IOC Report
5300000.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\5300000.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5300000.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\5300000.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
166AFC00000
heap
page read and write
2FA2000
heap
page read and write
18A6CB69000
heap
page read and write
B2478FE000
stack
page read and write
11846000000
heap
page read and write
236AEC00000
heap
page read and write
1E61F4B5000
heap
page read and write
24C74513000
heap
page read and write
2871AE75000
heap
page read and write
2871AE00000
heap
page read and write
22135002000
trusted library allocation
page read and write
236A968E000
heap
page read and write
18A6C24E000
heap
page read and write
2871AE90000
heap
page read and write
18A6CB4B000
heap
page read and write
1E61F4B3000
heap
page read and write
2871AC60000
heap
page read and write
24C74402000
heap
page read and write
668DF7D000
stack
page read and write
18A6CB8C000
heap
page read and write
18A6C1F0000
remote allocation
page read and write
18A6CB24000
heap
page read and write
F454A7E000
stack
page read and write
18BF1060000
heap
page read and write
22134900000
heap
page read and write
255C09D0000
trusted library allocation
page read and write
F13F54B000
stack
page read and write
18A6CB4B000
heap
page read and write
18A6C250000
heap
page read and write
18A6CBA7000
heap
page read and write
255C0790000
heap
page read and write
11846059000
heap
page read and write
956E7C000
stack
page read and write
236AEE10000
trusted library allocation
page read and write
2871AE65000
heap
page read and write
18BF1020000
heap
page read and write
1E61F4C8000
heap
page read and write
9E45177000
stack
page read and write
2871AE13000
heap
page read and write
18A6C313000
heap
page read and write
18BF13F5000
heap
page read and write
18A6CBB7000
heap
page read and write
710000
heap
page read and write
96F000
stack
page read and write
24590802000
heap
page read and write
1184603D000
heap
page read and write
255C0F90000
remote allocation
page read and write
166AFAF0000
heap
page read and write
18A6CA02000
heap
page read and write
526C97E000
stack
page read and write
236AEC30000
heap
page read and write
236AEE80000
trusted library allocation
page read and write
2871AE70000
heap
page read and write
255C07A0000
heap
page read and write
2F9E000
heap
page read and write
2812BA6D000
heap
page read and write
221346B0000
heap
page read and write
236AEB60000
trusted library allocation
page read and write
18BF10A7000
heap
page read and write
236AECDF000
heap
page read and write
9E45579000
stack
page read and write
18A6CB91000
heap
page read and write
18A6D002000
heap
page read and write
236AEB64000
trusted library allocation
page read and write
2871AF00000
heap
page read and write
95747F000
stack
page read and write
18A6CB61000
heap
page read and write
2812BA49000
heap
page read and write
22134913000
heap
page read and write
18BF10AF000
heap
page read and write
2FA4000
heap
page read and write
B247AFB000
stack
page read and write
166AFD13000
heap
page read and write
255C0800000
heap
page read and write
18A6C254000
heap
page read and write
1E61F4B1000
heap
page read and write
18A6CB97000
heap
page read and write
18A6CBAC000
heap
page read and write
1E61F4C8000
heap
page read and write
18BF13F9000
heap
page read and write
2812BA67000
heap
page read and write
166AFA90000
heap
page read and write
255C1002000
trusted library allocation
page read and write
18A6CBA8000
heap
page read and write
24C74500000
heap
page read and write
24C7444D000
heap
page read and write
22134828000
heap
page read and write
90F5EF000
stack
page read and write
236A9694000
heap
page read and write
95737E000
stack
page read and write
18A6D002000
heap
page read and write
2812BA4B000
heap
page read and write
236A9702000
heap
page read and write
9E45A7C000
stack
page read and write
18BF1F00000
trusted library allocation
page read and write
255C0A29000
heap
page read and write
18A6CB65000
heap
page read and write
236AECE5000
heap
page read and write
236AEC10000
heap
page read and write
166AFC3C000
heap
page read and write
24C74489000
heap
page read and write
24C74300000
heap
page read and write
18A6C258000
heap
page read and write
2812BA74000
heap
page read and write
24C74C02000
trusted library allocation
page read and write
5965FF8000
stack
page read and write
95707D000
stack
page read and write
2812BA42000
heap
page read and write
49FE000
stack
page read and write
22134902000
heap
page read and write
18A6CBAC000
heap
page read and write
11845F70000
trusted library allocation
page read and write
1E61F4A4000
heap
page read and write
24C74452000
heap
page read and write
1184607A000
heap
page read and write
18A6CB5C000
heap
page read and write
18BF1F10000
trusted library allocation
page read and write
236A9480000
heap
page read and write
236AECB3000
heap
page read and write
18A6C302000
heap
page read and write
2458FED0000
heap
page read and write
640000
heap
page read and write
2F95000
heap
page read and write
22134802000
heap
page read and write
526CDFE000
unkown
page read and write
18BF1C20000
trusted library allocation
page read and write
2812BA69000
heap
page read and write
95727F000
stack
page read and write
18A6C2F3000
heap
page read and write
2871AE3C000
heap
page read and write
18A6CB84000
heap
page read and write
668DD7D000
stack
page read and write
F4546BB000
stack
page read and write
2871AD60000
trusted library allocation
page read and write
2871AE5E000
heap
page read and write
236AEE10000
trusted library allocation
page read and write
236A95E0000
trusted library allocation
page read and write
2812BA39000
heap
page read and write
526C4CC000
stack
page read and write
166AFC4D000
heap
page read and write
18A6CB70000
heap
page read and write
2E60000
heap
page read and write
18A6D002000
heap
page read and write
245900CC000
heap
page read and write
236AED02000
heap
page read and write
24C74A60000
trusted library allocation
page read and write
2871AE5B000
heap
page read and write
2458FF60000
trusted library allocation
page read and write
18A6CB65000
heap
page read and write
11845F40000
heap
page read and write
22134840000
heap
page read and write
236A9629000
heap
page read and write
F13F87E000
stack
page read and write
236A9600000
heap
page read and write
2FA8000
heap
page read and write
59660FE000
stack
page read and write
2812BA29000
heap
page read and write
18A6C020000
heap
page read and write
255C0A00000
heap
page read and write
1E61F4C5000
heap
page read and write
24C74470000
heap
page read and write
18A6CB65000
heap
page read and write
90FC7E000
stack
page read and write
668DC7B000
stack
page read and write
18A6CB9B000
heap
page read and write
236AEC4F000
heap
page read and write
18A6CBAE000
heap
page read and write
18A6CBAC000
heap
page read and write
18A6CBA1000
heap
page read and write
5965E7A000
stack
page read and write
18A6CB7A000
heap
page read and write
2871AE45000
heap
page read and write
18A6C24D000
heap
page read and write
236AEFB0000
trusted library allocation
page read and write
2871AF02000
heap
page read and write
2812B9F0000
trusted library allocation
page read and write
F454B7E000
stack
page read and write
9E4537A000
stack
page read and write
236A963F000
heap
page read and write
166AFC52000
heap
page read and write
11846063000
heap
page read and write
236A96FE000
heap
page read and write
166AFC74000
heap
page read and write
22134859000
heap
page read and write
18A6CB95000
heap
page read and write
2871AE87000
heap
page read and write
18A6C247000
heap
page read and write
60E000
stack
page read and write
3200000
trusted library allocation
page read and write
1E61F4B9000
heap
page read and write
18A6CB69000
heap
page read and write
166AFC70000
heap
page read and write
2871AE81000
heap
page read and write
236A96FE000
heap
page read and write
236AECAB000
heap
page read and write
1E61F340000
heap
page read and write
E0000
heap
page read and write
18A6CBB1000
heap
page read and write
11846026000
heap
page read and write
2812BA3A000
heap
page read and write
18A6CBB7000
heap
page read and write
236A9F18000
heap
page read and write
18A6CB7A000
heap
page read and write
2FB2000
heap
page read and write
221346C0000
heap
page read and write
236A9707000
heap
page read and write
FAA58BC000
stack
page read and write
FAA5E7E000
stack
page read and write
B2475BB000
stack
page read and write
F454E7F000
stack
page read and write
18A6CB66000
heap
page read and write
18A6D003000
heap
page read and write
18A6D002000
heap
page read and write
1B0000
trusted library allocation
page read and write
F13FDFF000
stack
page read and write
18A6C213000
heap
page read and write
236A9676000
heap
page read and write
236A967A000
heap
page read and write
2812BA4D000
heap
page read and write
18A6C24A000
heap
page read and write
236A9670000
heap
page read and write
166AFA80000
heap
page read and write
18A6CB69000
heap
page read and write
4FD000
stack
page read and write
3EF4BFD000
stack
page read and write
18A6D003000
heap
page read and write
18A6CBA6000
heap
page read and write
2FB9000
heap
page read and write
18A6CB69000
heap
page read and write
24C7447D000
heap
page read and write
166AFC2D000
heap
page read and write
668DE7E000
stack
page read and write
FAA607F000
stack
page read and write
9E45D7F000
stack
page read and write
18A6CBC6000
heap
page read and write
1E61F5A0000
heap
page read and write
18A6CB7A000
heap
page read and write
2812BA64000
heap
page read and write
18A6CBD0000
heap
page read and write
90FD7F000
stack
page read and write
71B000
heap
page read and write
14C000
stack
page read and write
18A6CB72000
heap
page read and write
11845ED0000
heap
page read and write
5965F7E000
stack
page read and write
236AEB70000
trusted library allocation
page read and write
18A6CB67000
heap
page read and write
18A6CB4E000
heap
page read and write
2812BA00000
heap
page read and write
18A6CB65000
heap
page read and write
18A6CB73000
heap
page read and write
236A9E02000
heap
page read and write
18A6CB9C000
heap
page read and write
2812BA4E000
heap
page read and write
1E61F4B3000
heap
page read and write
236AEEA0000
remote allocation
page read and write
236AEB70000
trusted library allocation
page read and write
2812BA2E000
heap
page read and write
2458FF30000
heap
page read and write
B247DFF000
stack
page read and write
FAA593E000
stack
page read and write
F13F5CE000
stack
page read and write
236AEC23000
heap
page read and write
18A6CB9E000
heap
page read and write
18A6CB9D000
heap
page read and write
18A6D002000
heap
page read and write
24590013000
heap
page read and write
D40EE7B000
stack
page read and write
236AEE70000
trusted library allocation
page read and write
24590000000
heap
page read and write
2F99000
heap
page read and write
236AEB4E000
trusted library allocation
page read and write
1E61F4CA000
heap
page read and write
18BF10AE000
heap
page read and write
236AE9A0000
trusted library allocation
page read and write
18A6CB69000
heap
page read and write
24C74508000
heap
page read and write
18A6C2F6000
heap
page read and write
18A6C2A7000
heap
page read and write
1E61F4C1000
heap
page read and write
2812BA61000
heap
page read and write
24C7443C000
heap
page read and write
18A6CB95000
heap
page read and write
18A6D002000
heap
page read and write
236AEB84000
trusted library allocation
page read and write
2812BA45000
heap
page read and write
526CD7F000
stack
page read and write
B247CFF000
stack
page read and write
236AEE10000
trusted library allocation
page read and write
24C74429000
heap
page read and write
18BF1000000
heap
page read and write
2812BA44000
heap
page read and write
236A9702000
heap
page read and write
236AEC90000
trusted library allocation
page read and write
2871AE70000
heap
page read and write
2F95000
heap
page read and write
18A6CB5C000
heap
page read and write
18A6C2BE000
heap
page read and write
956A7B000
stack
page read and write
18A6CB83000
heap
page read and write
236A9F13000
heap
page read and write
22134813000
heap
page read and write
236AA9A0000
trusted library allocation
page read and write
2812C202000
trusted library allocation
page read and write
11846076000
heap
page read and write
255C0F90000
remote allocation
page read and write
18A6CB6B000
heap
page read and write
1E61F580000
heap
page read and write
11846102000
heap
page read and write
18A6CB00000
heap
page read and write
2812BA41000
heap
page read and write
18BF10AE000
heap
page read and write
166AFBF0000
trusted library allocation
page read and write
245900C6000
heap
page read and write
18A6C229000
heap
page read and write
18BF0F90000
heap
page read and write
18A6CB9C000
heap
page read and write
1E61F4A2000
heap
page read and write
18A6C308000
heap
page read and write
18BF1071000
heap
page read and write
236AEE50000
trusted library allocation
page read and write
526CC7A000
stack
page read and write
B247BF7000
stack
page read and write
236A9E15000
heap
page read and write
9E4527C000
stack
page read and write
1E61F496000
heap
page read and write
18BF10CA000
heap
page read and write
18A6C248000
heap
page read and write
18A6CB7A000
heap
page read and write
1184605C000
heap
page read and write
166AFC29000
heap
page read and write
18A6CB66000
heap
page read and write
18A6D000000
heap
page read and write
255C0F90000
remote allocation
page read and write
18A6CB5B000
heap
page read and write
4D80000
trusted library allocation
page read and write
2812BA83000
heap
page read and write
18A6CB9D000
heap
page read and write
1E61F610000
heap
page read and write
18A6CB9C000
heap
page read and write
668DA7F000
stack
page read and write
18BF13F0000
heap
page read and write
24C74400000
heap
page read and write
2B4A000
stack
page read and write
2459003E000
heap
page read and write
2458FEC0000
heap
page read and write
668D3AB000
stack
page read and write
18A6CB8C000
heap
page read and write
2B8B000
stack
page read and write
3237000
heap
page read and write
166B0402000
trusted library allocation
page read and write
18A6CB9F000
heap
page read and write
236AECFD000
heap
page read and write
D40EF7B000
stack
page read and write
24590102000
heap
page read and write
9E44D4B000
stack
page read and write
18A6C253000
heap
page read and write
2871ABF0000
heap
page read and write
18A6CB69000
heap
page read and write
18A6C2C5000
heap
page read and write
18A6CB72000
heap
page read and write
1184606D000
heap
page read and write
18A6CB9B000
heap
page read and write
18A6CB97000
heap
page read and write
2812BB02000
heap
page read and write
2871AF13000
heap
page read and write
11846013000
heap
page read and write
18A6CB7E000
heap
page read and write
2812BA75000
heap
page read and write
9E4567B000
stack
page read and write
2459006A000
heap
page read and write
1E61F4C0000
heap
page read and write
18BF1EE0000
trusted library allocation
page read and write
2812B950000
heap
page read and write
90F87E000
stack
page read and write
90F56B000
stack
page read and write
1E61F615000
heap
page read and write
2812BA46000
heap
page read and write
90F97B000
stack
page read and write
2F70000
heap
page read and write
2812BA2D000
heap
page read and write
956C7B000
stack
page read and write
2812BA13000
heap
page read and write
18A6CB9D000
heap
page read and write
24C742A0000
heap
page read and write
18A6CB24000
heap
page read and write
236AA4F0000
trusted library allocation
page read and write
18A6C23C000
heap
page read and write
FAA59BE000
stack
page read and write
166AFD08000
heap
page read and write
18A6CB9B000
heap
page read and write
18A6CBAC000
heap
page read and write
18A6CB9B000
heap
page read and write
166AFD00000
heap
page read and write
2871AF08000
heap
page read and write
255C0B02000
heap
page read and write
18A6C180000
trusted library allocation
page read and write
24C74290000
heap
page read and write
236AEC42000
heap
page read and write
2F9E000
heap
page read and write
18A6CB78000
heap
page read and write
18A6D002000
heap
page read and write
166AFD02000
heap
page read and write
11846069000
heap
page read and write
18A6CB4B000
heap
page read and write
236AECE7000
heap
page read and write
1E61F491000
heap
page read and write
1E61F4A6000
heap
page read and write
255C0A3D000
heap
page read and write
236AEEA0000
remote allocation
page read and write
18A6CB9B000
heap
page read and write
18A6CB97000
heap
page read and write
11846113000
heap
page read and write
95717E000
stack
page read and write
2812B960000
heap
page read and write
166AFC53000
heap
page read and write
18A6C1F0000
remote allocation
page read and write
2812BA30000
heap
page read and write
236AEB48000
trusted library allocation
page read and write
18A6CBAE000
heap
page read and write
1E61F4B8000
heap
page read and write
B24787E000
stack
page read and write
1E61F4A5000
heap
page read and write
18A6CB61000
heap
page read and write
FAA5F7E000
stack
page read and write
18A6CBAC000
heap
page read and write
18A6CB5C000
heap
page read and write
24590900000
heap
page read and write
5966079000
stack
page read and write
18A6CBBC000
heap
page read and write
236A9F58000
heap
page read and write
236AA993000
trusted library allocation
page read and write
166AFC90000
heap
page read and write
48CF000
stack
page read and write
18BF1F60000
trusted library allocation
page read and write
24C74413000
heap
page read and write
18A6CB69000
heap
page read and write
18A6CB66000
heap
page read and write
18A6CB71000
heap
page read and write
11846029000
heap
page read and write
24590063000
heap
page read and write
255C0A13000
heap
page read and write
3EF4B79000
stack
page read and write
11846002000
heap
page read and write
18A6CB9B000
heap
page read and write
236AEA30000
trusted library allocation
page read and write
2213487B000
heap
page read and write
2AE0000
heap
page read and write
22134800000
heap
page read and write
236AEEA0000
remote allocation
page read and write
2812BA7E000
heap
page read and write
A6F000
stack
page read and write
2812BA7A000
heap
page read and write
18A6CB70000
heap
page read and write
18A6CB9D000
heap
page read and write
2871AE5F000
heap
page read and write
2871AE29000
heap
page read and write
668DAFC000
stack
page read and write
FAA5D7F000
stack
page read and write
236A9F02000
heap
page read and write
D40E94B000
stack
page read and write
F454BFC000
stack
page read and write
526CA77000
stack
page read and write
18A6CBBE000
heap
page read and write
2F9E000
heap
page read and write
245900BB000
heap
page read and write
668D97E000
stack
page read and write
236AEC60000
heap
page read and write
18A6C1F0000
remote allocation
page read and write
18A6C316000
heap
page read and write
1FE000
stack
page read and write
18A6C080000
heap
page read and write
24590932000
heap
page read and write
18A6C256000
heap
page read and write
2812BA6F000
heap
page read and write
236A94E0000
heap
page read and write
18A6C010000
heap
page read and write
3210000
trusted library allocation
page read and write
2812BA62000
heap
page read and write
24C74450000
heap
page read and write
668D7FC000
stack
page read and write
18A6CB70000
heap
page read and write
18A6CB7C000
heap
page read and write
18BF1C90000
trusted library allocation
page read and write
236AECF5000
heap
page read and write
D40F17E000
stack
page read and write
18A6C2A7000
heap
page read and write
18A6CB7F000
heap
page read and write
3EF4CF9000
stack
page read and write
F13F9FE000
stack
page read and write
4A3F000
stack
page read and write
236AEB40000
trusted library allocation
page read and write
3EF4C7F000
stack
page read and write
F13FAFB000
stack
page read and write
2F9A000
heap
page read and write
2FA2000
heap
page read and write
236A9F04000
heap
page read and write
668E07E000
stack
page read and write
236AEB80000
trusted library allocation
page read and write
2812BA47000
heap
page read and write
18A6CB7F000
heap
page read and write
1E61F496000
heap
page read and write
236AEE20000
trusted library allocation
page read and write
18A6C257000
heap
page read and write
236AE9B0000
trusted library allocation
page read and write
18A6CB6F000
heap
page read and write
F13FBF7000
stack
page read and write
18A6CB4B000
heap
page read and write
1E61F4B1000
heap
page read and write
2871AC00000
heap
page read and write
2BF0000
trusted library allocation
page read and write
2871AE52000
heap
page read and write
236AECF1000
heap
page read and write
18A6CB69000
heap
page read and write
18BF1C30000
trusted library allocation
page read and write
18A6CB70000
heap
page read and write
24C7444B000
heap
page read and write
18A6CB6C000
heap
page read and write
236A9613000
heap
page read and write
18A6CB9B000
heap
page read and write
236AECF1000
heap
page read and write
255C0A25000
heap
page read and write
F13FCFE000
stack
page read and write
2F50000
heap
page read and write
24C74457000
heap
page read and write
236AEA20000
trusted library allocation
page read and write
2812BA63000
heap
page read and write
18A6CB24000
heap
page read and write
2812BA3D000
heap
page read and write
18A6CBAE000
heap
page read and write
18A6C281000
heap
page read and write
22134720000
heap
page read and write
24C74502000
heap
page read and write
236A96A1000
heap
page read and write
18A6C288000
heap
page read and write
F454F7D000
stack
page read and write
1E61F4B1000
heap
page read and write
18A6CB92000
heap
page read and write
236A9714000
heap
page read and write
18A6CB6B000
heap
page read and write
323A000
heap
page read and write
18A6CB5B000
heap
page read and write
236A9F00000
heap
page read and write
668DBFE000
stack
page read and write
18A6C249000
heap
page read and write
18A6CB98000
heap
page read and write
236A9678000
heap
page read and write
F454DFD000
stack
page read and write
18A6CB95000
heap
page read and write
18BF1EF0000
heap
page readonly
526C5CE000
stack
page read and write
18A6CB6B000
heap
page read and write
2812BA66000
heap
page read and write
236AA971000
trusted library allocation
page read and write
24590029000
heap
page read and write
18A6CB20000
heap
page read and write
18A6C2B1000
heap
page read and write
18BF0FA0000
trusted library allocation
page read and write
3EF474B000
stack
page read and write
526CB78000
stack
page read and write
18A6CB65000
heap
page read and write
9E45B7A000
stack
page read and write
2F54000
heap
page read and write
18A6D020000
heap
page read and write
2871AE62000
heap
page read and write
2812BA77000
heap
page read and write
18BF1400000
trusted library allocation
page read and write
2812BA7B000
heap
page read and write
18A6C251000
heap
page read and write
18A6CB65000
heap
page read and write
18A6D002000
heap
page read and write
18A6C270000
heap
page read and write
18A6D002000
heap
page read and write
236AEB40000
trusted library allocation
page read and write
9E4547E000
stack
page read and write
526C54E000
stack
page read and write
2F7A000
heap
page read and write
236AA990000
trusted library allocation
page read and write
596617C000
stack
page read and write
90FB77000
stack
page read and write
236A9F59000
heap
page read and write
236AECFA000
heap
page read and write
18A6CB97000
heap
page read and write
1E61F4B5000
heap
page read and write
236A9656000
heap
page read and write
2F9F000
heap
page read and write
488E000
stack
page read and write
236A9470000
heap
page read and write
24590087000
heap
page read and write
2812BA40000
heap
page read and write
1E61F4C6000
heap
page read and write
236AECA0000
trusted library allocation
page read and write
5965EFF000
stack
page read and write
11846802000
trusted library allocation
page read and write
1E61F480000
heap
page read and write
236AEE60000
trusted library allocation
page read and write
236A9690000
heap
page read and write
18A6CB7A000
heap
page read and write
236AECE9000
heap
page read and write
3230000
heap
page read and write
18BF1CA0000
trusted library allocation
page read and write
95757E000
stack
page read and write
1E61F4B3000
heap
page read and write
18A6CBA2000
heap
page read and write
18A6C200000
heap
page read and write
236AEB61000
trusted library allocation
page read and write
90FA7B000
stack
page read and write
2812BA60000
heap
page read and write
24C74454000
heap
page read and write
18A6C24B000
heap
page read and write
18A6CB5B000
heap
page read and write
2812BA48000
heap
page read and write
D40F07B000
stack
page read and write
18A6CB9B000
heap
page read and write
18BF10A8000
heap
page read and write
166AFC81000
heap
page read and write
24590113000
heap
page read and write
236AEF90000
trusted library allocation
page read and write
18A6CB19000
heap
page read and write
18A6CB17000
heap
page read and write
18BF1067000
heap
page read and write
11845EE0000
heap
page read and write
166AFC57000
heap
page read and write
18A6C2DD000
heap
page read and write
18A6D019000
heap
page read and write
6250000
trusted library allocation
page read and write
526CEF8000
stack
page read and write
2812B9C0000
heap
page read and write
166AFC13000
heap
page read and write
18A6CB95000
heap
page read and write
956D7E000
stack
page read and write
18A6CBCD000
heap
page read and write
2871B602000
trusted library allocation
page read and write
236AEC88000
heap
page read and write
1E61F4B5000
heap
page read and write
236A9F18000
heap
page read and write
255C0A02000
heap
page read and write
236A9E00000
heap
page read and write
255C0A57000
heap
page read and write
22134E80000
trusted library allocation
page read and write
18A6CBC6000
heap
page read and write
18A6CB5B000
heap
page read and write
There are 632 hidden memdumps, click here to show them.