Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
IP VM_8976544568.xhtml
|
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
|
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\Jm3Kimw[1].png
|
PNG image data, 108 x 24, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\NQUpBi2[1].png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\internet explorer\iexplore.exe
|
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\user\Desktop\IP VM_8976544568.xhtml
|
||
C:\Program Files (x86)\Internet Explorer\iexplore.exe
|
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6284 CREDAT:17410 /prefetch:2
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.wikipedia.com/
|
unknown
|
||
http://www.amazon.com/
|
unknown
|
||
http://www.nytimes.com/
|
unknown
|
||
https://i.imgur.com/Jm3Kimw.png
|
151.101.12.193
|
||
http://www.live.com/
|
unknown
|
||
https://i.imgur.com/NQUpBi2.png
|
151.101.12.193
|
||
http://www.reddit.com/
|
unknown
|
||
http://www.twitter.com/
|
unknown
|
||
http://www.youtube.com/
|
unknown
|
||
http://www.google.com/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ipv4.imgur.map.fastly.net
|
151.101.12.193
|
||
i.imgur.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
||
151.101.12.193
|
ipv4.imgur.map.fastly.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\AdminActive
|
{14C89559-F8F1-11EC-90EA-ECF4BB862DED}
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery
|
AdminActive
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore
|
Count
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore
|
Time
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore
|
Blocked
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
|
Count
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
|
Time
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
|
Count
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
|
Time
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
|
LoadTimeArray
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
|
LoadTimeArray
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\BrowserEmulation
|
CVListPingLastYMD
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\BrowserEmulation
|
CVListPingBitmap
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\BrowserEmulation
|
CVListPingRandomizedBitmap
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage
|
DecayDateQueue
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage
|
LastProcessed
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage
|
DecayDateQueue
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage
|
LastProcessed
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\DomainSuggestion
|
NextUpdateDate
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F01E060000
|
heap
|
page read and write
|
||
7D6737F000
|
stack
|
page read and write
|
||
15181890000
|
heap
|
page read and write
|
||
21B1A68A000
|
heap
|
page read and write
|
||
24F8AF7000
|
stack
|
page read and write
|
||
1732C04D000
|
heap
|
page read and write
|
||
1F01E042000
|
heap
|
page read and write
|
||
1F107500000
|
heap
|
page read and write
|
||
1FA4CD13000
|
heap
|
page read and write
|
||
1732C9A4000
|
heap
|
page read and write
|
||
1D01CE02000
|
trusted library allocation
|
page read and write
|
||
976A07E000
|
stack
|
page read and write
|
||
1B8B9580000
|
heap
|
page read and write
|
||
1732C9B5000
|
heap
|
page read and write
|
||
2205E883000
|
heap
|
page read and write
|
||
1B8BEEF8000
|
heap
|
page read and write
|
||
1FA4CC62000
|
heap
|
page read and write
|
||
24FEA7C000
|
stack
|
page read and write
|
||
5EB67E000
|
stack
|
page read and write
|
||
1B8BEDA0000
|
remote allocation
|
page read and write
|
||
86B5A7B000
|
stack
|
page read and write
|
||
15181A00000
|
heap
|
page read and write
|
||
15181A22000
|
heap
|
page read and write
|
||
1B4C82B6000
|
heap
|
page read and write
|
||
21B1A713000
|
heap
|
page read and write
|
||
1F01E041000
|
heap
|
page read and write
|
||
1F01E061000
|
heap
|
page read and write
|
||
1732C98C000
|
heap
|
page read and write
|
||
1B8BEE00000
|
heap
|
page read and write
|
||
1B8BEEA1000
|
heap
|
page read and write
|
||
2205E813000
|
heap
|
page read and write
|
||
15181A28000
|
heap
|
page read and write
|
||
1B4C82CB000
|
heap
|
page read and write
|
||
1B8BEC4E000
|
trusted library allocation
|
page read and write
|
||
15181B00000
|
heap
|
page read and write
|
||
2205E874000
|
heap
|
page read and write
|
||
1B8B9713000
|
heap
|
page read and write
|
||
1732C918000
|
heap
|
page read and write
|
||
1F01E069000
|
heap
|
page read and write
|
||
1F01E06A000
|
heap
|
page read and write
|
||
1732C949000
|
heap
|
page read and write
|
||
1732C976000
|
heap
|
page read and write
|
||
86B58FB000
|
stack
|
page read and write
|
||
24FE9FE000
|
stack
|
page read and write
|
||
1F01E05D000
|
heap
|
page read and write
|
||
2205F002000
|
trusted library allocation
|
page read and write
|
||
33824FF000
|
stack
|
page read and write
|
||
1732C982000
|
heap
|
page read and write
|
||
15181A62000
|
heap
|
page read and write
|
||
1B8BEE49000
|
heap
|
page read and write
|
||
1732C991000
|
heap
|
page read and write
|
||
1732C982000
|
heap
|
page read and write
|
||
1732C973000
|
heap
|
page read and write
|
||
1B8B96B7000
|
heap
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1B8BEC84000
|
trusted library allocation
|
page read and write
|
||
24F8D7F000
|
unkown
|
page read and write
|
||
1732C0BE000
|
heap
|
page read and write
|
||
21B1A600000
|
heap
|
page read and write
|
||
1B4C82C2000
|
heap
|
page read and write
|
||
1FA4CC60000
|
heap
|
page read and write
|
||
21B1A4D0000
|
heap
|
page read and write
|
||
1D01C708000
|
heap
|
page read and write
|
||
24F8BFF000
|
stack
|
page read and write
|
||
1732CE20000
|
heap
|
page read and write
|
||
1F01E063000
|
heap
|
page read and write
|
||
1B8BA5F0000
|
trusted library allocation
|
page read and write
|
||
24F887B000
|
stack
|
page read and write
|
||
7D913FF000
|
stack
|
page read and write
|
||
1B8B969B000
|
heap
|
page read and write
|
||
1B8BEDA0000
|
remote allocation
|
page read and write
|
||
1FA4CD02000
|
heap
|
page read and write
|
||
1732C9B5000
|
heap
|
page read and write
|
||
1732C975000
|
heap
|
page read and write
|
||
1B8B9E15000
|
heap
|
page read and write
|
||
1732C978000
|
heap
|
page read and write
|
||
1FA4CC00000
|
heap
|
page read and write
|
||
1FA4CBD0000
|
trusted library allocation
|
page read and write
|
||
19F37202000
|
trusted library allocation
|
page read and write
|
||
1B8BEC61000
|
trusted library allocation
|
page read and write
|
||
1732C0E6000
|
heap
|
page read and write
|
||
1F107402000
|
heap
|
page read and write
|
||
1B8B9600000
|
heap
|
page read and write
|
||
9769FFC000
|
stack
|
page read and write
|
||
5A5E57E000
|
stack
|
page read and write
|
||
1732C963000
|
heap
|
page read and write
|
||
1B8B96F9000
|
heap
|
page read and write
|
||
1732C9A4000
|
heap
|
page read and write
|
||
1D01C66C000
|
heap
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
1B8BEE1F000
|
heap
|
page read and write
|
||
21B1A65A000
|
heap
|
page read and write
|
||
1B4C82C7000
|
heap
|
page read and write
|
||
1B8BA6F0000
|
trusted library section
|
page readonly
|
||
1B4C8220000
|
heap
|
page read and write
|
||
1F01E074000
|
heap
|
page read and write
|
||
1FA4CC67000
|
heap
|
page read and write
|
||
5EB87B000
|
stack
|
page read and write
|
||
1B8BEDA0000
|
remote allocation
|
page read and write
|
||
1D01C655000
|
heap
|
page read and write
|
||
1732BF80000
|
trusted library allocation
|
page read and write
|
||
2205E913000
|
heap
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
1732C9A5000
|
heap
|
page read and write
|
||
1D01C580000
|
heap
|
page read and write
|
||
1D01CD50000
|
trusted library allocation
|
page read and write
|
||
1F106CBB000
|
heap
|
page read and write
|
||
1F01E06C000
|
heap
|
page read and write
|
||
7D6787E000
|
stack
|
page read and write
|
||
1732C9C5000
|
heap
|
page read and write
|
||
21B1A602000
|
heap
|
page read and write
|
||
1B4C82E0000
|
heap
|
page read and write
|
||
1732C0FA000
|
heap
|
page read and write
|
||
1732C91F000
|
heap
|
page read and write
|
||
19F37090000
|
remote allocation
|
page read and write
|
||
1B8B9613000
|
heap
|
page read and write
|
||
1B8B9702000
|
heap
|
page read and write
|
||
1F106AF0000
|
heap
|
page read and write
|
||
1FA4CA60000
|
heap
|
page read and write
|
||
5A5E27C000
|
stack
|
page read and write
|
||
7D911FE000
|
stack
|
page read and write
|
||
1B4C82D1000
|
heap
|
page read and write
|
||
1F01E03A000
|
heap
|
page read and write
|
||
1B8BEC48000
|
trusted library allocation
|
page read and write
|
||
1732C974000
|
heap
|
page read and write
|
||
19F36B02000
|
heap
|
page read and write
|
||
5A5E7FF000
|
stack
|
page read and write
|
||
7D668BB000
|
stack
|
page read and write
|
||
1F106CCC000
|
heap
|
page read and write
|
||
1B8BAA90000
|
trusted library allocation
|
page read and write
|
||
33826FE000
|
stack
|
page read and write
|
||
1732BE20000
|
heap
|
page read and write
|
||
1732C981000
|
heap
|
page read and write
|
||
1732C970000
|
heap
|
page read and write
|
||
1732C0E9000
|
heap
|
page read and write
|
||
1B8B9D50000
|
trusted library section
|
page read and write
|
||
1732C974000
|
heap
|
page read and write
|
||
1732C974000
|
heap
|
page read and write
|
||
1732BE10000
|
heap
|
page read and write
|
||
1FA4CC5B000
|
heap
|
page read and write
|
||
1F01E062000
|
heap
|
page read and write
|
||
1F01E040000
|
heap
|
page read and write
|
||
7D66F7A000
|
stack
|
page read and write
|
||
1732C952000
|
heap
|
page read and write
|
||
1B8BAA71000
|
trusted library allocation
|
page read and write
|
||
1F106D02000
|
heap
|
page read and write
|
||
1732C0C5000
|
heap
|
page read and write
|
||
1B4C82E6000
|
heap
|
page read and write
|
||
1F01DF80000
|
heap
|
page read and write
|
||
1B8B9E00000
|
heap
|
page read and write
|
||
1B4C82E6000
|
heap
|
page read and write
|
||
1F01E102000
|
heap
|
page read and write
|
||
1732C9B4000
|
heap
|
page read and write
|
||
1F01E059000
|
heap
|
page read and write
|
||
2205E908000
|
heap
|
page read and write
|
||
86B550E000
|
stack
|
page read and write
|
||
1B8BEC40000
|
trusted library allocation
|
page read and write
|
||
7D912F7000
|
stack
|
page read and write
|
||
1B4C8470000
|
heap
|
page read and write
|
||
7D9117B000
|
stack
|
page read and write
|
||
1F106CC3000
|
heap
|
page read and write
|
||
19F36A02000
|
heap
|
page read and write
|
||
1B8BEF00000
|
heap
|
page read and write
|
||
7D66CF8000
|
stack
|
page read and write
|
||
33827FE000
|
stack
|
page read and write
|
||
1B8B9641000
|
heap
|
page read and write
|
||
21B1A5D0000
|
trusted library allocation
|
page read and write
|
||
1732C983000
|
heap
|
page read and write
|
||
33825FF000
|
stack
|
page read and write
|
||
1732C0E1000
|
heap
|
page read and write
|
||
1B8B9656000
|
heap
|
page read and write
|
||
1B8BEC40000
|
trusted library allocation
|
page read and write
|
||
5EAF8B000
|
stack
|
page read and write
|
||
1F106BF0000
|
trusted library allocation
|
page read and write
|
||
1B8BEAA0000
|
trusted library allocation
|
page read and write
|
||
1B8B962A000
|
heap
|
page read and write
|
||
19F36A00000
|
heap
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1B8BEAB0000
|
trusted library allocation
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
2205E862000
|
heap
|
page read and write
|
||
1B8B9F00000
|
heap
|
page read and write
|
||
1B8BED10000
|
trusted library allocation
|
page read and write
|
||
21B1A677000
|
heap
|
page read and write
|
||
1732C984000
|
heap
|
page read and write
|
||
1B8BEC64000
|
trusted library allocation
|
page read and write
|
||
1B8BEF05000
|
heap
|
page read and write
|
||
1732BFF0000
|
remote allocation
|
page read and write
|
||
24FE8F9000
|
stack
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1B8B9D40000
|
trusted library allocation
|
page read and write
|
||
1F01E013000
|
heap
|
page read and write
|
||
15181A13000
|
heap
|
page read and write
|
||
15181B13000
|
heap
|
page read and write
|
||
21B1A470000
|
heap
|
page read and write
|
||
21B1A460000
|
heap
|
page read and write
|
||
1B8BEDA0000
|
trusted library allocation
|
page read and write
|
||
1B4C8610000
|
heap
|
page read and write
|
||
2205E82A000
|
heap
|
page read and write
|
||
33823FD000
|
stack
|
page read and write
|
||
1FA4CD00000
|
heap
|
page read and write
|
||
2205EF30000
|
trusted library allocation
|
page read and write
|
||
5A5E9FD000
|
stack
|
page read and write
|
||
1FA4CC29000
|
heap
|
page read and write
|
||
63BD0FE000
|
stack
|
page read and write
|
||
1D01C66E000
|
heap
|
page read and write
|
||
1F01E000000
|
heap
|
page read and write
|
||
976A277000
|
stack
|
page read and write
|
||
1F01E083000
|
heap
|
page read and write
|
||
1732C916000
|
heap
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
63BD1FF000
|
stack
|
page read and write
|
||
1732C900000
|
heap
|
page read and write
|
||
1B8BEB20000
|
trusted library allocation
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
1B8BEEDD000
|
heap
|
page read and write
|
||
15181A40000
|
heap
|
page read and write
|
||
1F01E029000
|
heap
|
page read and write
|
||
1732C102000
|
heap
|
page read and write
|
||
1732C984000
|
heap
|
page read and write
|
||
19F36A5C000
|
heap
|
page read and write
|
||
1732C90B000
|
heap
|
page read and write
|
||
1F01E073000
|
heap
|
page read and write
|
||
1732C0EC000
|
heap
|
page read and write
|
||
1F01E07C000
|
heap
|
page read and write
|
||
9769E7E000
|
stack
|
page read and write
|
||
7D6717B000
|
stack
|
page read and write
|
||
7D9107B000
|
stack
|
page read and write
|
||
1D01C700000
|
heap
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
24FE87E000
|
stack
|
page read and write
|
||
1F106C6D000
|
heap
|
page read and write
|
||
24F867B000
|
stack
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
24F88FE000
|
stack
|
page read and write
|
||
1732C974000
|
heap
|
page read and write
|
||
1B4C82A0000
|
heap
|
page read and write
|
||
1D01C600000
|
heap
|
page read and write
|
||
1B8B9676000
|
heap
|
page read and write
|
||
1732C918000
|
heap
|
page read and write
|
||
19F36890000
|
heap
|
page read and write
|
||
1732C9A5000
|
heap
|
page read and write
|
||
21B1A629000
|
heap
|
page read and write
|
||
1732CE00000
|
heap
|
page read and write
|
||
1B8BEEF3000
|
heap
|
page read and write
|
||
1732C0A9000
|
heap
|
page read and write
|
||
1B8BEE9F000
|
heap
|
page read and write
|
||
1B8B9570000
|
heap
|
page read and write
|
||
24F8CF7000
|
stack
|
page read and write
|
||
1D01C63C000
|
heap
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1FA4CC3C000
|
heap
|
page read and write
|
||
976A57F000
|
stack
|
page read and write
|
||
5EB6FC000
|
stack
|
page read and write
|
||
5EB57E000
|
stack
|
page read and write
|
||
7D90E7C000
|
stack
|
page read and write
|
||
1F01E750000
|
trusted library allocation
|
page read and write
|
||
7D66E7B000
|
stack
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1732C9A4000
|
heap
|
page read and write
|
||
1F106C2A000
|
heap
|
page read and write
|
||
1B4C82C6000
|
heap
|
page read and write
|
||
1732CE19000
|
heap
|
page read and write
|
||
1FA4CC13000
|
heap
|
page read and write
|
||
1F01E036000
|
heap
|
page read and write
|
||
1B8BEC60000
|
trusted library allocation
|
page read and write
|
||
7D671FF000
|
stack
|
page read and write
|
||
1B8BEE2D000
|
heap
|
page read and write
|
||
976A37E000
|
stack
|
page read and write
|
||
7D90EFD000
|
stack
|
page read and write
|
||
1B8BEEAC000
|
heap
|
page read and write
|
||
1B8BEE16000
|
heap
|
page read and write
|
||
63BCC7C000
|
stack
|
page read and write
|
||
21B1A675000
|
heap
|
page read and write
|
||
9769EFE000
|
stack
|
page read and write
|
||
1732C972000
|
heap
|
page read and write
|
||
2205E859000
|
heap
|
page read and write
|
||
1732C9D4000
|
heap
|
page read and write
|
||
1B8BED80000
|
trusted library allocation
|
page read and write
|
||
1B4C82CB000
|
heap
|
page read and write
|
||
1732C97A000
|
heap
|
page read and write
|
||
1B8B9F18000
|
heap
|
page read and write
|
||
1B8BA710000
|
trusted library section
|
page readonly
|
||
1F01E079000
|
heap
|
page read and write
|
||
1B8BEF03000
|
heap
|
page read and write
|
||
5EBC7E000
|
stack
|
page read and write
|
||
2205E877000
|
heap
|
page read and write
|
||
1B4C82D1000
|
heap
|
page read and write
|
||
976A179000
|
stack
|
page read and write
|
||
86B597E000
|
stack
|
page read and write
|
||
1B8B9E02000
|
heap
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
3381ECC000
|
stack
|
page read and write
|
||
1B8BED50000
|
trusted library allocation
|
page read and write
|
||
3382AFF000
|
stack
|
page read and write
|
||
21B1A702000
|
heap
|
page read and write
|
||
15181A79000
|
heap
|
page read and write
|
||
1F01E048000
|
heap
|
page read and write
|
||
19F37090000
|
remote allocation
|
page read and write
|
||
1732C976000
|
heap
|
page read and write
|
||
1732C108000
|
heap
|
page read and write
|
||
1732C987000
|
heap
|
page read and write
|
||
1732C9B5000
|
heap
|
page read and write
|
||
1B8BEC80000
|
trusted library allocation
|
page read and write
|
||
1F106A80000
|
heap
|
page read and write
|
||
1732C9B5000
|
heap
|
page read and write
|
||
21B1A63D000
|
heap
|
page read and write
|
||
1732BE80000
|
heap
|
page read and write
|
||
1F106CCA000
|
heap
|
page read and write
|
||
1732C974000
|
heap
|
page read and write
|
||
1B8BAAA0000
|
trusted library allocation
|
page read and write
|
||
15181A51000
|
heap
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
1732C9B5000
|
heap
|
page read and write
|
||
1B8BEEFB000
|
heap
|
page read and write
|
||
21B1A665000
|
heap
|
page read and write
|
||
63BCEFF000
|
stack
|
page read and write
|
||
1F01E05F000
|
heap
|
page read and write
|
||
7D915FF000
|
stack
|
page read and write
|
||
1B8BED60000
|
trusted library allocation
|
page read and write
|
||
1732C088000
|
heap
|
page read and write
|
||
24F8E7A000
|
stack
|
page read and write
|
||
1B8B9654000
|
heap
|
page read and write
|
||
1F01E802000
|
trusted library allocation
|
page read and write
|
||
1B8BEE5E000
|
heap
|
page read and write
|
||
1732C9D4000
|
heap
|
page read and write
|
||
1732CE03000
|
heap
|
page read and write
|
||
2205E83C000
|
heap
|
page read and write
|
||
2205E760000
|
heap
|
page read and write
|
||
7D674FA000
|
stack
|
page read and write
|
||
2205E863000
|
heap
|
page read and write
|
||
5A5E8FD000
|
stack
|
page read and write
|
||
1732BFF0000
|
remote allocation
|
page read and write
|
||
1B8BED70000
|
trusted library allocation
|
page read and write
|
||
7D6767D000
|
stack
|
page read and write
|
||
7D6707E000
|
stack
|
page read and write
|
||
2205E770000
|
heap
|
page read and write
|
||
1732C90B000
|
heap
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
1732C916000
|
heap
|
page read and write
|
||
1B8BA720000
|
trusted library section
|
page readonly
|
||
1F01E045000
|
heap
|
page read and write
|
||
15181820000
|
heap
|
page read and write
|
||
1732C90D000
|
heap
|
page read and write
|
||
63BCFFE000
|
stack
|
page read and write
|
||
1FA4CC5D000
|
heap
|
page read and write
|
||
1FA4CD08000
|
heap
|
page read and write
|
||
1F01E067000
|
heap
|
page read and write
|
||
15181830000
|
heap
|
page read and write
|
||
1F01E04B000
|
heap
|
page read and write
|
||
1732C9A4000
|
heap
|
page read and write
|
||
5EB7FC000
|
stack
|
page read and write
|
||
1B8B9699000
|
heap
|
page read and write
|
||
63BCCFE000
|
stack
|
page read and write
|
||
1F01DF90000
|
heap
|
page read and write
|
||
1B8B9F13000
|
heap
|
page read and write
|
||
1B8BEC70000
|
trusted library allocation
|
page read and write
|
||
1B4C82CB000
|
heap
|
page read and write
|
||
1732C081000
|
heap
|
page read and write
|
||
1D01C674000
|
heap
|
page read and write
|
||
24FE978000
|
stack
|
page read and write
|
||
1B8BED90000
|
trusted library allocation
|
page read and write
|
||
2205E900000
|
heap
|
page read and write
|
||
1B8B95E0000
|
heap
|
page read and write
|
||
19F36A3C000
|
heap
|
page read and write
|
||
1D01C702000
|
heap
|
page read and write
|
||
1B4C82B1000
|
heap
|
page read and write
|
||
1B4C82E6000
|
heap
|
page read and write
|
||
5EB3FC000
|
stack
|
page read and write
|
||
1F107532000
|
heap
|
page read and write
|
||
15181990000
|
trusted library allocation
|
page read and write
|
||
24F877E000
|
stack
|
page read and write
|
||
1B8BEF02000
|
heap
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1FA4CC7B000
|
heap
|
page read and write
|
||
1D01C5F0000
|
heap
|
page read and write
|
||
1732C97E000
|
heap
|
page read and write
|
||
33828FE000
|
stack
|
page read and write
|
||
7D6757E000
|
stack
|
page read and write
|
||
1FA4D402000
|
trusted library allocation
|
page read and write
|
||
1732C029000
|
heap
|
page read and write
|
||
1B8BEC70000
|
trusted library allocation
|
page read and write
|
||
2205E902000
|
heap
|
page read and write
|
||
1732C97D000
|
heap
|
page read and write
|
||
1732C916000
|
heap
|
page read and write
|
||
1B8BA6D0000
|
trusted library section
|
page readonly
|
||
1B8BEB30000
|
trusted library allocation
|
page read and write
|
||
1732C0B3000
|
heap
|
page read and write
|
||
24F86FE000
|
stack
|
page read and write
|
||
1F106C87000
|
heap
|
page read and write
|
||
1B4C8615000
|
heap
|
page read and write
|
||
1F01E044000
|
heap
|
page read and write
|
||
1732C982000
|
heap
|
page read and write
|
||
1732C918000
|
heap
|
page read and write
|
||
19F36900000
|
heap
|
page read and write
|
||
1F01E07A000
|
heap
|
page read and write
|
||
1732C989000
|
heap
|
page read and write
|
||
1732C974000
|
heap
|
page read and write
|
||
19F36A13000
|
heap
|
page read and write
|
||
1B8B9F18000
|
heap
|
page read and write
|
||
1732C03C000
|
heap
|
page read and write
|
||
2205E890000
|
heap
|
page read and write
|
||
1008FB000
|
stack
|
page read and write
|
||
1F106C40000
|
heap
|
page read and write
|
||
1D01C672000
|
heap
|
page read and write
|
||
1732C802000
|
heap
|
page read and write
|
||
1732C989000
|
heap
|
page read and write
|
||
1FA4CC85000
|
heap
|
page read and write
|
||
1732C982000
|
heap
|
page read and write
|
||
1732C983000
|
heap
|
page read and write
|
||
1B8BAA93000
|
trusted library allocation
|
page read and write
|
||
1732C982000
|
heap
|
page read and write
|
||
63BCD7E000
|
stack
|
page read and write
|
||
1732C0AA000
|
heap
|
page read and write
|
||
1B8B9671000
|
heap
|
page read and write
|
||
2205E869000
|
heap
|
page read and write
|
||
33829FF000
|
stack
|
page read and write
|
||
2205E874000
|
heap
|
page read and write
|
||
1B8BEE4C000
|
heap
|
page read and write
|
||
5A5E4FE000
|
stack
|
page read and write
|
||
1B8B966C000
|
heap
|
page read and write
|
||
10007C000
|
stack
|
page read and write
|
||
1F01E03D000
|
heap
|
page read and write
|
||
86B5D7F000
|
stack
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1B8BEEE2000
|
heap
|
page read and write
|
||
1006FF000
|
stack
|
page read and write
|
||
19F36A29000
|
heap
|
page read and write
|
||
7D672FF000
|
stack
|
page read and write
|
||
1FA4CAD0000
|
heap
|
page read and write
|
||
1F01E031000
|
heap
|
page read and write
|
||
1732C989000
|
heap
|
page read and write
|
||
5A5E67E000
|
stack
|
page read and write
|
||
1F01E046000
|
heap
|
page read and write
|
||
1B8B968E000
|
heap
|
page read and write
|
||
5A5E3FE000
|
stack
|
page read and write
|
||
15182202000
|
trusted library allocation
|
page read and write
|
||
1F01E057000
|
heap
|
page read and write
|
||
1732C9A4000
|
heap
|
page read and write
|
||
21B1A613000
|
heap
|
page read and write
|
||
24FE53A000
|
stack
|
page read and write
|
||
1732C974000
|
heap
|
page read and write
|
||
1FA4CA70000
|
heap
|
page read and write
|
||
1732CE03000
|
heap
|
page read and write
|
||
1732C113000
|
heap
|
page read and write
|
||
1F106C00000
|
heap
|
page read and write
|
||
21B1A66F000
|
heap
|
page read and write
|
||
86B5B77000
|
stack
|
page read and write
|
||
1B4C82DF000
|
heap
|
page read and write
|
||
3382BFF000
|
stack
|
page read and write
|
||
24F89F8000
|
stack
|
page read and write
|
||
1B4C82E6000
|
heap
|
page read and write
|
||
1732BFF0000
|
remote allocation
|
page read and write
|
||
1005FB000
|
stack
|
page read and write
|
||
7D90F7E000
|
stack
|
page read and write
|
||
976A47D000
|
stack
|
page read and write
|
||
1B4C82C4000
|
heap
|
page read and write
|
||
1D01C661000
|
heap
|
page read and write
|
||
33822FB000
|
stack
|
page read and write
|
||
1D01C629000
|
heap
|
page read and write
|
||
1732CE3E000
|
heap
|
page read and write
|
||
86B5C7F000
|
stack
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1F01E05C000
|
heap
|
page read and write
|
||
2205E877000
|
heap
|
page read and write
|
||
86B548C000
|
stack
|
page read and write
|
||
1B8BEE3F000
|
heap
|
page read and write
|
||
7D914FD000
|
stack
|
page read and write
|
||
1732C992000
|
heap
|
page read and write
|
||
5A5E77D000
|
stack
|
page read and write
|
||
19F368A0000
|
heap
|
page read and write
|
||
1F01E04E000
|
heap
|
page read and write
|
||
1D01C670000
|
heap
|
page read and write
|
||
1732CE02000
|
heap
|
page read and write
|
||
1732C0D4000
|
heap
|
page read and write
|
||
1732C9B4000
|
heap
|
page read and write
|
||
1F106C13000
|
heap
|
page read and write
|
||
1F01E002000
|
heap
|
page read and write
|
||
15181B02000
|
heap
|
page read and write
|
||
1732C949000
|
heap
|
page read and write
|
||
1007FF000
|
stack
|
page read and write
|
||
1732C000000
|
heap
|
page read and write
|
||
1B8BA6E0000
|
trusted library section
|
page readonly
|
||
19F37060000
|
trusted library allocation
|
page read and write
|
||
1732C9BA000
|
heap
|
page read and write
|
||
1F01E064000
|
heap
|
page read and write
|
||
7D6727E000
|
stack
|
page read and write
|
||
2205E7D0000
|
heap
|
page read and write
|
||
1B4C82D1000
|
heap
|
page read and write
|
||
1F01E05A000
|
heap
|
page read and write
|
||
2205E85F000
|
heap
|
page read and write
|
||
1F106A90000
|
heap
|
page read and write
|
||
1D01C613000
|
heap
|
page read and write
|
||
1F106D13000
|
heap
|
page read and write
|
||
1B8B9687000
|
heap
|
page read and write
|
||
1B8B9674000
|
heap
|
page read and write
|
||
86B558F000
|
stack
|
page read and write
|
||
5EBB7C000
|
stack
|
page read and write
|
||
1F01DFF0000
|
heap
|
page read and write
|
||
1732C013000
|
heap
|
page read and write
|
||
24FE5BF000
|
stack
|
page read and write
|
||
15181A77000
|
heap
|
page read and write
|
||
5EBA7E000
|
stack
|
page read and write
|
||
1732C970000
|
heap
|
page read and write
|
||
1B8B9F02000
|
heap
|
page read and write
|
||
1B8BA700000
|
trusted library section
|
page readonly
|
||
1B8B96AB000
|
heap
|
page read and write
|
||
1732C04F000
|
heap
|
page read and write
|
||
1732C9A5000
|
heap
|
page read and write
|
||
21B1AE02000
|
trusted library allocation
|
page read and write
|
||
9769BBC000
|
stack
|
page read and write
|
||
2205E866000
|
heap
|
page read and write
|
||
1B4C82B6000
|
heap
|
page read and write
|
||
1D01C713000
|
heap
|
page read and write
|
||
19F37090000
|
remote allocation
|
page read and write
|
||
2205E800000
|
heap
|
page read and write
|
||
1732C04B000
|
heap
|
page read and write
|
||
1F01E076000
|
heap
|
page read and write
|
||
1732C9BA000
|
heap
|
page read and write
|
||
1732C980000
|
heap
|
page read and write
|
||
1F01E058000
|
heap
|
page read and write
|
||
1732C116000
|
heap
|
page read and write
|
||
1732C993000
|
heap
|
page read and write
|
||
1732C070000
|
heap
|
page read and write
|
||
5EB97C000
|
stack
|
page read and write
|
||
1B4C8280000
|
heap
|
page read and write
|
||
1D01C590000
|
heap
|
page read and write
|
||
1732C9B7000
|
heap
|
page read and write
|
||
1B8C0000000
|
heap
|
page read and write
|
||
15181A02000
|
heap
|
page read and write
|
||
7D673FF000
|
stack
|
page read and write
|
||
1732C973000
|
heap
|
page read and write
|
There are 523 hidden memdumps, click here to show them.