Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\J5V5DR.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\J5V5DR.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,HdQZgnE
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,IfkPmdu
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ilekvoyn.com/
|
64.227.182.2
|
||
ilekvoyn.com
|
|||
http://ilekvoyn.com/4
|
unknown
|
||
http://ilekvoyn.com/u5
|
unknown
|
||
http://ilekvoyn.com/Y
|
unknown
|
||
https://shapka-youtube.ru/
|
unknown
|
||
http://ilekvoyn.com:80/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ilekvoyn.com
|
64.227.182.2
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
64.227.182.2
|
ilekvoyn.com
|
Canada
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
CF0000
|
heap
|
page read and write
|
||
1D395BDE000
|
heap
|
page read and write
|
||
239D1393000
|
heap
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
1D395CB3000
|
heap
|
page read and write
|
||
1EDE3F48000
|
heap
|
page read and write
|
||
1D397AAD000
|
heap
|
page read and write
|
||
219316C2000
|
heap
|
page read and write
|
||
1DC83302000
|
heap
|
page read and write
|
||
29CED8E0000
|
heap
|
page read and write
|
||
29CEDBE0000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1D397AD3000
|
heap
|
page read and write
|
||
5ED087B000
|
stack
|
page read and write
|
||
AFC96FF000
|
stack
|
page read and write
|
||
1DC87D90000
|
trusted library allocation
|
page read and write
|
||
1EDE5D04000
|
heap
|
page read and write
|
||
2B39EC3C000
|
heap
|
page read and write
|
||
1DC88250000
|
trusted library allocation
|
page read and write
|
||
1DB0B37E000
|
heap
|
page read and write
|
||
1DB0B38E000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
19F1CCCA000
|
heap
|
page read and write
|
||
1DC880FB000
|
heap
|
page read and write
|
||
2125D070000
|
trusted library allocation
|
page read and write
|
||
1DB0AA88000
|
heap
|
page read and write
|
||
239D1370000
|
remote allocation
|
page read and write
|
||
1DB0B3AE000
|
heap
|
page read and write
|
||
1DC83910000
|
trusted library allocation
|
page read and write
|
||
25CCF113000
|
heap
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
2B39EC64000
|
heap
|
page read and write
|
||
6FB000
|
stack
|
page read and write
|
||
1DC82A97000
|
heap
|
page read and write
|
||
180006000
|
direct allocation
|
page readonly
|
||
24773502000
|
heap
|
page read and write
|
||
1DC88102000
|
heap
|
page read and write
|
||
AFC9BFD000
|
stack
|
page read and write
|
||
1DC831F0000
|
trusted library allocation
|
page read and write
|
||
1DB0B300000
|
heap
|
page read and write
|
||
AE0000
|
unclassified section
|
page execute and read and write
|
||
1EDE5960000
|
remote allocation
|
page read and write
|
||
1DB0B381000
|
heap
|
page read and write
|
||
2B39F402000
|
trusted library allocation
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1EDE5CFD000
|
heap
|
page read and write
|
||
1DB0B392000
|
heap
|
page read and write
|
||
AFC938C000
|
stack
|
page read and write
|
||
A5ACBBB000
|
stack
|
page read and write
|
||
196F9B20000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
35A4E7E000
|
stack
|
page read and write
|
||
1DB0B38B000
|
heap
|
page read and write
|
||
E8BD87E000
|
stack
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1DB0AAEE000
|
heap
|
page read and write
|
||
99F1CF7000
|
stack
|
page read and write
|
||
196F9C78000
|
heap
|
page read and write
|
||
C29597E000
|
stack
|
page read and write
|
||
2558FB08000
|
heap
|
page read and write
|
||
19F1CC00000
|
heap
|
page read and write
|
||
7FFC66B00000
|
unkown
|
page readonly
|
||
2125C30A000
|
heap
|
page read and write
|
||
1DC87F28000
|
trusted library allocation
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
239D2D1F000
|
heap
|
page read and write
|
||
D1922FF000
|
stack
|
page read and write
|
||
23E698C0000
|
heap
|
page read and write
|
||
1DB0B802000
|
heap
|
page read and write
|
||
AFC9CFB000
|
stack
|
page read and write
|
||
1DB0B386000
|
heap
|
page read and write
|
||
1DB0B3A0000
|
heap
|
page read and write
|
||
1D395BA0000
|
heap
|
page read and write
|
||
23E69A02000
|
heap
|
page read and write
|
||
1DB0AA00000
|
heap
|
page read and write
|
||
196F9C55000
|
heap
|
page read and write
|
||
D191FAC000
|
stack
|
page read and write
|
||
24773465000
|
heap
|
page read and write
|
||
2B39EA20000
|
heap
|
page read and write
|
||
1DB0B394000
|
heap
|
page read and write
|
||
2125C470000
|
trusted library allocation
|
page read and write
|
||
1DB0AA4B000
|
heap
|
page read and write
|
||
7FFC66B07000
|
unkown
|
page readonly
|
||
25CCF062000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
2B39EC00000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
25CCF802000
|
trusted library allocation
|
page read and write
|
||
1DB0B365000
|
heap
|
page read and write
|
||
1D395E30000
|
heap
|
page read and write
|
||
E8BD3DB000
|
stack
|
page read and write
|
||
1DC82A78000
|
heap
|
page read and write
|
||
23E698B0000
|
heap
|
page read and write
|
||
2B39EA80000
|
heap
|
page read and write
|
||
219316C2000
|
heap
|
page read and write
|
||
1EDE4024000
|
heap
|
page read and write
|
||
26C0000
|
remote allocation
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
19F1D532000
|
heap
|
page read and write
|
||
1DB0B802000
|
heap
|
page read and write
|
||
5ED0B7F000
|
stack
|
page read and write
|
||
1E0A1190000
|
trusted library allocation
|
page read and write
|
||
219316B4000
|
heap
|
page read and write
|
||
35A517E000
|
stack
|
page read and write
|
||
196F9C68000
|
heap
|
page read and write
|
||
1D397750000
|
heap
|
page read and write
|
||
1DC829C0000
|
trusted library allocation
|
page read and write
|
||
180004000
|
direct allocation
|
page readonly
|
||
C6D000
|
heap
|
page read and write
|
||
766C47B000
|
stack
|
page read and write
|
||
24773477000
|
heap
|
page read and write
|
||
1DB0B38B000
|
heap
|
page read and write
|
||
1EDE5D2A000
|
heap
|
page read and write
|
||
1DC88102000
|
heap
|
page read and write
|
||
F9340FE000
|
stack
|
page read and write
|
||
9981AFC000
|
stack
|
page read and write
|
||
1DB0B800000
|
heap
|
page read and write
|
||
219316C6000
|
heap
|
page read and write
|
||
1DB0B38E000
|
heap
|
page read and write
|
||
7FFC65B10000
|
unkown
|
page readonly
|
||
21931630000
|
heap
|
page read and write
|
||
7FFC66B01000
|
unkown
|
page execute read
|
||
1DB0B394000
|
heap
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
19F1CD13000
|
heap
|
page read and write
|
||
BC44F7B000
|
stack
|
page read and write
|
||
2B39EA10000
|
heap
|
page read and write
|
||
2B39EC29000
|
heap
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
C5E000
|
heap
|
page read and write
|
||
23E6A202000
|
trusted library allocation
|
page read and write
|
||
1DC82A00000
|
heap
|
page read and write
|
||
B6F2CFF000
|
stack
|
page read and write
|
||
1DB0B38F000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
7FFC66B00000
|
unkown
|
page readonly
|
||
1DC83304000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
2558FB00000
|
heap
|
page read and write
|
||
BC44AEC000
|
stack
|
page read and write
|
||
1DB0B386000
|
heap
|
page read and write
|
||
1DB0B3B7000
|
heap
|
page read and write
|
||
24773465000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DB0B3B4000
|
heap
|
page read and write
|
||
5ED0A77000
|
stack
|
page read and write
|
||
A31757C000
|
stack
|
page read and write
|
||
23E69920000
|
heap
|
page read and write
|
||
1DC82A27000
|
heap
|
page read and write
|
||
1DC82A92000
|
heap
|
page read and write
|
||
35A4EFE000
|
stack
|
page read and write
|
||
C29567A000
|
stack
|
page read and write
|
||
2558F860000
|
heap
|
page read and write
|
||
9981BFC000
|
stack
|
page read and write
|
||
2193169A000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
7244FCC000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
A5AD0FB000
|
stack
|
page read and write
|
||
239D1290000
|
heap
|
page read and write
|
||
29CED780000
|
heap
|
page read and write
|
||
239D2D3E000
|
heap
|
page read and write
|
||
1E0A1258000
|
heap
|
page read and write
|
||
1DC88080000
|
trusted library allocation
|
page read and write
|
||
2125C303000
|
heap
|
page read and write
|
||
1DB0AA5A000
|
heap
|
page read and write
|
||
1DC87F44000
|
trusted library allocation
|
page read and write
|
||
1DB0B393000
|
heap
|
page read and write
|
||
239D1320000
|
heap
|
page read and write
|
||
25CCF06B000
|
heap
|
page read and write
|
||
1DB0B3A4000
|
heap
|
page read and write
|
||
1DB0AAAB000
|
heap
|
page read and write
|
||
F93427B000
|
stack
|
page read and write
|
||
23E69A79000
|
heap
|
page read and write
|
||
B6F2AFF000
|
stack
|
page read and write
|
||
1EDE401D000
|
heap
|
page read and write
|
||
196F9C60000
|
heap
|
page read and write
|
||
1DC88070000
|
trusted library allocation
|
page read and write
|
||
196F9C61000
|
heap
|
page read and write
|
||
19F1CB30000
|
heap
|
page read and write
|
||
2B39EC81000
|
heap
|
page read and write
|
||
1DC82ABC000
|
heap
|
page read and write
|
||
1DC83318000
|
heap
|
page read and write
|
||
1DB0B38B000
|
heap
|
page read and write
|
||
A31777D000
|
stack
|
page read and write
|
||
1DB0AA80000
|
heap
|
page read and write
|
||
2125C240000
|
heap
|
page read and write
|
||
23E69B02000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1EDE4235000
|
heap
|
page read and write
|
||
1DC82AB0000
|
heap
|
page read and write
|
||
99F1FF9000
|
stack
|
page read and write
|
||
1EDE4034000
|
heap
|
page read and write
|
||
766CC7F000
|
stack
|
page read and write
|
||
19F1CC6F000
|
heap
|
page read and write
|
||
1E0A1200000
|
heap
|
page read and write
|
||
1DC8808C000
|
heap
|
page read and write
|
||
1E0A1240000
|
heap
|
page read and write
|
||
29CEDBE5000
|
heap
|
page read and write
|
||
2558FA7D000
|
heap
|
page read and write
|
||
A3174FE000
|
stack
|
page read and write
|
||
1DB0B386000
|
heap
|
page read and write
|
||
1DB0A880000
|
heap
|
page read and write
|
||
99F17CB000
|
stack
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
1DC87FF0000
|
trusted library allocation
|
page read and write
|
||
1DC88390000
|
trusted library allocation
|
page read and write
|
||
239D2CF1000
|
heap
|
page read and write
|
||
E0B929B000
|
stack
|
page read and write
|
||
1DB0B3B1000
|
heap
|
page read and write
|
||
196F9C41000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1D397AA0000
|
heap
|
page read and write
|
||
5ED06FE000
|
stack
|
page read and write
|
||
239D2E65000
|
heap
|
page read and write
|
||
1DB0B802000
|
heap
|
page read and write
|
||
1DB0B81A000
|
heap
|
page read and write
|
||
2125C2C0000
|
heap
|
page read and write
|
||
1DB0AB13000
|
heap
|
page read and write
|
||
196F9C21000
|
heap
|
page read and write
|
||
196F9C4D000
|
heap
|
page read and write
|
||
2B39EC59000
|
heap
|
page read and write
|
||
219316C6000
|
heap
|
page read and write
|
||
2558F7F0000
|
heap
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
1DB0B37D000
|
heap
|
page read and write
|
||
7FFC66B01000
|
unkown
|
page execute read
|
||
219316A1000
|
heap
|
page read and write
|
||
7FFC66B08000
|
unkown
|
page write copy
|
||
1DB0B393000
|
heap
|
page read and write
|
||
24773483000
|
heap
|
page read and write
|
||
1DB0B37C000
|
heap
|
page read and write
|
||
196F9C5F000
|
heap
|
page read and write
|
||
1DC82A29000
|
heap
|
page read and write
|
||
1DB0AAF7000
|
heap
|
page read and write
|
||
1DC82AA2000
|
heap
|
page read and write
|
||
24773413000
|
heap
|
page read and write
|
||
1DB0AA4D000
|
heap
|
page read and write
|
||
1DC82AAD000
|
heap
|
page read and write
|
||
1DC88061000
|
heap
|
page read and write
|
||
2558FA4D000
|
heap
|
page read and write
|
||
A3177FF000
|
stack
|
page read and write
|
||
1DB0B3C0000
|
heap
|
page read and write
|
||
1DC880E7000
|
heap
|
page read and write
|
||
19F1CCC3000
|
heap
|
page read and write
|
||
24773513000
|
heap
|
page read and write
|
||
25CCF002000
|
heap
|
page read and write
|
||
24773300000
|
heap
|
page read and write
|
||
24773500000
|
heap
|
page read and write
|
||
23E69A5B000
|
heap
|
page read and write
|
||
1DB0B37C000
|
heap
|
page read and write
|
||
1DB0AA70000
|
heap
|
page read and write
|
||
239D2D35000
|
heap
|
page read and write
|
||
261C000
|
stack
|
page read and write
|
||
D19227F000
|
stack
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
1DB0B3A0000
|
heap
|
page read and write
|
||
1DC880FE000
|
heap
|
page read and write
|
||
19F1CCE1000
|
heap
|
page read and write
|
||
1D395B10000
|
heap
|
page read and write
|
||
239D2D11000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
21931860000
|
heap
|
page read and write
|
||
239D1340000
|
unclassified section
|
page execute and read and write
|
||
1DB0B3A2000
|
heap
|
page read and write
|
||
1DB0B3B5000
|
heap
|
page read and write
|
||
99F1A7E000
|
stack
|
page read and write
|
||
99F1DF7000
|
stack
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
2477346E000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
19F1CC13000
|
heap
|
page read and write
|
||
1DC880DD000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
219316B8000
|
heap
|
page read and write
|
||
1DC82850000
|
heap
|
page read and write
|
||
180008000
|
direct allocation
|
page read and write
|
||
1DC87E00000
|
trusted library allocation
|
page read and write
|
||
196F9C6A000
|
heap
|
page read and write
|
||
1DB0B38F000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1DB0B38D000
|
heap
|
page read and write
|
||
196F9C7B000
|
heap
|
page read and write
|
||
1DB0B377000
|
heap
|
page read and write
|
||
25702E60000
|
heap
|
page read and write
|
||
2125C110000
|
trusted library allocation
|
page read and write
|
||
9981CFF000
|
stack
|
page read and write
|
||
2477343C000
|
heap
|
page read and write
|
||
35A527E000
|
stack
|
page read and write
|
||
1DC880FC000
|
heap
|
page read and write
|
||
2125C3D0000
|
trusted library allocation
|
page read and write
|
||
766C17C000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DC87F20000
|
trusted library allocation
|
page read and write
|
||
2125C469000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DB0AA48000
|
heap
|
page read and write
|
||
180004000
|
direct allocation
|
page readonly
|
||
25CCF061000
|
heap
|
page read and write
|
||
239D147E000
|
heap
|
page read and write
|
||
25702E80000
|
heap
|
page read and write
|
||
2558FA4F000
|
heap
|
page read and write
|
||
2558FB13000
|
heap
|
page read and write
|
||
1E0A1A02000
|
trusted library allocation
|
page read and write
|
||
1D395B80000
|
heap
|
page read and write
|
||
2558FA13000
|
heap
|
page read and write
|
||
1DB0B37C000
|
heap
|
page read and write
|
||
C2958FE000
|
stack
|
page read and write
|
||
1DC880FE000
|
heap
|
page read and write
|
||
196F9C3D000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
25CCF057000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
180004000
|
direct allocation
|
page readonly
|
||
19F1CC29000
|
heap
|
page read and write
|
||
219318F5000
|
heap
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
269B000
|
stack
|
page read and write
|
||
1DB0B3AE000
|
heap
|
page read and write
|
||
F9343FB000
|
stack
|
page read and write
|
||
1DB0B38B000
|
heap
|
page read and write
|
||
196F9B10000
|
heap
|
page read and write
|
||
1EDE59A0000
|
heap
|
page read and write
|
||
A5AD1FB000
|
stack
|
page read and write
|
||
5ED0C7F000
|
stack
|
page read and write
|
||
1DC82ABB000
|
heap
|
page read and write
|
||
1DB0B385000
|
heap
|
page read and write
|
||
1DB0AADB000
|
heap
|
page read and write
|
||
2477344C000
|
heap
|
page read and write
|
||
25CCF013000
|
heap
|
page read and write
|
||
1EDE3F40000
|
heap
|
page read and write
|
||
23E69A6C000
|
heap
|
page read and write
|
||
25590202000
|
trusted library allocation
|
page read and write
|
||
1DB0AA58000
|
heap
|
page read and write
|
||
2B39ED00000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1DB0B38E000
|
heap
|
page read and write
|
||
1DC87F20000
|
trusted library allocation
|
page read and write
|
||
AFC99FE000
|
stack
|
page read and write
|
||
180008000
|
direct allocation
|
page read and write
|
||
1DB0B38F000
|
heap
|
page read and write
|
||
E0B9B7F000
|
stack
|
page read and write
|
||
99817FF000
|
stack
|
page read and write
|
||
26C0000
|
remote allocation
|
page read and write
|
||
1DB0AA4F000
|
heap
|
page read and write
|
||
1DB0B377000
|
heap
|
page read and write
|
||
1DC83202000
|
heap
|
page read and write
|
||
1DC83200000
|
heap
|
page read and write
|
||
1EDE5CF0000
|
heap
|
page read and write
|
||
23E6A080000
|
trusted library allocation
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
35A4BCC000
|
stack
|
page read and write
|
||
1DB0AA4C000
|
heap
|
page read and write
|
||
19F1CCB9000
|
heap
|
page read and write
|
||
1DB0AA3C000
|
heap
|
page read and write
|
||
1DC83D90000
|
trusted library allocation
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
196F9C5C000
|
heap
|
page read and write
|
||
724527F000
|
stack
|
page read and write
|
||
1E0A11C0000
|
remote allocation
|
page read and write
|
||
1DB0AA50000
|
heap
|
page read and write
|
||
766BEF7000
|
stack
|
page read and write
|
||
196F9C6E000
|
heap
|
page read and write
|
||
99F217A000
|
stack
|
page read and write
|
||
239D1300000
|
heap
|
page read and write
|
||
19F1CBA0000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DC82AB9000
|
heap
|
page read and write
|
||
E0B987E000
|
stack
|
page read and write
|
||
239D1370000
|
remote allocation
|
page read and write
|
||
1DC83215000
|
heap
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
219316B3000
|
heap
|
page read and write
|
||
2558FA53000
|
heap
|
page read and write
|
||
E8BD7F9000
|
stack
|
page read and write
|
||
2125D060000
|
heap
|
page readonly
|
||
1DC88107000
|
heap
|
page read and write
|
||
766C07B000
|
stack
|
page read and write
|
||
A31727B000
|
stack
|
page read and write
|
||
1DB0B802000
|
heap
|
page read and write
|
||
1DB0B821000
|
heap
|
page read and write
|
||
23E69A3F000
|
heap
|
page read and write
|
||
1DC87F50000
|
trusted library allocation
|
page read and write
|
||
239D2D02000
|
heap
|
page read and write
|
||
2B39EC73000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
196F9C58000
|
heap
|
page read and write
|
||
180008000
|
direct allocation
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DB0B393000
|
heap
|
page read and write
|
||
1DB0AB02000
|
heap
|
page read and write
|
||
19F1CC40000
|
heap
|
page read and write
|
||
1DB0AA13000
|
heap
|
page read and write
|
||
2125C30C000
|
heap
|
page read and write
|
||
2558FA4C000
|
heap
|
page read and write
|
||
1DC82A13000
|
heap
|
page read and write
|
||
1DC88280000
|
remote allocation
|
page read and write
|
||
E8BD779000
|
stack
|
page read and write
|
||
1E0A1236000
|
heap
|
page read and write
|
||
23E69A75000
|
heap
|
page read and write
|
||
1DC88000000
|
heap
|
page read and write
|
||
2558FA8C000
|
heap
|
page read and write
|
||
1DC83359000
|
heap
|
page read and write
|
||
1DB0B39C000
|
heap
|
page read and write
|
||
196F9B80000
|
heap
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
1DB0B352000
|
heap
|
page read and write
|
||
239D2E60000
|
heap
|
page read and write
|
||
239D138D000
|
heap
|
page read and write
|
||
219318F0000
|
heap
|
page read and write
|
||
2477342A000
|
heap
|
page read and write
|
||
1DB0B38B000
|
heap
|
page read and write
|
||
1DB0B3D1000
|
heap
|
page read and write
|
||
1DB0B38E000
|
heap
|
page read and write
|
||
21931880000
|
heap
|
page read and write
|
||
1DB0B202000
|
heap
|
page read and write
|
||
99F207F000
|
unkown
|
page read and write
|
||
23E69A72000
|
heap
|
page read and write
|
||
247733A0000
|
trusted library allocation
|
page read and write
|
||
196F9C64000
|
heap
|
page read and write
|
||
1DB0B37A000
|
heap
|
page read and write
|
||
2B39EB80000
|
trusted library allocation
|
page read and write
|
||
1DB0B317000
|
heap
|
page read and write
|
||
196F9C40000
|
heap
|
page read and write
|
||
219316B9000
|
heap
|
page read and write
|
||
1DB0A9E0000
|
trusted library allocation
|
page read and write
|
||
196F9C59000
|
heap
|
page read and write
|
||
766BAEB000
|
stack
|
page read and write
|
||
7FFC66B08000
|
unkown
|
page write copy
|
||
1DB0B385000
|
heap
|
page read and write
|
||
1DB0AA57000
|
heap
|
page read and write
|
||
196F9C67000
|
heap
|
page read and write
|
||
196F9C7C000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
7FFC66B01000
|
unkown
|
page execute read
|
||
2125C32F000
|
heap
|
page read and write
|
||
25702F30000
|
heap
|
page read and write
|
||
2558FA3C000
|
heap
|
page read and write
|
||
A5AD2FF000
|
stack
|
page read and write
|
||
1DB0B3A2000
|
heap
|
page read and write
|
||
1DC82AB9000
|
heap
|
page read and write
|
||
1DC880AB000
|
heap
|
page read and write
|
||
F93417E000
|
stack
|
page read and write
|
||
180006000
|
direct allocation
|
page readonly
|
||
219316A6000
|
heap
|
page read and write
|
||
29CEF540000
|
heap
|
page read and write
|
||
1DB0B377000
|
heap
|
page read and write
|
||
F9342FE000
|
stack
|
page read and write
|
||
1DB0AA52000
|
heap
|
page read and write
|
||
25702F50000
|
heap
|
page read and write
|
||
1EDE4040000
|
heap
|
page read and write
|
||
1D395DE0000
|
unclassified section
|
page execute and read and write
|
||
F9344F7000
|
stack
|
page read and write
|
||
1DC88021000
|
heap
|
page read and write
|
||
1DB0B386000
|
heap
|
page read and write
|
||
1EDE4230000
|
heap
|
page read and write
|
||
2558FA2A000
|
heap
|
page read and write
|
||
B6F2BFF000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
998197C000
|
stack
|
page read and write
|
||
1D395E10000
|
remote allocation
|
page read and write
|
||
19F1CC87000
|
heap
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DB0B3DB000
|
heap
|
page read and write
|
||
2558F800000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
E0B97FB000
|
stack
|
page read and write
|
||
1DB0B802000
|
heap
|
page read and write
|
||
23E69A13000
|
heap
|
page read and write
|
||
25702F35000
|
heap
|
page read and write
|
||
766C27F000
|
stack
|
page read and write
|
||
1DB0B3B1000
|
heap
|
page read and write
|
||
1DC88042000
|
heap
|
page read and write
|
||
A28447F000
|
stack
|
page read and write
|
||
72452FF000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
7FFC66B07000
|
unkown
|
page readonly
|
||
BC44EFC000
|
stack
|
page read and write
|
||
1DC87F60000
|
trusted library allocation
|
page read and write
|
||
196F9C13000
|
heap
|
page read and write
|
||
1DC82B02000
|
heap
|
page read and write
|
||
1D395BDB000
|
heap
|
page read and write
|
||
1D395CAD000
|
heap
|
page read and write
|
||
1DB0B3B8000
|
heap
|
page read and write
|
||
F9346FF000
|
stack
|
page read and write
|
||
1DB0AA49000
|
heap
|
page read and write
|
||
1E0A1202000
|
heap
|
page read and write
|
||
25CCF03C000
|
heap
|
page read and write
|
||
1DC88260000
|
trusted library allocation
|
page read and write
|
||
180006000
|
direct allocation
|
page readonly
|
||
1DB0B38B000
|
heap
|
page read and write
|
||
196F9C85000
|
heap
|
page read and write
|
||
E0B9977000
|
stack
|
page read and write
|
||
29CED970000
|
heap
|
page read and write
|
||
A28411C000
|
stack
|
page read and write
|
||
9981EFF000
|
stack
|
page read and write
|
||
766C37B000
|
stack
|
page read and write
|
||
2558FA84000
|
heap
|
page read and write
|
||
35A507E000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
196F9C47000
|
heap
|
page read and write
|
||
196F9C75000
|
heap
|
page read and write
|
||
1EDE5960000
|
remote allocation
|
page read and write
|
||
1DB0B37C000
|
heap
|
page read and write
|
||
1EDE5D00000
|
heap
|
page read and write
|
||
1DC88280000
|
remote allocation
|
page read and write
|
||
1DC82B07000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
29CED97B000
|
heap
|
page read and write
|
||
C29577E000
|
stack
|
page read and write
|
||
196F9C57000
|
heap
|
page read and write
|
||
1DB0B100000
|
remote allocation
|
page read and write
|
||
1DB0AAE3000
|
heap
|
page read and write
|
||
BC44B6E000
|
stack
|
page read and write
|
||
25CCF102000
|
heap
|
page read and write
|
||
B6F2DFF000
|
stack
|
page read and write
|
||
2B39EC51000
|
heap
|
page read and write
|
||
1EDE5D16000
|
heap
|
page read and write
|
||
1EDE3DF0000
|
heap
|
page read and write
|
||
1DC82B02000
|
heap
|
page read and write
|
||
1E0A11C0000
|
remote allocation
|
page read and write
|
||
1DB0B100000
|
remote allocation
|
page read and write
|
||
1DB0B37E000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
2125C320000
|
heap
|
page read and write
|
||
E0B96FB000
|
stack
|
page read and write
|
||
1DB0B381000
|
heap
|
page read and write
|
||
2B39ED02000
|
heap
|
page read and write
|
||
1DC83820000
|
trusted library allocation
|
page read and write
|
||
1DC88370000
|
trusted library allocation
|
page read and write
|
||
24773370000
|
heap
|
page read and write
|
||
1DB0B39E000
|
heap
|
page read and write
|
||
19F1CB40000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
A5AD3FF000
|
stack
|
page read and write
|
||
196F9C42000
|
heap
|
page read and write
|
||
23E69B13000
|
heap
|
page read and write
|
||
7FFC66B08000
|
unkown
|
page write copy
|
||
766BB6F000
|
stack
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
180004000
|
direct allocation
|
page readonly
|
||
1DC88102000
|
heap
|
page read and write
|
||
99F1AFE000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DB0B821000
|
heap
|
page read and write
|
||
1DB0AAC0000
|
heap
|
page read and write
|
||
24773400000
|
heap
|
page read and write
|
||
196F9C65000
|
heap
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
1DB0B100000
|
remote allocation
|
page read and write
|
||
180006000
|
direct allocation
|
page readonly
|
||
25CCF061000
|
heap
|
page read and write
|
||
F93407B000
|
stack
|
page read and write
|
||
26C0000
|
remote allocation
|
page read and write
|
||
C295879000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
A3173FE000
|
stack
|
page read and write
|
||
2193169E000
|
heap
|
page read and write
|
||
1DC83318000
|
heap
|
page read and write
|
||
1DB0B377000
|
heap
|
page read and write
|
||
1DB0B38E000
|
heap
|
page read and write
|
||
25CCF05C000
|
heap
|
page read and write
|
||
B6F21CB000
|
stack
|
page read and write
|
||
1EDE4060000
|
heap
|
page read and write
|
||
2125D080000
|
trusted library allocation
|
page read and write
|
||
2125C460000
|
heap
|
page read and write
|
||
196F9C6C000
|
heap
|
page read and write
|
||
1DC82A8D000
|
heap
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1E0A1100000
|
heap
|
page read and write
|
||
2B39EC5F000
|
heap
|
page read and write
|
||
196F9C56000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
19F1D500000
|
heap
|
page read and write
|
||
196F9D02000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
25CCEE80000
|
heap
|
page read and write
|
||
1DC87FF0000
|
trusted library allocation
|
page read and write
|
||
99F1BFC000
|
stack
|
page read and write
|
||
196F9C63000
|
heap
|
page read and write
|
||
1DB0B3AE000
|
heap
|
page read and write
|
||
1DC831F3000
|
trusted library allocation
|
page read and write
|
||
2125CE20000
|
trusted library allocation
|
page read and write
|
||
196F9C62000
|
heap
|
page read and write
|
||
1DB0B81A000
|
heap
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
1E0A11C0000
|
remote allocation
|
page read and write
|
||
25CCEE10000
|
heap
|
page read and write
|
||
E8BD8F9000
|
stack
|
page read and write
|
||
25702F5B000
|
heap
|
page read and write
|
||
B6F27FE000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
2B39EC13000
|
heap
|
page read and write
|
||
5ED067C000
|
stack
|
page read and write
|
||
25702D20000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1DB0A870000
|
heap
|
page read and write
|
||
23E69A24000
|
heap
|
page read and write
|
||
1DB0B38D000
|
heap
|
page read and write
|
||
1D395BD0000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
25704950000
|
heap
|
page read and write
|
||
AFC97FE000
|
stack
|
page read and write
|
||
1DC87F50000
|
trusted library allocation
|
page read and write
|
||
1E0A1160000
|
heap
|
page read and write
|
||
196F9C32000
|
heap
|
page read and write
|
||
1DC87F2E000
|
trusted library allocation
|
page read and write
|
||
2125D0D0000
|
trusted library allocation
|
page read and write
|
||
25CCEE20000
|
heap
|
page read and write
|
||
239D1380000
|
heap
|
page read and write
|
||
5ED077D000
|
stack
|
page read and write
|
||
1DB0B818000
|
heap
|
page read and write
|
||
2558FA56000
|
heap
|
page read and write
|
||
1DC8804F000
|
heap
|
page read and write
|
||
24773455000
|
heap
|
page read and write
|
||
1DB0B3A4000
|
heap
|
page read and write
|
||
E0B931D000
|
stack
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
1E0A1302000
|
heap
|
page read and write
|
||
1DC82B25000
|
heap
|
page read and write
|
||
2125C465000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DB0B3B7000
|
heap
|
page read and write
|
||
9981DFC000
|
stack
|
page read and write
|
||
B6F26FC000
|
stack
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DB0B38D000
|
heap
|
page read and write
|
||
2558F960000
|
trusted library allocation
|
page read and write
|
||
1EDE5960000
|
remote allocation
|
page read and write
|
||
1DB0B38E000
|
heap
|
page read and write
|
||
196F9C3B000
|
heap
|
page read and write
|
||
1DB0B3AF000
|
heap
|
page read and write
|
||
766C77D000
|
stack
|
page read and write
|
||
1DB0B802000
|
heap
|
page read and write
|
||
1DC82AFF000
|
heap
|
page read and write
|
||
1DB0B38F000
|
heap
|
page read and write
|
||
1DC88102000
|
heap
|
page read and write
|
||
1DC83300000
|
heap
|
page read and write
|
||
196F9C00000
|
heap
|
page read and write
|
||
1DC88230000
|
trusted library allocation
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
B6F29FD000
|
stack
|
page read and write
|
||
1DC880F2000
|
heap
|
page read and write
|
||
A3178FD000
|
stack
|
page read and write
|
||
25CCF062000
|
heap
|
page read and write
|
||
2558FA46000
|
heap
|
page read and write
|
||
25CCEF80000
|
trusted library allocation
|
page read and write
|
||
2125C2C8000
|
heap
|
page read and write
|
||
25CCF028000
|
heap
|
page read and write
|
||
1DC82A90000
|
heap
|
page read and write
|
||
21931690000
|
heap
|
page read and write
|
||
219316DA000
|
heap
|
page read and write
|
||
1DB0AB08000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
2558FB02000
|
heap
|
page read and write
|
||
1DB0B38B000
|
heap
|
page read and write
|
||
19F1D402000
|
heap
|
page read and write
|
||
2125C30A000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
99F1EFF000
|
stack
|
page read and write
|
||
1EDE5930000
|
unclassified section
|
page execute and read and write
|
||
7FFC65B11000
|
unkown
|
page execute read
|
||
21931697000
|
heap
|
page read and write
|
||
7FFC66B07000
|
unkown
|
page readonly
|
||
1DB0A8E0000
|
heap
|
page read and write
|
||
B6F25FA000
|
stack
|
page read and write
|
||
1DB0B37C000
|
heap
|
page read and write
|
||
239D1370000
|
remote allocation
|
page read and write
|
||
7FFC65B17000
|
unkown
|
page readonly
|
||
1DB0AAAB000
|
heap
|
page read and write
|
||
1DB0B394000
|
heap
|
page read and write
|
||
1E0A1213000
|
heap
|
page read and write
|
||
1DC87F40000
|
trusted library allocation
|
page read and write
|
||
1DC88200000
|
trusted library allocation
|
page read and write
|
||
25CCF100000
|
heap
|
page read and write
|
||
1D395E10000
|
remote allocation
|
page read and write
|
||
2558FA47000
|
heap
|
page read and write
|
||
1DC880E3000
|
heap
|
page read and write
|
||
1DC88102000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1DB0B377000
|
heap
|
page read and write
|
||
1DC82860000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1DB0B39C000
|
heap
|
page read and write
|
||
239D1467000
|
heap
|
page read and write
|
||
1E0A10F0000
|
heap
|
page read and write
|
||
2558FA4B000
|
heap
|
page read and write
|
||
1DB0B378000
|
heap
|
page read and write
|
||
BC44BEF000
|
stack
|
page read and write
|
||
1DC83313000
|
heap
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
1DC87F41000
|
trusted library allocation
|
page read and write
|
||
1DC83359000
|
heap
|
page read and write
|
||
1DC88240000
|
trusted library allocation
|
page read and write
|
||
1DC87E10000
|
trusted library allocation
|
page read and write
|
||
24773C02000
|
trusted library allocation
|
page read and write
|
||
724547E000
|
stack
|
page read and write
|
||
5ED097B000
|
stack
|
page read and write
|
||
2558FA00000
|
heap
|
page read and write
|
||
99818FF000
|
stack
|
page read and write
|
||
1DC828C0000
|
heap
|
page read and write
|
||
25CCF000000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
219316A6000
|
heap
|
page read and write
|
||
C2956FF000
|
stack
|
page read and write
|
||
2558FA71000
|
heap
|
page read and write
|
||
23E69A65000
|
heap
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
E0B939E000
|
stack
|
page read and write
|
||
1DB0AA54000
|
heap
|
page read and write
|
||
2125C30A000
|
heap
|
page read and write
|
||
2B39ED13000
|
heap
|
page read and write
|
||
24773451000
|
heap
|
page read and write
|
||
7FFC65B18000
|
unkown
|
page write copy
|
||
196F9C76000
|
heap
|
page read and write
|
||
1DB0AA27000
|
heap
|
page read and write
|
||
7FFC66B00000
|
unkown
|
page readonly
|
||
B6F2EFE000
|
stack
|
page read and write
|
||
1DC880B4000
|
heap
|
page read and write
|
||
1DB0B3AD000
|
heap
|
page read and write
|
||
1DC87F64000
|
trusted library allocation
|
page read and write
|
||
1DB0B38F000
|
heap
|
page read and write
|
||
1DB0B38F000
|
heap
|
page read and write
|
||
2125D050000
|
trusted library allocation
|
page read and write
|
||
1DC82A56000
|
heap
|
page read and write
|
||
1DB0B313000
|
heap
|
page read and write
|
||
1D395E35000
|
heap
|
page read and write
|
||
196F9C7A000
|
heap
|
page read and write
|
||
1DB0B383000
|
heap
|
page read and write
|
||
2125C2D0000
|
heap
|
page read and write
|
||
2477349C000
|
heap
|
page read and write
|
||
766C8FB000
|
stack
|
page read and write
|
||
72453FC000
|
stack
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
19F1CD02000
|
heap
|
page read and write
|
||
1D395E10000
|
remote allocation
|
page read and write
|
||
196F9C5A000
|
heap
|
page read and write
|
||
A28419F000
|
stack
|
page read and write
|
||
29CED8C0000
|
heap
|
page read and write
|
||
1DB0AB16000
|
heap
|
page read and write
|
||
C2957F9000
|
stack
|
page read and write
|
||
1EDE5CF1000
|
heap
|
page read and write
|
||
E0B9A7E000
|
stack
|
page read and write
|
||
196F9C7F000
|
heap
|
page read and write
|
||
196F9C24000
|
heap
|
page read and write
|
||
99815FC000
|
stack
|
page read and write
|
||
196F9BB0000
|
trusted library allocation
|
page read and write
|
||
1DB0B315000
|
heap
|
page read and write
|
||
1DB0B3B5000
|
heap
|
page read and write
|
||
19F1CBD0000
|
trusted library allocation
|
page read and write
|
||
F9345FE000
|
stack
|
page read and write
|
||
2125C440000
|
trusted library allocation
|
page read and write
|
||
1DB0B377000
|
heap
|
page read and write
|
||
2125C100000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1DB0B38D000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
1E0A1229000
|
heap
|
page read and write
|
||
196FA402000
|
trusted library allocation
|
page read and write
|
||
219316C2000
|
heap
|
page read and write
|
||
1DB0B37E000
|
heap
|
page read and write
|
||
1DB0AAC7000
|
heap
|
page read and write
|
||
1DB0B38F000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
||
2125C3E0000
|
trusted library allocation
|
page read and write
|
||
1DC82A3C000
|
heap
|
page read and write
|
||
766CA7A000
|
stack
|
page read and write
|
||
24773310000
|
heap
|
page read and write
|
||
9981A7D000
|
stack
|
page read and write
|
||
1DC82AFF000
|
heap
|
page read and write
|
||
24773508000
|
heap
|
page read and write
|
||
2B39EC5C000
|
heap
|
page read and write
|
||
1DB0AA29000
|
heap
|
page read and write
|
||
35A537F000
|
stack
|
page read and write
|
||
AFC9AFF000
|
stack
|
page read and write
|
||
1DB0B375000
|
heap
|
page read and write
|
||
180008000
|
direct allocation
|
page read and write
|
||
23E69A00000
|
heap
|
page read and write
|
||
239D2CF0000
|
heap
|
page read and write
|
||
2B39ED08000
|
heap
|
page read and write
|
||
998119B000
|
stack
|
page read and write
|
||
1DB0B37C000
|
heap
|
page read and write
|
||
2125C260000
|
heap
|
page read and write
|
||
1DC8802E000
|
heap
|
page read and write
|
||
1DC880EA000
|
heap
|
page read and write
|
||
1DB0B38A000
|
heap
|
page read and write
|
||
219316C6000
|
heap
|
page read and write
|
||
1DB0B37E000
|
heap
|
page read and write
|
||
1DC82A7B000
|
heap
|
page read and write
|
||
219316D8000
|
heap
|
page read and write
|
||
1DB0AAB5000
|
heap
|
page read and write
|
||
1DC87FF0000
|
trusted library allocation
|
page read and write
|
||
1DC88280000
|
remote allocation
|
page read and write
|
||
1DB0B3B5000
|
heap
|
page read and write
|
||
1DC82A73000
|
heap
|
page read and write
|
||
25CCF061000
|
heap
|
page read and write
|
There are 793 hidden memdumps, click here to show them.