Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MSAssist.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, ctime=Sun Dec 31 23:06:32 1600,
mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\35FlWc2[1].htm
|
HTML document, ASCII text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\mshta.exe
|
"C:\WINDOWS\system32\mshta.exe" https://bit.ly/35FlWc2
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://page.googledocpage.com/I
|
unknown
|
||
https://page.googledocpage.com/
|
unknown
|
||
https://page.googledocpage.com/U
|
unknown
|
||
https://page.googledocpage.com/WiU
|
unknown
|
||
https://page.googledocpage.com/z
|
unknown
|
||
https://bit.ly/35FlWc2C:
|
unknown
|
||
https://bit.ly/35FlWc2r
|
unknown
|
||
https://bit.ly/35FlWc2S
|
unknown
|
||
https://bit.ly/35FlWc2aHOMEDRIVE
|
unknown
|
||
https://bit.ly/35FlWc2B
|
unknown
|
||
https://bit.ly/35FlWc2
|
67.199.248.10
|
||
https://bit.ly/
|
unknown
|
||
https://bit.ly/35FlWc2...
|
unknown
|
||
https://bit.ly/r3
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bit.ly
|
67.199.248.10
|
||
page.googledocpage.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
67.199.248.10
|
bit.ly
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D70545C000
|
heap
|
page read and write
|
||
1D66DAA0000
|
trusted library allocation
|
page read and write
|
||
2088F918000
|
heap
|
page read and write
|
||
1CB58202000
|
heap
|
page read and write
|
||
1D705463000
|
heap
|
page read and write
|
||
1D66C05F000
|
heap
|
page read and write
|
||
1BDAC029000
|
heap
|
page read and write
|
||
1D66C065000
|
heap
|
page read and write
|
||
1CB58880000
|
trusted library allocation
|
page read and write
|
||
26EB8C77000
|
heap
|
page read and write
|
||
1D705400000
|
heap
|
page read and write
|
||
7AC61FB000
|
stack
|
page read and write
|
||
1ACE7ED0000
|
heap
|
page read and write
|
||
1D66D97C000
|
trusted library allocation
|
page read and write
|
||
26EB8D8E000
|
heap
|
page read and write
|
||
1BDAC900000
|
heap
|
page read and write
|
||
1D705465000
|
heap
|
page read and write
|
||
1CB58200000
|
heap
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
26EB8C3C000
|
heap
|
page read and write
|
||
1DE6E2EE000
|
heap
|
page read and write
|
||
26EB9270000
|
trusted library allocation
|
page read and write
|
||
DE6AFFF000
|
stack
|
page read and write
|
||
2088F7F0000
|
remote allocation
|
page read and write
|
||
1DE6E2CB000
|
heap
|
page read and write
|
||
26EB9502000
|
heap
|
page read and write
|
||
23820E02000
|
trusted library allocation
|
page read and write
|
||
7AC6A7D000
|
stack
|
page read and write
|
||
2088F840000
|
heap
|
page read and write
|
||
DE6B0FE000
|
stack
|
page read and write
|
||
1D66D968000
|
trusted library allocation
|
page read and write
|
||
1ACE7E70000
|
heap
|
page read and write
|
||
1D705484000
|
heap
|
page read and write
|
||
26EB8DE5000
|
heap
|
page read and write
|
||
93E377B000
|
stack
|
page read and write
|
||
371DFFE000
|
stack
|
page read and write
|
||
1D66C1B5000
|
heap
|
page read and write
|
||
3C2AB7E000
|
stack
|
page read and write
|
||
26EB9627000
|
heap
|
page read and write
|
||
1D66D9E4000
|
trusted library allocation
|
page read and write
|
||
43D7CFF000
|
stack
|
page read and write
|
||
2088F857000
|
heap
|
page read and write
|
||
26EB8A90000
|
heap
|
page read and write
|
||
1BDAC089000
|
heap
|
page read and write
|
||
2088F889000
|
heap
|
page read and write
|
||
26EB95BC000
|
heap
|
page read and write
|
||
1CB58313000
|
heap
|
page read and write
|
||
1D66BF20000
|
heap
|
page read and write
|
||
1DE6E2D8000
|
heap
|
page read and write
|
||
26EB95C8000
|
heap
|
page read and write
|
||
1DE6E1CF000
|
heap
|
page read and write
|
||
DE6B1FE000
|
stack
|
page read and write
|
||
1D66D9B8000
|
trusted library allocation
|
page read and write
|
||
1D70546A000
|
heap
|
page read and write
|
||
2088F82A000
|
heap
|
page read and write
|
||
1D66DA1C000
|
trusted library allocation
|
page read and write
|
||
1D7052F0000
|
heap
|
page read and write
|
||
83E7AFF000
|
stack
|
page read and write
|
||
1DE6E2E1000
|
heap
|
page read and write
|
||
DE6A97B000
|
stack
|
page read and write
|
||
2088F848000
|
heap
|
page read and write
|
||
1D66BF70000
|
trusted library allocation
|
page read and write
|
||
3C2A77C000
|
stack
|
page read and write
|
||
1DE6E170000
|
remote allocation
|
page read and write
|
||
1D705447000
|
heap
|
page read and write
|
||
1BDAC0BB000
|
heap
|
page read and write
|
||
26EB8A80000
|
heap
|
page read and write
|
||
1D66DA04000
|
trusted library allocation
|
page read and write
|
||
26EB8C29000
|
heap
|
page read and write
|
||
1D705460000
|
heap
|
page read and write
|
||
1D66C070000
|
heap
|
page read and write
|
||
23820470000
|
heap
|
page read and write
|
||
1D66D96C000
|
trusted library allocation
|
page read and write
|
||
1D705461000
|
heap
|
page read and write
|
||
23820602000
|
heap
|
page read and write
|
||
1D705496000
|
heap
|
page read and write
|
||
1ACE8000000
|
heap
|
page read and write
|
||
1D705413000
|
heap
|
page read and write
|
||
1DE6E1B9000
|
heap
|
page read and write
|
||
1ACE8029000
|
heap
|
page read and write
|
||
DE6A50C000
|
stack
|
page read and write
|
||
26EB8C2C000
|
heap
|
page read and write
|
||
1BDABEE0000
|
heap
|
page read and write
|
||
1D66C1B0000
|
heap
|
page read and write
|
||
1D705502000
|
heap
|
page read and write
|
||
E84D279000
|
stack
|
page read and write
|
||
23820629000
|
heap
|
page read and write
|
||
1D705426000
|
heap
|
page read and write
|
||
1D705459000
|
heap
|
page read and write
|
||
1D705455000
|
heap
|
page read and write
|
||
1D66C0CE000
|
heap
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
1D705390000
|
trusted library allocation
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
2088F862000
|
heap
|
page read and write
|
||
26EB9600000
|
heap
|
page read and write
|
||
93E387F000
|
stack
|
page read and write
|
||
1D66C0C9000
|
heap
|
page read and write
|
||
26644FC0000
|
heap
|
page read and write
|
||
1DE6E1B5000
|
heap
|
page read and write
|
||
810E7E000
|
stack
|
page read and write
|
||
1D66BF00000
|
heap
|
page read and write
|
||
1D66BFB7000
|
heap
|
page read and write
|
||
93E3A7C000
|
stack
|
page read and write
|
||
1BDABED0000
|
heap
|
page read and write
|
||
1D66C07E000
|
heap
|
page read and write
|
||
1CB58264000
|
heap
|
page read and write
|
||
1BDAC0CC000
|
heap
|
page read and write
|
||
1BDAC06F000
|
heap
|
page read and write
|
||
1D66D988000
|
trusted library allocation
|
page read and write
|
||
7AC66FE000
|
stack
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
2088F5B0000
|
heap
|
page read and write
|
||
1D705C02000
|
trusted library allocation
|
page read and write
|
||
E84D5FF000
|
stack
|
page read and write
|
||
83E7BFD000
|
stack
|
page read and write
|
||
1D705464000
|
heap
|
page read and write
|
||
2088F7B0000
|
trusted library allocation
|
page read and write
|
||
26EB9500000
|
heap
|
page read and write
|
||
371DD7E000
|
stack
|
page read and write
|
||
7AC68FD000
|
stack
|
page read and write
|
||
1CB580C0000
|
heap
|
page read and write
|
||
1D66D970000
|
trusted library allocation
|
page read and write
|
||
1DE6E2EE000
|
heap
|
page read and write
|
||
1CB58300000
|
heap
|
page read and write
|
||
26EB8C13000
|
heap
|
page read and write
|
||
26EB8C88000
|
heap
|
page read and write
|
||
26EB8C79000
|
heap
|
page read and write
|
||
2088F740000
|
trusted library allocation
|
page read and write
|
||
1ACE7FD0000
|
trusted library allocation
|
page read and write
|
||
1BDAC023000
|
heap
|
page read and write
|
||
1D705458000
|
heap
|
page read and write
|
||
1CB58268000
|
heap
|
page read and write
|
||
1BDAC067000
|
heap
|
page read and write
|
||
1D705467000
|
heap
|
page read and write
|
||
26645200000
|
heap
|
page read and write
|
||
1D66DB54000
|
heap
|
page read and write
|
||
1D66D9C1000
|
trusted library allocation
|
page read and write
|
||
1DE6E1BC000
|
heap
|
page read and write
|
||
E84D47A000
|
stack
|
page read and write
|
||
26645213000
|
heap
|
page read and write
|
||
1D66C078000
|
heap
|
page read and write
|
||
1D66BFC5000
|
heap
|
page read and write
|
||
DE6ADFD000
|
stack
|
page read and write
|
||
1D66C017000
|
heap
|
page read and write
|
||
1DE6E1C7000
|
heap
|
page read and write
|
||
E84D0FE000
|
stack
|
page read and write
|
||
1DE6E2DA000
|
heap
|
page read and write
|
||
2088F913000
|
heap
|
page read and write
|
||
E84D57F000
|
stack
|
page read and write
|
||
371DEFE000
|
stack
|
page read and write
|
||
26EB8C94000
|
heap
|
page read and write
|
||
2088F858000
|
heap
|
page read and write
|
||
26645257000
|
heap
|
page read and write
|
||
1DE6E170000
|
remote allocation
|
page read and write
|
||
83E6F08000
|
stack
|
page read and write
|
||
2382065A000
|
heap
|
page read and write
|
||
266457C0000
|
remote allocation
|
page read and write
|
||
1D66D9F0000
|
trusted library allocation
|
page read and write
|
||
23820600000
|
heap
|
page read and write
|
||
1D66D990000
|
trusted library allocation
|
page read and write
|
||
2088F900000
|
heap
|
page read and write
|
||
371DC7C000
|
stack
|
page read and write
|
||
1D70547B000
|
heap
|
page read and write
|
||
1D66BFE6000
|
heap
|
page read and write
|
||
93E397E000
|
stack
|
page read and write
|
||
1DE6E2DA000
|
heap
|
page read and write
|
||
1D66D9FC000
|
trusted library allocation
|
page read and write
|
||
23820654000
|
heap
|
page read and write
|
||
1DE6DF44000
|
heap
|
page read and write
|
||
3C2AE7E000
|
stack
|
page read and write
|
||
1D70544D000
|
heap
|
page read and write
|
||
371E0FE000
|
stack
|
page read and write
|
||
1DE6E1BF000
|
heap
|
page read and write
|
||
1CB5827B000
|
heap
|
page read and write
|
||
1DE6E2DA000
|
heap
|
page read and write
|
||
1D705477000
|
heap
|
page read and write
|
||
1D70546D000
|
heap
|
page read and write
|
||
93E35FC000
|
stack
|
page read and write
|
||
26EB9543000
|
heap
|
page read and write
|
||
1D66BFB0000
|
heap
|
page read and write
|
||
23820665000
|
heap
|
page read and write
|
||
3C2AA7F000
|
stack
|
page read and write
|
||
26EB8C6C000
|
heap
|
page read and write
|
||
1D66D978000
|
trusted library allocation
|
page read and write
|
||
26EB95B0000
|
heap
|
page read and write
|
||
1BDAC102000
|
heap
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
1DE6E1E2000
|
heap
|
page read and write
|
||
83E76FE000
|
stack
|
page read and write
|
||
1DE6E2A2000
|
heap
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
26EB8C00000
|
heap
|
page read and write
|
||
1D66C090000
|
heap
|
page read and write
|
||
1CB58213000
|
heap
|
page read and write
|
||
1D70546B000
|
heap
|
page read and write
|
||
1D66C0A2000
|
heap
|
page read and write
|
||
83E7CFF000
|
stack
|
page read and write
|
||
2088F800000
|
heap
|
page read and write
|
||
1D66D9A8000
|
trusted library allocation
|
page read and write
|
||
1D705456000
|
heap
|
page read and write
|
||
1DE6E30A000
|
heap
|
page read and write
|
||
1DE6E2C4000
|
heap
|
page read and write
|
||
1D705441000
|
heap
|
page read and write
|
||
DE6B2FF000
|
stack
|
page read and write
|
||
2088F858000
|
heap
|
page read and write
|
||
26644FD0000
|
heap
|
page read and write
|
||
2088F7F0000
|
remote allocation
|
page read and write
|
||
1ACE8102000
|
heap
|
page read and write
|
||
43D7BFE000
|
stack
|
page read and write
|
||
26EB9554000
|
heap
|
page read and write
|
||
1D705432000
|
heap
|
page read and write
|
||
1D66D9EC000
|
trusted library allocation
|
page read and write
|
||
E84D1FC000
|
stack
|
page read and write
|
||
1BDAC000000
|
heap
|
page read and write
|
||
1ACE803E000
|
heap
|
page read and write
|
||
371DCFE000
|
stack
|
page read and write
|
||
1D66C09A000
|
heap
|
page read and write
|
||
26EB95C1000
|
heap
|
page read and write
|
||
1D705440000
|
heap
|
page read and write
|
||
23820675000
|
heap
|
page read and write
|
||
93E347F000
|
stack
|
page read and write
|
||
1CB58228000
|
heap
|
page read and write
|
||
83E75FA000
|
stack
|
page read and write
|
||
23820702000
|
heap
|
page read and write
|
||
2088F802000
|
heap
|
page read and write
|
||
26EB9402000
|
heap
|
page read and write
|
||
1D66C09C000
|
heap
|
page read and write
|
||
3C2AF7C000
|
stack
|
page read and write
|
||
1DE6E170000
|
heap
|
page read and write
|
||
266457C0000
|
remote allocation
|
page read and write
|
||
20891202000
|
trusted library allocation
|
page read and write
|
||
26EB9623000
|
heap
|
page read and write
|
||
26EB8C40000
|
heap
|
page read and write
|
||
1DE6E2E1000
|
heap
|
page read and write
|
||
1CB58A02000
|
trusted library allocation
|
page read and write
|
||
26EB8C55000
|
heap
|
page read and write
|
||
1D705360000
|
heap
|
page read and write
|
||
43D7AF9000
|
stack
|
page read and write
|
||
1DE6E280000
|
heap
|
page read and write
|
||
1ACE8044000
|
heap
|
page read and write
|
||
1D66DB50000
|
heap
|
page read and write
|
||
26EB9592000
|
heap
|
page read and write
|
||
1DE6E2F9000
|
heap
|
page read and write
|
||
1DE6E1F8000
|
heap
|
page read and write
|
||
26EB8C8B000
|
heap
|
page read and write
|
||
1DE6E1D5000
|
heap
|
page read and write
|
||
26EB8C6F000
|
heap
|
page read and write
|
||
1D66C0B4000
|
heap
|
page read and write
|
||
1BDABF70000
|
trusted library allocation
|
page read and write
|
||
1DE6E30A000
|
heap
|
page read and write
|
||
81107E000
|
stack
|
page read and write
|
||
3C2A3AC000
|
stack
|
page read and write
|
||
1D66D9D0000
|
trusted library allocation
|
page read and write
|
||
810F7E000
|
stack
|
page read and write
|
||
1BDAC0C3000
|
heap
|
page read and write
|
||
1ACE803B000
|
heap
|
page read and write
|
||
1DE6E2B1000
|
heap
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
1D66D984000
|
trusted library allocation
|
page read and write
|
||
1CB580B0000
|
heap
|
page read and write
|
||
26EB9602000
|
heap
|
page read and write
|
||
26EB8BF0000
|
trusted library allocation
|
page read and write
|
||
26645030000
|
heap
|
page read and write
|
||
1D66DAD0000
|
heap
|
page read and write
|
||
1D705429000
|
heap
|
page read and write
|
||
1ACE8802000
|
trusted library allocation
|
page read and write
|
||
1D66DA60000
|
heap
|
page read and write
|
||
1D66D9B0000
|
trusted library allocation
|
page read and write
|
||
1DE703B0000
|
trusted library section
|
page readonly
|
||
83E7DFE000
|
stack
|
page read and write
|
||
2664523D000
|
heap
|
page read and write
|
||
DE6ACFE000
|
stack
|
page read and write
|
||
26EB9522000
|
heap
|
page read and write
|
||
93E357F000
|
stack
|
page read and write
|
||
2088F770000
|
trusted library allocation
|
page read and write
|
||
1D705475000
|
heap
|
page read and write
|
||
2382066F000
|
heap
|
page read and write
|
||
1ACE802F000
|
heap
|
page read and write
|
||
1D66D994000
|
trusted library allocation
|
page read and write
|
||
1DE6E2E3000
|
heap
|
page read and write
|
||
23820713000
|
heap
|
page read and write
|
||
26645790000
|
trusted library allocation
|
page read and write
|
||
2088F7F0000
|
remote allocation
|
page read and write
|
||
1DE6E1D3000
|
heap
|
page read and write
|
||
266457C0000
|
remote allocation
|
page read and write
|
||
371E1FF000
|
stack
|
page read and write
|
||
26EB8C66000
|
heap
|
page read and write
|
||
23820613000
|
heap
|
page read and write
|
||
1D66D9B4000
|
trusted library allocation
|
page read and write
|
||
1DE6E1B4000
|
heap
|
page read and write
|
||
1D705474000
|
heap
|
page read and write
|
||
26EB8D13000
|
heap
|
page read and write
|
||
1DE6E2E1000
|
heap
|
page read and write
|
||
1D66DA0C000
|
trusted library allocation
|
page read and write
|
||
7AC6B7D000
|
stack
|
page read and write
|
||
1D66D99C000
|
trusted library allocation
|
page read and write
|
||
1DE6E1C9000
|
heap
|
page read and write
|
||
2088F720000
|
trusted library allocation
|
page read and write
|
||
26EB9630000
|
heap
|
page read and write
|
||
7AC6BFE000
|
stack
|
page read and write
|
||
1DE6E1F3000
|
heap
|
page read and write
|
||
1D66BDC0000
|
heap
|
page read and write
|
||
238204E0000
|
heap
|
page read and write
|
||
1D66DA18000
|
trusted library allocation
|
page read and write
|
||
26EB956D000
|
heap
|
page read and write
|
||
1BDAC013000
|
heap
|
page read and write
|
||
1D66C094000
|
heap
|
page read and write
|
||
26EB8C5F000
|
heap
|
page read and write
|
||
810A7B000
|
stack
|
page read and write
|
||
7AC67FE000
|
stack
|
page read and write
|
||
1DE6E1CD000
|
heap
|
page read and write
|
||
1CB58302000
|
heap
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
1ACE8052000
|
heap
|
page read and write
|
||
26645202000
|
heap
|
page read and write
|
||
1BDAC0C9000
|
heap
|
page read and write
|
||
93E36FC000
|
stack
|
page read and write
|
||
26645302000
|
heap
|
page read and write
|
||
1DE71552000
|
trusted library allocation
|
page read and write
|
||
26645224000
|
heap
|
page read and write
|
||
1BDABF40000
|
heap
|
page read and write
|
||
1D66DA08000
|
trusted library allocation
|
page read and write
|
||
1DE6E170000
|
remote allocation
|
page read and write
|
||
DE6ABFE000
|
stack
|
page read and write
|
||
2088F902000
|
heap
|
page read and write
|
||
DE6AAFC000
|
stack
|
page read and write
|
||
1BDAC113000
|
heap
|
page read and write
|
||
1ACE8041000
|
heap
|
page read and write
|
||
7AC697E000
|
stack
|
page read and write
|
||
1D70545A000
|
heap
|
page read and write
|
||
83E6F5F000
|
stack
|
page read and write
|
||
1DE6E1D1000
|
heap
|
page read and write
|
||
1D66D998000
|
trusted library allocation
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
1D66D9C8000
|
trusted library allocation
|
page read and write
|
||
1CB58120000
|
heap
|
page read and write
|
||
1BDAC802000
|
heap
|
page read and write
|
||
3C2A97F000
|
stack
|
page read and write
|
||
238205E0000
|
trusted library allocation
|
page read and write
|
||
1D70547E000
|
heap
|
page read and write
|
||
1ACE8013000
|
heap
|
page read and write
|
||
1CB5825A000
|
heap
|
page read and write
|
||
1D70543B000
|
heap
|
page read and write
|
||
E84CF7A000
|
stack
|
page read and write
|
||
1D66D9BC000
|
trusted library allocation
|
page read and write
|
||
93E2ECC000
|
stack
|
page read and write
|
||
1D66DB5D000
|
heap
|
page read and write
|
||
1D66D9AC000
|
trusted library allocation
|
page read and write
|
||
3C2AC7C000
|
stack
|
page read and write
|
||
1D66D9A0000
|
trusted library allocation
|
page read and write
|
||
E84D67E000
|
stack
|
page read and write
|
||
1BDAC043000
|
heap
|
page read and write
|
||
2088F5C0000
|
heap
|
page read and write
|
||
83E7EFF000
|
stack
|
page read and write
|
||
1DE6E291000
|
heap
|
page read and write
|
||
1D705300000
|
heap
|
page read and write
|
||
26EB8DB9000
|
heap
|
page read and write
|
||
1CB58280000
|
heap
|
page read and write
|
||
26EB8C92000
|
heap
|
page read and write
|
||
26EB8AF0000
|
heap
|
page read and write
|
||
E84CB1B000
|
stack
|
page read and write
|
||
1D705462000
|
heap
|
page read and write
|
||
1D66D980000
|
trusted library allocation
|
page read and write
|
||
1D705442000
|
heap
|
page read and write
|
||
23820480000
|
heap
|
page read and write
|
||
93E32FB000
|
stack
|
page read and write
|
||
810D7B000
|
stack
|
page read and write
|
||
83E77FE000
|
stack
|
page read and write
|
||
7AC667E000
|
stack
|
page read and write
|
||
2382063D000
|
heap
|
page read and write
|
||
2088F872000
|
heap
|
page read and write
|
||
2088F847000
|
heap
|
page read and write
|
||
1ACE7E80000
|
heap
|
page read and write
|
||
1D70545F000
|
heap
|
page read and write
|
||
26645802000
|
trusted library allocation
|
page read and write
|
||
83E79FF000
|
stack
|
page read and write
|
||
E84D37F000
|
stack
|
page read and write
|
||
43D75AB000
|
stack
|
page read and write
|
||
1DE6E2E1000
|
heap
|
page read and write
|
||
1D70547A000
|
heap
|
page read and write
|
||
1ACE8002000
|
heap
|
page read and write
|
||
26EB9522000
|
heap
|
page read and write
|
||
1DE6DF40000
|
heap
|
page read and write
|
||
1D66D9D8000
|
trusted library allocation
|
page read and write
|
||
26EB9613000
|
heap
|
page read and write
|
||
93E3B7F000
|
stack
|
page read and write
|
||
1D66C0B0000
|
heap
|
page read and write
|
||
2088F813000
|
heap
|
page read and write
|
||
2088F848000
|
heap
|
page read and write
|
||
1DE6E2EF000
|
heap
|
page read and write
|
||
3C2AD7E000
|
stack
|
page read and write
|
||
23820665000
|
heap
|
page read and write
|
||
26645229000
|
heap
|
page read and write
|
||
1D70543D000
|
heap
|
page read and write
|
||
1CB58240000
|
heap
|
page read and write
|
||
DE6AEFE000
|
stack
|
page read and write
|
||
1D705457000
|
heap
|
page read and write
|
||
2088F620000
|
heap
|
page read and write
|
There are 389 hidden memdumps, click here to show them.