Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
zkB0qfWSJk.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_zkB0qfWSJk.exe_4e21ab8a6c52a8fdeb5761423d21df82a93865_bf7f78a4_6293aa2d-2707-4d52-988e-67550924207e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F66.tmp.dmp
|
Mini DuMP crash report, 16 streams, Mon Jul 1 12:48:09 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA12C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA18B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\regsvcs.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\zkB0qfWSJk.exe
|
"C:\Users\user\Desktop\zkB0qfWSJk.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7220 -s 980
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\choice.exe
|
choice /C Y /N /D Y /T 3
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.130.0
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.130.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
ProgramId
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
FileId
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
LowerCaseLongPath
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
LongPathHash
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
Name
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
OriginalFileName
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
Publisher
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
Version
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
BinFileVersion
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
BinaryType
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
ProductName
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
ProductVersion
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
LinkDate
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
BinProductVersion
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
AppxPackageFullName
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
Size
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
Language
|
||
\REGISTRY\A\{a0dc2c05-2eb6-6103-3a43-d0f66c2ef3d5}\Root\InventoryApplicationFile\zkb0qfwsjk.exe|7424ffec55d7c58
|
Usn
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2ED1000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
1AE1014B000
|
trusted library allocation
|
page read and write
|
||
1AE0003B000
|
trusted library allocation
|
page read and write
|
||
3094000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
32AC000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
1356000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
2D1B000
|
trusted library allocation
|
page execute and read and write
|
||
1360000
|
heap
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
4E0DF33000
|
stack
|
page read and write
|
||
2FDB000
|
trusted library allocation
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
7FFAAC77E000
|
trusted library allocation
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
1AE67B00000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
1AE67B20000
|
trusted library allocation
|
page read and write
|
||
1AE69530000
|
trusted library section
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
7FFAAC759000
|
trusted library allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
4E0E6FD000
|
stack
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5FC000
|
trusted library allocation
|
page execute and read and write
|
||
555D000
|
stack
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
146F000
|
stack
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
1AE10001000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
1AE6799D000
|
heap
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
3065000
|
trusted library allocation
|
page read and write
|
||
65BB000
|
heap
|
page read and write
|
||
687E000
|
stack
|
page read and write
|
||
7FFAAC5A2000
|
trusted library allocation
|
page read and write
|
||
7FFB16790000
|
unkown
|
page readonly
|
||
7FFAAC686000
|
trusted library allocation
|
page execute and read and write
|
||
1AE678A0000
|
heap
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
1333000
|
trusted library allocation
|
page execute and read and write
|
||
57DE000
|
stack
|
page read and write
|
||
1AE67970000
|
heap
|
page read and write
|
||
6586000
|
heap
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
3085000
|
trusted library allocation
|
page read and write
|
||
326C000
|
stack
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
1AE69600000
|
heap
|
page execute and read and write
|
||
7FFAAC5AD000
|
trusted library allocation
|
page execute and read and write
|
||
361E000
|
stack
|
page read and write
|
||
3058000
|
trusted library allocation
|
page read and write
|
||
1AE69E10000
|
heap
|
page read and write
|
||
1AE678C0000
|
heap
|
page read and write
|
||
1AE67890000
|
heap
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
1068000
|
heap
|
page read and write
|
||
2F82000
|
trusted library allocation
|
page read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
304A000
|
trusted library allocation
|
page read and write
|
||
1AE67C50000
|
heap
|
page read and write
|
||
2F89000
|
trusted library allocation
|
page read and write
|
||
2D17000
|
trusted library allocation
|
page execute and read and write
|
||
294E000
|
unkown
|
page read and write
|
||
2F9C000
|
trusted library allocation
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
1AE00001000
|
trusted library allocation
|
page read and write
|
||
1334000
|
trusted library allocation
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
2B9F000
|
unkown
|
page read and write
|
||
623F000
|
stack
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
7FFAAC5CD000
|
trusted library allocation
|
page execute and read and write
|
||
1AE67E30000
|
heap
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
3EF9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page execute and read and write
|
||
1AE6795B000
|
heap
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5BD000
|
trusted library allocation
|
page execute and read and write
|
||
2D40000
|
heap
|
page read and write
|
||
1AE67973000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
7FF48B890000
|
trusted library allocation
|
page execute and read and write
|
||
335E000
|
stack
|
page read and write
|
||
7FFB167B5000
|
unkown
|
page readonly
|
||
7FFAAC5A4000
|
trusted library allocation
|
page read and write
|
||
302B000
|
trusted library allocation
|
page read and write
|
||
4E0E7FE000
|
stack
|
page read and write
|
||
7FFAAC5C0000
|
trusted library allocation
|
page read and write
|
||
DF7000
|
stack
|
page read and write
|
||
50AC000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
1AE678E0000
|
heap
|
page read and write
|
||
1AE67802000
|
unkown
|
page readonly
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
108A000
|
heap
|
page read and write
|
||
6540000
|
heap
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
3017000
|
trusted library allocation
|
page read and write
|
||
301F000
|
trusted library allocation
|
page read and write
|
||
301B000
|
trusted library allocation
|
page read and write
|
||
1AE69640000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
1AE00352000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
1AE67C65000
|
heap
|
page read and write
|
||
4E0E2FF000
|
stack
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
667E000
|
stack
|
page read and write
|
||
4E0E8FE000
|
stack
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
7FFAAC656000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
4E0E4FF000
|
stack
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
29C4000
|
heap
|
page read and write
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
2D12000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page execute and read and write
|
||
35DE000
|
stack
|
page read and write
|
||
2F9A000
|
trusted library allocation
|
page read and write
|
||
5620000
|
heap
|
page read and write
|
||
3023000
|
trusted library allocation
|
page read and write
|
||
3013000
|
trusted library allocation
|
page read and write
|
||
1AE67930000
|
heap
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
7FFAAC5A3000
|
trusted library allocation
|
page execute and read and write
|
||
4E0E3FF000
|
stack
|
page read and write
|
||
1AE000E3000
|
trusted library allocation
|
page read and write
|
||
1AE67C60000
|
heap
|
page read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page read and write
|
||
1AE6793C000
|
heap
|
page read and write
|
||
24CD000
|
stack
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
7FFAAC5CB000
|
trusted library allocation
|
page execute and read and write
|
||
57F0000
|
heap
|
page execute and read and write
|
||
135A000
|
trusted library allocation
|
page execute and read and write
|
||
67FF000
|
stack
|
page read and write
|
||
4E0E5FF000
|
stack
|
page read and write
|
||
6577000
|
heap
|
page read and write
|
||
7FFAAC5B2000
|
trusted library allocation
|
page read and write
|
||
1AE67C40000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
7FFAAC754000
|
trusted library allocation
|
page read and write
|
||
4E0EAFE000
|
stack
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page execute and read and write
|
||
6C40000
|
heap
|
page read and write
|
||
6C3C000
|
stack
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
7FFAAC65C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB16791000
|
unkown
|
page execute read
|
||
29C5000
|
heap
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
613E000
|
stack
|
page read and write
|
||
1AE10007000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
1AE67800000
|
unkown
|
page readonly
|
||
5429000
|
trusted library allocation
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
302F000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
7FFB167B2000
|
unkown
|
page readonly
|
||
2820000
|
heap
|
page read and write
|
||
29AC000
|
heap
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
7FFAAC5C4000
|
trusted library allocation
|
page read and write
|
||
1AE00020000
|
trusted library allocation
|
page read and write
|
||
7FFB167A6000
|
unkown
|
page readonly
|
||
2DA0000
|
heap
|
page read and write
|
||
1AE67E35000
|
heap
|
page read and write
|
||
1AE679A4000
|
heap
|
page read and write
|
||
7FFB167B0000
|
unkown
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
1AE695F0000
|
heap
|
page execute and read and write
|
||
1060000
|
heap
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC5A0000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
2FC9000
|
trusted library allocation
|
page read and write
|
||
25CD000
|
stack
|
page read and write
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
6B3C000
|
stack
|
page read and write
|
||
4E0E9FE000
|
stack
|
page read and write
|
||
133D000
|
trusted library allocation
|
page execute and read and write
|
||
1110000
|
heap
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
1AE67C43000
|
trusted library allocation
|
page read and write
|
||
3027000
|
trusted library allocation
|
page read and write
|
||
633F000
|
stack
|
page read and write
|
||
68BE000
|
stack
|
page read and write
|
||
1352000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page execute and read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
There are 220 hidden memdumps, click here to show them.