IOC Report
SecuriteInfo.com.Trojan.Win64.Spy.1125.10281.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Win64.Spy.1125.10281.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\MicrosoftWindowsDefenderCoreService[1].exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\AnyDeskShellIntegration[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\AnyDeskCrashHandler[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\AnyDeskShellIntegration.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\AnyDeskShellIntegration_Update.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\AnyDeskShellIntegration[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\AnyDeskUpdateService[1].exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\WindowsUpdate.txt
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\version[1].txt
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\oobe\version.txt
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Spy.1125.10281.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Spy.1125.10281.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
malicious
C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe
"C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe" install
malicious
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
"C:\Windows\System32\oobe\AnyDeskCrashHandler.exe" --pid 6636
malicious
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
"C:\Windows\System32\oobe\AnyDeskCrashHandler.exe" --pid 2404
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc start AnyDeskUpdateService
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc start AnyDeskUpdateService
malicious
C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe
"C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
"C:\Windows\System32\oobe\AnyDeskCrashHandler.exe" --pid 2128
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
malicious
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
"C:\Windows\System32\oobe\AnyDeskUpdateService.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
malicious
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
"C:\Windows\System32\oobe\AnyDeskCrashHandler.exe" --pid 6552
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im MsMpEng.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start AnyDeskUpdateService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\sc.exe
sc start AnyDeskUpdateService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start AnyDeskUpdateService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start AnyDeskUpdateService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start AnyDeskUpdateService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start AnyDeskUpdateService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start AnyDeskUpdateService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start AnyDeskUpdateService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc start MicrosoftWindowsDefenderCoreService
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 182 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exehttps://duy-thanh.github.io/file/AnyDeskUpda
unknown
https://duy-thanh.github.io/file/version.txtD
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllges
unknown
https://duy-thanh.github.io/file/MicrosoftWindowsDefenderCoreService.exep
unknown
https://duy-thanh.github.io/=R
unknown
https://duy-thanh.github.io/1
unknown
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exen
unknown
https://duy-thanh.github.io/file/MicrosoftWindowsDefenderCoreService.exev
unknown
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exedll
unknown
https://duy-thanh.github.io/file/AnyDeskUpdateService.exe3l
unknown
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exe
185.199.110.153
https://duy-thanh.github.io/file/AnyDeskUpdateService.exeC:
unknown
https://duy-thanh.github.io/file/version.txtb.io/file/AnyDeskCrashHandler.exe
unknown
https://duy-thanh.github.io/file/version.txtX
unknown
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exetup%l
unknown
https://duy-thanh.github.io/file/version.txt9c4a2f8b514.cdf-msMo
unknown
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exetupz
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllz
unknown
https://duy-thanh.github.io/file/AnyDeskUpdateService.exe
185.199.110.153
https://duy-thanh.github.io/file/version.txtC:
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dll(l
unknown
https://duy-thanh.github.io/file/version.txtb.io/file/version.txteService.exe3l
unknown
https://duy-thanh.github.io/file/version.txte1
unknown
https://duy-thanh.github.io/file/version.txt.dll
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllao
unknown
https://duy-thanh.github.io/file/AnyDeskS
unknown
https://duy-thanh.github.io/file/AnyDeskUpdateService.exedf-msMo
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dll
185.199.110.153
https://duy-thanh.github.io/file/AnyDeskCrashHandler.execdf-ms
unknown
https://duy-thanh.github.io/file/AnyDeskUpdateService.exeml
unknown
https://duy-thanh.github.io/file/version.txt%l
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dll8l
unknown
https://duy-thanh.github.io/file/version.txt8Y
unknown
https://duy-thanh.github.io/file/AnyDeskUpdateService.exeup
unknown
https://duy-thanh.github.io/file/version.txtb.io/file/version.txt3l
unknown
https://duy-thanh.github.io/file/version.txt
185.199.110.153
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllhttps://duy-thanh.github.io/file/AnyDesk
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllRo-
unknown
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exey
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllmsml
unknown
https://duy-thanh.github.io/file/AnyDeskShellIntegratP
unknown
https://duy-thanh.github.io/file/version.txtt
unknown
https://duy-thanh.github.io/
unknown
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exez
unknown
https://duy-thanh.github.io/file/MicrosoftWindowsDefenderCoreService.exe
185.199.110.153
https://duy-thanh.github.io/file/AnyDeskShellIntegratL
unknown
https://duy-thanh.github.io/file/version.txtr
unknown
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exetup
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
duy-thanh.github.io
185.199.110.153

IPs

IP
Domain
Country
Malicious
185.199.110.153
duy-thanh.github.io
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
24FA65A7000
heap
page read and write
24FA65A6000
heap
page read and write
1F7B17F0000
heap
page read and write
211128B0000
heap
page read and write
24FA6F0F000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA65AD000
heap
page read and write
1F7B1789000
heap
page read and write
24FA65A8000
heap
page read and write
24FA6F0F000
heap
page read and write
E084FFB000
stack
page read and write
1FB90CD0000
heap
page read and write
24D171B0000
heap
page read and write
1F7B17AD000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6571000
heap
page read and write
24FA65A3000
heap
page read and write
24FA65A5000
heap
page read and write
13C404D0000
heap
page read and write
24FA65AA000
heap
page read and write
1F7B178A000
heap
page read and write
1F7B1781000
heap
page read and write
7FF71DDDC000
unkown
page execute and write copy
7FF71DD80000
unkown
page readonly
24FA6599000
heap
page read and write
2777D3A0000
heap
page read and write
7FF71DDDC000
unkown
page execute and write copy
24FA6595000
heap
page read and write
1FB90C70000
heap
page read and write
24FA6584000
heap
page read and write
24FA6F1A000
heap
page read and write
24FA6570000
heap
page read and write
1F7B21CC000
heap
page read and write
28116FD0000
heap
page read and write
18A55458000
heap
page read and write
24FA6566000
heap
page read and write
24FA6577000
heap
page read and write
1679A170000
heap
page read and write
246638CB000
heap
page read and write
24FA65B5000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6578000
heap
page read and write
24FA6594000
heap
page read and write
13C40820000
heap
page read and write
211127A8000
heap
page read and write
24FA65AA000
heap
page read and write
27C0D8E0000
heap
page read and write
24FA6F1F000
heap
page read and write
24FA6590000
heap
page read and write
D42F07E000
stack
page read and write
24FA6574000
heap
page read and write
24FA6590000
heap
page read and write
2486E160000
heap
page read and write
24FA6F0F000
heap
page read and write
1F7B21A0000
remote allocation
page read and write
24FA6563000
heap
page read and write
24FA65AD000
heap
page read and write
28116FF8000
heap
page read and write
24FA65A6000
heap
page read and write
27620A68000
heap
page read and write
1341BD40000
heap
page read and write
2777D405000
heap
page read and write
24FA656E000
heap
page read and write
24FA6592000
heap
page read and write
24FA656D000
heap
page read and write
24FA6599000
heap
page read and write
16799E2D000
heap
page read and write
24FA65B5000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA657C000
heap
page read and write
1E826AD8000
heap
page read and write
1F7B17AC000
heap
page read and write
24FA659A000
heap
page read and write
24FA6559000
heap
page read and write
24FA6590000
heap
page read and write
24FA6590000
heap
page read and write
1F7B21DA000
heap
page read and write
20B80D90000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA65AD000
heap
page read and write
2466387E000
heap
page read and write
BE1A8FC000
stack
page read and write
24FA657A000
heap
page read and write
24FA6556000
heap
page read and write
24FA65B6000
heap
page read and write
7FF76E1D2000
unkown
page execute and write copy
24FA6F0F000
heap
page read and write
24FA6583000
heap
page read and write
7FF76E1D3000
unkown
page write copy
24FA6574000
heap
page read and write
7FF76E181000
unkown
page execute and read and write
1F7B16F0000
heap
page read and write
7FF71DD80000
unkown
page readonly
24FA6572000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA656E000
heap
page read and write
24FA6571000
heap
page read and write
B9544FF000
stack
page read and write
24FA65B8000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65A1000
heap
page read and write
7FF76E1D2000
unkown
page execute and write copy
24FA6590000
heap
page read and write
261CBB85000
heap
page read and write
24FA657B000
heap
page read and write
24FA6F0F000
heap
page read and write
1FB90B70000
heap
page read and write
1E826D70000
heap
page read and write
261CBA30000
heap
page read and write
A7357CD000
stack
page read and write
24FA65B6000
heap
page read and write
24FA6576000
heap
page read and write
24FA6597000
heap
page read and write
1F7B21D5000
heap
page read and write
1888FFE000
stack
page read and write
24FA656D000
heap
page read and write
7FF7AA966000
unkown
page execute and write copy
24D171F0000
heap
page read and write
95619FF000
stack
page read and write
23CFE7E000
unkown
page readonly
BE1A4FE000
stack
page read and write
24FA65A9000
heap
page read and write
24FA6585000
heap
page read and write
24FA65B6000
heap
page read and write
7FF7AA950000
unkown
page readonly
7FF76E1B0000
unkown
page execute and write copy
7FF71DD80000
unkown
page readonly
24FA6F0F000
heap
page read and write
7FF71DDDC000
unkown
page execute and write copy
24FA6593000
heap
page read and write
24FA6590000
heap
page read and write
24FA6F11000
heap
page read and write
1F7B21D5000
heap
page read and write
24FA6587000
heap
page read and write
24FA656E000
heap
page read and write
246637C5000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA654D000
heap
page read and write
13684A88000
heap
page read and write
24FA65B6000
heap
page read and write
25299360000
heap
page read and write
1F7B21D7000
heap
page read and write
24FA64FA000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA65AF000
heap
page read and write
18F5CD50000
heap
page read and write
24FA659A000
heap
page read and write
24FA6590000
heap
page read and write
E03F7FF000
stack
page read and write
24FA6583000
heap
page read and write
2EEC8FE000
stack
page read and write
2BA9BD10000
heap
page read and write
89AD87E000
stack
page read and write
246637C0000
heap
page read and write
2486E1A8000
heap
page read and write
24FA6583000
heap
page read and write
24FA65A1000
heap
page read and write
24FA6F06000
heap
page read and write
24FA6583000
heap
page read and write
24FA65A1000
heap
page read and write
7FF71DD81000
unkown
page execute and read and write
13684A80000
heap
page read and write
7FF6C78AC000
unkown
page execute and write copy
24FA65B6000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6F11000
heap
page read and write
7FF71DD81000
unkown
page execute and read and write
4C68FE000
stack
page read and write
24FA656E000
heap
page read and write
27620A69000
heap
page read and write
1C233CCB000
heap
page read and write
24FA656D000
heap
page read and write
2486E180000
heap
page read and write
24FA656D000
heap
page read and write
24FA65A2000
heap
page read and write
24FA65A8000
heap
page read and write
24FA6593000
heap
page read and write
24FA656D000
heap
page read and write
24FA6570000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6F10000
heap
page read and write
1F7B21A0000
remote allocation
page read and write
13685040000
heap
page read and write
24FA6F15000
heap
page read and write
7FF71DDD3000
unkown
page execute and read and write
E761F7E000
stack
page read and write
7FF7AA950000
unkown
page readonly
3C2FFFE000
stack
page read and write
1F1A68F0000
heap
page read and write
1F7B21F4000
heap
page read and write
1F7B21CC000
heap
page read and write
246636C0000
heap
page read and write
2777D640000
heap
page read and write
24FA6F1A000
heap
page read and write
24FA657D000
heap
page read and write
24FA65A2000
heap
page read and write
7FF71DD80000
unkown
page readonly
24B89190000
heap
page read and write
1F7B17E2000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA6590000
heap
page read and write
95617FE000
stack
page read and write
276227BE000
heap
page read and write
18F5CDC0000
heap
page read and write
24FA6590000
heap
page read and write
28117218000
heap
page read and write
24D171D0000
heap
page read and write
24FA65A3000
heap
page read and write
24FA6570000
heap
page read and write
2D7AFA60000
heap
page read and write
18A55413000
heap
page read and write
1B300230000
heap
page read and write
24FA6579000
heap
page read and write
24FA6583000
heap
page read and write
18A55C02000
trusted library allocation
page read and write
24FA65AA000
heap
page read and write
24FA65A6000
heap
page read and write
28116F70000
heap
page read and write
24FA65B7000
heap
page read and write
24FA65A0000
heap
page read and write
24FA6590000
heap
page read and write
24FA6F0B000
heap
page read and write
1F7B17E2000
heap
page read and write
24FA6470000
heap
page read and write
18A55432000
heap
page read and write
7FF6C78AD000
unkown
page write copy
1F7B21FE000
heap
page read and write
BF99BFF000
stack
page read and write
24FA6F1E000
heap
page read and write
24FA65B8000
heap
page read and write
7FF76E1D1000
unkown
page execute and read and write
2856E770000
heap
page read and write
24FA651B000
heap
page read and write
7FF7AA950000
unkown
page readonly
24FA65A5000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA6F1E000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA6590000
heap
page read and write
24FA6566000
heap
page read and write
24FA6590000
heap
page read and write
173E6E9D000
heap
page read and write
7FF71DDD3000
unkown
page execute and read and write
24FA651B000
heap
page read and write
24FA656D000
heap
page read and write
1F7B17E2000
heap
page read and write
24FA65B6000
heap
page read and write
EC124EC000
stack
page read and write
2856E690000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6F15000
heap
page read and write
BE1AAFE000
stack
page read and write
1E826BE0000
heap
page read and write
24FA6595000
heap
page read and write
24FA656D000
heap
page read and write
24FA657B000
heap
page read and write
37796FC000
stack
page read and write
24FA6576000
heap
page read and write
24FA6583000
heap
page read and write
24FA65A3000
heap
page read and write
24FA656E000
heap
page read and write
24FA65A5000
heap
page read and write
24FA6F06000
heap
page read and write
24FA6587000
heap
page read and write
D42ED3C000
stack
page read and write
24FA6F1F000
heap
page read and write
24FA6590000
heap
page read and write
24FA6F06000
heap
page read and write
24FA6593000
heap
page read and write
2BA9BD40000
heap
page read and write
24FA657F000
heap
page read and write
24FA6590000
heap
page read and write
24FA655D000
heap
page read and write
24FA65A3000
heap
page read and write
24FA6F0F000
heap
page read and write
1E112180000
heap
page read and write
7FF71DDDC000
unkown
page execute and write copy
7FF71DDDB000
unkown
page execute and read and write
24FA6593000
heap
page read and write
2BA9BD45000
heap
page read and write
24FA6F01000
heap
page read and write
1F7B21D5000
heap
page read and write
24FA6598000
heap
page read and write
7FF71DDDC000
unkown
page execute and write copy
24FA656D000
heap
page read and write
24FA65AC000
heap
page read and write
27B0C7C9000
heap
page read and write
252991E0000
heap
page read and write
7FF76E180000
unkown
page readonly
2856EA30000
heap
page read and write
281171D5000
heap
page read and write
1F7B15E0000
heap
page read and write
24FA659C000
heap
page read and write
276209D5000
heap
page read and write
24FA6579000
heap
page read and write
1FB963D0000
heap
page read and write
24FA656D000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6F36000
heap
page read and write
13C40825000
heap
page read and write
7FF7AA951000
unkown
page execute and read and write
28117170000
heap
page read and write
24FA6F1F000
heap
page read and write
24FA6F0C000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA654C000
heap
page read and write
24FA6593000
heap
page read and write
7FF76E1B0000
unkown
page execute and write copy
24FA6574000
heap
page read and write
24FA6F15000
heap
page read and write
24FA6583000
heap
page read and write
24FA65A9000
heap
page read and write
BE1A3FE000
stack
page read and write
2856E850000
heap
page read and write
24FA6F06000
heap
page read and write
7FF71DDDD000
unkown
page read and write
1F7B21CC000
heap
page read and write
24FA6F13000
heap
page read and write
1F7B17AD000
heap
page read and write
24FA65B8000
heap
page read and write
24FA65A8000
heap
page read and write
1E112380000
heap
page read and write
24FA6595000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6573000
heap
page read and write
24FA6566000
heap
page read and write
24FA6F01000
heap
page read and write
24FA6582000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA6F1E000
heap
page read and write
24FA6F1F000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6765000
heap
page read and write
24FA6577000
heap
page read and write
16799E20000
heap
page read and write
F49487E000
stack
page read and write
24FA655D000
heap
page read and write
7FF71DDDB000
unkown
page execute and read and write
7FF71DDDD000
unkown
page write copy
24FA65A1000
heap
page read and write
24FA657F000
heap
page read and write
24FA656D000
heap
page read and write
7FF7AA96C000
unkown
page execute and read and write
24FA65A7000
heap
page read and write
69FA7D000
stack
page read and write
24FA6590000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65A8000
heap
page read and write
4C65FE000
stack
page read and write
27622600000
remote allocation
page read and write
24FA65A3000
heap
page read and write
BF99AFC000
stack
page read and write
24FA656F000
heap
page read and write
16799E2F000
heap
page read and write
E084BFE000
stack
page read and write
24FA65A1000
heap
page read and write
1F7B21CD000
heap
page read and write
B58C7E000
stack
page read and write
24D171F8000
heap
page read and write
24FA6F0F000
heap
page read and write
7FF71DDB6000
unkown
page execute and write copy
7FF71DDB6000
unkown
page execute and write copy
24FA6F0F000
heap
page read and write
24FA6584000
heap
page read and write
24FA6F0F000
heap
page read and write
2762097C000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65AF000
heap
page read and write
24FA654B000
heap
page read and write
24FA6579000
heap
page read and write
24FA659A000
heap
page read and write
24FA6576000
heap
page read and write
18A55290000
heap
page read and write
24FA6F19000
heap
page read and write
24FA6581000
heap
page read and write
65DF51D000
stack
page read and write
24FA6F01000
heap
page read and write
7FF7AA972000
unkown
page execute and read and write
24FA6590000
heap
page read and write
7FF7AA951000
unkown
page execute and read and write
276227C4000
heap
page read and write
24FA6592000
heap
page read and write
24FA6F01000
heap
page read and write
24FA6F0F000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA659D000
heap
page read and write
9561AFB000
stack
page read and write
24FA6583000
heap
page read and write
21112B65000
heap
page read and write
24FA6551000
heap
page read and write
24FA6F11000
heap
page read and write
1B300290000
heap
page read and write
24FA656D000
heap
page read and write
24FA657C000
heap
page read and write
1341BCA0000
heap
page read and write
24FA6590000
heap
page read and write
BE1A7FE000
stack
page read and write
24FA655E000
heap
page read and write
18A55400000
heap
page read and write
24FA6590000
heap
page read and write
24FA656D000
heap
page read and write
24FA656D000
heap
page read and write
246637D0000
heap
page read and write
2486E1A0000
heap
page read and write
E084DFE000
stack
page read and write
24FA6F05000
heap
page read and write
24FA65AE000
heap
page read and write
24FA6F0A000
heap
page read and write
1E826CE0000
heap
page read and write
1F7B17AD000
heap
page read and write
24FA65AB000
heap
page read and write
7FF71DD81000
unkown
page execute and read and write
24FA65A8000
heap
page read and write
7FF71DDB6000
unkown
page execute and write copy
6B2357E000
stack
page read and write
1F7B21CC000
heap
page read and write
24FA65B8000
heap
page read and write
1B3004C0000
heap
page read and write
7FF71DDDC000
unkown
page execute and write copy
261CBA10000
heap
page read and write
24FA6576000
heap
page read and write
24FA65AA000
heap
page read and write
24FA65AA000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA65A1000
heap
page read and write
24FA6F0D000
heap
page read and write
27B0C700000
heap
page read and write
24FA65A1000
heap
page read and write
20B80D70000
heap
page read and write
24FA6578000
heap
page read and write
24FA6577000
heap
page read and write
24FA6571000
heap
page read and write
24FA65B8000
heap
page read and write
24FA657B000
heap
page read and write
24FA6F1E000
heap
page read and write
24FA6573000
heap
page read and write
7FF71DDDD000
unkown
page read and write
276208E0000
heap
page read and write
24FA6F1A000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6585000
heap
page read and write
24FA6F0C000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6592000
heap
page read and write
1341BCA5000
heap
page read and write
24FA6590000
heap
page read and write
24FA65A8000
heap
page read and write
173E6E80000
heap
page read and write
24FA6598000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65A8000
heap
page read and write
24FA6595000
heap
page read and write
24FA6F12000
heap
page read and write
24FA6582000
heap
page read and write
1F7B17DA000
heap
page read and write
1F7B16F7000
heap
page read and write
24FA65B6000
heap
page read and write
7FF71DDDD000
unkown
page read and write
F4948FE000
unkown
page readonly
9561CFD000
stack
page read and write
7FF71DDB6000
unkown
page execute and write copy
E914A7D000
stack
page read and write
24FA6F15000
heap
page read and write
BE1A0FE000
stack
page read and write
24FA65AA000
heap
page read and write
24FA6578000
heap
page read and write
B58A7D000
stack
page read and write
1F7B17E2000
heap
page read and write
7FF76E180000
unkown
page readonly
24FA65B6000
heap
page read and write
24FA65B6000
heap
page read and write
24FA657E000
heap
page read and write
13684A8D000
heap
page read and write
23CF59C000
stack
page read and write
24FA6581000
heap
page read and write
24D175B0000
heap
page read and write
24FA654B000
heap
page read and write
24FA6590000
heap
page read and write
24FA6592000
heap
page read and write
24FA6590000
heap
page read and write
7FF7AA96C000
unkown
page execute and read and write
1E112390000
heap
page read and write
24FA6F0F000
heap
page read and write
2BA9BD50000
heap
page read and write
24FA6551000
heap
page read and write
24FA6590000
heap
page read and write
24FA6575000
heap
page read and write
24FA659C000
heap
page read and write
24FA6F06000
heap
page read and write
24FA6590000
heap
page read and write
24FA65A8000
heap
page read and write
7FF6C7886000
unkown
page execute and write copy
24FA6F1E000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA65AC000
heap
page read and write
7FF7AA950000
unkown
page readonly
24FA6576000
heap
page read and write
7FF71DDDD000
unkown
page write copy
24FA6551000
heap
page read and write
24FA65B6000
heap
page read and write
24B89160000
heap
page read and write
24FA656D000
heap
page read and write
24FA6F06000
heap
page read and write
24FA657E000
heap
page read and write
24665500000
heap
page read and write
24FA6550000
heap
page read and write
27C0D900000
heap
page read and write
37797FE000
stack
page read and write
24FA6575000
heap
page read and write
24FA6594000
heap
page read and write
24FA65A6000
heap
page read and write
2D7AF7C9000
heap
page read and write
2486E3E0000
heap
page read and write
1F7B21DB000
heap
page read and write
24FA6F1F000
heap
page read and write
2D76B7E000
stack
page read and write
E914C7F000
stack
page read and write
7FF71DD81000
unkown
page execute and read and write
24FA656E000
heap
page read and write
27B0C7CF000
heap
page read and write
24FA6F0F000
heap
page read and write
1F1A68F8000
heap
page read and write
24FA6F15000
heap
page read and write
24FA6575000
heap
page read and write
24FA6599000
heap
page read and write
24FA6F07000
heap
page read and write
24663840000
heap
page read and write
27B0C600000
heap
page read and write
1F7B21FE000
heap
page read and write
24FA6577000
heap
page read and write
7FF71DDD3000
unkown
page execute and read and write
7FF7AA972000
unkown
page execute and read and write
24FA6563000
heap
page read and write
4C6DF9000
stack
page read and write
24FA6594000
heap
page read and write
24FA656E000
heap
page read and write
24FA656E000
heap
page read and write
7FF7AA96C000
unkown
page execute and read and write
24FA6F11000
heap
page read and write
24FA6572000
heap
page read and write
1F7B21D3000
heap
page read and write
24FA6587000
heap
page read and write
24FA6F0C000
heap
page read and write
24B8AB30000
heap
page read and write
24FA655C000
heap
page read and write
24FA6590000
heap
page read and write
24FA65AF000
heap
page read and write
261CBB80000
heap
page read and write
24FA6F01000
heap
page read and write
24FA656D000
heap
page read and write
24FA6590000
heap
page read and write
1F7B2201000
heap
page read and write
1F1A6860000
heap
page read and write
24FA65A8000
heap
page read and write
24FA656D000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6590000
heap
page read and write
7FF71DDDB000
unkown
page execute and read and write
89AD77E000
stack
page read and write
27620976000
heap
page read and write
24FA6593000
heap
page read and write
24FA65A8000
heap
page read and write
24FA656D000
heap
page read and write
24FA656D000
heap
page read and write
24FA659B000
heap
page read and write
65DF87E000
stack
page read and write
24FA6590000
heap
page read and write
24FA656E000
heap
page read and write
1F7B21CC000
heap
page read and write
138FC7E0000
heap
page read and write
24FA6F13000
heap
page read and write
24FA6559000
heap
page read and write
24FA65B6000
heap
page read and write
24FA656D000
heap
page read and write
24FA657C000
heap
page read and write
24FA65B6000
heap
page read and write
1FB90C50000
heap
page read and write
24FA6594000
heap
page read and write
B58B7F000
stack
page read and write
2D7AF740000
heap
page read and write
24FA6590000
heap
page read and write
24FA65AA000
heap
page read and write
D7AF9FF000
stack
page read and write
24FA65B8000
heap
page read and write
2D76A7F000
stack
page read and write
BF99CFE000
stack
page read and write
D42F17E000
stack
page read and write
E084CFE000
stack
page read and write
26AC188D000
heap
page read and write
1F7B21FE000
heap
page read and write
20B810E0000
heap
page read and write
24FA657E000
heap
page read and write
1963AFE000
stack
page read and write
24FA6571000
heap
page read and write
B298BEC000
stack
page read and write
1F7B17E4000
heap
page read and write
2777D3F0000
heap
page read and write
24FA6F0F000
heap
page read and write
BE1A2FE000
stack
page read and write
24FA6580000
heap
page read and write
24FA6F0C000
heap
page read and write
173E6D20000
heap
page read and write
27620AE0000
heap
page read and write
24FA6586000
heap
page read and write
4C6CFF000
stack
page read and write
24FA65AC000
heap
page read and write
7FF71DDD3000
unkown
page execute and read and write
69FC7F000
stack
page read and write
B70F2FF000
stack
page read and write
24FA6F0F000
heap
page read and write
24FA65A1000
heap
page read and write
2006EB70000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6590000
heap
page read and write
24FA65A7000
heap
page read and write
24FA65A3000
heap
page read and write
24FA65B8000
heap
page read and write
7FF7AA974000
unkown
page read and write
26AC1880000
heap
page read and write
1FB90CF0000
heap
page read and write
24FA6F36000
heap
page read and write
24FA6370000
heap
page read and write
28116FFF000
heap
page read and write
1FB90CD5000
heap
page read and write
1F7B17E2000
heap
page read and write
24FA65A8000
heap
page read and write
24FA65B3000
heap
page read and write
24FA65B6000
heap
page read and write
24FA656E000
heap
page read and write
24FA6F1E000
heap
page read and write
24FA6592000
heap
page read and write
24FA656D000
heap
page read and write
B70F0FC000
stack
page read and write
24FA6590000
heap
page read and write
1F7B21D5000
heap
page read and write
1F7B21B0000
heap
page read and write
24FA65B6000
heap
page read and write
24FA656E000
heap
page read and write
7FF7AA973000
unkown
page execute and write copy
24FA659A000
heap
page read and write
24FA6593000
heap
page read and write
24FA65A1000
heap
page read and write
24FA6F06000
heap
page read and write
24FA6590000
heap
page read and write
1F7B21CC000
heap
page read and write
1F1A6840000
heap
page read and write
24FA659A000
heap
page read and write
24FA6F15000
heap
page read and write
24FA655D000
heap
page read and write
69FB7E000
stack
page read and write
2BA9BB38000
heap
page read and write
1F7B17AD000
heap
page read and write
24FA651B000
heap
page read and write
1FB90CF8000
heap
page read and write
24FA65B8000
heap
page read and write
24FA656D000
heap
page read and write
24FA6F1F000
heap
page read and write
93F6EFF000
stack
page read and write
24FA65B6000
heap
page read and write
24FA6594000
heap
page read and write
24FA656E000
heap
page read and write
1F7B21D7000
heap
page read and write
7FF71DDDD000
unkown
page read and write
7FF7AA974000
unkown
page read and write
27C0DB90000
heap
page read and write
13C403D0000
heap
page read and write
25299330000
heap
page read and write
24FA6590000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65A8000
heap
page read and write
1F7B21DA000
heap
page read and write
24FA655F000
heap
page read and write
24FA65B6000
heap
page read and write
24FA655B000
heap
page read and write
24FA65B6000
heap
page read and write
18A5542B000
heap
page read and write
138FCAE0000
heap
page read and write
24FA6590000
heap
page read and write
2006EF05000
heap
page read and write
24FA656D000
heap
page read and write
24FA6592000
heap
page read and write
1888EFC000
stack
page read and write
7FF71DDDB000
unkown
page execute and read and write
24FA655D000
heap
page read and write
7FF71DD80000
unkown
page readonly
24FA657B000
heap
page read and write
24FA6586000
heap
page read and write
24FA656D000
heap
page read and write
7FF71DD80000
unkown
page readonly
2D7AF770000
heap
page read and write
24FA65A3000
heap
page read and write
23CFB7D000
stack
page read and write
7FF7AA951000
unkown
page execute and read and write
25299335000
heap
page read and write
24FA6594000
heap
page read and write
3C2FF7E000
unkown
page readonly
7FF7AA973000
unkown
page execute and write copy
24FA65B6000
heap
page read and write
24FA6590000
heap
page read and write
1F7B21D7000
heap
page read and write
1F7B17E4000
heap
page read and write
23D027E000
unkown
page readonly
24FA65B8000
heap
page read and write
24FA65AE000
heap
page read and write
24FA656D000
heap
page read and write
BE19FFE000
stack
page read and write
24FA6590000
heap
page read and write
24FA65A7000
heap
page read and write
24FA6F12000
heap
page read and write
24D171A0000
heap
page read and write
24FA6584000
heap
page read and write
24FA6F11000
heap
page read and write
24FA65A6000
heap
page read and write
24FA65B6000
heap
page read and write
211127A0000
heap
page read and write
27B0C6E0000
heap
page read and write
1F7B17B0000
heap
page read and write
1F7B21CC000
heap
page read and write
360FFAE000
stack
page read and write
1F7B1727000
heap
page read and write
24FA65AB000
heap
page read and write
24FA65B6000
heap
page read and write
173E6E87000
heap
page read and write
24FA65B6000
heap
page read and write
1F7B17B0000
heap
page read and write
261CB840000
heap
page read and write
24FA6F15000
heap
page read and write
24FA6F0C000
heap
page read and write
1F7B17E2000
heap
page read and write
20B810E5000
heap
page read and write
24FA6F0F000
heap
page read and write
1F7B17E2000
heap
page read and write
24FA65AB000
heap
page read and write
24FA6598000
heap
page read and write
7FF6C78AD000
unkown
page read and write
24FA659C000
heap
page read and write
24FA65A8000
heap
page read and write
1F7B21D5000
heap
page read and write
1F7B17E4000
heap
page read and write
211129B0000
heap
page read and write
24FA6F36000
heap
page read and write
7FF71DDB6000
unkown
page execute and write copy
281171D0000
heap
page read and write
24FA6593000
heap
page read and write
1F7B21D5000
heap
page read and write
1C233CC9000
heap
page read and write
24FA6590000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6590000
heap
page read and write
24FA6599000
heap
page read and write
24D17201000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65AC000
heap
page read and write
27620A66000
heap
page read and write
24FA6F36000
heap
page read and write
24FA656D000
heap
page read and write
24FA6590000
heap
page read and write
93F6DFE000
stack
page read and write
24FA6590000
heap
page read and write
24FA65B6000
heap
page read and write
1F7B21CC000
heap
page read and write
1F7B17A9000
heap
page read and write
18A55370000
heap
page read and write
24FA6576000
heap
page read and write
24FA65A8000
heap
page read and write
24FA657B000
heap
page read and write
24FA6F05000
heap
page read and write
24FA6590000
heap
page read and write
7FF71DDB6000
unkown
page execute and write copy
27C0D950000
heap
page read and write
2777D3C0000
heap
page read and write
1F7B17AD000
heap
page read and write
24FA6F12000
heap
page read and write
26AC1790000
heap
page read and write
EC125EE000
stack
page read and write
27B0C7B0000
heap
page read and write
24FA657B000
heap
page read and write
24FA6F0F000
heap
page read and write
1F7B21D7000
heap
page read and write
28117210000
heap
page read and write
24FA656E000
heap
page read and write
26AC1888000
heap
page read and write
27C0D8D0000
heap
page read and write
24FA6590000
heap
page read and write
1963BFE000
stack
page read and write
24FA656E000
heap
page read and write
24FA6590000
heap
page read and write
24FA656E000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6599000
heap
page read and write
16799DA0000
heap
page read and write
1F7B1789000
heap
page read and write
24FA656D000
heap
page read and write
24FA6F0C000
heap
page read and write
E0846FC000
stack
page read and write
24FA655F000
heap
page read and write
24FA6590000
heap
page read and write
1F7B17E2000
heap
page read and write
1341BC40000
heap
page read and write
24FA65B6000
heap
page read and write
24FA656E000
heap
page read and write
26AC1E00000
heap
page read and write
7FF7AA973000
unkown
page execute and write copy
24FA6577000
heap
page read and write
16799E27000
heap
page read and write
24FA6559000
heap
page read and write
7FF6C78AB000
unkown
page execute and read and write
24FA6F1F000
heap
page read and write
24FA65B8000
heap
page read and write
1F1A6C50000
heap
page read and write
173E7160000
heap
page read and write
24B891F8000
heap
page read and write
173E6E00000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65B8000
heap
page read and write
7FF7AA950000
unkown
page readonly
24FA6F10000
heap
page read and write
26AC1E50000
heap
page read and write
7FF7AA974000
unkown
page read and write
24FA6575000
heap
page read and write
24FA6F36000
heap
page read and write
D7AF8FE000
stack
page read and write
24FA656D000
heap
page read and write
18A55502000
heap
page read and write
7FF71DD80000
unkown
page readonly
24FA657A000
heap
page read and write
27814AD000
stack
page read and write
24FA6F06000
heap
page read and write
24FA6590000
heap
page read and write
24FA6586000
heap
page read and write
24FA6590000
heap
page read and write
24FA6583000
heap
page read and write
27C0DB95000
heap
page read and write
24FA65B8000
heap
page read and write
1F7B17B0000
heap
page read and write
1FB96790000
heap
page read and write
27622600000
remote allocation
page read and write
1E826CC0000
heap
page read and write
1F7B16E0000
heap
page read and write
1F1A6830000
heap
page read and write
24FA656D000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6582000
heap
page read and write
1E112160000
heap
page read and write
24FA656F000
heap
page read and write
1E112350000
heap
page read and write
24FA64C0000
heap
page read and write
1B300298000
heap
page read and write
24FA6F0A000
heap
page read and write
24FA654F000
heap
page read and write
24FA6F36000
heap
page read and write
24FA6F09000
heap
page read and write
24FA6579000
heap
page read and write
1FB963D8000
heap
page read and write
24FA65B6000
heap
page read and write
82467F000
stack
page read and write
24FA65AD000
heap
page read and write
24FA656E000
heap
page read and write
24FA65B8000
heap
page read and write
24FA6573000
heap
page read and write
138FC807000
heap
page read and write
24FA6F1F000
heap
page read and write
89AD67C000
stack
page read and write
24FA6563000
heap
page read and write
3C2FBBD000
stack
page read and write
24FA6F0F000
heap
page read and write
24FA6598000
heap
page read and write
246637A0000
heap
page read and write
7FF71DD80000
unkown
page readonly
2D7676C000
stack
page read and write
1F7B17AC000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6590000
heap
page read and write
28116F50000
heap
page read and write
24FA6596000
heap
page read and write
7FF71DDDC000
unkown
page execute and write copy
24FA6590000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA6574000
heap
page read and write
2D7AFA65000
heap
page read and write
24FA6F0F000
heap
page read and write
2006EBA0000
heap
page read and write
7FF71DDDB000
unkown
page execute and read and write
24FA65B8000
heap
page read and write
27620A07000
heap
page read and write
24FA6575000
heap
page read and write
24FA65B6000
heap
page read and write
7FF7AA972000
unkown
page execute and read and write
24FA6F1E000
heap
page read and write
65DF97E000
stack
page read and write
24FA6573000
heap
page read and write
24FA656D000
heap
page read and write
2006EF00000
heap
page read and write
1F7B17AD000
heap
page read and write
24FA65AE000
heap
page read and write
24FA65AC000
heap
page read and write
24FA655D000
heap
page read and write
24FA6583000
heap
page read and write
24FA65B6000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA659F000
heap
page read and write
24FA65B8000
heap
page read and write
B70F1FF000
stack
page read and write
18A553A0000
trusted library allocation
page read and write
7FF76E181000
unkown
page execute and read and write
24FA6F12000
heap
page read and write
24FA6590000
heap
page read and write
24FA6578000
heap
page read and write
2856EA35000
heap
page read and write
276209F6000
heap
page read and write
24FA6570000
heap
page read and write
24FA6F0F000
heap
page read and write
1E112385000
heap
page read and write
27622600000
remote allocation
page read and write
24B89080000
heap
page read and write
2006EC30000
heap
page read and write
173E6E20000
heap
page read and write
1F7B21DA000
heap
page read and write
24FA6576000
heap
page read and write
24FA6F1F000
heap
page read and write
27620A3D000
heap
page read and write
7FF71DDDD000
unkown
page write copy
D7AF57C000
stack
page read and write
1F7B21CC000
heap
page read and write
24FA657C000
heap
page read and write
28116FD5000
heap
page read and write
24FA655D000
heap
page read and write
E084AFE000
stack
page read and write
1341BB60000
heap
page read and write
1FB965B0000
heap
page read and write
24FA6F0F000
heap
page read and write
1F7B179E000
heap
page read and write
24FA6F36000
heap
page read and write
24FA6583000
heap
page read and write
CEFE6FF000
stack
page read and write
27620970000
heap
page read and write
24FA655C000
heap
page read and write
7FF71DD81000
unkown
page execute and read and write
24FA655D000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA65B6000
heap
page read and write
24FA656D000
heap
page read and write
24FA65B6000
heap
page read and write
7FF76E180000
unkown
page readonly
7FF76E1D3000
unkown
page write copy
24FA65A8000
heap
page read and write
BE1A6FE000
stack
page read and write
1E112188000
heap
page read and write
1C233CA0000
heap
page read and write
24FA6590000
heap
page read and write
24FA6F1E000
heap
page read and write
1F7B21FE000
heap
page read and write
24FA65A6000
heap
page read and write
24FA6760000
heap
page read and write
82477E000
stack
page read and write
24FA6590000
heap
page read and write
2856E790000
heap
page read and write
1F7B21CC000
heap
page read and write
1F7B17DA000
heap
page read and write
2D76BFE000
unkown
page readonly
24FA65B0000
heap
page read and write
24FA656D000
heap
page read and write
24FA6590000
heap
page read and write
24FA6578000
heap
page read and write
1F7B21D5000
heap
page read and write
24FA65A8000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6590000
heap
page read and write
24FA6F13000
heap
page read and write
24FA6590000
heap
page read and write
7FF76E180000
unkown
page readonly
2856E858000
heap
page read and write
24FA6F09000
heap
page read and write
27620800000
heap
page read and write
24FA655D000
heap
page read and write
7FF71DD80000
unkown
page readonly
24FA659F000
heap
page read and write
276226C0000
heap
page read and write
261CB820000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6595000
heap
page read and write
1F7B1789000
heap
page read and write
1FB964D0000
heap
page read and write
1F7B179E000
heap
page read and write
2EEC5FC000
stack
page read and write
24FA6594000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA6578000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA6F1F000
heap
page read and write
1FB96795000
heap
page read and write
7FF7AA974000
unkown
page write copy
F49455D000
stack
page read and write
13684F10000
heap
page read and write
24FA6590000
heap
page read and write
24FA655B000
heap
page read and write
E0848FE000
stack
page read and write
1F7B17E2000
heap
page read and write
1F7B21D7000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA6554000
heap
page read and write
7FF71DDDD000
unkown
page write copy
24FA6590000
heap
page read and write
24FA6582000
heap
page read and write
24FA656D000
heap
page read and write
24FA65A7000
heap
page read and write
24FA6590000
heap
page read and write
24FA6583000
heap
page read and write
24FA659C000
heap
page read and write
1E826D75000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA659C000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6574000
heap
page read and write
4C6AFF000
stack
page read and write
7FF7AA950000
unkown
page readonly
24FA65A5000
heap
page read and write
27620A06000
heap
page read and write
24FA6590000
heap
page read and write
A735AFE000
stack
page read and write
D7C71FE000
stack
page read and write
24FA6582000
heap
page read and write
1B300150000
heap
page read and write
7FF7AA966000
unkown
page execute and write copy
261CB848000
heap
page read and write
24FA6F0F000
heap
page read and write
7FF71DDDD000
unkown
page read and write
24FA6598000
heap
page read and write
B95418C000
stack
page read and write
1E826AD0000
heap
page read and write
24FA6583000
heap
page read and write
24FA656E000
heap
page read and write
24FA6559000
heap
page read and write
24FA6F1A000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA6590000
heap
page read and write
1F7B17AD000
heap
page read and write
24FA6574000
heap
page read and write
24FA6587000
heap
page read and write
1F7B17E2000
heap
page read and write
24FA6590000
heap
page read and write
138FC800000
heap
page read and write
20B80D60000
heap
page read and write
24FA656D000
heap
page read and write
7FF7AA974000
unkown
page write copy
24FA656D000
heap
page read and write
252992C0000
heap
page read and write
18A55443000
heap
page read and write
24FA65A8000
heap
page read and write
24FA659F000
heap
page read and write
28116FF0000
heap
page read and write
24FA6F0D000
heap
page read and write
20B80E20000
heap
page read and write
1F7B17AC000
heap
page read and write
24FA6557000
heap
page read and write
7FF71DD81000
unkown
page execute and read and write
24FA6F0C000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6F36000
heap
page read and write
E0847FE000
stack
page read and write
7FF71DDDD000
unkown
page write copy
24FA6F0F000
heap
page read and write
2D7AF750000
heap
page read and write
1C233CC0000
heap
page read and write
24FA656E000
heap
page read and write
95616FE000
stack
page read and write
EC128FF000
stack
page read and write
24FA657A000
heap
page read and write
27B0C7BC000
heap
page read and write
24FA65B8000
heap
page read and write
13C404B0000
heap
page read and write
24FA6582000
heap
page read and write
1F7B17E2000
heap
page read and write
18890FE000
stack
page read and write
2777D3F7000
heap
page read and write
24FA6F16000
heap
page read and write
24FA6561000
heap
page read and write
18F5CD40000
heap
page read and write
24FA6576000
heap
page read and write
24FA6553000
heap
page read and write
1F7B179E000
heap
page read and write
4C66FD000
stack
page read and write
1F7B16E5000
heap
page read and write
24FA65A6000
heap
page read and write
24FA65AA000
heap
page read and write
24FA654D000
heap
page read and write
7FF7AA973000
unkown
page execute and write copy
160927E000
stack
page read and write
24FA6F0F000
heap
page read and write
D7C6DAC000
stack
page read and write
24FA6578000
heap
page read and write
24FA6F00000
heap
page read and write
93F6CFC000
stack
page read and write
24FA6F0A000
heap
page read and write
24FA6583000
heap
page read and write
1F7B21A0000
remote allocation
page read and write
24FA659E000
heap
page read and write
28117070000
heap
page read and write
13C405A8000
heap
page read and write
B9545FF000
stack
page read and write
BE1A9FB000
stack
page read and write
7FF7AA950000
unkown
page readonly
24FA6586000
heap
page read and write
24FA6590000
heap
page read and write
1FB965D0000
heap
page read and write
24FA6582000
heap
page read and write
24FA65B8000
heap
page read and write
24FA657B000
heap
page read and write
7FF71DD81000
unkown
page execute and read and write
7FF71DDDD000
unkown
page write copy
82434C000
stack
page read and write
24FA6590000
heap
page read and write
BE1A5FB000
stack
page read and write
24FA6593000
heap
page read and write
24FA6590000
heap
page read and write
1F7B21D5000
heap
page read and write
E03F38C000
stack
page read and write
24FA6590000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65A9000
heap
page read and write
24FA6596000
heap
page read and write
1C235720000
heap
page read and write
1F7B21CC000
heap
page read and write
7FF71DDB6000
unkown
page execute and write copy
1F7B179E000
heap
page read and write
13C405A0000
heap
page read and write
24FA659E000
heap
page read and write
24FA6F0F000
heap
page read and write
F49497E000
stack
page read and write
24FA6581000
heap
page read and write
24FA6F01000
heap
page read and write
24FA6571000
heap
page read and write
24FA65B6000
heap
page read and write
24FA65B8000
heap
page read and write
24FA6590000
heap
page read and write
24FA6596000
heap
page read and write
24FA65AC000
heap
page read and write
E914B7F000
stack
page read and write
24FA6590000
heap
page read and write
24FA6578000
heap
page read and write
7FF76E1D3000
unkown
page read and write
24FA655F000
heap
page read and write
24FA6590000
heap
page read and write
24FA6F07000
heap
page read and write
24FA6583000
heap
page read and write
A735BFE000
stack
page read and write
24FA6F0F000
heap
page read and write
E084EFE000
stack
page read and write
1341BC60000
heap
page read and write
24FA6F0F000
heap
page read and write
D776FC000
stack
page read and write
4C6BFB000
stack
page read and write
24FA6575000
heap
page read and write
24FA65AD000
heap
page read and write
BE1A1FF000
stack
page read and write
7FF7AA972000
unkown
page execute and read and write
1F7B17E4000
heap
page read and write
24FA6F0F000
heap
page read and write
136848A0000
heap
page read and write
24FA6F07000
heap
page read and write
26AC1980000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6556000
heap
page read and write
24FA6F0F000
heap
page read and write
27B0C7D7000
heap
page read and write
27620900000
heap
page read and write
24FA6583000
heap
page read and write
E76207E000
stack
page read and write
1F7B16C0000
heap
page read and write
24FA6F0F000
heap
page read and write
E761E7C000
stack
page read and write
24FA6F0F000
heap
page read and write
252992E0000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6583000
heap
page read and write
2EEC9FE000
stack
page read and write
1F7B21F4000
heap
page read and write
24FA6F1E000
heap
page read and write
7FF71DD80000
unkown
page readonly
24FA6590000
heap
page read and write
24FA657F000
heap
page read and write
24FA6590000
heap
page read and write
27C0D958000
heap
page read and write
24FA65AC000
heap
page read and write
24FA65B8000
heap
page read and write
1F7B17A9000
heap
page read and write
24FA656E000
heap
page read and write
24FA6578000
heap
page read and write
23CFC7E000
unkown
page readonly
24FA6F1F000
heap
page read and write
21112B60000
heap
page read and write
1F7B21D5000
heap
page read and write
24FA6F04000
heap
page read and write
1F7B17AC000
heap
page read and write
7FF76E1C9000
unkown
page execute and read and write
7FF6C78A3000
unkown
page execute and read and write
24FA6F36000
heap
page read and write
24FA6592000
heap
page read and write
24FA6590000
heap
page read and write
27620A3D000
heap
page read and write
18F5D0F0000
heap
page read and write
2BA9BB30000
heap
page read and write
1F7B17E2000
heap
page read and write
24FA65B6000
heap
page read and write
138FC814000
heap
page read and write
7FF71DDD3000
unkown
page execute and read and write
24FA6F09000
heap
page read and write
24FA6586000
heap
page read and write
1F7B17E4000
heap
page read and write
1F7B21DA000
heap
page read and write
24FA6594000
heap
page read and write
1341BD48000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6F0D000
heap
page read and write
6B2367F000
stack
page read and write
24FA6592000
heap
page read and write
138FC9D0000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6F0F000
heap
page read and write
7FF7AA974000
unkown
page read and write
7FF71DD80000
unkown
page readonly
24FA65B6000
heap
page read and write
24FA65B6000
heap
page read and write
138FC81E000
heap
page read and write
24FA6F1E000
heap
page read and write
24FA657B000
heap
page read and write
24FA65B6000
heap
page read and write
1F7B21D5000
heap
page read and write
24FA6599000
heap
page read and write
24FA6595000
heap
page read and write
24FA651B000
heap
page read and write
24FA6575000
heap
page read and write
7FF71DDDD000
unkown
page read and write
24FA6570000
heap
page read and write
24FA6F08000
heap
page read and write
24FA6578000
heap
page read and write
24FA6F0D000
heap
page read and write
24FA6590000
heap
page read and write
24FA656D000
heap
page read and write
24FA65A3000
heap
page read and write
7FF7AA951000
unkown
page execute and read and write
21112990000
heap
page read and write
24FA6F1E000
heap
page read and write
24FA656D000
heap
page read and write
24FA654F000
heap
page read and write
36102FF000
stack
page read and write
7FF6C7850000
unkown
page readonly
24FA6F14000
heap
page read and write
24FA6F3C000
heap
page read and write
16799DB0000
heap
page read and write
24FA6F12000
heap
page read and write
7FF7AA966000
unkown
page execute and write copy
24FA6599000
heap
page read and write
24FA6F13000
heap
page read and write
24FA65B3000
heap
page read and write
24FA6F08000
heap
page read and write
27620A69000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA656D000
heap
page read and write
24FA65A8000
heap
page read and write
24FA656D000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6590000
heap
page read and write
24FA65A8000
heap
page read and write
24FA656D000
heap
page read and write
24FA65AA000
heap
page read and write
27620A66000
heap
page read and write
24FA656F000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA6F14000
heap
page read and write
7FF71DDD3000
unkown
page execute and read and write
7FF76E1D3000
unkown
page read and write
24FA65B8000
heap
page read and write
24FA656D000
heap
page read and write
24FA659A000
heap
page read and write
1B300250000
heap
page read and write
138FC7D0000
heap
page read and write
24FA6551000
heap
page read and write
24FA656D000
heap
page read and write
24FA6585000
heap
page read and write
7FF76E1D1000
unkown
page execute and read and write
1F7B17E2000
heap
page read and write
24FA65B6000
heap
page read and write
1F7B21CC000
heap
page read and write
24FA6595000
heap
page read and write
24FA651D000
heap
page read and write
24FA65A8000
heap
page read and write
24FA6F36000
heap
page read and write
7FF71DD80000
unkown
page readonly
24FA65A7000
heap
page read and write
24FA6F1E000
heap
page read and write
24FA6574000
heap
page read and write
24FA6590000
heap
page read and write
1679A175000
heap
page read and write
7FF7AA96C000
unkown
page execute and read and write
24FA6571000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6590000
heap
page read and write
24FA6592000
heap
page read and write
95612FF000
stack
page read and write
24FA65B6000
heap
page read and write
24FA6F1A000
heap
page read and write
24FA656E000
heap
page read and write
1C233C60000
heap
page read and write
24FA6599000
heap
page read and write
24FA6F12000
heap
page read and write
2D7AF7C0000
heap
page read and write
24FA65B8000
heap
page read and write
276227B8000
heap
page read and write
95615FE000
stack
page read and write
24FA65B8000
heap
page read and write
23CFD7E000
stack
page read and write
6B2347D000
stack
page read and write
1F7B21DA000
heap
page read and write
24FA659F000
heap
page read and write
13684980000
heap
page read and write
24FA65AC000
heap
page read and write
7FF76E1C9000
unkown
page execute and read and write
24FA6F0F000
heap
page read and write
CEFE28D000
stack
page read and write
23D017C000
stack
page read and write
24B891F0000
heap
page read and write
24FA64C8000
heap
page read and write
28116F40000
heap
page read and write
1F7B17E4000
heap
page read and write
18A55270000
heap
page read and write
2BA9BC30000
heap
page read and write
24FA6599000
heap
page read and write
1F7B21F4000
heap
page read and write
24D175B5000
heap
page read and write
1F7B17E2000
heap
page read and write
24FA6F0F000
heap
page read and write
3C2FEFE000
stack
page read and write
24FA65AE000
heap
page read and write
24FA6590000
heap
page read and write
24FA65A1000
heap
page read and write
1F7B17E2000
heap
page read and write
7FF7AA950000
unkown
page readonly
24FA6583000
heap
page read and write
24FA65A2000
heap
page read and write
7FF71DDDB000
unkown
page execute and read and write
24FA656E000
heap
page read and write
24FA65B6000
heap
page read and write
24FA659E000
heap
page read and write
1F1A690B000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6F0C000
heap
page read and write
24FA654C000
heap
page read and write
24FA654F000
heap
page read and write
24FA65A8000
heap
page read and write
7FF71DD80000
unkown
page readonly
16799DD0000
heap
page read and write
24FA6F06000
heap
page read and write
24FA6F07000
heap
page read and write
24FA65A1000
heap
page read and write
18F5CDC8000
heap
page read and write
2006EC38000
heap
page read and write
9560FAC000
stack
page read and write
18A55402000
heap
page read and write
25299368000
heap
page read and write
24FA65B6000
heap
page read and write
4C67FA000
stack
page read and write
24FA657D000
heap
page read and write
24FA651B000
heap
page read and write
24FA6F36000
heap
page read and write
24FA6583000
heap
page read and write
24FA6577000
heap
page read and write
24FA6590000
heap
page read and write
1608F7C000
stack
page read and write
28117150000
heap
page read and write
7FF71DD80000
unkown
page readonly
24FA6590000
heap
page read and write
24FA6578000
heap
page read and write
24FA6560000
heap
page read and write
7FF7AA966000
unkown
page execute and write copy
24FA6590000
heap
page read and write
24FA65A2000
heap
page read and write
24FA6F0F000
heap
page read and write
1F7B17E2000
heap
page read and write
24FA65A9000
heap
page read and write
24FA6571000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA65A7000
heap
page read and write
24FA656D000
heap
page read and write
24FA6F01000
heap
page read and write
24FA6599000
heap
page read and write
24FA6575000
heap
page read and write
24FA6F0F000
heap
page read and write
24FA6579000
heap
page read and write
7FF71DDDD000
unkown
page write copy
24FA6F1E000
heap
page read and write
24FA65A8000
heap
page read and write
2466384C000
heap
page read and write
24FA65B6000
heap
page read and write
24FA6F04000
heap
page read and write
19637DC000
stack
page read and write
2486E150000
heap
page read and write
BE19EF6000
stack
page read and write
24FA65A0000
heap
page read and write
24FA65A5000
heap
page read and write
1F7B17E4000
heap
page read and write
24FA6F10000
heap
page read and write
24FA6590000
heap
page read and write
18F5CD70000
heap
page read and write
24FA656E000
heap
page read and write
160937F000
stack
page read and write
37798FF000
stack
page read and write
24FA651B000
heap
page read and write
7FF7AA974000
unkown
page write copy
24FA65B8000
heap
page read and write
CEFE38F000
stack
page read and write
24FA6583000
heap
page read and write
4C62FC000
stack
page read and write
24FA656D000
heap
page read and write
D7C70FF000
stack
page read and write
24FA65AD000
heap
page read and write
7FF71DDDB000
unkown
page execute and read and write
2006EB80000
heap
page read and write
24FA65A3000
heap
page read and write
24FA6F36000
heap
page read and write
1F7B17E4000
heap
page read and write
27620AE5000
heap
page read and write
7FF6C7850000
unkown
page readonly
24FA6570000
heap
page read and write
24FA656D000
heap
page read and write
24FA65A3000
heap
page read and write
24FA6573000
heap
page read and write
E03F6FF000
stack
page read and write
24FA656D000
heap
page read and write
24FA6F36000
heap
page read and write
24FA6590000
heap
page read and write
24FA6573000
heap
page read and write
24FA65B8000
heap
page read and write
20B80E28000
heap
page read and write
24FA6F1E000
heap
page read and write
4C69FF000
stack
page read and write
27B0C970000
heap
page read and write
24FA6F0F000
heap
page read and write
1C233C70000
heap
page read and write
24FA6F1F000
heap
page read and write
24FA6590000
heap
page read and write
7FF6C7851000
unkown
page execute and read and write
24FA6583000
heap
page read and write
24FA6583000
heap
page read and write
2777D390000
heap
page read and write
24FA6F07000
heap
page read and write
7FF7AA974000
unkown
page write copy
360FEAC000
stack
page read and write
7FF71DDDD000
unkown
page read and write
1B3004C5000
heap
page read and write
18F5D0F5000
heap
page read and write
24FA6590000
heap
page read and write
24FA655D000
heap
page read and write
276227A0000
heap
page read and write
24FA6450000
heap
page read and write
24FA6F0B000
heap
page read and write
7FF71DDD3000
unkown
page execute and read and write
24FA6F08000
heap
page read and write
24FA6F0F000
heap
page read and write
There are 1459 hidden memdumps, click here to show them.