Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.Win64.Spy.1125.10281.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\MicrosoftWindowsDefenderCoreService[1].exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\AnyDeskShellIntegration[1].dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\AnyDeskCrashHandler[1].exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AnyDeskShellIntegration.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AnyDeskShellIntegration_Update.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\AnyDeskShellIntegration[1].dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\AnyDeskUpdateService[1].exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\WindowsUpdate.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\version[1].txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\oobe\version.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Spy.1125.10281.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Spy.1125.10281.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
|
||
C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe
|
"C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe" install
|
||
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
|
"C:\Windows\System32\oobe\AnyDeskCrashHandler.exe" --pid 6636
|
||
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
|
"C:\Windows\System32\oobe\AnyDeskCrashHandler.exe" --pid 2404
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\System32\cmd.exe /c sc start AnyDeskUpdateService
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\System32\cmd.exe /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\System32\cmd.exe /c sc start AnyDeskUpdateService
|
||
C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe
|
"C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\System32\cmd.exe /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
|
"C:\Windows\System32\oobe\AnyDeskCrashHandler.exe" --pid 2128
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
|
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
|
||
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
|
"C:\Windows\System32\oobe\AnyDeskUpdateService.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
|
||
C:\Windows\System32\oobe\AnyDeskCrashHandler.exe
|
"C:\Windows\System32\oobe\AnyDeskCrashHandler.exe" --pid 6552
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
|
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
|
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
|
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
|
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\oobe\AnyDeskUpdateService.exe
|
C:\Windows\System32\oobe\AnyDeskUpdateService.exe install
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start AnyDeskUpdateService
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\oobe\version.txt"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /f /im MsMpEng.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start AnyDeskUpdateService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\sc.exe
|
sc start AnyDeskUpdateService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start AnyDeskUpdateService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start AnyDeskUpdateService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start AnyDeskUpdateService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start AnyDeskUpdateService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start AnyDeskUpdateService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start AnyDeskUpdateService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc start MicrosoftWindowsDefenderCoreService
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 182 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exehttps://duy-thanh.github.io/file/AnyDeskUpda
|
unknown
|
||
https://duy-thanh.github.io/file/version.txtD
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllges
|
unknown
|
||
https://duy-thanh.github.io/file/MicrosoftWindowsDefenderCoreService.exep
|
unknown
|
||
https://duy-thanh.github.io/=R
|
unknown
|
||
https://duy-thanh.github.io/1
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exen
|
unknown
|
||
https://duy-thanh.github.io/file/MicrosoftWindowsDefenderCoreService.exev
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exedll
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskUpdateService.exe3l
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exe
|
185.199.110.153
|
||
https://duy-thanh.github.io/file/AnyDeskUpdateService.exeC:
|
unknown
|
||
https://duy-thanh.github.io/file/version.txtb.io/file/AnyDeskCrashHandler.exe
|
unknown
|
||
https://duy-thanh.github.io/file/version.txtX
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exetup%l
|
unknown
|
||
https://duy-thanh.github.io/file/version.txt9c4a2f8b514.cdf-msMo
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exetupz
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllz
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskUpdateService.exe
|
185.199.110.153
|
||
https://duy-thanh.github.io/file/version.txtC:
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dll(l
|
unknown
|
||
https://duy-thanh.github.io/file/version.txtb.io/file/version.txteService.exe3l
|
unknown
|
||
https://duy-thanh.github.io/file/version.txte1
|
unknown
|
||
https://duy-thanh.github.io/file/version.txt.dll
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllao
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskS
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskUpdateService.exedf-msMo
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dll
|
185.199.110.153
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.execdf-ms
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskUpdateService.exeml
|
unknown
|
||
https://duy-thanh.github.io/file/version.txt%l
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dll8l
|
unknown
|
||
https://duy-thanh.github.io/file/version.txt8Y
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskUpdateService.exeup
|
unknown
|
||
https://duy-thanh.github.io/file/version.txtb.io/file/version.txt3l
|
unknown
|
||
https://duy-thanh.github.io/file/version.txt
|
185.199.110.153
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllhttps://duy-thanh.github.io/file/AnyDesk
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllRo-
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exey
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegration.dllmsml
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegratP
|
unknown
|
||
https://duy-thanh.github.io/file/version.txtt
|
unknown
|
||
https://duy-thanh.github.io/
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exez
|
unknown
|
||
https://duy-thanh.github.io/file/MicrosoftWindowsDefenderCoreService.exe
|
185.199.110.153
|
||
https://duy-thanh.github.io/file/AnyDeskShellIntegratL
|
unknown
|
||
https://duy-thanh.github.io/file/version.txtr
|
unknown
|
||
https://duy-thanh.github.io/file/AnyDeskCrashHandler.exetup
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
duy-thanh.github.io
|
185.199.110.153
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.199.110.153
|
duy-thanh.github.io
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
24FA65A7000
|
heap
|
page read and write
|
||
24FA65A6000
|
heap
|
page read and write
|
||
1F7B17F0000
|
heap
|
page read and write
|
||
211128B0000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA65AD000
|
heap
|
page read and write
|
||
1F7B1789000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
E084FFB000
|
stack
|
page read and write
|
||
1FB90CD0000
|
heap
|
page read and write
|
||
24D171B0000
|
heap
|
page read and write
|
||
1F7B17AD000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6571000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
24FA65A5000
|
heap
|
page read and write
|
||
13C404D0000
|
heap
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
1F7B178A000
|
heap
|
page read and write
|
||
1F7B1781000
|
heap
|
page read and write
|
||
7FF71DDDC000
|
unkown
|
page execute and write copy
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA6599000
|
heap
|
page read and write
|
||
2777D3A0000
|
heap
|
page read and write
|
||
7FF71DDDC000
|
unkown
|
page execute and write copy
|
||
24FA6595000
|
heap
|
page read and write
|
||
1FB90C70000
|
heap
|
page read and write
|
||
24FA6584000
|
heap
|
page read and write
|
||
24FA6F1A000
|
heap
|
page read and write
|
||
24FA6570000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
28116FD0000
|
heap
|
page read and write
|
||
18A55458000
|
heap
|
page read and write
|
||
24FA6566000
|
heap
|
page read and write
|
||
24FA6577000
|
heap
|
page read and write
|
||
1679A170000
|
heap
|
page read and write
|
||
246638CB000
|
heap
|
page read and write
|
||
24FA65B5000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
24FA6594000
|
heap
|
page read and write
|
||
13C40820000
|
heap
|
page read and write
|
||
211127A8000
|
heap
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
27C0D8E0000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
D42F07E000
|
stack
|
page read and write
|
||
24FA6574000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
2486E160000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1F7B21A0000
|
remote allocation
|
page read and write
|
||
24FA6563000
|
heap
|
page read and write
|
||
24FA65AD000
|
heap
|
page read and write
|
||
28116FF8000
|
heap
|
page read and write
|
||
24FA65A6000
|
heap
|
page read and write
|
||
27620A68000
|
heap
|
page read and write
|
||
1341BD40000
|
heap
|
page read and write
|
||
2777D405000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6599000
|
heap
|
page read and write
|
||
16799E2D000
|
heap
|
page read and write
|
||
24FA65B5000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA657C000
|
heap
|
page read and write
|
||
1E826AD8000
|
heap
|
page read and write
|
||
1F7B17AC000
|
heap
|
page read and write
|
||
24FA659A000
|
heap
|
page read and write
|
||
24FA6559000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B21DA000
|
heap
|
page read and write
|
||
20B80D90000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA65AD000
|
heap
|
page read and write
|
||
2466387E000
|
heap
|
page read and write
|
||
BE1A8FC000
|
stack
|
page read and write
|
||
24FA657A000
|
heap
|
page read and write
|
||
24FA6556000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
7FF76E1D2000
|
unkown
|
page execute and write copy
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
7FF76E1D3000
|
unkown
|
page write copy
|
||
24FA6574000
|
heap
|
page read and write
|
||
7FF76E181000
|
unkown
|
page execute and read and write
|
||
1F7B16F0000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA6572000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA6571000
|
heap
|
page read and write
|
||
B9544FF000
|
stack
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
7FF76E1D2000
|
unkown
|
page execute and write copy
|
||
24FA6590000
|
heap
|
page read and write
|
||
261CBB85000
|
heap
|
page read and write
|
||
24FA657B000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1FB90B70000
|
heap
|
page read and write
|
||
1E826D70000
|
heap
|
page read and write
|
||
261CBA30000
|
heap
|
page read and write
|
||
A7357CD000
|
stack
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6576000
|
heap
|
page read and write
|
||
24FA6597000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
1888FFE000
|
stack
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
7FF7AA966000
|
unkown
|
page execute and write copy
|
||
24D171F0000
|
heap
|
page read and write
|
||
95619FF000
|
stack
|
page read and write
|
||
23CFE7E000
|
unkown
|
page readonly
|
||
BE1A4FE000
|
stack
|
page read and write
|
||
24FA65A9000
|
heap
|
page read and write
|
||
24FA6585000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
7FF7AA950000
|
unkown
|
page readonly
|
||
7FF76E1B0000
|
unkown
|
page execute and write copy
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
7FF71DDDC000
|
unkown
|
page execute and write copy
|
||
24FA6593000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6F11000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
24FA6587000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
246637C5000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA654D000
|
heap
|
page read and write
|
||
13684A88000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
25299360000
|
heap
|
page read and write
|
||
1F7B21D7000
|
heap
|
page read and write
|
||
24FA64FA000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA65AF000
|
heap
|
page read and write
|
||
18F5CD50000
|
heap
|
page read and write
|
||
24FA659A000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
E03F7FF000
|
stack
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
2EEC8FE000
|
stack
|
page read and write
|
||
2BA9BD10000
|
heap
|
page read and write
|
||
89AD87E000
|
stack
|
page read and write
|
||
246637C0000
|
heap
|
page read and write
|
||
2486E1A8000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
7FF71DD81000
|
unkown
|
page execute and read and write
|
||
13684A80000
|
heap
|
page read and write
|
||
7FF6C78AC000
|
unkown
|
page execute and write copy
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F11000
|
heap
|
page read and write
|
||
7FF71DD81000
|
unkown
|
page execute and read and write
|
||
4C68FE000
|
stack
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
27620A69000
|
heap
|
page read and write
|
||
1C233CCB000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
2486E180000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65A2000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA6593000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6570000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F10000
|
heap
|
page read and write
|
||
1F7B21A0000
|
remote allocation
|
page read and write
|
||
13685040000
|
heap
|
page read and write
|
||
24FA6F15000
|
heap
|
page read and write
|
||
7FF71DDD3000
|
unkown
|
page execute and read and write
|
||
E761F7E000
|
stack
|
page read and write
|
||
7FF7AA950000
|
unkown
|
page readonly
|
||
3C2FFFE000
|
stack
|
page read and write
|
||
1F1A68F0000
|
heap
|
page read and write
|
||
1F7B21F4000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
246636C0000
|
heap
|
page read and write
|
||
2777D640000
|
heap
|
page read and write
|
||
24FA6F1A000
|
heap
|
page read and write
|
||
24FA657D000
|
heap
|
page read and write
|
||
24FA65A2000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24B89190000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
95617FE000
|
stack
|
page read and write
|
||
276227BE000
|
heap
|
page read and write
|
||
18F5CDC0000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
28117218000
|
heap
|
page read and write
|
||
24D171D0000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
24FA6570000
|
heap
|
page read and write
|
||
2D7AFA60000
|
heap
|
page read and write
|
||
18A55413000
|
heap
|
page read and write
|
||
1B300230000
|
heap
|
page read and write
|
||
24FA6579000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
18A55C02000
|
trusted library allocation
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
24FA65A6000
|
heap
|
page read and write
|
||
28116F70000
|
heap
|
page read and write
|
||
24FA65B7000
|
heap
|
page read and write
|
||
24FA65A0000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6F0B000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA6470000
|
heap
|
page read and write
|
||
18A55432000
|
heap
|
page read and write
|
||
7FF6C78AD000
|
unkown
|
page write copy
|
||
1F7B21FE000
|
heap
|
page read and write
|
||
BF99BFF000
|
stack
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
7FF76E1D1000
|
unkown
|
page execute and read and write
|
||
2856E770000
|
heap
|
page read and write
|
||
24FA651B000
|
heap
|
page read and write
|
||
7FF7AA950000
|
unkown
|
page readonly
|
||
24FA65A5000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6566000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
173E6E9D000
|
heap
|
page read and write
|
||
7FF71DDD3000
|
unkown
|
page execute and read and write
|
||
24FA651B000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
EC124EC000
|
stack
|
page read and write
|
||
2856E690000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F15000
|
heap
|
page read and write
|
||
BE1AAFE000
|
stack
|
page read and write
|
||
1E826BE0000
|
heap
|
page read and write
|
||
24FA6595000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA657B000
|
heap
|
page read and write
|
||
37796FC000
|
stack
|
page read and write
|
||
24FA6576000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA65A5000
|
heap
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
24FA6587000
|
heap
|
page read and write
|
||
D42ED3C000
|
stack
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
24FA6593000
|
heap
|
page read and write
|
||
2BA9BD40000
|
heap
|
page read and write
|
||
24FA657F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1E112180000
|
heap
|
page read and write
|
||
7FF71DDDC000
|
unkown
|
page execute and write copy
|
||
7FF71DDDB000
|
unkown
|
page execute and read and write
|
||
24FA6593000
|
heap
|
page read and write
|
||
2BA9BD45000
|
heap
|
page read and write
|
||
24FA6F01000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
24FA6598000
|
heap
|
page read and write
|
||
7FF71DDDC000
|
unkown
|
page execute and write copy
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65AC000
|
heap
|
page read and write
|
||
27B0C7C9000
|
heap
|
page read and write
|
||
252991E0000
|
heap
|
page read and write
|
||
7FF76E180000
|
unkown
|
page readonly
|
||
2856EA30000
|
heap
|
page read and write
|
||
281171D5000
|
heap
|
page read and write
|
||
1F7B15E0000
|
heap
|
page read and write
|
||
24FA659C000
|
heap
|
page read and write
|
||
276209D5000
|
heap
|
page read and write
|
||
24FA6579000
|
heap
|
page read and write
|
||
1FB963D0000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
13C40825000
|
heap
|
page read and write
|
||
7FF7AA951000
|
unkown
|
page execute and read and write
|
||
28117170000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
24FA6F0C000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA654C000
|
heap
|
page read and write
|
||
24FA6593000
|
heap
|
page read and write
|
||
7FF76E1B0000
|
unkown
|
page execute and write copy
|
||
24FA6574000
|
heap
|
page read and write
|
||
24FA6F15000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA65A9000
|
heap
|
page read and write
|
||
BE1A3FE000
|
stack
|
page read and write
|
||
2856E850000
|
heap
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6F13000
|
heap
|
page read and write
|
||
1F7B17AD000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
1E112380000
|
heap
|
page read and write
|
||
24FA6595000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6573000
|
heap
|
page read and write
|
||
24FA6566000
|
heap
|
page read and write
|
||
24FA6F01000
|
heap
|
page read and write
|
||
24FA6582000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6765000
|
heap
|
page read and write
|
||
24FA6577000
|
heap
|
page read and write
|
||
16799E20000
|
heap
|
page read and write
|
||
F49487E000
|
stack
|
page read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
7FF71DDDB000
|
unkown
|
page execute and read and write
|
||
7FF71DDDD000
|
unkown
|
page write copy
|
||
24FA65A1000
|
heap
|
page read and write
|
||
24FA657F000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
7FF7AA96C000
|
unkown
|
page execute and read and write
|
||
24FA65A7000
|
heap
|
page read and write
|
||
69FA7D000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
4C65FE000
|
stack
|
page read and write
|
||
27622600000
|
remote allocation
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
BF99AFC000
|
stack
|
page read and write
|
||
24FA656F000
|
heap
|
page read and write
|
||
16799E2F000
|
heap
|
page read and write
|
||
E084BFE000
|
stack
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
1F7B21CD000
|
heap
|
page read and write
|
||
B58C7E000
|
stack
|
page read and write
|
||
24D171F8000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
7FF71DDB6000
|
unkown
|
page execute and write copy
|
||
7FF71DDB6000
|
unkown
|
page execute and write copy
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6584000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
2762097C000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65AF000
|
heap
|
page read and write
|
||
24FA654B000
|
heap
|
page read and write
|
||
24FA6579000
|
heap
|
page read and write
|
||
24FA659A000
|
heap
|
page read and write
|
||
24FA6576000
|
heap
|
page read and write
|
||
18A55290000
|
heap
|
page read and write
|
||
24FA6F19000
|
heap
|
page read and write
|
||
24FA6581000
|
heap
|
page read and write
|
||
65DF51D000
|
stack
|
page read and write
|
||
24FA6F01000
|
heap
|
page read and write
|
||
7FF7AA972000
|
unkown
|
page execute and read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
7FF7AA951000
|
unkown
|
page execute and read and write
|
||
276227C4000
|
heap
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
24FA6F01000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA659D000
|
heap
|
page read and write
|
||
9561AFB000
|
stack
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
21112B65000
|
heap
|
page read and write
|
||
24FA6551000
|
heap
|
page read and write
|
||
24FA6F11000
|
heap
|
page read and write
|
||
1B300290000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA657C000
|
heap
|
page read and write
|
||
1341BCA0000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
BE1A7FE000
|
stack
|
page read and write
|
||
24FA655E000
|
heap
|
page read and write
|
||
18A55400000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
246637D0000
|
heap
|
page read and write
|
||
2486E1A0000
|
heap
|
page read and write
|
||
E084DFE000
|
stack
|
page read and write
|
||
24FA6F05000
|
heap
|
page read and write
|
||
24FA65AE000
|
heap
|
page read and write
|
||
24FA6F0A000
|
heap
|
page read and write
|
||
1E826CE0000
|
heap
|
page read and write
|
||
1F7B17AD000
|
heap
|
page read and write
|
||
24FA65AB000
|
heap
|
page read and write
|
||
7FF71DD81000
|
unkown
|
page execute and read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
7FF71DDB6000
|
unkown
|
page execute and write copy
|
||
6B2357E000
|
stack
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
1B3004C0000
|
heap
|
page read and write
|
||
7FF71DDDC000
|
unkown
|
page execute and write copy
|
||
261CBA10000
|
heap
|
page read and write
|
||
24FA6576000
|
heap
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
24FA6F0D000
|
heap
|
page read and write
|
||
27B0C700000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
20B80D70000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
24FA6577000
|
heap
|
page read and write
|
||
24FA6571000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA657B000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
24FA6573000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page read and write
|
||
276208E0000
|
heap
|
page read and write
|
||
24FA6F1A000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6585000
|
heap
|
page read and write
|
||
24FA6F0C000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
1341BCA5000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
173E6E80000
|
heap
|
page read and write
|
||
24FA6598000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA6595000
|
heap
|
page read and write
|
||
24FA6F12000
|
heap
|
page read and write
|
||
24FA6582000
|
heap
|
page read and write
|
||
1F7B17DA000
|
heap
|
page read and write
|
||
1F7B16F7000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page read and write
|
||
F4948FE000
|
unkown
|
page readonly
|
||
9561CFD000
|
stack
|
page read and write
|
||
7FF71DDB6000
|
unkown
|
page execute and write copy
|
||
E914A7D000
|
stack
|
page read and write
|
||
24FA6F15000
|
heap
|
page read and write
|
||
BE1A0FE000
|
stack
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
B58A7D000
|
stack
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
7FF76E180000
|
unkown
|
page readonly
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA657E000
|
heap
|
page read and write
|
||
13684A8D000
|
heap
|
page read and write
|
||
23CF59C000
|
stack
|
page read and write
|
||
24FA6581000
|
heap
|
page read and write
|
||
24D175B0000
|
heap
|
page read and write
|
||
24FA654B000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
7FF7AA96C000
|
unkown
|
page execute and read and write
|
||
1E112390000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
2BA9BD50000
|
heap
|
page read and write
|
||
24FA6551000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6575000
|
heap
|
page read and write
|
||
24FA659C000
|
heap
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
7FF6C7886000
|
unkown
|
page execute and write copy
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA65AC000
|
heap
|
page read and write
|
||
7FF7AA950000
|
unkown
|
page readonly
|
||
24FA6576000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page write copy
|
||
24FA6551000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24B89160000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
24FA657E000
|
heap
|
page read and write
|
||
24665500000
|
heap
|
page read and write
|
||
24FA6550000
|
heap
|
page read and write
|
||
27C0D900000
|
heap
|
page read and write
|
||
37797FE000
|
stack
|
page read and write
|
||
24FA6575000
|
heap
|
page read and write
|
||
24FA6594000
|
heap
|
page read and write
|
||
24FA65A6000
|
heap
|
page read and write
|
||
2D7AF7C9000
|
heap
|
page read and write
|
||
2486E3E0000
|
heap
|
page read and write
|
||
1F7B21DB000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
2D76B7E000
|
stack
|
page read and write
|
||
E914C7F000
|
stack
|
page read and write
|
||
7FF71DD81000
|
unkown
|
page execute and read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
27B0C7CF000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1F1A68F8000
|
heap
|
page read and write
|
||
24FA6F15000
|
heap
|
page read and write
|
||
24FA6575000
|
heap
|
page read and write
|
||
24FA6599000
|
heap
|
page read and write
|
||
24FA6F07000
|
heap
|
page read and write
|
||
24663840000
|
heap
|
page read and write
|
||
27B0C600000
|
heap
|
page read and write
|
||
1F7B21FE000
|
heap
|
page read and write
|
||
24FA6577000
|
heap
|
page read and write
|
||
7FF71DDD3000
|
unkown
|
page execute and read and write
|
||
7FF7AA972000
|
unkown
|
page execute and read and write
|
||
24FA6563000
|
heap
|
page read and write
|
||
4C6DF9000
|
stack
|
page read and write
|
||
24FA6594000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
7FF7AA96C000
|
unkown
|
page execute and read and write
|
||
24FA6F11000
|
heap
|
page read and write
|
||
24FA6572000
|
heap
|
page read and write
|
||
1F7B21D3000
|
heap
|
page read and write
|
||
24FA6587000
|
heap
|
page read and write
|
||
24FA6F0C000
|
heap
|
page read and write
|
||
24B8AB30000
|
heap
|
page read and write
|
||
24FA655C000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65AF000
|
heap
|
page read and write
|
||
261CBB80000
|
heap
|
page read and write
|
||
24FA6F01000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B2201000
|
heap
|
page read and write
|
||
1F1A6860000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
7FF71DDDB000
|
unkown
|
page execute and read and write
|
||
89AD77E000
|
stack
|
page read and write
|
||
27620976000
|
heap
|
page read and write
|
||
24FA6593000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA659B000
|
heap
|
page read and write
|
||
65DF87E000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
138FC7E0000
|
heap
|
page read and write
|
||
24FA6F13000
|
heap
|
page read and write
|
||
24FA6559000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA657C000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
1FB90C50000
|
heap
|
page read and write
|
||
24FA6594000
|
heap
|
page read and write
|
||
B58B7F000
|
stack
|
page read and write
|
||
2D7AF740000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
D7AF9FF000
|
stack
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
2D76A7F000
|
stack
|
page read and write
|
||
BF99CFE000
|
stack
|
page read and write
|
||
D42F17E000
|
stack
|
page read and write
|
||
E084CFE000
|
stack
|
page read and write
|
||
26AC188D000
|
heap
|
page read and write
|
||
1F7B21FE000
|
heap
|
page read and write
|
||
20B810E0000
|
heap
|
page read and write
|
||
24FA657E000
|
heap
|
page read and write
|
||
1963AFE000
|
stack
|
page read and write
|
||
24FA6571000
|
heap
|
page read and write
|
||
B298BEC000
|
stack
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
2777D3F0000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
BE1A2FE000
|
stack
|
page read and write
|
||
24FA6580000
|
heap
|
page read and write
|
||
24FA6F0C000
|
heap
|
page read and write
|
||
173E6D20000
|
heap
|
page read and write
|
||
27620AE0000
|
heap
|
page read and write
|
||
24FA6586000
|
heap
|
page read and write
|
||
4C6CFF000
|
stack
|
page read and write
|
||
24FA65AC000
|
heap
|
page read and write
|
||
7FF71DDD3000
|
unkown
|
page execute and read and write
|
||
69FC7F000
|
stack
|
page read and write
|
||
B70F2FF000
|
stack
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
2006EB70000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65A7000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
7FF7AA974000
|
unkown
|
page read and write
|
||
26AC1880000
|
heap
|
page read and write
|
||
1FB90CF0000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
24FA6370000
|
heap
|
page read and write
|
||
28116FFF000
|
heap
|
page read and write
|
||
1FB90CD5000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA65B3000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
B70F0FC000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
1F7B21B0000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
7FF7AA973000
|
unkown
|
page execute and write copy
|
||
24FA659A000
|
heap
|
page read and write
|
||
24FA6593000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
1F1A6840000
|
heap
|
page read and write
|
||
24FA659A000
|
heap
|
page read and write
|
||
24FA6F15000
|
heap
|
page read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
69FB7E000
|
stack
|
page read and write
|
||
2BA9BB38000
|
heap
|
page read and write
|
||
1F7B17AD000
|
heap
|
page read and write
|
||
24FA651B000
|
heap
|
page read and write
|
||
1FB90CF8000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
93F6EFF000
|
stack
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6594000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
1F7B21D7000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page read and write
|
||
7FF7AA974000
|
unkown
|
page read and write
|
||
27C0DB90000
|
heap
|
page read and write
|
||
13C403D0000
|
heap
|
page read and write
|
||
25299330000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
1F7B21DA000
|
heap
|
page read and write
|
||
24FA655F000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA655B000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
18A5542B000
|
heap
|
page read and write
|
||
138FCAE0000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
2006EF05000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
1888EFC000
|
stack
|
page read and write
|
||
7FF71DDDB000
|
unkown
|
page execute and read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA657B000
|
heap
|
page read and write
|
||
24FA6586000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
2D7AF770000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
23CFB7D000
|
stack
|
page read and write
|
||
7FF7AA951000
|
unkown
|
page execute and read and write
|
||
25299335000
|
heap
|
page read and write
|
||
24FA6594000
|
heap
|
page read and write
|
||
3C2FF7E000
|
unkown
|
page readonly
|
||
7FF7AA973000
|
unkown
|
page execute and write copy
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B21D7000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
23D027E000
|
unkown
|
page readonly
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA65AE000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
BE19FFE000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65A7000
|
heap
|
page read and write
|
||
24FA6F12000
|
heap
|
page read and write
|
||
24D171A0000
|
heap
|
page read and write
|
||
24FA6584000
|
heap
|
page read and write
|
||
24FA6F11000
|
heap
|
page read and write
|
||
24FA65A6000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
211127A0000
|
heap
|
page read and write
|
||
27B0C6E0000
|
heap
|
page read and write
|
||
1F7B17B0000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
360FFAE000
|
stack
|
page read and write
|
||
1F7B1727000
|
heap
|
page read and write
|
||
24FA65AB000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
173E6E87000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
1F7B17B0000
|
heap
|
page read and write
|
||
261CB840000
|
heap
|
page read and write
|
||
24FA6F15000
|
heap
|
page read and write
|
||
24FA6F0C000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
20B810E5000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA65AB000
|
heap
|
page read and write
|
||
24FA6598000
|
heap
|
page read and write
|
||
7FF6C78AD000
|
unkown
|
page read and write
|
||
24FA659C000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
211129B0000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
7FF71DDB6000
|
unkown
|
page execute and write copy
|
||
281171D0000
|
heap
|
page read and write
|
||
24FA6593000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
1C233CC9000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6599000
|
heap
|
page read and write
|
||
24D17201000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65AC000
|
heap
|
page read and write
|
||
27620A66000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
93F6DFE000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
1F7B17A9000
|
heap
|
page read and write
|
||
18A55370000
|
heap
|
page read and write
|
||
24FA6576000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA657B000
|
heap
|
page read and write
|
||
24FA6F05000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
7FF71DDB6000
|
unkown
|
page execute and write copy
|
||
27C0D950000
|
heap
|
page read and write
|
||
2777D3C0000
|
heap
|
page read and write
|
||
1F7B17AD000
|
heap
|
page read and write
|
||
24FA6F12000
|
heap
|
page read and write
|
||
26AC1790000
|
heap
|
page read and write
|
||
EC125EE000
|
stack
|
page read and write
|
||
27B0C7B0000
|
heap
|
page read and write
|
||
24FA657B000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1F7B21D7000
|
heap
|
page read and write
|
||
28117210000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
26AC1888000
|
heap
|
page read and write
|
||
27C0D8D0000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1963BFE000
|
stack
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6599000
|
heap
|
page read and write
|
||
16799DA0000
|
heap
|
page read and write
|
||
1F7B1789000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6F0C000
|
heap
|
page read and write
|
||
E0846FC000
|
stack
|
page read and write
|
||
24FA655F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
1341BC40000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
26AC1E00000
|
heap
|
page read and write
|
||
7FF7AA973000
|
unkown
|
page execute and write copy
|
||
24FA6577000
|
heap
|
page read and write
|
||
16799E27000
|
heap
|
page read and write
|
||
24FA6559000
|
heap
|
page read and write
|
||
7FF6C78AB000
|
unkown
|
page execute and read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
1F1A6C50000
|
heap
|
page read and write
|
||
173E7160000
|
heap
|
page read and write
|
||
24B891F8000
|
heap
|
page read and write
|
||
173E6E00000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
7FF7AA950000
|
unkown
|
page readonly
|
||
24FA6F10000
|
heap
|
page read and write
|
||
26AC1E50000
|
heap
|
page read and write
|
||
7FF7AA974000
|
unkown
|
page read and write
|
||
24FA6575000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
D7AF8FE000
|
stack
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
18A55502000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA657A000
|
heap
|
page read and write
|
||
27814AD000
|
stack
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6586000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
27C0DB95000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
1F7B17B0000
|
heap
|
page read and write
|
||
1FB96790000
|
heap
|
page read and write
|
||
27622600000
|
remote allocation
|
page read and write
|
||
1E826CC0000
|
heap
|
page read and write
|
||
1F7B16E0000
|
heap
|
page read and write
|
||
1F1A6830000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6582000
|
heap
|
page read and write
|
||
1E112160000
|
heap
|
page read and write
|
||
24FA656F000
|
heap
|
page read and write
|
||
1E112350000
|
heap
|
page read and write
|
||
24FA64C0000
|
heap
|
page read and write
|
||
1B300298000
|
heap
|
page read and write
|
||
24FA6F0A000
|
heap
|
page read and write
|
||
24FA654F000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
24FA6F09000
|
heap
|
page read and write
|
||
24FA6579000
|
heap
|
page read and write
|
||
1FB963D8000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
82467F000
|
stack
|
page read and write
|
||
24FA65AD000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA6573000
|
heap
|
page read and write
|
||
138FC807000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
89AD67C000
|
stack
|
page read and write
|
||
24FA6563000
|
heap
|
page read and write
|
||
3C2FBBD000
|
stack
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6598000
|
heap
|
page read and write
|
||
246637A0000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
2D7676C000
|
stack
|
page read and write
|
||
1F7B17AC000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
28116F50000
|
heap
|
page read and write
|
||
24FA6596000
|
heap
|
page read and write
|
||
7FF71DDDC000
|
unkown
|
page execute and write copy
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6574000
|
heap
|
page read and write
|
||
2D7AFA65000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
2006EBA0000
|
heap
|
page read and write
|
||
7FF71DDDB000
|
unkown
|
page execute and read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
27620A07000
|
heap
|
page read and write
|
||
24FA6575000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
7FF7AA972000
|
unkown
|
page execute and read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
65DF97E000
|
stack
|
page read and write
|
||
24FA6573000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
2006EF00000
|
heap
|
page read and write
|
||
1F7B17AD000
|
heap
|
page read and write
|
||
24FA65AE000
|
heap
|
page read and write
|
||
24FA65AC000
|
heap
|
page read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA659F000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
B70F1FF000
|
stack
|
page read and write
|
||
18A553A0000
|
trusted library allocation
|
page read and write
|
||
7FF76E181000
|
unkown
|
page execute and read and write
|
||
24FA6F12000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
2856EA35000
|
heap
|
page read and write
|
||
276209F6000
|
heap
|
page read and write
|
||
24FA6570000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1E112385000
|
heap
|
page read and write
|
||
27622600000
|
remote allocation
|
page read and write
|
||
24B89080000
|
heap
|
page read and write
|
||
2006EC30000
|
heap
|
page read and write
|
||
173E6E20000
|
heap
|
page read and write
|
||
1F7B21DA000
|
heap
|
page read and write
|
||
24FA6576000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
27620A3D000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page write copy
|
||
D7AF57C000
|
stack
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA657C000
|
heap
|
page read and write
|
||
28116FD5000
|
heap
|
page read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
E084AFE000
|
stack
|
page read and write
|
||
1341BB60000
|
heap
|
page read and write
|
||
1FB965B0000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1F7B179E000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
CEFE6FF000
|
stack
|
page read and write
|
||
27620970000
|
heap
|
page read and write
|
||
24FA655C000
|
heap
|
page read and write
|
||
7FF71DD81000
|
unkown
|
page execute and read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
7FF76E180000
|
unkown
|
page readonly
|
||
7FF76E1D3000
|
unkown
|
page write copy
|
||
24FA65A8000
|
heap
|
page read and write
|
||
BE1A6FE000
|
stack
|
page read and write
|
||
1E112188000
|
heap
|
page read and write
|
||
1C233CA0000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
1F7B21FE000
|
heap
|
page read and write
|
||
24FA65A6000
|
heap
|
page read and write
|
||
24FA6760000
|
heap
|
page read and write
|
||
82477E000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
2856E790000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
1F7B17DA000
|
heap
|
page read and write
|
||
2D76BFE000
|
unkown
|
page readonly
|
||
24FA65B0000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6F13000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
7FF76E180000
|
unkown
|
page readonly
|
||
2856E858000
|
heap
|
page read and write
|
||
24FA6F09000
|
heap
|
page read and write
|
||
27620800000
|
heap
|
page read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA659F000
|
heap
|
page read and write
|
||
276226C0000
|
heap
|
page read and write
|
||
261CB820000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6595000
|
heap
|
page read and write
|
||
1F7B1789000
|
heap
|
page read and write
|
||
1FB964D0000
|
heap
|
page read and write
|
||
1F7B179E000
|
heap
|
page read and write
|
||
2EEC5FC000
|
stack
|
page read and write
|
||
24FA6594000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
1FB96795000
|
heap
|
page read and write
|
||
7FF7AA974000
|
unkown
|
page write copy
|
||
F49455D000
|
stack
|
page read and write
|
||
13684F10000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA655B000
|
heap
|
page read and write
|
||
E0848FE000
|
stack
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
1F7B21D7000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA6554000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page write copy
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6582000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65A7000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA659C000
|
heap
|
page read and write
|
||
1E826D75000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA659C000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6574000
|
heap
|
page read and write
|
||
4C6AFF000
|
stack
|
page read and write
|
||
7FF7AA950000
|
unkown
|
page readonly
|
||
24FA65A5000
|
heap
|
page read and write
|
||
27620A06000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
A735AFE000
|
stack
|
page read and write
|
||
D7C71FE000
|
stack
|
page read and write
|
||
24FA6582000
|
heap
|
page read and write
|
||
1B300150000
|
heap
|
page read and write
|
||
7FF7AA966000
|
unkown
|
page execute and write copy
|
||
261CB848000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page read and write
|
||
24FA6598000
|
heap
|
page read and write
|
||
B95418C000
|
stack
|
page read and write
|
||
1E826AD0000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA6559000
|
heap
|
page read and write
|
||
24FA6F1A000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B17AD000
|
heap
|
page read and write
|
||
24FA6574000
|
heap
|
page read and write
|
||
24FA6587000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
138FC800000
|
heap
|
page read and write
|
||
20B80D60000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
7FF7AA974000
|
unkown
|
page write copy
|
||
24FA656D000
|
heap
|
page read and write
|
||
252992C0000
|
heap
|
page read and write
|
||
18A55443000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA659F000
|
heap
|
page read and write
|
||
28116FF0000
|
heap
|
page read and write
|
||
24FA6F0D000
|
heap
|
page read and write
|
||
20B80E20000
|
heap
|
page read and write
|
||
1F7B17AC000
|
heap
|
page read and write
|
||
24FA6557000
|
heap
|
page read and write
|
||
7FF71DD81000
|
unkown
|
page execute and read and write
|
||
24FA6F0C000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
E0847FE000
|
stack
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page write copy
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
2D7AF750000
|
heap
|
page read and write
|
||
1C233CC0000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
95616FE000
|
stack
|
page read and write
|
||
EC128FF000
|
stack
|
page read and write
|
||
24FA657A000
|
heap
|
page read and write
|
||
27B0C7BC000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
13C404B0000
|
heap
|
page read and write
|
||
24FA6582000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
18890FE000
|
stack
|
page read and write
|
||
2777D3F7000
|
heap
|
page read and write
|
||
24FA6F16000
|
heap
|
page read and write
|
||
24FA6561000
|
heap
|
page read and write
|
||
18F5CD40000
|
heap
|
page read and write
|
||
24FA6576000
|
heap
|
page read and write
|
||
24FA6553000
|
heap
|
page read and write
|
||
1F7B179E000
|
heap
|
page read and write
|
||
4C66FD000
|
stack
|
page read and write
|
||
1F7B16E5000
|
heap
|
page read and write
|
||
24FA65A6000
|
heap
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
24FA654D000
|
heap
|
page read and write
|
||
7FF7AA973000
|
unkown
|
page execute and write copy
|
||
160927E000
|
stack
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
D7C6DAC000
|
stack
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
24FA6F00000
|
heap
|
page read and write
|
||
93F6CFC000
|
stack
|
page read and write
|
||
24FA6F0A000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
1F7B21A0000
|
remote allocation
|
page read and write
|
||
24FA659E000
|
heap
|
page read and write
|
||
28117070000
|
heap
|
page read and write
|
||
13C405A8000
|
heap
|
page read and write
|
||
B9545FF000
|
stack
|
page read and write
|
||
BE1A9FB000
|
stack
|
page read and write
|
||
7FF7AA950000
|
unkown
|
page readonly
|
||
24FA6586000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1FB965D0000
|
heap
|
page read and write
|
||
24FA6582000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA657B000
|
heap
|
page read and write
|
||
7FF71DD81000
|
unkown
|
page execute and read and write
|
||
7FF71DDDD000
|
unkown
|
page write copy
|
||
82434C000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
BE1A5FB000
|
stack
|
page read and write
|
||
24FA6593000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
E03F38C000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65A9000
|
heap
|
page read and write
|
||
24FA6596000
|
heap
|
page read and write
|
||
1C235720000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
7FF71DDB6000
|
unkown
|
page execute and write copy
|
||
1F7B179E000
|
heap
|
page read and write
|
||
13C405A0000
|
heap
|
page read and write
|
||
24FA659E000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
F49497E000
|
stack
|
page read and write
|
||
24FA6581000
|
heap
|
page read and write
|
||
24FA6F01000
|
heap
|
page read and write
|
||
24FA6571000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6596000
|
heap
|
page read and write
|
||
24FA65AC000
|
heap
|
page read and write
|
||
E914B7F000
|
stack
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
7FF76E1D3000
|
unkown
|
page read and write
|
||
24FA655F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6F07000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
A735BFE000
|
stack
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
E084EFE000
|
stack
|
page read and write
|
||
1341BC60000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
D776FC000
|
stack
|
page read and write
|
||
4C6BFB000
|
stack
|
page read and write
|
||
24FA6575000
|
heap
|
page read and write
|
||
24FA65AD000
|
heap
|
page read and write
|
||
BE1A1FF000
|
stack
|
page read and write
|
||
7FF7AA972000
|
unkown
|
page execute and read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
136848A0000
|
heap
|
page read and write
|
||
24FA6F07000
|
heap
|
page read and write
|
||
26AC1980000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6556000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
27B0C7D7000
|
heap
|
page read and write
|
||
27620900000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
E76207E000
|
stack
|
page read and write
|
||
1F7B16C0000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
E761E7C000
|
stack
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
252992E0000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
2EEC9FE000
|
stack
|
page read and write
|
||
1F7B21F4000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA657F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
27C0D958000
|
heap
|
page read and write
|
||
24FA65AC000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
1F7B17A9000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
23CFC7E000
|
unkown
|
page readonly
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
21112B60000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
24FA6F04000
|
heap
|
page read and write
|
||
1F7B17AC000
|
heap
|
page read and write
|
||
7FF76E1C9000
|
unkown
|
page execute and read and write
|
||
7FF6C78A3000
|
unkown
|
page execute and read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
27620A3D000
|
heap
|
page read and write
|
||
18F5D0F0000
|
heap
|
page read and write
|
||
2BA9BB30000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
138FC814000
|
heap
|
page read and write
|
||
7FF71DDD3000
|
unkown
|
page execute and read and write
|
||
24FA6F09000
|
heap
|
page read and write
|
||
24FA6586000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
1F7B21DA000
|
heap
|
page read and write
|
||
24FA6594000
|
heap
|
page read and write
|
||
1341BD48000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6F0D000
|
heap
|
page read and write
|
||
6B2367F000
|
stack
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
138FC9D0000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
7FF7AA974000
|
unkown
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
138FC81E000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
24FA657B000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
1F7B21D5000
|
heap
|
page read and write
|
||
24FA6599000
|
heap
|
page read and write
|
||
24FA6595000
|
heap
|
page read and write
|
||
24FA651B000
|
heap
|
page read and write
|
||
24FA6575000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page read and write
|
||
24FA6570000
|
heap
|
page read and write
|
||
24FA6F08000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
24FA6F0D000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
7FF7AA951000
|
unkown
|
page execute and read and write
|
||
21112990000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA654F000
|
heap
|
page read and write
|
||
36102FF000
|
stack
|
page read and write
|
||
7FF6C7850000
|
unkown
|
page readonly
|
||
24FA6F14000
|
heap
|
page read and write
|
||
24FA6F3C000
|
heap
|
page read and write
|
||
16799DB0000
|
heap
|
page read and write
|
||
24FA6F12000
|
heap
|
page read and write
|
||
7FF7AA966000
|
unkown
|
page execute and write copy
|
||
24FA6599000
|
heap
|
page read and write
|
||
24FA6F13000
|
heap
|
page read and write
|
||
24FA65B3000
|
heap
|
page read and write
|
||
24FA6F08000
|
heap
|
page read and write
|
||
27620A69000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65AA000
|
heap
|
page read and write
|
||
27620A66000
|
heap
|
page read and write
|
||
24FA656F000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6F14000
|
heap
|
page read and write
|
||
7FF71DDD3000
|
unkown
|
page execute and read and write
|
||
7FF76E1D3000
|
unkown
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA659A000
|
heap
|
page read and write
|
||
1B300250000
|
heap
|
page read and write
|
||
138FC7D0000
|
heap
|
page read and write
|
||
24FA6551000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6585000
|
heap
|
page read and write
|
||
7FF76E1D1000
|
unkown
|
page execute and read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
1F7B21CC000
|
heap
|
page read and write
|
||
24FA6595000
|
heap
|
page read and write
|
||
24FA651D000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA65A7000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
24FA6574000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1679A175000
|
heap
|
page read and write
|
||
7FF7AA96C000
|
unkown
|
page execute and read and write
|
||
24FA6571000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6592000
|
heap
|
page read and write
|
||
95612FF000
|
stack
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F1A000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
1C233C60000
|
heap
|
page read and write
|
||
24FA6599000
|
heap
|
page read and write
|
||
24FA6F12000
|
heap
|
page read and write
|
||
2D7AF7C0000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
276227B8000
|
heap
|
page read and write
|
||
95615FE000
|
stack
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
23CFD7E000
|
stack
|
page read and write
|
||
6B2347D000
|
stack
|
page read and write
|
||
1F7B21DA000
|
heap
|
page read and write
|
||
24FA659F000
|
heap
|
page read and write
|
||
13684980000
|
heap
|
page read and write
|
||
24FA65AC000
|
heap
|
page read and write
|
||
7FF76E1C9000
|
unkown
|
page execute and read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
CEFE28D000
|
stack
|
page read and write
|
||
23D017C000
|
stack
|
page read and write
|
||
24B891F0000
|
heap
|
page read and write
|
||
24FA64C8000
|
heap
|
page read and write
|
||
28116F40000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
18A55270000
|
heap
|
page read and write
|
||
2BA9BC30000
|
heap
|
page read and write
|
||
24FA6599000
|
heap
|
page read and write
|
||
1F7B21F4000
|
heap
|
page read and write
|
||
24D175B5000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
3C2FEFE000
|
stack
|
page read and write
|
||
24FA65AE000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
7FF7AA950000
|
unkown
|
page readonly
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA65A2000
|
heap
|
page read and write
|
||
7FF71DDDB000
|
unkown
|
page execute and read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA659E000
|
heap
|
page read and write
|
||
1F1A690B000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6F0C000
|
heap
|
page read and write
|
||
24FA654C000
|
heap
|
page read and write
|
||
24FA654F000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
16799DD0000
|
heap
|
page read and write
|
||
24FA6F06000
|
heap
|
page read and write
|
||
24FA6F07000
|
heap
|
page read and write
|
||
24FA65A1000
|
heap
|
page read and write
|
||
18F5CDC8000
|
heap
|
page read and write
|
||
2006EC38000
|
heap
|
page read and write
|
||
9560FAC000
|
stack
|
page read and write
|
||
18A55402000
|
heap
|
page read and write
|
||
25299368000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
4C67FA000
|
stack
|
page read and write
|
||
24FA657D000
|
heap
|
page read and write
|
||
24FA651B000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA6577000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
1608F7C000
|
stack
|
page read and write
|
||
28117150000
|
heap
|
page read and write
|
||
7FF71DD80000
|
unkown
|
page readonly
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6578000
|
heap
|
page read and write
|
||
24FA6560000
|
heap
|
page read and write
|
||
7FF7AA966000
|
unkown
|
page execute and write copy
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA65A2000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1F7B17E2000
|
heap
|
page read and write
|
||
24FA65A9000
|
heap
|
page read and write
|
||
24FA6571000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA65A7000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6F01000
|
heap
|
page read and write
|
||
24FA6599000
|
heap
|
page read and write
|
||
24FA6575000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
24FA6579000
|
heap
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page write copy
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
24FA65A8000
|
heap
|
page read and write
|
||
2466384C000
|
heap
|
page read and write
|
||
24FA65B6000
|
heap
|
page read and write
|
||
24FA6F04000
|
heap
|
page read and write
|
||
19637DC000
|
stack
|
page read and write
|
||
2486E150000
|
heap
|
page read and write
|
||
BE19EF6000
|
stack
|
page read and write
|
||
24FA65A0000
|
heap
|
page read and write
|
||
24FA65A5000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
24FA6F10000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
18F5CD70000
|
heap
|
page read and write
|
||
24FA656E000
|
heap
|
page read and write
|
||
160937F000
|
stack
|
page read and write
|
||
37798FF000
|
stack
|
page read and write
|
||
24FA651B000
|
heap
|
page read and write
|
||
7FF7AA974000
|
unkown
|
page write copy
|
||
24FA65B8000
|
heap
|
page read and write
|
||
CEFE38F000
|
stack
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
4C62FC000
|
stack
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
D7C70FF000
|
stack
|
page read and write
|
||
24FA65AD000
|
heap
|
page read and write
|
||
7FF71DDDB000
|
unkown
|
page execute and read and write
|
||
2006EB80000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
1F7B17E4000
|
heap
|
page read and write
|
||
27620AE5000
|
heap
|
page read and write
|
||
7FF6C7850000
|
unkown
|
page readonly
|
||
24FA6570000
|
heap
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA65A3000
|
heap
|
page read and write
|
||
24FA6573000
|
heap
|
page read and write
|
||
E03F6FF000
|
stack
|
page read and write
|
||
24FA656D000
|
heap
|
page read and write
|
||
24FA6F36000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA6573000
|
heap
|
page read and write
|
||
24FA65B8000
|
heap
|
page read and write
|
||
20B80E28000
|
heap
|
page read and write
|
||
24FA6F1E000
|
heap
|
page read and write
|
||
4C69FF000
|
stack
|
page read and write
|
||
27B0C970000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
||
1C233C70000
|
heap
|
page read and write
|
||
24FA6F1F000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
7FF6C7851000
|
unkown
|
page execute and read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
24FA6583000
|
heap
|
page read and write
|
||
2777D390000
|
heap
|
page read and write
|
||
24FA6F07000
|
heap
|
page read and write
|
||
7FF7AA974000
|
unkown
|
page write copy
|
||
360FEAC000
|
stack
|
page read and write
|
||
7FF71DDDD000
|
unkown
|
page read and write
|
||
1B3004C5000
|
heap
|
page read and write
|
||
18F5D0F5000
|
heap
|
page read and write
|
||
24FA6590000
|
heap
|
page read and write
|
||
24FA655D000
|
heap
|
page read and write
|
||
276227A0000
|
heap
|
page read and write
|
||
24FA6450000
|
heap
|
page read and write
|
||
24FA6F0B000
|
heap
|
page read and write
|
||
7FF71DDD3000
|
unkown
|
page execute and read and write
|
||
24FA6F08000
|
heap
|
page read and write
|
||
24FA6F0F000
|
heap
|
page read and write
|
There are 1459 hidden memdumps, click here to show them.