B000
unkown
page readonly
E8E000
stack
page read and write
9C929C9000
stack
page read and write
DDD000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
20F1DB07000
unkown
page readonly
135A000
trusted library allocation
page execute and read and write
55AE000
stack
page read and write
13BE000
stack
page read and write
223FC2CB000
heap
page read and write
28728F08000
heap
page read and write
57EF000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
28711310000
trusted library allocation
page read and write
1770000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
9A5000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
1552D540000
heap
page read and write
582B000
stack
page read and write
7FF848FDA000
trusted library allocation
page read and write
28711992000
trusted library allocation
page read and write
1602000
trusted library allocation
page execute and read and write
7FF8491B0000
trusted library allocation
page read and write
3C1B0C9000
stack
page read and write
E5C000
heap
page read and write
1552FAC2000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
DA8000
heap
page read and write
19ED059C000
trusted library allocation
page read and write
20F1FC40000
heap
page read and write
DA9000
heap
page read and write
1515000
heap
page read and write
DD8000
heap
page read and write
1494000
heap
page read and write
18FF000
stack
page read and write
63FE000
heap
page read and write
54AF000
stack
page read and write
1650000
heap
page read and write
7FF849182000
trusted library allocation
page read and write
287116AD000
trusted library allocation
page read and write
5A2E000
stack
page read and write
5580000
heap
page read and write
287107A5000
trusted library allocation
page read and write
63F0000
heap
page read and write
12691000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
2870EBF2000
heap
page read and write
DB5000
heap
page read and write
19EE8126000
heap
page read and write
1552D470000
trusted library allocation
page read and write
620D000
stack
page read and write
287208D2000
trusted library allocation
page read and write
1184000
heap
page read and write
CFE000
unkown
page read and write
7FF848FF2000
trusted library allocation
page read and write
28728C2D000
heap
page read and write
223FC126000
heap
page execute and read and write
19ED027C000
trusted library allocation
page read and write
DD0000
heap
page read and write
19EE8067000
heap
page read and write
19EDFB30000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page read and write
20F1FD60000
heap
page read and write
325C000
unkown
page readonly
7FF848ED6000
trusted library allocation
page read and write
19ECF710000
trusted library allocation
page read and write
223902EE000
trusted library allocation
page read and write
223F9F91000
heap
page read and write
1552EEF1000
trusted library allocation
page read and write
87852FB000
stack
page read and write
223FC15F000
heap
page read and write
953000
trusted library allocation
page read and write
28728C8D000
heap
page read and write
E4F000
heap
page read and write
16B0000
heap
page read and write
DBA000
heap
page read and write
15EE000
stack
page read and write
223FB890000
heap
page readonly
56CF000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
223FBB3C000
heap
page read and write
1260000
heap
page read and write
223813C7000
trusted library allocation
page read and write
7F9E000
stack
page read and write
1552D340000
heap
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
10BA000
trusted library allocation
page execute and read and write
7FF8490F0000
trusted library allocation
page read and write
9C9294E000
stack
page read and write
58F037F000
stack
page read and write
7FF848E22000
trusted library allocation
page read and write
1150000
heap
page read and write
FC0000
unkown
page readonly
21BCD480000
heap
page read and write
1285000
heap
page read and write
223811AB000
trusted library allocation
page read and write
58AE000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
A8E000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
57EC000
stack
page read and write
D128000
trusted library allocation
page read and write
AAB000
heap
page read and write
3C1B14C000
stack
page read and write
EEC49FD000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
E0E000
heap
page read and write
28711A9E000
trusted library allocation
page read and write
20F200D0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
6387000
trusted library allocation
page execute and read and write
7FF849270000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
636A000
trusted library allocation
page execute and read and write
1630000
trusted library allocation
page read and write
7FF849185000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
EF9000
stack
page read and write
1552D330000
trusted library allocation
page read and write
1640000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
19EE7E79000
heap
page read and write
7FF848FD1000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
2871115C000
trusted library allocation
page read and write
1158000
heap
page read and write
1362000
trusted library allocation
page execute and read and write
1552D450000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
19EDF860000
trusted library allocation
page read and write
CF5000
heap
page read and write
223812AC000
trusted library allocation
page read and write
DED000
heap
page read and write
1552EEE0000
heap
page read and write
28711FEC000
trusted library allocation
page read and write
7FF849276000
trusted library allocation
page read and write
10A2000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
1553080E000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
1B04C000
stack
page read and write
26E4000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
1552D348000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1600000
heap
page read and write
1617000
trusted library allocation
page execute and read and write
104B000
heap
page read and write
6360000
trusted library allocation
page read and write
2871147E000
trusted library allocation
page read and write
9C919F7000
stack
page read and write
C80000
heap
page read and write
5C7C000
unkown
page readonly
8784FF8000
stack
page read and write
9C91B77000
stack
page read and write
7FF849153000
trusted library allocation
page read and write
1BC6E000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
DE0000
heap
page read and write
950000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
DE7000
heap
page read and write
9C918F9000
stack
page read and write
19ED042E000
trusted library allocation
page read and write
223902F6000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
20F1D012000
unkown
page readonly
1311000
stack
page read and write
19ECF6C0000
heap
page read and write
DDD000
heap
page read and write
7A3000
stack
page read and write
3C1A279000
stack
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1040000
heap
page execute and read and write
7FF84918C000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
2870EEB0000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849185000
trusted library allocation
page read and write
9C91CFE000
stack
page read and write
1552D4A0000
heap
page execute and read and write
8785E47000
stack
page read and write
56EE000
stack
page read and write
1092000
trusted library allocation
page execute and read and write
50B1000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
113B000
trusted library allocation
page execute and read and write
1B93A000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
223FBB29000
heap
page read and write
15530153000
trusted library allocation
page read and write
1BCAF000
stack
page read and write
E55000
heap
page read and write
7FF849174000
trusted library allocation
page read and write
92E1000
trusted library allocation
page read and write
1552FABE000
trusted library allocation
page read and write
7FF84922C000
trusted library allocation
page read and write
107E000
heap
page read and write
7E98EF0000
stack
page read and write
2C9E000
stack
page read and write
19EDF879000
trusted library allocation
page read and write
20F1FDD0000
trusted library allocation
page read and write
32C1000
trusted library allocation
page read and write
1553F1D6000
trusted library allocation
page read and write
223F9FD8000
heap
page read and write
64B1000
heap
page read and write
35FD000
unkown
page readonly
1637000
trusted library allocation
page execute and read and write
7FF849153000
trusted library allocation
page read and write
E54000
heap
page read and write
223FB8D0000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
594E000
stack
page read and write
878498E000
stack
page read and write
542C000
stack
page read and write
1C0EB000
stack
page read and write
EEC41AF000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
134E000
stack
page read and write
15547594000
heap
page read and write
DE3000
heap
page read and write
E29000
heap
page read and write
223F9FD4000
heap
page read and write
ABAE000
stack
page read and write
223FC20A000
heap
page read and write
3280000
heap
page read and write
6680000
trusted library allocation
page execute and read and write
5C28000
heap
page read and write
223FA0A5000
heap
page read and write
146E000
stack
page read and write
9C91AF9000
stack
page read and write
223902E7000
trusted library allocation
page read and write
A93000
heap
page read and write
7DF4DF450000
trusted library allocation
page execute and read and write
A12000
heap
page read and write
1B400000
heap
page read and write
586C000
stack
page read and write
DAE000
heap
page read and write
22381DDD000
trusted library allocation
page read and write
22390306000
trusted library allocation
page read and write
7AB000
stack
page read and write
160A000
trusted library allocation
page execute and read and write
3210000
heap
page execute and read and write
10F2000
trusted library allocation
page execute and read and write
7FF849120000
trusted library allocation
page read and write
667F000
stack
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF849020000
trusted library allocation
page read and write
A650000
heap
page read and write
20F1FE5F000
heap
page read and write
A10000
heap
page read and write
7E992FE000
stack
page read and write
50AC000
heap
page read and write
D72000
heap
page read and write
7FF849008000
trusted library allocation
page read and write
28720A20000
trusted library allocation
page read and write
8785078000
stack
page read and write
1552D381000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
223FBC10000
heap
page execute and read and write
19ECF6F0000
heap
page read and write
51EE000
stack
page read and write
A79E000
stack
page read and write
3213000
unkown
page readonly
7FF849080000
trusted library allocation
page read and write
13C8000
heap
page read and write
D75000
heap
page read and write
E11000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
223FC19F000
heap
page read and write
319F000
stack
page read and write
1552D4F0000
heap
page read and write
223FBB54000
heap
page read and write
56CE000
stack
page read and write
5280000
heap
page read and write
19ECE090000
heap
page read and write
3646000
unkown
page readonly
7FF848EC0000
trusted library allocation
page execute and read and write
110A000
trusted library allocation
page execute and read and write
63AB000
trusted library allocation
page execute and read and write
20F1DDC9000
unkown
page readonly
1570000
heap
page read and write
11EB000
trusted library allocation
page execute and read and write
DCD000
heap
page read and write
19ECDD1C000
heap
page read and write
E5C000
heap
page read and write
10A0000
heap
page read and write
7E994FF000
stack
page read and write
7FF849250000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
167E000
stack
page read and write
1BA3C000
stack
page read and write
3C1A378000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
19ECF7B0000
trusted library allocation
page read and write
155474F0000
heap
page read and write
1BF5E000
stack
page read and write
5B0000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
7FF849169000
trusted library allocation
page read and write
2570000
heap
page read and write
155473D0000
heap
page execute and read and write
63EE000
stack
page read and write
5210000
trusted library allocation
page read and write
28729120000
heap
page read and write
7FF849002000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
8785D4C000
stack
page read and write
50B5000
heap
page read and write
6415000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
20F1FDE3000
trusted library allocation
page read and write
2870EE90000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
155474E4000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1552D387000
heap
page read and write
EEC4776000
stack
page read and write
58F0279000
stack
page read and write
10E0000
trusted library allocation
page read and write
28728C38000
heap
page read and write
DB8000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
1360000
heap
page read and write
223F9F58000
heap
page read and write
ACAE000
stack
page read and write
3139000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
40F1000
trusted library allocation
page read and write
1B4DA000
heap
page read and write
223FC120000
heap
page execute and read and write
157E000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
19ECF8CB000
trusted library allocation
page read and write
57F0000
heap
page read and write
20F1E802000
unkown
page readonly
10AC000
trusted library allocation
page execute and read and write
EEC4AFB000
stack
page read and write
1552D1B0000
heap
page read and write
E30000
heap
page read and write
28712031000
trusted library allocation
page read and write
1553EF00000
trusted library allocation
page read and write
15F0000
heap
page read and write
8785F4C000
stack
page read and write
7FF849008000
trusted library allocation
page read and write
20F1F202000
unkown
page readonly
1552EEC0000
heap
page execute and read and write
19ECDD08000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
50AB000
heap
page read and write
20F1DACE000
unkown
page readonly
14EF000
stack
page read and write
20F20065000
heap
page read and write
E09000
heap
page read and write
12681000
trusted library allocation
page read and write
223FB880000
heap
page read and write
223F9F8F000
heap
page read and write
1553EEF1000
trusted library allocation
page read and write
1BE5F000
stack
page read and write
32F4000
trusted library allocation
page read and write
287290D0000
trusted library allocation
page read and write
EEC45F7000
stack
page read and write
28720A12000
trusted library allocation
page read and write
19EE7DCD000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
22380F9F000
trusted library allocation
page read and write
2239006E000
trusted library allocation
page read and write
BC9000
stack
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
28728FDC000
heap
page read and write
9C91E7B000
stack
page read and write
223FC199000
heap
page read and write
638A000
trusted library allocation
page execute and read and write
7FF849179000
trusted library allocation
page read and write
BDE000
stack
page read and write
50B9000
heap
page read and write
6352000
trusted library allocation
page execute and read and write
223FBB7E000
heap
page read and write
7FF849273000
trusted library allocation
page read and write
60F6000
stack
page read and write
1390000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
E56000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
19EE7EA0000
heap
page read and write
1456000
heap
page read and write
11B9000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
20F1FBB8000
unkown
page readonly
19EDF9F1000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
2238130D000
trusted library allocation
page read and write
7DF43AB50000
trusted library allocation
page execute and read and write
1550000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
20F1FDB0000
trusted library allocation
page read and write
55AE000
stack
page read and write
15530320000
trusted library allocation
page read and write
B2E000
unkown
page read and write
28728D60000
heap
page execute and read and write
EEC457E000
stack
page read and write
2870EC1D000
heap
page read and write
155475BA000
heap
page read and write
147E000
heap
page read and write
19EE812C000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
EEC46F8000
stack
page read and write
19EE804F000
heap
page read and write
6560000
trusted library allocation
page read and write
5D80000
heap
page read and write
19EE7FD0000
heap
page read and write
3C19E72000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
92E4000
trusted library allocation
page read and write
7FF84918C000
trusted library allocation
page read and write
188E000
stack
page read and write
28728C66000
heap
page read and write
DD0000
heap
page read and write
8D0000
heap
page read and write
B7B000
stack
page read and write
7FF848EC0000
trusted library allocation
page read and write
6568000
trusted library allocation
page read and write
1553F1D0000
trusted library allocation
page read and write
223FC0C0000
heap
page execute and read and write
223FC130000
heap
page read and write
527E000
stack
page read and write
20F1FD40000
heap
page read and write
546E000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
54CE000
stack
page read and write
110C000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
50B9000
heap
page read and write
22381951000
trusted library allocation
page read and write
28711A77000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
DE3000
heap
page read and write
20F3A380000
heap
page execute and read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
1070000
heap
page read and write
7FF84917C000
trusted library allocation
page read and write
3C1A1FE000
stack
page read and write
223F9F9B000
heap
page read and write
5A70000
heap
page read and write
2870EDD0000
heap
page read and write
E49000
heap
page read and write
13291000
trusted library allocation
page read and write
B40000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
DB5000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
22381254000
trusted library allocation
page read and write
2870EEBA000
heap
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
AF2C000
stack
page read and write
20F1DE02000
unkown
page readonly
122E000
heap
page read and write
E11000
heap
page read and write
1470000
heap
page read and write
642F000
heap
page read and write
20F21A11000
trusted library allocation
page read and write
1552D39B000
heap
page read and write
28729005000
heap
page read and write
DE1000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
58EE000
stack
page read and write
20F31A13000
trusted library allocation
page read and write
1B4AF000
heap
page read and write
223FBA45000
heap
page read and write
34B3000
unkown
page readonly
7FF849180000
trusted library allocation
page read and write
28712011000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
17D0000
heap
page read and write
3C1A4FE000
stack
page read and write
3C1A3FB000
stack
page read and write
223F9E20000
heap
page read and write
50AB000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
BC6000
stack
page read and write
162A000
trusted library allocation
page execute and read and write
596D000
stack
page read and write
1552D3C2000
heap
page read and write
1622000
trusted library allocation
page execute and read and write
EEC48FE000
stack
page read and write
223FBB79000
heap
page read and write
7FF848E3B000
trusted library allocation
page read and write
365E000
unkown
page readonly
55BD000
stack
page read and write
7DF408680000
trusted library allocation
page execute and read and write
5500000
trusted library allocation
page read and write
22381094000
trusted library allocation
page read and write
1372000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
2708000
trusted library allocation
page read and write
CBB000
stack
page read and write
28712036000
trusted library allocation
page read and write
653E000
stack
page read and write
3C1A2F8000
stack
page read and write
1AC0D000
stack
page read and write
2870EE80000
heap
page readonly
878527E000
stack
page read and write
7FF848DF4000
trusted library allocation
page read and write
20F1FE8B000
heap
page read and write
1032000
trusted library allocation
page execute and read and write
6469000
heap
page read and write
7DF43AB60000
trusted library allocation
page execute and read and write
223818F2000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
DA8000
heap
page read and write
161A000
trusted library allocation
page execute and read and write
C3F000
stack
page read and write
AE2C000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF849060000
trusted library allocation
page read and write
19EE8004000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
21BCD870000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
CE2D000
trusted library allocation
page read and write
1B050000
heap
page read and write
223FB870000
trusted library allocation
page read and write
10D0000
heap
page read and write
28728EB0000
heap
page execute and read and write
15547678000
heap
page read and write
66F0000
heap
page execute and read and write
1552D545000
heap
page read and write
2872900E000
heap
page read and write
12688000
trusted library allocation
page read and write
BF0000
heap
page read and write
E0F000
heap
page read and write
22380A52000
trusted library allocation
page read and write
9C91BFA000
stack
page read and write
20F1FE53000
heap
page read and write
55CE000
stack
page read and write
223FBFE0000
heap
page read and write
19EE8110000
heap
page read and write
19ECDD48000
heap
page read and write
DD9000
heap
page read and write
32C4000
trusted library allocation
page read and write
155474FC000
heap
page read and write
58F02FF000
unkown
page read and write
20F31A11000
trusted library allocation
page read and write
42F1000
trusted library allocation
page read and write
536C000
stack
page read and write
22381126000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
1552ECF0000
trusted library allocation
page read and write
1553F090000
trusted library allocation
page read and write
28728BF8000
heap
page read and write
DDC000
heap
page read and write
5C0000
heap
page read and write
8784F79000
stack
page read and write
A3B000
heap
page read and write
7E993FD000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
7FF487260000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
223FC13C000
heap
page read and write
1B5FE000
stack
page read and write
8784E79000
stack
page read and write
59EE000
stack
page read and write
11E0000
trusted library allocation
page read and write
1357000
trusted library allocation
page execute and read and write
7FF849030000
trusted library allocation
page read and write
7FF849178000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
21BCD4B0000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
DD8000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
19ED0C22000
trusted library allocation
page read and write
DB6000
heap
page read and write
1102000
trusted library allocation
page execute and read and write
9C91C78000
stack
page read and write
7FF848FF8000
trusted library allocation
page read and write
155473D6000
heap
page execute and read and write
DCE000
heap
page read and write
EEC447E000
stack
page read and write
361A000
unkown
page readonly
145C000
heap
page read and write
2870EEC0000
trusted library allocation
page read and write
FE0000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
3607000
unkown
page readonly
7FF849210000
trusted library allocation
page read and write
22380229000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
3641000
unkown
page readonly
1400000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1470000
heap
page read and write
19ECF750000
trusted library allocation
page read and write
2870EBE0000
heap
page read and write
7FF848F45000
trusted library allocation
page execute and read and write
7FF849140000
trusted library allocation
page read and write
E53000
heap
page read and write
5BF0000
heap
page read and write
155304C1000
trusted library allocation
page read and write
EC0000
heap
page read and write
EEC4A7E000
stack
page read and write
19ECDD45000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
2870EBD0000
heap
page read and write
7FF848F45000
trusted library allocation
page execute and read and write
10FA000
trusted library allocation
page execute and read and write
4960000
heap
page read and write
1130000
trusted library allocation
page read and write
19ED1157000
trusted library allocation
page read and write
CD71000
trusted library allocation
page read and write
223FC28A000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
DD5000
heap
page read and write
1370000
trusted library allocation
page read and write
323F000
unkown
page readonly
7FF848ED0000
trusted library allocation
page read and write
1080000
heap
page execute and read and write
28710958000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
8784EFE000
stack
page read and write
6362000
trusted library allocation
page execute and read and write
3C19F7F000
stack
page read and write
7FF849280000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848E14000
trusted library allocation
page read and write
A01000
heap
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
19ECF851000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
321D000
unkown
page readonly
28728D90000
heap
page read and write
7FF848ED6000
trusted library allocation
page read and write
19ECDDD0000
heap
page read and write
20F31A19000
trusted library allocation
page read and write
51D0000
heap
page read and write
1080000
trusted library allocation
page read and write
19EE80D0000
heap
page read and write
110C000
heap
page read and write
1770000
trusted library allocation
page read and write
5E0000
heap
page read and write
1552D4F5000
heap
page read and write
7FF849276000
trusted library allocation
page read and write
2870EEB5000
heap
page read and write
19EE80E9000
heap
page read and write
19ECDCC0000
heap
page read and write
19EE82E0000
heap
page read and write
306E000
unkown
page readonly
7FF849070000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
1342000
trusted library allocation
page execute and read and write
361F000
unkown
page readonly
556E000
stack
page read and write
570E000
stack
page read and write
13298000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
2870EE50000
trusted library allocation
page read and write
D81000
heap
page read and write
7DF408690000
trusted library allocation
page execute and read and write
10AA000
trusted library allocation
page execute and read and write
EEC497E000
stack
page read and write
51BE000
stack
page read and write
15547230000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
267E000
stack
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
223FBA20000
trusted library allocation
page read and write
E4F000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
223F9F50000
heap
page read and write
223FB916000
heap
page read and write
1553025F000
trusted library allocation
page read and write
3C1A57F000
stack
page read and write
17F0000
heap
page read and write
1552F118000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1230000
heap
page read and write
103F000
stack
page read and write
1552FAD2000
trusted library allocation
page read and write
1377000
trusted library allocation
page execute and read and write
28720741000
trusted library allocation
page read and write
56AE000
stack
page read and write
223FBAA0000
heap
page read and write
1552D2F0000
heap
page read and write
5080000
heap
page read and write
155474EC000
heap
page read and write
CE66000
trusted library allocation
page read and write
7FA20000
trusted library allocation
page execute and read and write
9C91DFE000
stack
page read and write
10A0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
223FC2D0000
heap
page read and write
EC6000
heap
page read and write
28711B5F000
trusted library allocation
page read and write
19ECFA78000
trusted library allocation
page read and write
21BCD875000
heap
page read and write
772000
unkown
page readonly
223811DE000
trusted library allocation
page read and write
1552D290000
heap
page read and write
7FF84918A000
trusted library allocation
page read and write
54BF000
stack
page read and write
4FE8000
trusted library allocation
page read and write
50A2000
heap
page read and write
9C91D7E000
stack
page read and write
10D8000
heap
page read and write
1A6B0000
trusted library allocation
page read and write
E5E000
heap
page read and write
ACB000
stack
page read and write
576C000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
22381030000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
2870EC67000
heap
page read and write
19EDFB3D000
trusted library allocation
page read and write
223FC292000
heap
page read and write
DDC000
heap
page read and write
A47F000
stack
page read and write
7FF849000000
trusted library allocation
page execute and read and write
1553F1DC000
trusted library allocation
page read and write
87851FE000
stack
page read and write
15EA000
trusted library allocation
page execute and read and write
17E0000
heap
page execute and read and write
DE4000
heap
page read and write
1B72000
unkown
page readonly
7FF849002000
trusted library allocation
page read and write
1B81D000
stack
page read and write
20F21A00000
heap
page execute and read and write
CF0000
heap
page read and write
19EE7FB0000
heap
page execute and read and write
1552D2B0000
heap
page read and write
21BCD450000
heap
page read and write
5980000
unclassified section
page read and write
3C1A079000
stack
page read and write
3602000
unkown
page readonly
155472E7000
heap
page read and write
E2B000
heap
page read and write
1523000
heap
page read and write
9C9152E000
stack
page read and write
14BE000
heap
page read and write
3261000
unkown
page readonly
15D0000
trusted library allocation
page read and write
7FF849179000
trusted library allocation
page read and write
31FB000
unkown
page readonly
7FF848E10000
trusted library allocation
page read and write
3257000
unkown
page readonly
22380F99000
trusted library allocation
page read and write
AF60000
heap
page read and write
50AB000
heap
page read and write
19ECF730000
trusted library allocation
page read and write
19ED0AB3000
trusted library allocation
page read and write
9C92A4C000
stack
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
DD5000
heap
page read and write
A69E000
stack
page read and write
A64E000
stack
page read and write
116E000
heap
page read and write
137B000
trusted library allocation
page execute and read and write
1B3FF000
stack
page read and write
2870EC25000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
28728F03000
heap
page read and write
15547630000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
EEC40A3000
stack
page read and write
22390031000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
104E000
heap
page read and write
2560000
heap
page execute and read and write
EEC47FC000
stack
page read and write
5DCE000
stack
page read and write
EEC4879000
stack
page read and write
F30000
heap
page read and write
13E0000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
5D70000
heap
page read and write
134A000
trusted library allocation
page execute and read and write
15547400000
heap
page read and write
15547662000
heap
page read and write
155307F7000
trusted library allocation
page read and write
135E000
stack
page read and write
20F200D5000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
19EE7D80000
heap
page read and write
13C0000
heap
page execute and read and write
FC6000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
1218000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1BD5E000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
28728C2F000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
9DC000
heap
page read and write
111A000
trusted library allocation
page execute and read and write
7FF848EB0000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
19EDF8B7000
trusted library allocation
page read and write
7FF849143000
trusted library allocation
page read and write
19EE8107000
heap
page read and write
3200000
unkown
page readonly
223FBFEA000
heap
page read and write
EEC41EE000
stack
page read and write
7FF849010000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
1B2FF000
stack
page read and write
223F9FAD000
heap
page read and write
545E000
unkown
page readonly
22380001000
trusted library allocation
page read and write
1BFEF000
stack
page read and write
7FF848EC6000
trusted library allocation
page read and write
19ED0C81000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
22381E27000
trusted library allocation
page read and write
9C928CC000
stack
page read and write
162E000
stack
page read and write
22380083000
trusted library allocation
page read and write
A54E000
stack
page read and write
E10000
heap
page read and write
28728F05000
heap
page read and write
15547522000
heap
page read and write
DB9000
stack
page read and write
1B835000
stack
page read and write
3C19FFE000
stack
page read and write
1553F1FE000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7DF4086A0000
trusted library allocation
page execute and read and write
155307AD000
trusted library allocation
page read and write
19EE7D76000
heap
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
A10000
heap
page read and write
F00000
heap
page read and write
20F1DA12000
unkown
page readonly
E09000
heap
page read and write
7FF849188000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
5A30000
heap
page read and write
EEC412F000
stack
page read and write
DB8000
heap
page read and write
4A5E000
unkown
page readonly
7E995FE000
stack
page read and write
28720731000
trusted library allocation
page read and write
1552F91C000
trusted library allocation
page read and write
There are 1411 hidden memdumps, click here to show them.