IOC Report
IP VM_8976544568.xhtml

loading gif

Files

File Path
Type
Category
Malicious
IP VM_8976544568.xhtml
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\Jm3Kimw[1].png
PNG image data, 108 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\NQUpBi2[1].png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\internet explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\user\Desktop\IP VM_8976544568.xhtml
C:\Program Files (x86)\Internet Explorer\iexplore.exe
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6284 CREDAT:17410 /prefetch:2

URLs

Name
IP
Malicious
http://www.wikipedia.com/
unknown
http://www.amazon.com/
unknown
http://www.nytimes.com/
unknown
https://i.imgur.com/Jm3Kimw.png
151.101.12.193
http://www.live.com/
unknown
https://i.imgur.com/NQUpBi2.png
151.101.12.193
http://www.reddit.com/
unknown
http://www.twitter.com/
unknown
http://www.youtube.com/
unknown
http://www.google.com/
unknown

Domains

Name
IP
Malicious
ipv4.imgur.map.fastly.net
151.101.12.193
i.imgur.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown
151.101.12.193
ipv4.imgur.map.fastly.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\AdminActive
{14C89559-F8F1-11EC-90EA-ECF4BB862DED}
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery
AdminActive
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore
Count
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore
Time
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore
Blocked
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Count
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Time
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Count
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Time
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
LoadTimeArray
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
LoadTimeArray
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\BrowserEmulation
CVListPingLastYMD
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\BrowserEmulation
CVListPingBitmap
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\BrowserEmulation
CVListPingRandomizedBitmap
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage
DecayDateQueue
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage
LastProcessed
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage
DecayDateQueue
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage
LastProcessed
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\DomainSuggestion
NextUpdateDate
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F01E060000
heap
page read and write
7D6737F000
stack
page read and write
15181890000
heap
page read and write
21B1A68A000
heap
page read and write
24F8AF7000
stack
page read and write
1732C04D000
heap
page read and write
1F01E042000
heap
page read and write
1F107500000
heap
page read and write
1FA4CD13000
heap
page read and write
1732C9A4000
heap
page read and write
1D01CE02000
trusted library allocation
page read and write
976A07E000
stack
page read and write
1B8B9580000
heap
page read and write
1732C9B5000
heap
page read and write
2205E883000
heap
page read and write
1B8BEEF8000
heap
page read and write
1FA4CC62000
heap
page read and write
24FEA7C000
stack
page read and write
5EB67E000
stack
page read and write
1B8BEDA0000
remote allocation
page read and write
86B5A7B000
stack
page read and write
15181A00000
heap
page read and write
15181A22000
heap
page read and write
1B4C82B6000
heap
page read and write
21B1A713000
heap
page read and write
1F01E041000
heap
page read and write
1F01E061000
heap
page read and write
1732C98C000
heap
page read and write
1B8BEE00000
heap
page read and write
1B8BEEA1000
heap
page read and write
2205E813000
heap
page read and write
15181A28000
heap
page read and write
1B4C82CB000
heap
page read and write
1B8BEC4E000
trusted library allocation
page read and write
15181B00000
heap
page read and write
2205E874000
heap
page read and write
1B8B9713000
heap
page read and write
1732C918000
heap
page read and write
1F01E069000
heap
page read and write
1F01E06A000
heap
page read and write
1732C949000
heap
page read and write
1732C976000
heap
page read and write
86B58FB000
stack
page read and write
24FE9FE000
stack
page read and write
1F01E05D000
heap
page read and write
2205F002000
trusted library allocation
page read and write
33824FF000
stack
page read and write
1732C982000
heap
page read and write
15181A62000
heap
page read and write
1B8BEE49000
heap
page read and write
1732C991000
heap
page read and write
1732C982000
heap
page read and write
1732C973000
heap
page read and write
1B8B96B7000
heap
page read and write
1732C993000
heap
page read and write
1B8BEC84000
trusted library allocation
page read and write
24F8D7F000
unkown
page read and write
1732C0BE000
heap
page read and write
21B1A600000
heap
page read and write
1B4C82C2000
heap
page read and write
1FA4CC60000
heap
page read and write
21B1A4D0000
heap
page read and write
1D01C708000
heap
page read and write
24F8BFF000
stack
page read and write
1732CE20000
heap
page read and write
1F01E063000
heap
page read and write
1B8BA5F0000
trusted library allocation
page read and write
24F887B000
stack
page read and write
7D913FF000
stack
page read and write
1B8B969B000
heap
page read and write
1B8BEDA0000
remote allocation
page read and write
1FA4CD02000
heap
page read and write
1732C9B5000
heap
page read and write
1732C975000
heap
page read and write
1B8B9E15000
heap
page read and write
1732C978000
heap
page read and write
1FA4CC00000
heap
page read and write
1FA4CBD0000
trusted library allocation
page read and write
19F37202000
trusted library allocation
page read and write
1B8BEC61000
trusted library allocation
page read and write
1732C0E6000
heap
page read and write
1F107402000
heap
page read and write
1B8B9600000
heap
page read and write
9769FFC000
stack
page read and write
5A5E57E000
stack
page read and write
1732C963000
heap
page read and write
1B8B96F9000
heap
page read and write
1732C9A4000
heap
page read and write
1D01C66C000
heap
page read and write
1732CE02000
heap
page read and write
1B8BEE1F000
heap
page read and write
21B1A65A000
heap
page read and write
1B4C82C7000
heap
page read and write
1B8BA6F0000
trusted library section
page readonly
1B4C8220000
heap
page read and write
1F01E074000
heap
page read and write
1FA4CC67000
heap
page read and write
5EB87B000
stack
page read and write
1B8BEDA0000
remote allocation
page read and write
1D01C655000
heap
page read and write
1732BF80000
trusted library allocation
page read and write
2205E913000
heap
page read and write
1732CE02000
heap
page read and write
1732C9A5000
heap
page read and write
1D01C580000
heap
page read and write
1D01CD50000
trusted library allocation
page read and write
1F106CBB000
heap
page read and write
1F01E06C000
heap
page read and write
7D6787E000
stack
page read and write
1732C9C5000
heap
page read and write
21B1A602000
heap
page read and write
1B4C82E0000
heap
page read and write
1732C0FA000
heap
page read and write
1732C91F000
heap
page read and write
19F37090000
remote allocation
page read and write
1B8B9613000
heap
page read and write
1B8B9702000
heap
page read and write
1F106AF0000
heap
page read and write
1FA4CA60000
heap
page read and write
5A5E27C000
stack
page read and write
7D911FE000
stack
page read and write
1B4C82D1000
heap
page read and write
1F01E03A000
heap
page read and write
1B8BEC48000
trusted library allocation
page read and write
1732C974000
heap
page read and write
19F36B02000
heap
page read and write
5A5E7FF000
stack
page read and write
7D668BB000
stack
page read and write
1F106CCC000
heap
page read and write
1B8BAA90000
trusted library allocation
page read and write
33826FE000
stack
page read and write
1732BE20000
heap
page read and write
1732C981000
heap
page read and write
1732C970000
heap
page read and write
1732C0E9000
heap
page read and write
1B8B9D50000
trusted library section
page read and write
1732C974000
heap
page read and write
1732C974000
heap
page read and write
1732BE10000
heap
page read and write
1FA4CC5B000
heap
page read and write
1F01E062000
heap
page read and write
1F01E040000
heap
page read and write
7D66F7A000
stack
page read and write
1732C952000
heap
page read and write
1B8BAA71000
trusted library allocation
page read and write
1F106D02000
heap
page read and write
1732C0C5000
heap
page read and write
1B4C82E6000
heap
page read and write
1F01DF80000
heap
page read and write
1B8B9E00000
heap
page read and write
1B4C82E6000
heap
page read and write
1F01E102000
heap
page read and write
1732C9B4000
heap
page read and write
1F01E059000
heap
page read and write
2205E908000
heap
page read and write
86B550E000
stack
page read and write
1B8BEC40000
trusted library allocation
page read and write
7D912F7000
stack
page read and write
1B4C8470000
heap
page read and write
7D9117B000
stack
page read and write
1F106CC3000
heap
page read and write
19F36A02000
heap
page read and write
1B8BEF00000
heap
page read and write
7D66CF8000
stack
page read and write
33827FE000
stack
page read and write
1B8B9641000
heap
page read and write
21B1A5D0000
trusted library allocation
page read and write
1732C983000
heap
page read and write
33825FF000
stack
page read and write
1732C0E1000
heap
page read and write
1B8B9656000
heap
page read and write
1B8BEC40000
trusted library allocation
page read and write
5EAF8B000
stack
page read and write
1F106BF0000
trusted library allocation
page read and write
1B8BEAA0000
trusted library allocation
page read and write
1B8B962A000
heap
page read and write
19F36A00000
heap
page read and write
1732C993000
heap
page read and write
1B8BEAB0000
trusted library allocation
page read and write
1732C993000
heap
page read and write
2205E862000
heap
page read and write
1B8B9F00000
heap
page read and write
1B8BED10000
trusted library allocation
page read and write
21B1A677000
heap
page read and write
1732C984000
heap
page read and write
1B8BEC64000
trusted library allocation
page read and write
1B8BEF05000
heap
page read and write
1732BFF0000
remote allocation
page read and write
24FE8F9000
stack
page read and write
1732C993000
heap
page read and write
1B8B9D40000
trusted library allocation
page read and write
1F01E013000
heap
page read and write
15181A13000
heap
page read and write
15181B13000
heap
page read and write
21B1A470000
heap
page read and write
21B1A460000
heap
page read and write
1B8BEDA0000
trusted library allocation
page read and write
1B4C8610000
heap
page read and write
2205E82A000
heap
page read and write
33823FD000
stack
page read and write
1FA4CD00000
heap
page read and write
2205EF30000
trusted library allocation
page read and write
5A5E9FD000
stack
page read and write
1FA4CC29000
heap
page read and write
63BD0FE000
stack
page read and write
1D01C66E000
heap
page read and write
1F01E000000
heap
page read and write
976A277000
stack
page read and write
1F01E083000
heap
page read and write
1732C916000
heap
page read and write
1732C993000
heap
page read and write
63BD1FF000
stack
page read and write
1732C900000
heap
page read and write
1B8BEB20000
trusted library allocation
page read and write
1732CE02000
heap
page read and write
1B8BEEDD000
heap
page read and write
15181A40000
heap
page read and write
1F01E029000
heap
page read and write
1732C102000
heap
page read and write
1732C984000
heap
page read and write
19F36A5C000
heap
page read and write
1732C90B000
heap
page read and write
1F01E073000
heap
page read and write
1732C0EC000
heap
page read and write
1F01E07C000
heap
page read and write
9769E7E000
stack
page read and write
7D6717B000
stack
page read and write
7D9107B000
stack
page read and write
1D01C700000
heap
page read and write
1732CE02000
heap
page read and write
24FE87E000
stack
page read and write
1F106C6D000
heap
page read and write
24F867B000
stack
page read and write
1732CE02000
heap
page read and write
24F88FE000
stack
page read and write
1732C974000
heap
page read and write
1B4C82A0000
heap
page read and write
1D01C600000
heap
page read and write
1B8B9676000
heap
page read and write
1732C918000
heap
page read and write
19F36890000
heap
page read and write
1732C9A5000
heap
page read and write
21B1A629000
heap
page read and write
1732CE00000
heap
page read and write
1B8BEEF3000
heap
page read and write
1732C0A9000
heap
page read and write
1B8BEE9F000
heap
page read and write
1B8B9570000
heap
page read and write
24F8CF7000
stack
page read and write
1D01C63C000
heap
page read and write
1732C993000
heap
page read and write
1FA4CC3C000
heap
page read and write
976A57F000
stack
page read and write
5EB6FC000
stack
page read and write
5EB57E000
stack
page read and write
7D90E7C000
stack
page read and write
1F01E750000
trusted library allocation
page read and write
7D66E7B000
stack
page read and write
1732C993000
heap
page read and write
1732C9A4000
heap
page read and write
1F106C2A000
heap
page read and write
1B4C82C6000
heap
page read and write
1732CE19000
heap
page read and write
1FA4CC13000
heap
page read and write
1F01E036000
heap
page read and write
1B8BEC60000
trusted library allocation
page read and write
7D671FF000
stack
page read and write
1B8BEE2D000
heap
page read and write
976A37E000
stack
page read and write
7D90EFD000
stack
page read and write
1B8BEEAC000
heap
page read and write
1B8BEE16000
heap
page read and write
63BCC7C000
stack
page read and write
21B1A675000
heap
page read and write
9769EFE000
stack
page read and write
1732C972000
heap
page read and write
2205E859000
heap
page read and write
1732C9D4000
heap
page read and write
1B8BED80000
trusted library allocation
page read and write
1B4C82CB000
heap
page read and write
1732C97A000
heap
page read and write
1B8B9F18000
heap
page read and write
1B8BA710000
trusted library section
page readonly
1F01E079000
heap
page read and write
1B8BEF03000
heap
page read and write
5EBC7E000
stack
page read and write
2205E877000
heap
page read and write
1B4C82D1000
heap
page read and write
976A179000
stack
page read and write
86B597E000
stack
page read and write
1B8B9E02000
heap
page read and write
1732CE02000
heap
page read and write
3381ECC000
stack
page read and write
1B8BED50000
trusted library allocation
page read and write
3382AFF000
stack
page read and write
21B1A702000
heap
page read and write
15181A79000
heap
page read and write
1F01E048000
heap
page read and write
19F37090000
remote allocation
page read and write
1732C976000
heap
page read and write
1732C108000
heap
page read and write
1732C987000
heap
page read and write
1732C9B5000
heap
page read and write
1B8BEC80000
trusted library allocation
page read and write
1F106A80000
heap
page read and write
1732C9B5000
heap
page read and write
21B1A63D000
heap
page read and write
1732BE80000
heap
page read and write
1F106CCA000
heap
page read and write
1732C974000
heap
page read and write
1B8BAAA0000
trusted library allocation
page read and write
15181A51000
heap
page read and write
1732CE02000
heap
page read and write
1732C9B5000
heap
page read and write
1B8BEEFB000
heap
page read and write
21B1A665000
heap
page read and write
63BCEFF000
stack
page read and write
1F01E05F000
heap
page read and write
7D915FF000
stack
page read and write
1B8BED60000
trusted library allocation
page read and write
1732C088000
heap
page read and write
24F8E7A000
stack
page read and write
1B8B9654000
heap
page read and write
1F01E802000
trusted library allocation
page read and write
1B8BEE5E000
heap
page read and write
1732C9D4000
heap
page read and write
1732CE03000
heap
page read and write
2205E83C000
heap
page read and write
2205E760000
heap
page read and write
7D674FA000
stack
page read and write
2205E863000
heap
page read and write
5A5E8FD000
stack
page read and write
1732BFF0000
remote allocation
page read and write
1B8BED70000
trusted library allocation
page read and write
7D6767D000
stack
page read and write
7D6707E000
stack
page read and write
2205E770000
heap
page read and write
1732C90B000
heap
page read and write
1732CE02000
heap
page read and write
1732C916000
heap
page read and write
1B8BA720000
trusted library section
page readonly
1F01E045000
heap
page read and write
15181820000
heap
page read and write
1732C90D000
heap
page read and write
63BCFFE000
stack
page read and write
1FA4CC5D000
heap
page read and write
1FA4CD08000
heap
page read and write
1F01E067000
heap
page read and write
15181830000
heap
page read and write
1F01E04B000
heap
page read and write
1732C9A4000
heap
page read and write
5EB7FC000
stack
page read and write
1B8B9699000
heap
page read and write
63BCCFE000
stack
page read and write
1F01DF90000
heap
page read and write
1B8B9F13000
heap
page read and write
1B8BEC70000
trusted library allocation
page read and write
1B4C82CB000
heap
page read and write
1732C081000
heap
page read and write
1D01C674000
heap
page read and write
24FE978000
stack
page read and write
1B8BED90000
trusted library allocation
page read and write
2205E900000
heap
page read and write
1B8B95E0000
heap
page read and write
19F36A3C000
heap
page read and write
1D01C702000
heap
page read and write
1B4C82B1000
heap
page read and write
1B4C82E6000
heap
page read and write
5EB3FC000
stack
page read and write
1F107532000
heap
page read and write
15181990000
trusted library allocation
page read and write
24F877E000
stack
page read and write
1B8BEF02000
heap
page read and write
1732C993000
heap
page read and write
1FA4CC7B000
heap
page read and write
1D01C5F0000
heap
page read and write
1732C97E000
heap
page read and write
33828FE000
stack
page read and write
7D6757E000
stack
page read and write
1FA4D402000
trusted library allocation
page read and write
1732C029000
heap
page read and write
1B8BEC70000
trusted library allocation
page read and write
2205E902000
heap
page read and write
1732C97D000
heap
page read and write
1732C916000
heap
page read and write
1B8BA6D0000
trusted library section
page readonly
1B8BEB30000
trusted library allocation
page read and write
1732C0B3000
heap
page read and write
24F86FE000
stack
page read and write
1F106C87000
heap
page read and write
1B4C8615000
heap
page read and write
1F01E044000
heap
page read and write
1732C982000
heap
page read and write
1732C918000
heap
page read and write
19F36900000
heap
page read and write
1F01E07A000
heap
page read and write
1732C989000
heap
page read and write
1732C974000
heap
page read and write
19F36A13000
heap
page read and write
1B8B9F18000
heap
page read and write
1732C03C000
heap
page read and write
2205E890000
heap
page read and write
1008FB000
stack
page read and write
1F106C40000
heap
page read and write
1D01C672000
heap
page read and write
1732C802000
heap
page read and write
1732C989000
heap
page read and write
1FA4CC85000
heap
page read and write
1732C982000
heap
page read and write
1732C983000
heap
page read and write
1B8BAA93000
trusted library allocation
page read and write
1732C982000
heap
page read and write
63BCD7E000
stack
page read and write
1732C0AA000
heap
page read and write
1B8B9671000
heap
page read and write
2205E869000
heap
page read and write
33829FF000
stack
page read and write
2205E874000
heap
page read and write
1B8BEE4C000
heap
page read and write
5A5E4FE000
stack
page read and write
1B8B966C000
heap
page read and write
10007C000
stack
page read and write
1F01E03D000
heap
page read and write
86B5D7F000
stack
page read and write
1732C993000
heap
page read and write
1732C993000
heap
page read and write
1B8BEEE2000
heap
page read and write
1006FF000
stack
page read and write
19F36A29000
heap
page read and write
7D672FF000
stack
page read and write
1FA4CAD0000
heap
page read and write
1F01E031000
heap
page read and write
1732C989000
heap
page read and write
5A5E67E000
stack
page read and write
1F01E046000
heap
page read and write
1B8B968E000
heap
page read and write
5A5E3FE000
stack
page read and write
15182202000
trusted library allocation
page read and write
1F01E057000
heap
page read and write
1732C9A4000
heap
page read and write
21B1A613000
heap
page read and write
24FE53A000
stack
page read and write
1732C974000
heap
page read and write
1FA4CA70000
heap
page read and write
1732CE03000
heap
page read and write
1732C113000
heap
page read and write
1F106C00000
heap
page read and write
21B1A66F000
heap
page read and write
86B5B77000
stack
page read and write
1B4C82DF000
heap
page read and write
3382BFF000
stack
page read and write
24F89F8000
stack
page read and write
1B4C82E6000
heap
page read and write
1732BFF0000
remote allocation
page read and write
1005FB000
stack
page read and write
7D90F7E000
stack
page read and write
976A47D000
stack
page read and write
1B4C82C4000
heap
page read and write
1D01C661000
heap
page read and write
33822FB000
stack
page read and write
1D01C629000
heap
page read and write
1732CE3E000
heap
page read and write
86B5C7F000
stack
page read and write
1732C993000
heap
page read and write
1F01E05C000
heap
page read and write
2205E877000
heap
page read and write
86B548C000
stack
page read and write
1B8BEE3F000
heap
page read and write
7D914FD000
stack
page read and write
1732C992000
heap
page read and write
5A5E77D000
stack
page read and write
19F368A0000
heap
page read and write
1F01E04E000
heap
page read and write
1D01C670000
heap
page read and write
1732CE02000
heap
page read and write
1732C0D4000
heap
page read and write
1732C9B4000
heap
page read and write
1F106C13000
heap
page read and write
1F01E002000
heap
page read and write
15181B02000
heap
page read and write
1732C949000
heap
page read and write
1007FF000
stack
page read and write
1732C000000
heap
page read and write
1B8BA6E0000
trusted library section
page readonly
19F37060000
trusted library allocation
page read and write
1732C9BA000
heap
page read and write
1F01E064000
heap
page read and write
7D6727E000
stack
page read and write
2205E7D0000
heap
page read and write
1B4C82D1000
heap
page read and write
1F01E05A000
heap
page read and write
2205E85F000
heap
page read and write
1F106A90000
heap
page read and write
1D01C613000
heap
page read and write
1F106D13000
heap
page read and write
1B8B9687000
heap
page read and write
1B8B9674000
heap
page read and write
86B558F000
stack
page read and write
5EBB7C000
stack
page read and write
1F01DFF0000
heap
page read and write
1732C013000
heap
page read and write
24FE5BF000
stack
page read and write
15181A77000
heap
page read and write
5EBA7E000
stack
page read and write
1732C970000
heap
page read and write
1B8B9F02000
heap
page read and write
1B8BA700000
trusted library section
page readonly
1B8B96AB000
heap
page read and write
1732C04F000
heap
page read and write
1732C9A5000
heap
page read and write
21B1AE02000
trusted library allocation
page read and write
9769BBC000
stack
page read and write
2205E866000
heap
page read and write
1B4C82B6000
heap
page read and write
1D01C713000
heap
page read and write
19F37090000
remote allocation
page read and write
2205E800000
heap
page read and write
1732C04B000
heap
page read and write
1F01E076000
heap
page read and write
1732C9BA000
heap
page read and write
1732C980000
heap
page read and write
1F01E058000
heap
page read and write
1732C116000
heap
page read and write
1732C993000
heap
page read and write
1732C070000
heap
page read and write
5EB97C000
stack
page read and write
1B4C8280000
heap
page read and write
1D01C590000
heap
page read and write
1732C9B7000
heap
page read and write
1B8C0000000
heap
page read and write
15181A02000
heap
page read and write
7D673FF000
stack
page read and write
1732C973000
heap
page read and write
There are 523 hidden memdumps, click here to show them.