IOC Report
J5V5DR.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\J5V5DR.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\J5V5DR.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,HdQZgnE
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,IfkPmdu
malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1

URLs

Name
IP
Malicious
http://ilekvoyn.com/
64.227.182.2
malicious
ilekvoyn.com
malicious
http://ilekvoyn.com/4
unknown
http://ilekvoyn.com/u5
unknown
http://ilekvoyn.com/Y
unknown
https://shapka-youtube.ru/
unknown
http://ilekvoyn.com:80/
unknown

Domains

Name
IP
Malicious
ilekvoyn.com
64.227.182.2
malicious

IPs

IP
Domain
Country
Malicious
64.227.182.2
ilekvoyn.com
Canada
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
CF0000
heap
page read and write
malicious
1D395BDE000
heap
page read and write
malicious
239D1393000
heap
page read and write
malicious
B7B000
heap
page read and write
malicious
1D395CB3000
heap
page read and write
malicious
1EDE3F48000
heap
page read and write
malicious
1D397AAD000
heap
page read and write
malicious
219316C2000
heap
page read and write
1DC83302000
heap
page read and write
29CED8E0000
heap
page read and write
29CEDBE0000
heap
page read and write
25CCF061000
heap
page read and write
1D397AD3000
heap
page read and write
5ED087B000
stack
page read and write
AFC96FF000
stack
page read and write
1DC87D90000
trusted library allocation
page read and write
1EDE5D04000
heap
page read and write
2B39EC3C000
heap
page read and write
1DC88250000
trusted library allocation
page read and write
1DB0B37E000
heap
page read and write
1DB0B38E000
heap
page read and write
A00000
heap
page read and write
19F1CCCA000
heap
page read and write
1DC880FB000
heap
page read and write
2125D070000
trusted library allocation
page read and write
1DB0AA88000
heap
page read and write
239D1370000
remote allocation
page read and write
1DB0B3AE000
heap
page read and write
1DC83910000
trusted library allocation
page read and write
25CCF113000
heap
page read and write
1DB0B38A000
heap
page read and write
2B39EC64000
heap
page read and write
6FB000
stack
page read and write
1DC82A97000
heap
page read and write
180006000
direct allocation
page readonly
24773502000
heap
page read and write
1DC88102000
heap
page read and write
AFC9BFD000
stack
page read and write
1DC831F0000
trusted library allocation
page read and write
1DB0B300000
heap
page read and write
AE0000
unclassified section
page execute and read and write
1EDE5960000
remote allocation
page read and write
1DB0B381000
heap
page read and write
2B39F402000
trusted library allocation
page read and write
25CCF061000
heap
page read and write
1EDE5CFD000
heap
page read and write
1DB0B392000
heap
page read and write
AFC938C000
stack
page read and write
A5ACBBB000
stack
page read and write
196F9B20000
heap
page read and write
1DB0B383000
heap
page read and write
35A4E7E000
stack
page read and write
1DB0B38B000
heap
page read and write
E8BD87E000
stack
page read and write
D38000
heap
page read and write
1DB0AAEE000
heap
page read and write
99F1CF7000
stack
page read and write
196F9C78000
heap
page read and write
C29597E000
stack
page read and write
2558FB08000
heap
page read and write
19F1CC00000
heap
page read and write
7FFC66B00000
unkown
page readonly
2125C30A000
heap
page read and write
1DC87F28000
trusted library allocation
page read and write
CEF000
stack
page read and write
239D2D1F000
heap
page read and write
D1922FF000
stack
page read and write
23E698C0000
heap
page read and write
1DB0B802000
heap
page read and write
AFC9CFB000
stack
page read and write
1DB0B386000
heap
page read and write
1DB0B3A0000
heap
page read and write
1D395BA0000
heap
page read and write
23E69A02000
heap
page read and write
1DB0AA00000
heap
page read and write
196F9C55000
heap
page read and write
D191FAC000
stack
page read and write
24773465000
heap
page read and write
2B39EA20000
heap
page read and write
1DB0B394000
heap
page read and write
2125C470000
trusted library allocation
page read and write
1DB0AA4B000
heap
page read and write
7FFC66B07000
unkown
page readonly
25CCF062000
heap
page read and write
1DB0B383000
heap
page read and write
2B39EC00000
heap
page read and write
1DB0B383000
heap
page read and write
25CCF802000
trusted library allocation
page read and write
1DB0B365000
heap
page read and write
1D395E30000
heap
page read and write
E8BD3DB000
stack
page read and write
1DC82A78000
heap
page read and write
23E698B0000
heap
page read and write
2B39EA80000
heap
page read and write
219316C2000
heap
page read and write
1EDE4024000
heap
page read and write
26C0000
remote allocation
page read and write
25CCF061000
heap
page read and write
19F1D532000
heap
page read and write
1DB0B802000
heap
page read and write
5ED0B7F000
stack
page read and write
1E0A1190000
trusted library allocation
page read and write
219316B4000
heap
page read and write
35A517E000
stack
page read and write
196F9C68000
heap
page read and write
1D397750000
heap
page read and write
1DC829C0000
trusted library allocation
page read and write
180004000
direct allocation
page readonly
C6D000
heap
page read and write
766C47B000
stack
page read and write
24773477000
heap
page read and write
1DB0B38B000
heap
page read and write
1EDE5D2A000
heap
page read and write
1DC88102000
heap
page read and write
F9340FE000
stack
page read and write
9981AFC000
stack
page read and write
1DB0B800000
heap
page read and write
219316C6000
heap
page read and write
1DB0B38E000
heap
page read and write
7FFC65B10000
unkown
page readonly
21931630000
heap
page read and write
7FFC66B01000
unkown
page execute read
1DB0B394000
heap
page read and write
1DB0B38A000
heap
page read and write
19F1CD13000
heap
page read and write
BC44F7B000
stack
page read and write
2B39EA10000
heap
page read and write
2B39EC29000
heap
page read and write
180001000
direct allocation
page execute read
C5E000
heap
page read and write
23E6A202000
trusted library allocation
page read and write
1DC82A00000
heap
page read and write
B6F2CFF000
stack
page read and write
1DB0B38F000
heap
page read and write
1DB0B383000
heap
page read and write
7FFC66B00000
unkown
page readonly
1DC83304000
heap
page read and write
2770000
heap
page read and write
2558FB00000
heap
page read and write
BC44AEC000
stack
page read and write
1DB0B386000
heap
page read and write
1DB0B3B7000
heap
page read and write
24773465000
heap
page read and write
25CCF061000
heap
page read and write
1DB0B3B4000
heap
page read and write
5ED0A77000
stack
page read and write
A31757C000
stack
page read and write
23E69920000
heap
page read and write
1DC82A27000
heap
page read and write
1DC82A92000
heap
page read and write
35A4EFE000
stack
page read and write
C29567A000
stack
page read and write
2558F860000
heap
page read and write
9981BFC000
stack
page read and write
2193169A000
heap
page read and write
1DB0B383000
heap
page read and write
7244FCC000
stack
page read and write
25CCF061000
heap
page read and write
A5AD0FB000
stack
page read and write
239D1290000
heap
page read and write
29CED780000
heap
page read and write
239D2D3E000
heap
page read and write
1E0A1258000
heap
page read and write
1DC88080000
trusted library allocation
page read and write
2125C303000
heap
page read and write
1DB0AA5A000
heap
page read and write
1DC87F44000
trusted library allocation
page read and write
1DB0B393000
heap
page read and write
239D1320000
heap
page read and write
25CCF06B000
heap
page read and write
1DB0B3A4000
heap
page read and write
1DB0AAAB000
heap
page read and write
F93427B000
stack
page read and write
23E69A79000
heap
page read and write
B6F2AFF000
stack
page read and write
1EDE401D000
heap
page read and write
196F9C60000
heap
page read and write
1DC88070000
trusted library allocation
page read and write
196F9C61000
heap
page read and write
19F1CB30000
heap
page read and write
2B39EC81000
heap
page read and write
1DC82ABC000
heap
page read and write
1DC83318000
heap
page read and write
1DB0B38B000
heap
page read and write
A31777D000
stack
page read and write
1DB0AA80000
heap
page read and write
2125C240000
heap
page read and write
23E69B02000
heap
page read and write
25CCF061000
heap
page read and write
1EDE4235000
heap
page read and write
1DC82AB0000
heap
page read and write
99F1FF9000
stack
page read and write
1EDE4034000
heap
page read and write
766CC7F000
stack
page read and write
19F1CC6F000
heap
page read and write
1E0A1200000
heap
page read and write
1DC8808C000
heap
page read and write
1E0A1240000
heap
page read and write
29CEDBE5000
heap
page read and write
2558FA7D000
heap
page read and write
A3174FE000
stack
page read and write
1DB0B386000
heap
page read and write
1DB0A880000
heap
page read and write
99F17CB000
stack
page read and write
1DB0B383000
heap
page read and write
1DC87FF0000
trusted library allocation
page read and write
1DC88390000
trusted library allocation
page read and write
239D2CF1000
heap
page read and write
E0B929B000
stack
page read and write
1DB0B3B1000
heap
page read and write
196F9C41000
heap
page read and write
25CCF061000
heap
page read and write
1D397AA0000
heap
page read and write
5ED06FE000
stack
page read and write
239D2E65000
heap
page read and write
1DB0B802000
heap
page read and write
1DB0B81A000
heap
page read and write
2125C2C0000
heap
page read and write
1DB0AB13000
heap
page read and write
196F9C21000
heap
page read and write
196F9C4D000
heap
page read and write
2B39EC59000
heap
page read and write
219316C6000
heap
page read and write
2558F7F0000
heap
page read and write
1DB0B38A000
heap
page read and write
1DB0B37D000
heap
page read and write
7FFC66B01000
unkown
page execute read
219316A1000
heap
page read and write
7FFC66B08000
unkown
page write copy
1DB0B393000
heap
page read and write
24773483000
heap
page read and write
1DB0B37C000
heap
page read and write
196F9C5F000
heap
page read and write
1DC82A29000
heap
page read and write
1DB0AAF7000
heap
page read and write
1DC82AA2000
heap
page read and write
24773413000
heap
page read and write
1DB0AA4D000
heap
page read and write
1DC82AAD000
heap
page read and write
1DC88061000
heap
page read and write
2558FA4D000
heap
page read and write
A3177FF000
stack
page read and write
1DB0B3C0000
heap
page read and write
1DC880E7000
heap
page read and write
19F1CCC3000
heap
page read and write
24773513000
heap
page read and write
25CCF002000
heap
page read and write
24773300000
heap
page read and write
24773500000
heap
page read and write
23E69A5B000
heap
page read and write
1DB0B37C000
heap
page read and write
1DB0AA70000
heap
page read and write
239D2D35000
heap
page read and write
261C000
stack
page read and write
D19227F000
stack
page read and write
1DB0B38A000
heap
page read and write
1DB0B3A0000
heap
page read and write
1DC880FE000
heap
page read and write
19F1CCE1000
heap
page read and write
1D395B10000
heap
page read and write
239D2D11000
heap
page read and write
1DB0B383000
heap
page read and write
21931860000
heap
page read and write
239D1340000
unclassified section
page execute and read and write
1DB0B3A2000
heap
page read and write
1DB0B3B5000
heap
page read and write
99F1A7E000
stack
page read and write
99F1DF7000
stack
page read and write
1DB0B383000
heap
page read and write
2477346E000
heap
page read and write
25CCF061000
heap
page read and write
19F1CC13000
heap
page read and write
1DC880DD000
heap
page read and write
1DB0B383000
heap
page read and write
219316B8000
heap
page read and write
1DC82850000
heap
page read and write
180008000
direct allocation
page read and write
1DC87E00000
trusted library allocation
page read and write
196F9C6A000
heap
page read and write
1DB0B38F000
heap
page read and write
B70000
heap
page read and write
1DB0B38D000
heap
page read and write
196F9C7B000
heap
page read and write
1DB0B377000
heap
page read and write
25702E60000
heap
page read and write
2125C110000
trusted library allocation
page read and write
9981CFF000
stack
page read and write
2477343C000
heap
page read and write
35A527E000
stack
page read and write
1DC880FC000
heap
page read and write
2125C3D0000
trusted library allocation
page read and write
766C17C000
stack
page read and write
25CCF061000
heap
page read and write
1DC87F20000
trusted library allocation
page read and write
2125C469000
heap
page read and write
25CCF061000
heap
page read and write
1DB0AA48000
heap
page read and write
180004000
direct allocation
page readonly
25CCF061000
heap
page read and write
239D147E000
heap
page read and write
25702E80000
heap
page read and write
2558FA4F000
heap
page read and write
2558FB13000
heap
page read and write
1E0A1A02000
trusted library allocation
page read and write
1D395B80000
heap
page read and write
2558FA13000
heap
page read and write
1DB0B37C000
heap
page read and write
C2958FE000
stack
page read and write
1DC880FE000
heap
page read and write
196F9C3D000
heap
page read and write
1DB0B383000
heap
page read and write
25CCF057000
heap
page read and write
180000000
direct allocation
page read and write
180004000
direct allocation
page readonly
19F1CC29000
heap
page read and write
219318F5000
heap
page read and write
180001000
direct allocation
page execute read
269B000
stack
page read and write
1DB0B3AE000
heap
page read and write
F9343FB000
stack
page read and write
1DB0B38B000
heap
page read and write
196F9B10000
heap
page read and write
1EDE59A0000
heap
page read and write
A5AD1FB000
stack
page read and write
5ED0C7F000
stack
page read and write
1DC82ABB000
heap
page read and write
1DB0B385000
heap
page read and write
1DB0AADB000
heap
page read and write
2477344C000
heap
page read and write
25CCF013000
heap
page read and write
1EDE3F40000
heap
page read and write
23E69A6C000
heap
page read and write
25590202000
trusted library allocation
page read and write
1DB0AA58000
heap
page read and write
2B39ED00000
heap
page read and write
A20000
heap
page read and write
1DB0B38E000
heap
page read and write
1DC87F20000
trusted library allocation
page read and write
AFC99FE000
stack
page read and write
180008000
direct allocation
page read and write
1DB0B38F000
heap
page read and write
E0B9B7F000
stack
page read and write
99817FF000
stack
page read and write
26C0000
remote allocation
page read and write
1DB0AA4F000
heap
page read and write
1DB0B377000
heap
page read and write
1DC83202000
heap
page read and write
1DC83200000
heap
page read and write
1EDE5CF0000
heap
page read and write
23E6A080000
trusted library allocation
page read and write
25CCF061000
heap
page read and write
35A4BCC000
stack
page read and write
1DB0AA4C000
heap
page read and write
19F1CCB9000
heap
page read and write
1DB0AA3C000
heap
page read and write
1DC83D90000
trusted library allocation
page read and write
25CCF061000
heap
page read and write
196F9C5C000
heap
page read and write
724527F000
stack
page read and write
1E0A11C0000
remote allocation
page read and write
1DB0AA50000
heap
page read and write
766BEF7000
stack
page read and write
196F9C6E000
heap
page read and write
99F217A000
stack
page read and write
239D1300000
heap
page read and write
19F1CBA0000
heap
page read and write
25CCF061000
heap
page read and write
1DC82AB9000
heap
page read and write
E0B987E000
stack
page read and write
239D1370000
remote allocation
page read and write
1DC83215000
heap
page read and write
1DB0B38A000
heap
page read and write
219316B3000
heap
page read and write
2558FA53000
heap
page read and write
E8BD7F9000
stack
page read and write
2125D060000
heap
page readonly
1DC88107000
heap
page read and write
766C07B000
stack
page read and write
A31727B000
stack
page read and write
1DB0B802000
heap
page read and write
1DB0B821000
heap
page read and write
23E69A3F000
heap
page read and write
1DC87F50000
trusted library allocation
page read and write
239D2D02000
heap
page read and write
2B39EC73000
heap
page read and write
25CCF061000
heap
page read and write
196F9C58000
heap
page read and write
180008000
direct allocation
page read and write
25CCF061000
heap
page read and write
1DB0B393000
heap
page read and write
1DB0AB02000
heap
page read and write
19F1CC40000
heap
page read and write
1DB0AA13000
heap
page read and write
2125C30C000
heap
page read and write
2558FA4C000
heap
page read and write
1DC82A13000
heap
page read and write
1DC88280000
remote allocation
page read and write
E8BD779000
stack
page read and write
1E0A1236000
heap
page read and write
23E69A75000
heap
page read and write
1DC88000000
heap
page read and write
2558FA8C000
heap
page read and write
1DC83359000
heap
page read and write
1DB0B39C000
heap
page read and write
196F9B80000
heap
page read and write
1DB0B38A000
heap
page read and write
1DB0B352000
heap
page read and write
239D2E60000
heap
page read and write
239D138D000
heap
page read and write
219318F0000
heap
page read and write
2477342A000
heap
page read and write
1DB0B38B000
heap
page read and write
1DB0B3D1000
heap
page read and write
1DB0B38E000
heap
page read and write
21931880000
heap
page read and write
1DB0B202000
heap
page read and write
99F207F000
unkown
page read and write
23E69A72000
heap
page read and write
247733A0000
trusted library allocation
page read and write
196F9C64000
heap
page read and write
1DB0B37A000
heap
page read and write
2B39EB80000
trusted library allocation
page read and write
1DB0B317000
heap
page read and write
196F9C40000
heap
page read and write
219316B9000
heap
page read and write
1DB0A9E0000
trusted library allocation
page read and write
196F9C59000
heap
page read and write
766BAEB000
stack
page read and write
7FFC66B08000
unkown
page write copy
1DB0B385000
heap
page read and write
1DB0AA57000
heap
page read and write
196F9C67000
heap
page read and write
196F9C7C000
heap
page read and write
25CCF061000
heap
page read and write
7FFC66B01000
unkown
page execute read
2125C32F000
heap
page read and write
25702F30000
heap
page read and write
2558FA3C000
heap
page read and write
A5AD2FF000
stack
page read and write
1DB0B3A2000
heap
page read and write
1DC82AB9000
heap
page read and write
1DC880AB000
heap
page read and write
F93417E000
stack
page read and write
180006000
direct allocation
page readonly
219316A6000
heap
page read and write
29CEF540000
heap
page read and write
1DB0B377000
heap
page read and write
F9342FE000
stack
page read and write
1DB0AA52000
heap
page read and write
25702F50000
heap
page read and write
1EDE4040000
heap
page read and write
1D395DE0000
unclassified section
page execute and read and write
F9344F7000
stack
page read and write
1DC88021000
heap
page read and write
1DB0B386000
heap
page read and write
1EDE4230000
heap
page read and write
2558FA2A000
heap
page read and write
B6F2BFF000
stack
page read and write
25CCF061000
heap
page read and write
998197C000
stack
page read and write
1D395E10000
remote allocation
page read and write
19F1CC87000
heap
page read and write
180001000
direct allocation
page execute read
25CCF061000
heap
page read and write
1DB0B3DB000
heap
page read and write
2558F800000
heap
page read and write
25CCF061000
heap
page read and write
E0B97FB000
stack
page read and write
1DB0B802000
heap
page read and write
23E69A13000
heap
page read and write
25702F35000
heap
page read and write
766C27F000
stack
page read and write
1DB0B3B1000
heap
page read and write
1DC88042000
heap
page read and write
A28447F000
stack
page read and write
72452FF000
stack
page read and write
25CCF061000
heap
page read and write
7FFC66B07000
unkown
page readonly
BC44EFC000
stack
page read and write
1DC87F60000
trusted library allocation
page read and write
196F9C13000
heap
page read and write
1DC82B02000
heap
page read and write
1D395BDB000
heap
page read and write
1D395CAD000
heap
page read and write
1DB0B3B8000
heap
page read and write
F9346FF000
stack
page read and write
1DB0AA49000
heap
page read and write
1E0A1202000
heap
page read and write
25CCF03C000
heap
page read and write
1DC88260000
trusted library allocation
page read and write
180006000
direct allocation
page readonly
1DB0B38B000
heap
page read and write
196F9C85000
heap
page read and write
E0B9977000
stack
page read and write
29CED970000
heap
page read and write
A28411C000
stack
page read and write
9981EFF000
stack
page read and write
766C37B000
stack
page read and write
2558FA84000
heap
page read and write
35A507E000
stack
page read and write
25CCF061000
heap
page read and write
25CCF061000
heap
page read and write
196F9C47000
heap
page read and write
196F9C75000
heap
page read and write
1EDE5960000
remote allocation
page read and write
1DB0B37C000
heap
page read and write
1EDE5D00000
heap
page read and write
1DC88280000
remote allocation
page read and write
1DC82B07000
heap
page read and write
25CCF061000
heap
page read and write
29CED97B000
heap
page read and write
C29577E000
stack
page read and write
196F9C57000
heap
page read and write
1DB0B100000
remote allocation
page read and write
1DB0AAE3000
heap
page read and write
BC44B6E000
stack
page read and write
25CCF102000
heap
page read and write
B6F2DFF000
stack
page read and write
2B39EC51000
heap
page read and write
1EDE5D16000
heap
page read and write
1EDE3DF0000
heap
page read and write
1DC82B02000
heap
page read and write
1E0A11C0000
remote allocation
page read and write
1DB0B100000
remote allocation
page read and write
1DB0B37E000
heap
page read and write
25CCF061000
heap
page read and write
2125C320000
heap
page read and write
E0B96FB000
stack
page read and write
1DB0B381000
heap
page read and write
2B39ED02000
heap
page read and write
1DC83820000
trusted library allocation
page read and write
1DC88370000
trusted library allocation
page read and write
24773370000
heap
page read and write
1DB0B39E000
heap
page read and write
19F1CB40000
heap
page read and write
DF0000
heap
page read and write
A5AD3FF000
stack
page read and write
196F9C42000
heap
page read and write
23E69B13000
heap
page read and write
7FFC66B08000
unkown
page write copy
766BB6F000
stack
page read and write
1DB0B38A000
heap
page read and write
180004000
direct allocation
page readonly
1DC88102000
heap
page read and write
99F1AFE000
stack
page read and write
25CCF061000
heap
page read and write
1DB0B821000
heap
page read and write
1DB0AAC0000
heap
page read and write
24773400000
heap
page read and write
196F9C65000
heap
page read and write
1DB0B38A000
heap
page read and write
1DB0B100000
remote allocation
page read and write
180006000
direct allocation
page readonly
25CCF061000
heap
page read and write
F93407B000
stack
page read and write
26C0000
remote allocation
page read and write
C295879000
stack
page read and write
25CCF061000
heap
page read and write
A3173FE000
stack
page read and write
2193169E000
heap
page read and write
1DC83318000
heap
page read and write
1DB0B377000
heap
page read and write
1DB0B38E000
heap
page read and write
25CCF05C000
heap
page read and write
B6F21CB000
stack
page read and write
1EDE4060000
heap
page read and write
2125D080000
trusted library allocation
page read and write
2125C460000
heap
page read and write
196F9C6C000
heap
page read and write
1DC82A8D000
heap
page read and write
180001000
direct allocation
page execute read
1E0A1100000
heap
page read and write
2B39EC5F000
heap
page read and write
196F9C56000
heap
page read and write
640000
heap
page read and write
19F1D500000
heap
page read and write
196F9D02000
heap
page read and write
25CCF061000
heap
page read and write
25CCEE80000
heap
page read and write
1DC87FF0000
trusted library allocation
page read and write
99F1BFC000
stack
page read and write
196F9C63000
heap
page read and write
1DB0B3AE000
heap
page read and write
1DC831F3000
trusted library allocation
page read and write
2125CE20000
trusted library allocation
page read and write
196F9C62000
heap
page read and write
1DB0B81A000
heap
page read and write
DF5000
heap
page read and write
1E0A11C0000
remote allocation
page read and write
25CCEE10000
heap
page read and write
E8BD8F9000
stack
page read and write
25702F5B000
heap
page read and write
B6F27FE000
stack
page read and write
25CCF061000
heap
page read and write
2B39EC13000
heap
page read and write
5ED067C000
stack
page read and write
25702D20000
heap
page read and write
180000000
direct allocation
page read and write
1DB0A870000
heap
page read and write
23E69A24000
heap
page read and write
1DB0B38D000
heap
page read and write
1D395BD0000
heap
page read and write
D20000
heap
page read and write
25CCF061000
heap
page read and write
25704950000
heap
page read and write
AFC97FE000
stack
page read and write
1DC87F50000
trusted library allocation
page read and write
1E0A1160000
heap
page read and write
196F9C32000
heap
page read and write
1DC87F2E000
trusted library allocation
page read and write
2125D0D0000
trusted library allocation
page read and write
25CCEE20000
heap
page read and write
239D1380000
heap
page read and write
5ED077D000
stack
page read and write
1DB0B818000
heap
page read and write
2558FA56000
heap
page read and write
1DC8804F000
heap
page read and write
24773455000
heap
page read and write
1DB0B3A4000
heap
page read and write
E0B931D000
stack
page read and write
1DB0B38A000
heap
page read and write
1E0A1302000
heap
page read and write
1DC82B25000
heap
page read and write
2125C465000
heap
page read and write
25CCF061000
heap
page read and write
1DB0B3B7000
heap
page read and write
9981DFC000
stack
page read and write
B6F26FC000
stack
page read and write
1DB0B383000
heap
page read and write
25CCF061000
heap
page read and write
1DB0B38D000
heap
page read and write
2558F960000
trusted library allocation
page read and write
1EDE5960000
remote allocation
page read and write
1DB0B38E000
heap
page read and write
196F9C3B000
heap
page read and write
1DB0B3AF000
heap
page read and write
766C77D000
stack
page read and write
1DB0B802000
heap
page read and write
1DC82AFF000
heap
page read and write
1DB0B38F000
heap
page read and write
1DC88102000
heap
page read and write
1DC83300000
heap
page read and write
196F9C00000
heap
page read and write
1DC88230000
trusted library allocation
page read and write
25CCF061000
heap
page read and write
ADF000
stack
page read and write
25CCF061000
heap
page read and write
B6F29FD000
stack
page read and write
1DC880F2000
heap
page read and write
A3178FD000
stack
page read and write
25CCF062000
heap
page read and write
2558FA46000
heap
page read and write
25CCEF80000
trusted library allocation
page read and write
2125C2C8000
heap
page read and write
25CCF028000
heap
page read and write
1DC82A90000
heap
page read and write
21931690000
heap
page read and write
219316DA000
heap
page read and write
1DB0AB08000
heap
page read and write
25CCF061000
heap
page read and write
2558FB02000
heap
page read and write
1DB0B38B000
heap
page read and write
19F1D402000
heap
page read and write
2125C30A000
heap
page read and write
25CCF061000
heap
page read and write
99F1EFF000
stack
page read and write
1EDE5930000
unclassified section
page execute and read and write
7FFC65B11000
unkown
page execute read
21931697000
heap
page read and write
7FFC66B07000
unkown
page readonly
1DB0A8E0000
heap
page read and write
B6F25FA000
stack
page read and write
1DB0B37C000
heap
page read and write
239D1370000
remote allocation
page read and write
7FFC65B17000
unkown
page readonly
1DB0AAAB000
heap
page read and write
1DB0B394000
heap
page read and write
1E0A1213000
heap
page read and write
1DC87F40000
trusted library allocation
page read and write
1DC88200000
trusted library allocation
page read and write
25CCF100000
heap
page read and write
1D395E10000
remote allocation
page read and write
2558FA47000
heap
page read and write
1DC880E3000
heap
page read and write
1DC88102000
heap
page read and write
25CCF061000
heap
page read and write
1DB0B377000
heap
page read and write
1DC82860000
heap
page read and write
180000000
direct allocation
page read and write
1DB0B39C000
heap
page read and write
239D1467000
heap
page read and write
1E0A10F0000
heap
page read and write
2558FA4B000
heap
page read and write
1DB0B378000
heap
page read and write
BC44BEF000
stack
page read and write
1DC83313000
heap
page read and write
D25000
heap
page read and write
1DC87F41000
trusted library allocation
page read and write
1DC83359000
heap
page read and write
1DC88240000
trusted library allocation
page read and write
1DC87E10000
trusted library allocation
page read and write
24773C02000
trusted library allocation
page read and write
724547E000
stack
page read and write
5ED097B000
stack
page read and write
2558FA00000
heap
page read and write
99818FF000
stack
page read and write
1DC828C0000
heap
page read and write
25CCF000000
heap
page read and write
25CCF061000
heap
page read and write
25CCF061000
heap
page read and write
219316A6000
heap
page read and write
C2956FF000
stack
page read and write
2558FA71000
heap
page read and write
23E69A65000
heap
page read and write
1DB0B38A000
heap
page read and write
E0B939E000
stack
page read and write
1DB0AA54000
heap
page read and write
2125C30A000
heap
page read and write
2B39ED13000
heap
page read and write
24773451000
heap
page read and write
7FFC65B18000
unkown
page write copy
196F9C76000
heap
page read and write
1DB0AA27000
heap
page read and write
7FFC66B00000
unkown
page readonly
B6F2EFE000
stack
page read and write
1DC880B4000
heap
page read and write
1DB0B3AD000
heap
page read and write
1DC87F64000
trusted library allocation
page read and write
1DB0B38F000
heap
page read and write
1DB0B38F000
heap
page read and write
2125D050000
trusted library allocation
page read and write
1DC82A56000
heap
page read and write
1DB0B313000
heap
page read and write
1D395E35000
heap
page read and write
196F9C7A000
heap
page read and write
1DB0B383000
heap
page read and write
2125C2D0000
heap
page read and write
2477349C000
heap
page read and write
766C8FB000
stack
page read and write
72453FC000
stack
page read and write
1DB0B38A000
heap
page read and write
19F1CD02000
heap
page read and write
1D395E10000
remote allocation
page read and write
196F9C5A000
heap
page read and write
A28419F000
stack
page read and write
29CED8C0000
heap
page read and write
1DB0AB16000
heap
page read and write
C2957F9000
stack
page read and write
1EDE5CF1000
heap
page read and write
E0B9A7E000
stack
page read and write
196F9C7F000
heap
page read and write
196F9C24000
heap
page read and write
99815FC000
stack
page read and write
196F9BB0000
trusted library allocation
page read and write
1DB0B315000
heap
page read and write
1DB0B3B5000
heap
page read and write
19F1CBD0000
trusted library allocation
page read and write
F9345FE000
stack
page read and write
2125C440000
trusted library allocation
page read and write
1DB0B377000
heap
page read and write
2125C100000
heap
page read and write
180000000
direct allocation
page read and write
1DB0B38D000
heap
page read and write
25CCF061000
heap
page read and write
1E0A1229000
heap
page read and write
196FA402000
trusted library allocation
page read and write
219316C2000
heap
page read and write
1DB0B37E000
heap
page read and write
1DB0AAC7000
heap
page read and write
1DB0B38F000
heap
page read and write
25CCF061000
heap
page read and write
2125C3E0000
trusted library allocation
page read and write
1DC82A3C000
heap
page read and write
766CA7A000
stack
page read and write
24773310000
heap
page read and write
9981A7D000
stack
page read and write
1DC82AFF000
heap
page read and write
24773508000
heap
page read and write
2B39EC5C000
heap
page read and write
1DB0AA29000
heap
page read and write
35A537F000
stack
page read and write
AFC9AFF000
stack
page read and write
1DB0B375000
heap
page read and write
180008000
direct allocation
page read and write
23E69A00000
heap
page read and write
239D2CF0000
heap
page read and write
2B39ED08000
heap
page read and write
998119B000
stack
page read and write
1DB0B37C000
heap
page read and write
2125C260000
heap
page read and write
1DC8802E000
heap
page read and write
1DC880EA000
heap
page read and write
1DB0B38A000
heap
page read and write
219316C6000
heap
page read and write
1DB0B37E000
heap
page read and write
1DC82A7B000
heap
page read and write
219316D8000
heap
page read and write
1DB0AAB5000
heap
page read and write
1DC87FF0000
trusted library allocation
page read and write
1DC88280000
remote allocation
page read and write
1DB0B3B5000
heap
page read and write
1DC82A73000
heap
page read and write
25CCF061000
heap
page read and write
There are 793 hidden memdumps, click here to show them.