Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\OojqjHGE0W.exe
|
"C:\Users\user\Desktop\OojqjHGE0W.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://mem.gfx.ms/meversion/?partner=msn&market=de-ch"
|
unknown
|
||
https://www.msn.com/de-ch/news/other/weniger-verbindungen-zwischen-z%c3%bcrich-und-bern-daf%c3%bcr-m
|
unknown
|
||
https://www.msn.com/de-ch/news/other/fremdes-b%c3%bcsi-gef%c3%bcttert-frau-soll-1250-franken-strafe-
|
unknown
|
||
https://outlook.com/
|
unknown
|
||
https://www.msn.com/de-ch/shopping
|
unknown
|
||
http://www.msn.com/de-ch/
|
13.107.40.203
|
||
http://ogp.me/ns#
|
unknown
|
||
https://i.geistm.com/l/HFCH_DTS_LP?bcid=61c4707a19d27603f32a58ba&bhid=6203eb0e7db0ad17f44b22d8&a
|
unknown
|
||
https://browser.events.data.msn.com/OneCollector/1.0/t.js?qsp=true&anoncknm=%22%22&name=%22M
|
unknown
|
||
https://cdn.hoergeraete.hoeren-heute.ch/horizon_reveal/?act=ACT0000040013ACT&utm_source=mcrs&
|
unknown
|
||
https://www.msn.com/de-ch/sport/other/der-fcz-verabschiedet-sich-von-doumbia-und-ceesay/ar-AAXsezM?o
|
unknown
|
||
https://www.msn.com/de-ch/news/other/stadtrat-handelt-in-z%c3%bcrich-west-mehr-preisg%c3%bcnstige-wo
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://www.msn.com/de-ch/news/other/autofahrer-38-rast-mit-94-km-h-durch-30er-zone/ar-AAXsnwd?ocid=
|
unknown
|
||
http://ogp.me/ns/fb#
|
unknown
|
||
https://www.msn.com/de-ch/news/other/olivia-und-noah-sind-die-beliebtesten-baby-vornamen-in-z%c3%bcr
|
unknown
|
||
https://www.msn.com/de-ch/news/other/z%c3%bcrcher-kantonsrat-pr%c3%bcft-nach-igelkot-vorfall-sicherh
|
unknown
|
||
http://www.msn.com/de-ch
|
unknown
|
||
https://i.geistm.com/l/HFCH_DTS_LP?bcid=61c4707a19d27603f32a58b8&bhid=62470ee6adad76040858398f&a
|
unknown
|
||
http://www.msn.com/
|
13.107.40.203
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
a-0003.fbs2-a-msedge.net
|
13.107.40.203
|
||
anm.msn.com
|
unknown
|
||
www.msn.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.107.40.203
|
a-0003.fbs2-a-msedge.net
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
20C8000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
1B69000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
20C8000
|
heap
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
5109EFE000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
20F9E013000
|
heap
|
page read and write
|
||
1140000
|
remote allocation
|
page read and write
|
||
1A97AC40000
|
heap
|
page read and write
|
||
1F061103000
|
heap
|
page read and write
|
||
36630FC000
|
stack
|
page read and write
|
||
712D97F000
|
stack
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
1F0610DE000
|
heap
|
page read and write
|
||
1F05BA58000
|
heap
|
page read and write
|
||
1F05C313000
|
heap
|
page read and write
|
||
B1F927F000
|
stack
|
page read and write
|
||
712DE7F000
|
stack
|
page read and write
|
||
712E07E000
|
stack
|
page read and write
|
||
1F061270000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2310DD00000
|
heap
|
page read and write
|
||
370000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1349000
|
unclassified section
|
page readonly
|
||
1F05CD90000
|
trusted library allocation
|
page read and write
|
||
63BEFFE000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
AFA2F7B000
|
stack
|
page read and write
|
||
1A97AD00000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
2310D4BB000
|
heap
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
712DB7E000
|
stack
|
page read and write
|
||
1F060DB0000
|
trusted library allocation
|
page read and write
|
||
19F55A6B000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
4300000
|
trusted library allocation
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
712D87B000
|
stack
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2310D502000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
B1F90FE000
|
stack
|
page read and write
|
||
1F05BA91000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
712DD7F000
|
stack
|
page read and write
|
||
1140000
|
remote allocation
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
229DDC70000
|
heap
|
page read and write
|
||
1F05B9F0000
|
trusted library section
|
page read and write
|
||
229DDE40000
|
heap
|
page read and write
|
||
19F55A5F000
|
heap
|
page read and write
|
||
1F061100000
|
heap
|
page read and write
|
||
11FD000
|
stack
|
page read and write
|
||
229DDC80000
|
heap
|
page read and write
|
||
510A3FE000
|
stack
|
page read and write
|
||
19F55A7D000
|
heap
|
page read and write
|
||
2310D4CC000
|
heap
|
page read and write
|
||
19F55A3E000
|
heap
|
page read and write
|
||
20F9E075000
|
heap
|
page read and write
|
||
370000
|
trusted library allocation
|
page read and write
|
||
1F05BAB5000
|
heap
|
page read and write
|
||
E83D000
|
stack
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
712E17F000
|
stack
|
page read and write
|
||
1F05BB13000
|
heap
|
page read and write
|
||
229DDE5C000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
AFA2AFE000
|
stack
|
page read and write
|
||
1C7E000
|
stack
|
page read and write
|
||
2310D513000
|
heap
|
page read and write
|
||
AFA2BFF000
|
stack
|
page read and write
|
||
20F9DF00000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F060F70000
|
trusted library allocation
|
page read and write
|
||
1F060F4E000
|
trusted library allocation
|
page read and write
|
||
1F05B870000
|
heap
|
page read and write
|
||
19F55A69000
|
heap
|
page read and write
|
||
19F55A00000
|
heap
|
page read and write
|
||
1A97AC64000
|
heap
|
page read and write
|
||
AFA257F000
|
stack
|
page read and write
|
||
229DE470000
|
remote allocation
|
page read and write
|
||
2310D413000
|
heap
|
page read and write
|
||
1F060F40000
|
trusted library allocation
|
page read and write
|
||
1F05BAAC000
|
heap
|
page read and write
|
||
19F55A4F000
|
heap
|
page read and write
|
||
1F05CA20000
|
trusted library section
|
page readonly
|
||
19F55A62000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
E97F000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
36631FE000
|
stack
|
page read and write
|
||
3662AFF000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
19F55A46000
|
heap
|
page read and write
|
||
1F05CA00000
|
trusted library section
|
page readonly
|
||
A21000
|
heap
|
page read and write
|
||
AFA327F000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F061250000
|
trusted library allocation
|
page read and write
|
||
712DF7F000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
229DE470000
|
remote allocation
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
1A97AC02000
|
heap
|
page read and write
|
||
1210000
|
direct allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
20F9E000000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
7A4000
|
heap
|
page read and write
|
||
19F55A7C000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2310DC02000
|
heap
|
page read and write
|
||
1F05C318000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
AFA2DFF000
|
stack
|
page read and write
|
||
19F55A42000
|
heap
|
page read and write
|
||
1210000
|
direct allocation
|
page read and write
|
||
1A97AC13000
|
heap
|
page read and write
|
||
6FA000
|
stack
|
page read and write
|
||
2310D2E0000
|
heap
|
page read and write
|
||
AFA297E000
|
stack
|
page read and write
|
||
AFA2D7F000
|
stack
|
page read and write
|
||
19F55A5A000
|
heap
|
page read and write
|
||
370000
|
trusted library allocation
|
page read and write
|
||
30A000
|
stack
|
page read and write
|
||
1F0610B6000
|
heap
|
page read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
1A97AC7C000
|
heap
|
page read and write
|
||
2580000
|
trusted library allocation
|
page execute and read and write
|
||
1F05BA8B000
|
heap
|
page read and write
|
||
229DDE02000
|
heap
|
page read and write
|
||
1340000
|
unclassified section
|
page read and write
|
||
B48000
|
unkown
|
page execute and read and write
|
||
19F55B02000
|
heap
|
page read and write
|
||
C33000
|
unkown
|
page read and write
|
||
3662FFF000
|
stack
|
page read and write
|
||
B1F91FD000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F061210000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
20F9DF70000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1A97ABF0000
|
trusted library allocation
|
page read and write
|
||
360000
|
trusted library allocation
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
6E7000
|
stack
|
page read and write
|
||
19F559B0000
|
heap
|
page read and write
|
||
B1F8FFF000
|
stack
|
page read and write
|
||
878000
|
heap
|
page read and write
|
||
19F55A64000
|
heap
|
page read and write
|
||
1F060F48000
|
trusted library allocation
|
page read and write
|
||
366251B000
|
stack
|
page read and write
|
||
3662BFF000
|
stack
|
page read and write
|
||
1210000
|
direct allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F05C318000
|
heap
|
page read and write
|
||
1A97AD13000
|
heap
|
page read and write
|
||
1F05B8E0000
|
heap
|
page read and write
|
||
19F55A3C000
|
heap
|
page read and write
|
||
1F061049000
|
heap
|
page read and write
|
||
5109F7E000
|
stack
|
page read and write
|
||
1F05C9D0000
|
trusted library section
|
page readonly
|
||
A21000
|
heap
|
page read and write
|
||
1F05C9E0000
|
trusted library section
|
page readonly
|
||
A21000
|
heap
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
2310D3E0000
|
trusted library allocation
|
page read and write
|
||
19F55A6D000
|
heap
|
page read and write
|
||
1F05C300000
|
heap
|
page read and write
|
||
5109E7C000
|
stack
|
page read and write
|
||
2310D487000
|
heap
|
page read and write
|
||
1F061090000
|
trusted library allocation
|
page read and write
|
||
1F05BA74000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F05C359000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1A97B202000
|
trusted library allocation
|
page read and write
|
||
1F05C9F0000
|
trusted library section
|
page readonly
|
||
A21000
|
heap
|
page read and write
|
||
1F061088000
|
heap
|
page read and write
|
||
103D000
|
stack
|
page read and write
|
||
20F9E068000
|
heap
|
page read and write
|
||
19F55A29000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
AFA277A000
|
stack
|
page read and write
|
||
19F55A45000
|
heap
|
page read and write
|
||
20F9E102000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
AFA2B7E000
|
stack
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
404000
|
remote allocation
|
page execute and read and write
|
||
3662EFC000
|
stack
|
page read and write
|
||
19F55A26000
|
heap
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
17DD000
|
stack
|
page read and write
|
||
133C000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F0610F9000
|
heap
|
page read and write
|
||
1F05C215000
|
heap
|
page read and write
|
||
1A97AD02000
|
heap
|
page read and write
|
||
19F55A6F000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
4396000
|
trusted library allocation
|
page read and write
|
||
AFA2677000
|
stack
|
page read and write
|
||
1F05BA9C000
|
heap
|
page read and write
|
||
1F06102B000
|
heap
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
1F0610B5000
|
heap
|
page read and write
|
||
EA24000
|
heap
|
page read and write
|
||
404000
|
remote allocation
|
page execute and read and write
|
||
740000
|
trusted library allocation
|
page read and write
|
||
1BE8000
|
heap
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
1F05BA54000
|
heap
|
page read and write
|
||
1F061061000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
1F060F84000
|
trusted library allocation
|
page read and write
|
||
1F05BA00000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
3662D7C000
|
stack
|
page read and write
|
||
C36000
|
unkown
|
page readonly
|
||
7A4000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F05B880000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1C90000
|
heap
|
page read and write
|
||
1F05BA9E000
|
heap
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
A21000
|
heap
|
page read and write
|
||
19F55A76000
|
heap
|
page read and write
|
||
510A1FE000
|
stack
|
page read and write
|
||
2586000
|
trusted library allocation
|
page execute and read and write
|
||
A21000
|
heap
|
page read and write
|
||
3DBD000
|
stack
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
2310D280000
|
heap
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
366297C000
|
stack
|
page read and write
|
||
1A97AA20000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
E87E000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F05C302000
|
heap
|
page read and write
|
||
19F55A59000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
229DDF02000
|
heap
|
page read and write
|
||
1F0610DE000
|
heap
|
page read and write
|
||
AFA2CFD000
|
stack
|
page read and write
|
||
1A97AC28000
|
heap
|
page read and write
|
||
113C000
|
stack
|
page read and write
|
||
1140000
|
remote allocation
|
page read and write
|
||
2584000
|
trusted library allocation
|
page execute and read and write
|
||
1358000
|
heap
|
page read and write
|
||
1A97AC00000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
229DE470000
|
remote allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1C3D000
|
stack
|
page read and write
|
||
19F55A47000
|
heap
|
page read and write
|
||
1F060F60000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
AFA307A000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1A97A9B0000
|
heap
|
page read and write
|
||
19F55A65000
|
heap
|
page read and write
|
||
19F55A5E000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
AFA287A000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
134C000
|
unclassified section
|
page readonly
|
||
1F06103C000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
20F9E802000
|
trusted library allocation
|
page read and write
|
||
63BEDFB000
|
stack
|
page read and write
|
||
1F05B9E0000
|
trusted library allocation
|
page read and write
|
||
63BE89B000
|
stack
|
page read and write
|
||
712DC7D000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F05BA3F000
|
heap
|
page read and write
|
||
406000
|
remote allocation
|
page execute and read and write
|
||
E7FF000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
19F55950000
|
heap
|
page read and write
|
||
2310DD32000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
4301000
|
trusted library allocation
|
page read and write
|
||
E47F000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
229DDE29000
|
heap
|
page read and write
|
||
229DDE00000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F05BB02000
|
heap
|
page read and write
|
||
E57E000
|
stack
|
page read and write
|
||
19F55A5B000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
2310D400000
|
heap
|
page read and write
|
||
1210000
|
direct allocation
|
page read and write
|
||
1A97A9C0000
|
heap
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
1F05BA77000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
1F0610F5000
|
heap
|
page read and write
|
||
1F0612A0000
|
remote allocation
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F060F64000
|
trusted library allocation
|
page read and write
|
||
FF3F000
|
stack
|
page read and write
|
||
1F0610A9000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
2744000
|
trusted library allocation
|
page read and write
|
||
20F9E113000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1CA0000
|
heap
|
page read and write
|
||
1F061280000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F05CD71000
|
trusted library allocation
|
page read and write
|
||
2884000
|
trusted library allocation
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
2310D4C3000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1140000
|
remote allocation
|
page read and write
|
||
229DE602000
|
trusted library allocation
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F05C202000
|
heap
|
page read and write
|
||
B1F8AFB000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
19F55A7F000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2A0000
|
heap
|
page read and write
|
||
1F0610A0000
|
trusted library allocation
|
page read and write
|
||
1F05BA29000
|
heap
|
page read and write
|
||
AFA2A7B000
|
stack
|
page read and write
|
||
1F05BAFD000
|
heap
|
page read and write
|
||
19F56202000
|
trusted library allocation
|
page read and write
|
||
229DDDE0000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
1CD0000
|
heap
|
page read and write
|
||
19F55A41000
|
heap
|
page read and write
|
||
E5BE000
|
stack
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
20F9DFA0000
|
trusted library allocation
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
20F9E05A000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F05C8F0000
|
trusted library allocation
|
page read and write
|
||
1F05CA10000
|
trusted library section
|
page readonly
|
||
1F0610A6000
|
heap
|
page read and write
|
||
1140000
|
remote allocation
|
page read and write
|
||
1F05C359000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
B1F937D000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
370000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
1F060F61000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
B1F947D000
|
stack
|
page read and write
|
||
510A0FF000
|
stack
|
page read and write
|
||
1210000
|
direct allocation
|
page read and write
|
||
2310D429000
|
heap
|
page read and write
|
||
19F55A77000
|
heap
|
page read and write
|
||
AFA247B000
|
stack
|
page read and write
|
||
2310D470000
|
heap
|
page read and write
|
||
134A000
|
unclassified section
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
19F55A66000
|
heap
|
page read and write
|
||
229DDE13000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
FF40000
|
trusted library allocation
|
page execute and read and write
|
||
1F05CDA0000
|
trusted library allocation
|
page read and write
|
||
1F06101D000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
20F9E029000
|
heap
|
page read and write
|
||
406000
|
remote allocation
|
page execute and read and write
|
||
19F55A5D000
|
heap
|
page read and write
|
||
1F060F40000
|
trusted library allocation
|
page read and write
|
||
C32000
|
unkown
|
page execute read
|
||
7A4000
|
heap
|
page read and write
|
||
1A97AC77000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
19F55A13000
|
heap
|
page read and write
|
||
EA20000
|
heap
|
page read and write
|
||
1F060E20000
|
trusted library allocation
|
page read and write
|
||
2049000
|
heap
|
page read and write
|
||
19F559E0000
|
trusted library allocation
|
page read and write
|
||
19F55A48000
|
heap
|
page read and write
|
||
1F060DA0000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
1F061000000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
E6BF000
|
stack
|
page read and write
|
||
2310D4E1000
|
heap
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
1220000
|
heap
|
page read and write
|
||
510A2FE000
|
stack
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
4010000
|
heap
|
page read and write
|
||
19F55A58000
|
heap
|
page read and write
|
||
1F061260000
|
trusted library allocation
|
page read and write
|
||
229DDCE0000
|
heap
|
page read and write
|
||
19F55A61000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
B1F8F7E000
|
stack
|
page read and write
|
||
406000
|
remote allocation
|
page execute and read and write
|
||
20F9E041000
|
heap
|
page read and write
|
||
3CBA000
|
stack
|
page read and write
|
||
C33000
|
unkown
|
page write copy
|
||
1F05C200000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F060F80000
|
trusted library allocation
|
page read and write
|
||
3662DFB000
|
stack
|
page read and write
|
||
1F0612A0000
|
remote allocation
|
page read and write
|
||
13D1000
|
heap
|
page read and write
|
||
19F55A63000
|
heap
|
page read and write
|
||
2310D270000
|
heap
|
page read and write
|
||
1F05BA6F000
|
heap
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
404000
|
remote allocation
|
page execute and read and write
|
||
25CB000
|
trusted library allocation
|
page execute and read and write
|
||
A21000
|
heap
|
page read and write
|
||
E6FE000
|
stack
|
page read and write
|
||
20F9E002000
|
heap
|
page read and write
|
||
3662C7C000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F0612A0000
|
remote allocation
|
page read and write
|
||
1F061012000
|
heap
|
page read and write
|
||
1A97AC56000
|
heap
|
page read and write
|
||
1F05CD93000
|
trusted library allocation
|
page read and write
|
||
1A97AC79000
|
heap
|
page read and write
|
||
370000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F05BA13000
|
heap
|
page read and write
|
||
63BEEFE000
|
stack
|
page read and write
|
||
1F060F70000
|
trusted library allocation
|
page read and write
|
||
FE3D000
|
stack
|
page read and write
|
||
712D67B000
|
stack
|
page read and write
|
||
AFA2E7F000
|
stack
|
page read and write
|
||
19F55940000
|
heap
|
page read and write
|
||
1F05BA79000
|
heap
|
page read and write
|
||
174C000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
1F0610E4000
|
heap
|
page read and write
|
||
19F55A79000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
20F9DF10000
|
heap
|
page read and write
|
||
1F060E30000
|
trusted library allocation
|
page read and write
|
||
1210000
|
direct allocation
|
page read and write
|
||
1F0610EE000
|
heap
|
page read and write
|
||
19F55A86000
|
heap
|
page read and write
|
||
C36000
|
unkown
|
page readonly
|
||
63BF0FF000
|
stack
|
page read and write
|
||
19F55A43000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
19F55A33000
|
heap
|
page read and write
|
||
1341000
|
unclassified section
|
page execute read
|
||
2310D443000
|
heap
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
712DA7D000
|
stack
|
page read and write
|
There are 494 hidden memdumps, click here to show them.