IOC Report
jYzNEOocXJ.exe

loading gif

Files

File Path
Type
Category
Malicious
jYzNEOocXJ.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\jYzNEOocXJ.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\jYzNEOocXJ.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\jYzNEOocXJ.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\jYzNEOocXJ.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SlbehL\VFRyzv.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IGITGYfeMHnijDRfh\YUPGSgcOA.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MTGBtRnw\JNSgzavrCOAZ.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NiLEPseQYt\GYKBfnsNfiUmNl.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\SlbehL\VFRyzv.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\DjbPAkHwGwShv\clUEIwbdI.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\jYzNEOocXJ.dll",#1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/
unknown
https://172.105.115.71:8080/daynvy/lwep/gvpqtdecbbocnir/mhitp/$V
unknown
https://172.105.115.71:8080/daynvy/lwep/gvpqtdecbbocnir/mhitp/
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
VFRyzv.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
2A925490000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
B00000
direct allocation
page execute and read and write
malicious
1F70000
direct allocation
page execute and read and write
malicious
208C4B40000
direct allocation
page execute and read and write
malicious
2BF0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1E780100000
direct allocation
page execute and read and write
malicious
C39000
heap
page read and write
112B000
heap
page read and write
114D000
heap
page read and write
1505000
heap
page read and write
1200000
remote allocation
page read and write
14DE000
stack
page read and write
18002C000
direct allocation
page read and write
1C4992E0000
trusted library allocation
page read and write
2550000
heap
page read and write
208C4999000
heap
page read and write
2A925573000
heap
page read and write
C0E000
heap
page read and write
208C4890000
heap
page read and write
208C49D7000
heap
page read and write
480000
heap
page read and write
2D50000
trusted library allocation
page read and write
DDF000
heap
page read and write
2E21000
heap
page read and write
D30000
heap
page read and write
C39000
heap
page read and write
1FC0000
heap
page read and write
2A925320000
heap
page read and write
2A926DDC000
heap
page read and write
DCB000
stack
page read and write
670000
heap
page read and write
150C000
heap
page read and write
208C4986000
heap
page read and write
4F6047B000
stack
page read and write
2A92553C000
heap
page read and write
1265000
heap
page read and write
1E7F9989000
heap
page read and write
4D9000
heap
page read and write
208C499E000
heap
page read and write
58A0000
heap
page read and write
DE0000
heap
page read and write
524000
heap
page read and write
C10000
heap
page read and write
2530000
remote allocation
page read and write
2530000
remote allocation
page read and write
DEE000
heap
page read and write
580000
heap
page read and write
B95000
heap
page read and write
7FF875EA1000
unkown
page execute read
BAC000
heap
page read and write
1238000
heap
page read and write
B48000
heap
page read and write
1E7F9989000
heap
page read and write
E11000
heap
page read and write
2E60000
heap
page read and write
208C6570000
heap
page read and write
8CA000
stack
page read and write
69D000
heap
page read and write
7FF875F27000
unkown
page readonly
C0E000
heap
page read and write
4D0000
heap
page read and write
1E7F9870000
heap
page read and write
260B000
heap
page read and write
2A925546000
heap
page read and write
DB5000
heap
page read and write
DBE000
heap
page read and write
DE1000
heap
page read and write
B8D000
heap
page read and write
18002D000
direct allocation
page readonly
6A5000
heap
page read and write
C29000
heap
page read and write
2A925538000
heap
page read and write
18002C000
direct allocation
page read and write
21C9000
stack
page read and write
FA0000
heap
page read and write
DF6000
heap
page read and write
C39000
heap
page read and write
4F603FE000
stack
page read and write
2CAF000
stack
page read and write
C29000
heap
page read and write
2560000
heap
page read and write
62B0000
trusted library allocation
page read and write
C10000
heap
page read and write
FB8DA7E000
stack
page read and write
1E780130000
direct allocation
page execute and read and write
208C6360000
heap
page read and write
DC8000
heap
page read and write
B86000
heap
page read and write
311E000
stack
page read and write
C0E000
heap
page read and write
B73000
heap
page read and write
9D0000
heap
page read and write
B8D000
heap
page read and write
10F0000
heap
page read and write
1269000
heap
page read and write
10D0000
heap
page read and write
208C49E0000
heap
page read and write
1E780310000
heap
page read and write
1C4983AC000
heap
page read and write
BC1000
heap
page read and write
7FF875F1E000
unkown
page read and write
21B0000
heap
page read and write
1266000
heap
page read and write
21B3000
heap
page read and write
208C49B8000
heap
page read and write
18002D000
direct allocation
page readonly
8F0000
remote allocation
page read and write
7FF875ED8000
unkown
page readonly
DBE000
heap
page read and write
2B90000
heap
page read and write
507000
heap
page read and write
7FF875F25000
unkown
page readonly
7FF875F22000
unkown
page readonly
7FF875F1E000
unkown
page read and write
C29000
heap
page read and write
2C1E000
stack
page read and write
2D47000
stack
page read and write
78B000
stack
page read and write
2913000
heap
page read and write
B7C000
heap
page read and write
1E780240000
trusted library allocation
page read and write
F7020FE000
stack
page read and write
2608000
heap
page read and write
DD0000
heap
page readonly
7FF875EA0000
unkown
page readonly
BB3000
heap
page read and write
FB8DAFF000
stack
page read and write
F701EFC000
stack
page read and write
18002B000
direct allocation
page readonly
2B9C000
stack
page read and write
1151000
heap
page read and write
1C498310000
heap
page read and write
507000
heap
page read and write
1C4983AC000
heap
page read and write
4F601FE000
stack
page read and write
1E7F994F000
heap
page read and write
1E780140000
heap
page readonly
1E7F9850000
heap
page read and write
1210000
heap
page read and write
FB8DBF9000
stack
page read and write
8B0000
heap
page read and write
208C4B80000
heap
page readonly
18002D000
direct allocation
page readonly
299F000
stack
page read and write
208C49FA000
heap
page read and write
BBA000
heap
page read and write
125D000
heap
page read and write
6A5000
heap
page read and write
2621000
heap
page read and write
7FF875F25000
unkown
page readonly
2A925523000
heap
page read and write
CB0000
remote allocation
page read and write
1C4983CC000
heap
page read and write
190000
heap
page read and write
BAC000
heap
page read and write
1E7F994F000
heap
page read and write
507000
heap
page read and write
2623000
heap
page read and write
114D000
heap
page read and write
F88DFD000
stack
page read and write
1E7F9987000
heap
page read and write
18002C000
direct allocation
page read and write
526000
heap
page read and write
1156000
heap
page read and write
C39000
heap
page read and write
4F6017E000
stack
page read and write
2A9254D0000
heap
page read and write
1C4984A0000
trusted library allocation
page read and write
810000
heap
page read and write
BB3000
heap
page read and write
FDA000
stack
page read and write
FB8DC7E000
stack
page read and write
8F0000
remote allocation
page read and write
518000
heap
page read and write
630000
heap
page read and write
21D0000
trusted library allocation
page read and write
125D000
heap
page read and write
1265000
heap
page read and write
25C0000
heap
page read and write
2E49000
heap
page read and write
538000
heap
page read and write
2DB0000
heap
page read and write
20C0000
heap
page readonly
C00000
heap
page read and write
28B0000
heap
page read and write
69D000
heap
page read and write
68F000
heap
page read and write
2A925545000
heap
page read and write
EC0000
heap
page read and write
2E48000
heap
page read and write
2A925549000
heap
page read and write
1E7F9710000
heap
page read and write
BB3000
heap
page read and write
F701FFF000
stack
page read and write
12C5000
heap
page read and write
7FF875F22000
unkown
page readonly
670000
heap
page read and write
208C4900000
heap
page read and write
1E780240000
trusted library allocation
page read and write
DEA000
heap
page read and write
52F000
heap
page read and write
DB5000
heap
page read and write
2A926EB0000
trusted library allocation
page read and write
C39000
heap
page read and write
E00000
heap
page read and write
2D50000
trusted library allocation
page read and write
26DB000
stack
page read and write
CDE000
stack
page read and write
7C0000
heap
page read and write
2608000
heap
page read and write
8BC000
heap
page read and write
1E7F9938000
heap
page read and write
208C4992000
heap
page read and write
2E69000
heap
page read and write
208C49A2000
heap
page read and write
C0E000
heap
page read and write
25E1000
heap
page read and write
4F6037E000
stack
page read and write
4F600FE000
stack
page read and write
D23000
heap
page read and write
1C4983CD000
heap
page read and write
479000
stack
page read and write
DC6000
heap
page read and write
BAC000
heap
page read and write
2A92551D000
heap
page read and write
1F6F000
stack
page read and write
326B000
stack
page read and write
B6E000
heap
page read and write
2AF0000
heap
page read and write
4C5000
heap
page read and write
5B00000
trusted library allocation
page read and write
7FF875F22000
unkown
page readonly
50A0000
trusted library allocation
page read and write
2613000
heap
page read and write
18002C000
direct allocation
page read and write
208C4968000
heap
page read and write
208C4986000
heap
page read and write
208C49D7000
heap
page read and write
7E0000
heap
page read and write
DC6000
heap
page read and write
208C49CE000
heap
page read and write
25FF000
stack
page read and write
2A925584000
heap
page read and write
B8E000
heap
page read and write
208C6530000
trusted library allocation
page read and write
7FF875F27000
unkown
page readonly
507000
heap
page read and write
6D0000
heap
page read and write
4AB000
heap
page read and write
B95000
heap
page read and write
E00000
heap
page read and write
C3C000
heap
page read and write
DEE000
heap
page read and write
115B000
heap
page read and write
47B000
stack
page read and write
7FF875F22000
unkown
page readonly
180000000
direct allocation
page read and write
7FF875F27000
unkown
page readonly
1199000
heap
page read and write
2A9254F0000
trusted library allocation
page read and write
B30000
direct allocation
page execute and read and write
8B5000
heap
page read and write
2A925558000
heap
page read and write
6C2000
heap
page read and write
2520000
trusted library allocation
page read and write
31EE000
stack
page read and write
2A926F95000
heap
page read and write
1E7F999B000
heap
page read and write
D20000
heap
page read and write
DD0000
heap
page read and write
B8D000
heap
page read and write
BD3000
heap
page read and write
4F6007C000
stack
page read and write
55B000
heap
page read and write
7FF875EA1000
unkown
page execute read
2A925460000
heap
page read and write
2A925510000
heap
page read and write
1E7F9930000
heap
page read and write
2B1C000
stack
page read and write
F20000
heap
page read and write
2A926DDC000
heap
page read and write
1C498560000
heap
page read and write
260A000
heap
page read and write
208C4BB5000
heap
page read and write
2A92552C000
heap
page read and write
DB0000
heap
page read and write
D98000
heap
page read and write
25C1000
heap
page read and write
7FF875F1E000
unkown
page read and write
1C4983A4000
heap
page read and write
DF6000
heap
page read and write
DEE000
heap
page read and write
D90000
heap
page read and write
1E7F9960000
heap
page read and write
FA5000
heap
page read and write
7FF875F25000
unkown
page readonly
208C498B000
heap
page read and write
7FF875ED8000
unkown
page readonly
BA8000
heap
page read and write
126C000
heap
page read and write
B6E000
heap
page read and write
116C000
heap
page read and write
C39000
heap
page read and write
1230000
heap
page read and write
257E000
stack
page read and write
7FF875EA1000
unkown
page execute read
B6E000
heap
page read and write
F88E7E000
stack
page read and write
1C498565000
heap
page read and write
18002B000
direct allocation
page readonly
C39000
heap
page read and write
180000000
direct allocation
page read and write
B89000
heap
page read and write
2A1E000
stack
page read and write
DC6000
heap
page read and write
1E7F9B45000
heap
page read and write
60BE000
stack
page read and write
5E40000
heap
page read and write
208C4999000
heap
page read and write
2AEE000
stack
page read and write
7FF875F1E000
unkown
page read and write
BA8000
heap
page read and write
18002B000
direct allocation
page readonly
7FF875EA0000
unkown
page readonly
7B0000
remote allocation
page read and write
1C4984B0000
trusted library allocation
page read and write
261A000
heap
page read and write
1C498360000
heap
page read and write
549000
heap
page read and write
2A9254C0000
direct allocation
page execute and read and write
DBE000
heap
page read and write
1FB0000
heap
page read and write
1E7F994F000
heap
page read and write
BD3000
heap
page read and write
538000
heap
page read and write
B8D000
heap
page read and write
BC5000
heap
page read and write
1FA0000
direct allocation
page execute and read and write
208C4BB0000
heap
page read and write
12C0000
heap
page read and write
F7023F9000
stack
page read and write
1C499280000
trusted library allocation
page read and write
B8E000
heap
page read and write
1200000
remote allocation
page read and write
C30000
heap
page read and write
E05000
heap
page read and write
B7E000
heap
page read and write
C35000
heap
page read and write
2530000
remote allocation
page read and write
4F6027C000
stack
page read and write
2E49000
heap
page read and write
DFC000
heap
page read and write
4A0000
remote allocation
page read and write
1E780000000
heap
page read and write
7FF875F25000
unkown
page readonly
1255000
heap
page read and write
678000
heap
page read and write
B7E000
heap
page read and write
5A0000
heap
page read and write
D90000
heap
page read and write
2E21000
heap
page read and write
275B000
stack
page read and write
1EEF000
stack
page read and write
20DE000
stack
page read and write
BAF000
heap
page read and write
18002C000
direct allocation
page read and write
1187000
heap
page read and write
DC6000
heap
page read and write
7FF875F27000
unkown
page readonly
208C49B8000
heap
page read and write
DF6000
heap
page read and write
2CCE000
stack
page read and write
18002B000
direct allocation
page readonly
9D0000
heap
page read and write
6A5000
heap
page read and write
1C4981E0000
trusted library allocation
page read and write
DCC000
heap
page read and write
BD3000
heap
page read and write
180000000
direct allocation
page read and write
7FF875F25000
unkown
page readonly
B88000
heap
page read and write
1C4983AC000
heap
page read and write
DC6000
heap
page read and write
21D0000
trusted library allocation
page read and write
7FF875F1E000
unkown
page read and write
7FF875EA0000
unkown
page readonly
18002D000
direct allocation
page readonly
DE0000
trusted library allocation
page read and write
2B1C000
heap
page read and write
1265000
heap
page read and write
208C49E9000
heap
page read and write
7FF875ED8000
unkown
page readonly
1179000
heap
page read and write
B7F000
heap
page read and write
C2C000
heap
page read and write
4A0000
heap
page read and write
F88EF9000
stack
page read and write
7FF875EA0000
unkown
page readonly
54CE000
stack
page read and write
1C498569000
heap
page read and write
515000
heap
page read and write
D10000
heap
page read and write
DE5000
heap
page read and write
1C499060000
trusted library allocation
page read and write
2DAF000
stack
page read and write
B95000
heap
page read and write
DF6000
heap
page read and write
F7021FE000
stack
page read and write
DC6000
heap
page read and write
1250000
heap
page read and write
208C49C5000
heap
page read and write
2A926DB0000
heap
page read and write
180000000
direct allocation
page read and write
1281000
heap
page read and write
1500000
heap
page read and write
507000
heap
page read and write
208C49B8000
heap
page read and write
2A92554E000
heap
page read and write
51E000
heap
page read and write
208C4960000
heap
page read and write
C0E000
heap
page read and write
208C4920000
heap
page read and write
2599000
heap
page read and write
F8899C000
stack
page read and write
180000000
direct allocation
page read and write
FB8DB7E000
stack
page read and write
2A926F90000
heap
page read and write
1E7F9963000
heap
page read and write
2910000
heap
page read and write
6A0000
heap
page read and write
F7022FD000
stack
page read and write
1C0000
heap
page read and write
7FF875ED8000
unkown
page readonly
DE5000
heap
page read and write
C24000
heap
page read and write
7FF875EA0000
unkown
page readonly
C29000
heap
page read and write
613E000
stack
page read and write
E11000
heap
page read and write
1C498368000
heap
page read and write
2E69000
heap
page read and write
1187000
heap
page read and write
DBA000
heap
page read and write
2C30000
heap
page readonly
12BE000
stack
page read and write
208C49C8000
heap
page read and write
7FF875F27000
unkown
page readonly
7FF875ED8000
unkown
page readonly
4A0000
remote allocation
page read and write
18002B000
direct allocation
page readonly
C10000
heap
page read and write
214E000
stack
page read and write
DAF000
heap
page read and write
69D000
heap
page read and write
1C499270000
heap
page readonly
208C49B8000
heap
page read and write
B85000
heap
page read and write
7FF875F22000
unkown
page readonly
B95000
heap
page read and write
2C20000
direct allocation
page execute and read and write
25CE000
stack
page read and write
FB8D7BC000
stack
page read and write
B40000
heap
page read and write
7FF875EA0000
unkown
page readonly
2E50000
heap
page read and write
2A925538000
heap
page read and write
180000000
direct allocation
page read and write
CB0000
remote allocation
page read and write
114D000
heap
page read and write
7FF875F27000
unkown
page readonly
18002B000
direct allocation
page readonly
DEE000
heap
page read and write
208C6530000
trusted library allocation
page read and write
C29000
heap
page read and write
7FF875EA1000
unkown
page execute read
18002C000
direct allocation
page read and write
526000
heap
page read and write
F8E000
stack
page read and write
7FF875F22000
unkown
page readonly
DF6000
heap
page read and write
694000
heap
page read and write
1120000
heap
page read and write
5640000
trusted library allocation
page read and write
1E78002C000
heap
page read and write
7FF875F25000
unkown
page readonly
1400000
heap
page read and write
C10000
heap
page read and write
DBE000
heap
page read and write
2A925573000
heap
page read and write
7FF875EA1000
unkown
page execute read
1C498570000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
FAC000
heap
page read and write
208C499E000
heap
page read and write
18002D000
direct allocation
page readonly
B93000
heap
page read and write
208C49A2000
heap
page read and write
4F602F7000
stack
page read and write
2C40000
heap
page read and write
7FF875EA1000
unkown
page execute read
1259000
heap
page read and write
1C499290000
trusted library allocation
page read and write
1C498330000
heap
page read and write
2A925540000
heap
page read and write
125D000
heap
page read and write
258C000
heap
page read and write
1E7F9B40000
heap
page read and write
2E53000
heap
page read and write
6A6000
heap
page read and write
DE1000
heap
page read and write
208C497E000
heap
page read and write
1C498550000
trusted library allocation
page read and write
C99000
stack
page read and write
F88D79000
stack
page read and write
208C638D000
heap
page read and write
2E00000
heap
page read and write
1C498510000
trusted library allocation
page read and write
7FF875ED8000
unkown
page readonly
7B0000
remote allocation
page read and write
208C49D5000
heap
page read and write
2520000
trusted library allocation
page read and write
BAC000
heap
page read and write
6A5000
heap
page read and write
1C4981D0000
heap
page read and write
208C4B70000
direct allocation
page execute and read and write
DC0000
heap
page read and write
2FB4000
heap
page read and write
18002D000
direct allocation
page readonly
208C49B8000
heap
page read and write
507000
heap
page read and write
2A925538000
heap
page read and write
B7A000
heap
page read and write
B85000
heap
page read and write
C10000
heap
page read and write
2A926F10000
heap
page read and write
7FF875F1E000
unkown
page read and write
DF6000
heap
page read and write
C20000
heap
page read and write
There are 534 hidden memdumps, click here to show them.