IOC Report
QEydjQdRxs.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\QEydjQdRxs.dll,mydllmain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://rammenale.com/for2/regit.tmp$u
unknown
malicious
https://rammenale.com/for2/aclog.txtM
unknown
malicious
https://rammenale.com/for2/regit.tmpent
unknown
malicious
https://rammenale.com/for2/aclog.txtPR
unknown
malicious
https://rammenale.com/for2/aclogY
unknown
malicious
https://rammenale.com/for2/aclog
unknown
malicious
https://rammenale.com/for2/regit.tmp
131.153.206.231
malicious
https://rammenale.com/
unknown
malicious
https://rammenale.com/for2/aclog.txt
131.153.206.231
malicious
https://rammenale.com/for2/regit.tmpft
unknown
https://rammenale.com/for2/regit.tmp4kJ
unknown
https://rammenale.com/for2/regit.tmp(
unknown
https://rammenale.com/for2/regit.tmpPR5
unknown
https://rammenale.com/for2/aclog.txtT
unknown
https://rammenale.com/for2/regit.tmp)
unknown
https://rammenale.com/T
unknown
https://rammenale.com/for2/aclog.txtR
unknown
https://rammenale.com/for2/aclog.txt42
unknown
https://rammenale.com/for2/aclog.txt6634-1003(
unknown
https://rammenale.com/for2/regit.tmp%
unknown
https://rammenale.com/for2/regit.tmpry
unknown
https://rammenale.com/for2/aclog.txtO
unknown
https://rammenale.com/for2/aclog.txtZ
unknown
https://rammenale.com/for2/aclog.txt4?
unknown
https://rammenale.com/for2/aclog.txte
unknown
https://rammenale.com/d
unknown
https://rammenale.com/for2/regit.tmpsC:
unknown
https://rammenale.com/for2/aclog.txt)
unknown
https://rammenale.com/k
unknown
https://rammenale.com/for2/aclog.txt4Y
unknown
https://rammenale.com/for2/aclog.txtenth
unknown
https://rammenale.com/for2/aclog.txt4
unknown
https://rammenale.com/for2/aclog.txt4FA
unknown
https://rammenale.com/for2/aclog.txt3
unknown
https://rammenale.com/for2/aclog.txt0O
unknown
https://rammenale.com/for2/aclog.txt0
unknown
https://rammenale.com/q
unknown
https://rammenale.com/for2/aclog.txt:
unknown
https://rammenale.com/for2/regit.tmpn
unknown
https://rammenale.com/for2/aclog.txtF
unknown
https://rammenale.com/for2/regit.tmpw
unknown
https://rammenale.com/for2/regit.tmpxe.muiE
unknown
https://rammenale.com/for2/regit.tmpz
unknown
https://rammenale.com/for2/regit.tmps
unknown
https://rammenale.com/for2/regit.tmpC:
unknown
https://rammenale.com/for2/regit.tmpu
unknown
https://rammenale.com/for2/aclog.txt6634-1003
unknown
https://rammenale.com/for2/aclog.txt?
unknown
https://rammenale.com/for2/regit.tmp8a5
unknown
https://rammenale.com/for2/aclog.txt4u
unknown
https://rammenale.com/for2/regit.tmp6634-1003
unknown
https://rammenale.com/for2/aclog.txtry
unknown
https://rammenale.com/for2/aclog.txtQw
unknown
https://rammenale.com/for2/aclog.txtrw
unknown
https://rammenale.com/for2/regit.tmpg
unknown
https://rammenale.com/for2/regit.tmph
unknown
https://rammenale.com/for2/aclog.txt4n
unknown
https://rammenale.com/for2/aclog.txt60
unknown
https://rammenale.com/for2/aclog.txtentindowsINetCookies
unknown
https://rammenale.com/for2/aclog.txt4r
unknown
https://rammenale.com/for2/regit.tmp08
unknown
https://rammenale.com/for2/regit.tmpP
unknown
https://rammenale.com/for2/aclog.txtfw
unknown
https://rammenale.com/for2/aclog.txtC:
unknown
https://rammenale.com/for2/aclog.txt&
unknown
https://rammenale.com/for2/aclog.txt%
unknown
https://rammenale.com/for2/aclog.txt4~
unknown
https://rammenale.com/for2/regit.tmpS
unknown
https://rammenale.com/for2/aclog.txtft
unknown
https://rammenale.com/for2/regit.tmpA
unknown
https://rammenale.com/for2/aclog.txtk
unknown
https://rammenale.com//9
unknown
https://rammenale.com/for2/regit.tmp;
unknown
https://rammenale.com/for2/aclog.txti
unknown
https://rammenale.com/for2/aclogtxt
unknown
https://rammenale.com/for2/aclog.txtv
unknown
https://rammenale.com/for2/regit.tmpG
unknown
https://rammenale.com/6
unknown
https://rammenale.com/for2/aclog.txtt
unknown
https://rammenale.com/for2/aclog.txts
unknown
https://rammenale.com/for2/regit.tmp4s5
unknown
https://rammenale.com/for2/regit.tmp0
unknown
https://rammenale.com/for2/regit.tmpmp
unknown
https://rammenale.com/for2/regit.tmp4X
unknown
https://rammenale.com/for2/aclog.txtz
unknown
https://rammenale.com/for2/aclog.txtentdll8
unknown
https://rammenale.com/for2/aclog.txtx
unknown
https://rammenale.com/for2/regit.tmp7
unknown
https://rammenale.com/for2/regit.tmpc4u
unknown
https://rammenale.com/for2/regit.tmp4Zfrh
unknown
https://rammenale.com/for2/aclog.txt4$
unknown
https://rammenale.com/for2/aclog.txtdT
unknown
https://rammenale.com/for2/regit.tmp4
unknown
https://rammenale.com/for2/regit.tmpuk
unknown
https://rammenale.com/for2/aclog.txtentdll
unknown
https://rammenale.com/for2/regit.tmp6
unknown
There are 86 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rammenale.com
131.153.206.231
malicious

IPs

IP
Domain
Country
Malicious
131.153.206.231
rammenale.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4820000
heap
page read and write
3286000
heap
page read and write
3190000
heap
page read and write
8D3F000
stack
page read and write
2E73000
heap
page read and write
2891000
heap
page read and write
2E72000
heap
page read and write
508A000
heap
page read and write
4BF0000
heap
page read and write
2877000
stack
page read and write
440000
heap
page read and write
8D7E000
stack
page read and write
8CEE000
heap
page read and write
2B14000
heap
page read and write
5080000
trusted library allocation
page read and write
4D10000
heap
page read and write
8F20000
heap
page read and write
2840000
heap
page read and write
2AAA000
heap
page read and write
8811000
heap
page read and write
148F000
stack
page read and write
2B6D000
heap
page read and write
50ED000
stack
page read and write
8FA7000
heap
page read and write
2830000
heap
page read and write
4B4C000
stack
page read and write
892E000
stack
page read and write
4B5E000
stack
page read and write
4B1E000
stack
page read and write
62E0000
trusted library allocation
page read and write
323C000
heap
page read and write
2AF7000
heap
page read and write
2B33000
stack
page read and write
28D0000
heap
page read and write
62D0000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
8C1E000
stack
page read and write
8DCF000
stack
page read and write
7B83000
heap
page read and write
2B48000
heap
page read and write
8D1B000
heap
page read and write
50B9000
heap
page read and write
3243000
heap
page read and write
4C79000
heap
page read and write
3110000
heap
page read and write
3205000
heap
page read and write
3230000
heap
page read and write
936E000
stack
page read and write
4E1F000
stack
page read and write
7CCE000
stack
page read and write
303D000
heap
page read and write
90F0000
remote allocation
page read and write
BA0000
heap
page read and write
90DE000
stack
page read and write
2E97000
heap
page read and write
28AA000
heap
page read and write
517F000
stack
page read and write
3160000
heap
page read and write
8E0E000
stack
page read and write
8BFA000
heap
page read and write
2EDE000
heap
page read and write
2EE7000
heap
page read and write
28FA000
heap
page read and write
8C5F000
stack
page read and write
45CB000
stack
page read and write
32C0000
heap
page read and write
8FD0000
remote allocation
page read and write
2E97000
heap
page read and write
4A50000
heap
page read and write
2FDD000
heap
page read and write
2F40000
heap
page read and write
7C8F000
stack
page read and write
2BB0000
heap
page read and write
31D5000
heap
page read and write
440000
heap
page read and write
2F94000
heap
page read and write
2AFC000
heap
page read and write
92ED000
stack
page read and write
28EC000
heap
page read and write
2EC000
stack
page read and write
5070000
heap
page read and write
468D000
stack
page read and write
8CE4000
heap
page read and write
89AE000
stack
page read and write
3B0000
heap
page read and write
2E9E000
heap
page read and write
25DB000
stack
page read and write
6450000
trusted library allocation
page read and write
317A000
heap
page read and write
3233000
heap
page read and write
7D0F000
stack
page read and write
8F3B000
heap
page read and write
513E000
stack
page read and write
4400000
heap
page read and write
FCB000
heap
page read and write
460D000
stack
page read and write
31E7000
heap
page read and write
6290000
trusted library allocation
page read and write
2FF4000
heap
page read and write
2B81000
heap
page read and write
3280000
heap
page read and write
2E92000
heap
page read and write
2B10000
heap
page read and write
533B000
stack
page read and write
4F1D000
stack
page read and write
2EDE000
heap
page read and write
42E000
stack
page read and write
321D000
heap
page read and write
93AF000
stack
page read and write
2880000
heap
page read and write
2BE0000
heap
page read and write
4404000
heap
page read and write
2B59000
heap
page read and write
8DCE000
stack
page read and write
8F2C000
stack
page read and write
27F4000
heap
page read and write
2931000
heap
page read and write
7B89000
heap
page read and write
8D34000
heap
page read and write
28C0000
heap
page read and write
4F7D000
stack
page read and write
2990000
heap
page read and write
900C000
stack
page read and write
7B42000
heap
page read and write
51FE000
stack
page read and write
8C3E000
heap
page read and write
2EF2000
heap
page read and write
2E3A000
heap
page read and write
8D8E000
stack
page read and write
31C9000
heap
page read and write
50B0000
heap
page read and write
29E0000
heap
page read and write
8C11000
heap
page read and write
8C5C000
heap
page read and write
523E000
stack
page read and write
4819000
heap
page read and write
4EDE000
stack
page read and write
31FF000
heap
page read and write
3248000
heap
page read and write
2F10000
heap
page read and write
8C47000
heap
page read and write
3225000
heap
page read and write
8C74000
heap
page read and write
193000
stack
page read and write
6560000
trusted library allocation
page read and write
7B2A000
heap
page read and write
9330000
remote allocation
page read and write
3100000
heap
page read and write
7B71000
heap
page read and write
2E83000
heap
page read and write
4E5D000
stack
page read and write
6FA08000
unkown
page readonly
8FCB000
stack
page read and write
26C0000
heap
page read and write
4B0C000
stack
page read and write
90DE000
stack
page read and write
6FA08000
unkown
page readonly
6410000
trusted library allocation
page read and write
28CE000
heap
page read and write
B70000
heap
page read and write
4BDD000
stack
page read and write
4A0E000
stack
page read and write
2896000
heap
page read and write
322E000
heap
page read and write
5060000
heap
page read and write
2D70000
heap
page read and write
8C90000
heap
page read and write
2AF3000
heap
page read and write
909F000
stack
page read and write
8C46000
heap
page read and write
2B4E000
heap
page read and write
F8E000
stack
page read and write
3239000
heap
page read and write
7F20000
remote allocation
page read and write
7B5C000
heap
page read and write
5200000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
284A000
heap
page read and write
2EE3000
heap
page read and write
3216000
heap
page read and write
8F6C000
stack
page read and write
905E000
stack
page read and write
28A2000
heap
page read and write
2EE3000
heap
page read and write
905E000
stack
page read and write
28A6000
heap
page read and write
2B0C000
heap
page read and write
4C0B000
stack
page read and write
2D20000
heap
page read and write
8BBE000
stack
page read and write
27E0000
trusted library allocation
page read and write
50A2000
heap
page read and write
882B000
heap
page read and write
904F000
stack
page read and write
8E0F000
stack
page read and write
4850000
heap
page read and write
319A000
heap
page read and write
2E8B000
heap
page read and write
29DF000
stack
page read and write
507B000
stack
page read and write
4C20000
heap
page read and write
511A000
heap
page read and write
8CA1000
heap
page read and write
907E000
stack
page read and write
4D20000
heap
page read and write
3170000
heap
page read and write
2F4A000
heap
page read and write
7F20000
remote allocation
page read and write
54B9000
heap
page read and write
87F0000
heap
page read and write
2EC9000
heap
page read and write
4DDE000
stack
page read and write
2A50000
heap
page read and write
293B000
heap
page read and write
90A0000
remote allocation
page read and write
66E0000
trusted library allocation
page read and write
2E9B000
heap
page read and write
5100000
heap
page read and write
8C90000
heap
page read and write
31E8000
heap
page read and write
2EC9000
heap
page read and write
8C27000
heap
page read and write
326E000
heap
page read and write
4BDF000
stack
page read and write
3003000
heap
page read and write
4FEC000
stack
page read and write
911F000
stack
page read and write
6F9FD000
unkown
page readonly
2720000
heap
page read and write
2833000
stack
page read and write
54B0000
heap
page read and write
2901000
heap
page read and write
92AC000
stack
page read and write
8C3E000
heap
page read and write
2EC6000
heap
page read and write
2780000
heap
page read and write
8814000
heap
page read and write
5220000
heap
page read and write
3286000
heap
page read and write
8CD2000
heap
page read and write
2FB3000
heap
page read and write
30B4000
heap
page read and write
8C00000
heap
page read and write
1D7000
stack
page read and write
7F9F000
stack
page read and write
2B18000
heap
page read and write
2F95000
heap
page read and write
EFC000
stack
page read and write
4C1E000
stack
page read and write
31FC000
heap
page read and write
4D24000
heap
page read and write
5390000
heap
page read and write
2E9B000
heap
page read and write
8F5E000
heap
page read and write
2FAB000
heap
page read and write
2C63000
stack
page read and write
2DC3000
stack
page read and write
30B0000
heap
page read and write
3203000
heap
page read and write
2B37000
heap
page read and write
325C000
heap
page read and write
2D10000
heap
page read and write
5131000
heap
page read and write
2E8B000
heap
page read and write
5100000
heap
page read and write
31EB000
heap
page read and write
2F2C000
heap
page read and write
31E5000
heap
page read and write
537D000
stack
page read and write
2E9E000
heap
page read and write
8C19000
heap
page read and write
7F5E000
stack
page read and write
8C11000
heap
page read and write
8C1B000
heap
page read and write
2F98000
heap
page read and write
2B3A000
heap
page read and write
2970000
heap
page read and write
5490000
trusted library allocation
page read and write
8CFD000
heap
page read and write
2B69000
heap
page read and write
8FD0000
remote allocation
page read and write
3080000
heap
page read and write
2EA5000
heap
page read and write
6B93D000
unkown
page readonly
324E000
heap
page read and write
8C90000
remote allocation
page read and write
59A0000
trusted library allocation
page read and write
290F000
stack
page read and write
8F59000
heap
page read and write
FC0000
heap
page read and write
882F000
heap
page read and write
2B1B000
heap
page read and write
B2C000
stack
page read and write
28FD000
heap
page read and write
FCF000
heap
page read and write
8BC0000
heap
page read and write
4C9A000
heap
page read and write
3085000
heap
page read and write
BFE000
stack
page read and write
2916000
heap
page read and write
7BA5000
heap
page read and write
3240000
heap
page read and write
47C0000
trusted library allocation
page read and write
53C0000
heap
page read and write
2ED7000
heap
page read and write
3006000
heap
page read and write
2EA2000
heap
page read and write
2EF5000
heap
page read and write
90F0000
remote allocation
page read and write
128F000
stack
page read and write
2D46000
heap
page read and write
6F9E0000
unkown
page readonly
62A0000
trusted library allocation
page read and write
30D0000
heap
page read and write
478E000
stack
page read and write
326A000
heap
page read and write
6FA06000
unkown
page read and write
2EC6000
heap
page read and write
8C90000
remote allocation
page read and write
5030000
trusted library allocation
page read and write
28E4000
heap
page read and write
28F8000
heap
page read and write
25EE000
stack
page read and write
293E000
heap
page read and write
2FF8000
heap
page read and write
32C000
stack
page read and write
31C0000
heap
page read and write
259C000
stack
page read and write
888E000
heap
page read and write
2EF2000
heap
page read and write
6570000
trusted library allocation
page read and write
4E9E000
stack
page read and write
464E000
stack
page read and write
527D000
stack
page read and write
8CFD000
heap
page read and write
51BD000
stack
page read and write
5069000
heap
page read and write
4C4E000
stack
page read and write
30C0000
heap
page read and write
4A8D000
stack
page read and write
2F90000
heap
page read and write
3281000
heap
page read and write
7B46000
heap
page read and write
3080000
heap
page read and write
8B7E000
stack
page read and write
2EE7000
heap
page read and write
432E000
stack
page read and write
259F000
stack
page read and write
8C50000
heap
page read and write
3A0000
heap
page read and write
4A4E000
stack
page read and write
32C7000
heap
page read and write
2FAF000
heap
page read and write
7B15000
heap
page read and write
28B6000
heap
page read and write
8DBF000
stack
page read and write
8C71000
heap
page read and write
4CB0000
heap
page read and write
8844000
heap
page read and write
2995000
heap
page read and write
8CBC000
heap
page read and write
3230000
heap
page read and write
6380000
trusted library allocation
page read and write
31F0000
heap
page read and write
2AE5000
heap
page read and write
8D02000
heap
page read and write
2B08000
heap
page read and write
2B64000
heap
page read and write
3021000
heap
page read and write
8FA1000
heap
page read and write
7B25000
heap
page read and write
8CCC000
heap
page read and write
4B9F000
stack
page read and write
6B948000
unkown
page readonly
90A0000
remote allocation
page read and write
3222000
heap
page read and write
5229000
heap
page read and write
4C24000
heap
page read and write
28B9000
heap
page read and write
5FB0000
trusted library allocation
page read and write
896F000
stack
page read and write
2FD8000
heap
page read and write
436F000
stack
page read and write
6B921000
unkown
page execute read
2B67000
heap
page read and write
2EFB000
heap
page read and write
6F9E0000
unkown
page readonly
5132000
heap
page read and write
4ACF000
stack
page read and write
50FD000
stack
page read and write
31F7000
heap
page read and write
889A000
heap
page read and write
8D14000
heap
page read and write
2B37000
stack
page read and write
2840000
heap
page read and write
3257000
heap
page read and write
2D75000
heap
page read and write
2F10000
heap
page read and write
2AF3000
stack
page read and write
511A000
heap
page read and write
2ED7000
heap
page read and write
8CE5000
heap
page read and write
5070000
heap
page read and write
2E92000
heap
page read and write
8BE3000
heap
page read and write
2EAA000
heap
page read and write
2EA0000
heap
page read and write
6B920000
unkown
page readonly
8C8A000
heap
page read and write
6200000
trusted library allocation
page read and write
483A000
heap
page read and write
28D2000
heap
page read and write
283F000
stack
page read and write
2F9C000
heap
page read and write
322B000
heap
page read and write
8CFE000
stack
page read and write
3208000
heap
page read and write
89EF000
stack
page read and write
520000
heap
page read and write
8C43000
heap
page read and write
3037000
stack
page read and write
300C000
heap
page read and write
6F9E1000
unkown
page execute read
8C00000
heap
page read and write
4FDB000
stack
page read and write
2F2C000
heap
page read and write
2E83000
heap
page read and write
8E4F000
stack
page read and write
289A000
heap
page read and write
4FAB000
stack
page read and write
4C70000
heap
page read and write
325A000
heap
page read and write
2EF5000
heap
page read and write
2FE8000
heap
page read and write
889F000
heap
page read and write
6F9E1000
unkown
page execute read
3070000
heap
page read and write
4810000
heap
page read and write
138F000
stack
page read and write
4940000
heap
page read and write
FDD000
heap
page read and write
6F9FD000
unkown
page readonly
8E4E000
stack
page read and write
27F0000
heap
page read and write
6210000
trusted library allocation
page read and write
2B04000
heap
page read and write
901E000
stack
page read and write
28E8000
heap
page read and write
4BF4000
heap
page read and write
8C6B000
heap
page read and write
474B000
stack
page read and write
90F0000
remote allocation
page read and write
4B5F000
stack
page read and write
8C27000
heap
page read and write
26D0000
heap
page read and write
2FEE000
heap
page read and write
28DD000
heap
page read and write
6B946000
unkown
page read and write
2B55000
heap
page read and write
BB0000
heap
page read and write
2EAA000
heap
page read and write
4B9E000
stack
page read and write
390000
heap
page read and write
44A000
heap
page read and write
2B9D000
heap
page read and write
2FA8000
heap
page read and write
2BF0000
heap
page read and write
324C000
heap
page read and write
2B77000
stack
page read and write
4C60000
trusted library allocation
page read and write
9330000
remote allocation
page read and write
8E8F000
stack
page read and write
26D5000
heap
page read and write
7EDC000
stack
page read and write
53AA000
heap
page read and write
6FA06000
unkown
page read and write
2BA0000
heap
page read and write
4C80000
heap
page read and write
9330000
remote allocation
page read and write
7F20000
remote allocation
page read and write
31D9000
heap
page read and write
28AE000
heap
page read and write
911F000
stack
page read and write
31DD000
heap
page read and write
7C4E000
stack
page read and write
3260000
heap
page read and write
501E000
stack
page read and write
30D6000
heap
page read and write
8F42000
heap
page read and write
8C46000
heap
page read and write
4FBD000
stack
page read and write
2A5A000
heap
page read and write
50AB000
stack
page read and write
90BF000
stack
page read and write
8CA1000
heap
page read and write
8F70000
heap
page read and write
27CE000
stack
page read and write
320A000
heap
page read and write
8C27000
heap
page read and write
7E9B000
stack
page read and write
2AA0000
heap
page read and write
26C7000
heap
page read and write
31D1000
heap
page read and write
F3E000
stack
page read and write
2EFB000
heap
page read and write
8F85000
heap
page read and write
900E000
stack
page read and write
2CA7000
stack
page read and write
4CB0000
heap
page read and write
2FA3000
heap
page read and write
8C90000
remote allocation
page read and write
2D40000
heap
page read and write
299E000
stack
page read and write
2EA2000
heap
page read and write
3116000
heap
page read and write
90A0000
remote allocation
page read and write
3289000
heap
page read and write
3208000
heap
page read and write
2E30000
heap
page read and write
8FD0000
remote allocation
page read and write
There are 510 hidden memdumps, click here to show them.