Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
unpacked (1).dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_7bde5861e98b2ac3cc37e329f3101f62f0fff922_82810a17_1492a377\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9984.tmp.dmp
|
Mini DuMP crash report, 14 streams, Fri Mar 17 02:54:08 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C05.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C74.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\unpacked (1).dll"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\unpacked (1).dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\unpacked (1).dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5144 -s 644
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProgramId
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
FileId
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LongPathHash
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Name
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Publisher
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Version
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinFileVersion
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinaryType
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductName
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductVersion
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LinkDate
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinProductVersion
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Size
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Language
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsPeFile
|
||
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D6D000
|
stack
|
page read and write
|
||
2B352732000
|
heap
|
page read and write
|
||
2B351EA2000
|
heap
|
page read and write
|
||
2B351E86000
|
heap
|
page read and write
|
||
20E05B00000
|
heap
|
page read and write
|
||
FF64DFA000
|
stack
|
page read and write
|
||
2B461A6D000
|
heap
|
page read and write
|
||
2B461830000
|
heap
|
page read and write
|
||
2B351EA0000
|
heap
|
page read and write
|
||
25E0D5E0000
|
heap
|
page read and write
|
||
220BFE75000
|
heap
|
page read and write
|
||
2B351D10000
|
trusted library allocation
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
FF6497B000
|
stack
|
page read and write
|
||
2B352772000
|
heap
|
page read and write
|
||
E8B000
|
heap
|
page read and write
|
||
22BC5037000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
E7729FC000
|
stack
|
page read and write
|
||
2B351F13000
|
heap
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
2B461A42000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
20E05A51000
|
heap
|
page read and write
|
||
27681C00000
|
heap
|
page read and write
|
||
2B461A45000
|
heap
|
page read and write
|
||
2B461930000
|
trusted library allocation
|
page read and write
|
||
2B35276F000
|
heap
|
page read and write
|
||
27681B70000
|
trusted library allocation
|
page read and write
|
||
2B352772000
|
heap
|
page read and write
|
||
2B351E41000
|
heap
|
page read and write
|
||
9F8757D000
|
stack
|
page read and write
|
||
290A0A00000
|
heap
|
page read and write
|
||
220BFE5A000
|
heap
|
page read and write
|
||
2B461A65000
|
heap
|
page read and write
|
||
220BFDB0000
|
heap
|
page read and write
|
||
27681D18000
|
heap
|
page read and write
|
||
2B461A63000
|
heap
|
page read and write
|
||
EFD767F000
|
stack
|
page read and write
|
||
2B351E84000
|
heap
|
page read and write
|
||
290A0B02000
|
heap
|
page read and write
|
||
FF6451B000
|
stack
|
page read and write
|
||
B1FE87F000
|
stack
|
page read and write
|
||
220BFE64000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page write copy
|
||
20E05A64000
|
heap
|
page read and write
|
||
2B461A31000
|
heap
|
page read and write
|
||
2B352737000
|
heap
|
page read and write
|
||
20E05A66000
|
heap
|
page read and write
|
||
B118EFB000
|
stack
|
page read and write
|
||
290A09C0000
|
heap
|
page read and write
|
||
27681BE0000
|
remote allocation
|
page read and write
|
||
2B352727000
|
heap
|
page read and write
|
||
9F8727D000
|
stack
|
page read and write
|
||
E85478E000
|
stack
|
page read and write
|
||
10006000
|
unkown
|
page readonly
|
||
10008000
|
unkown
|
page readonly
|
||
FF64B7B000
|
stack
|
page read and write
|
||
2B351E5D000
|
heap
|
page read and write
|
||
E854B7E000
|
stack
|
page read and write
|
||
290A0A64000
|
heap
|
page read and write
|
||
20E05A43000
|
heap
|
page read and write
|
||
2B351E23000
|
heap
|
page read and write
|
||
2B35275F000
|
heap
|
page read and write
|
||
2B461A61000
|
heap
|
page read and write
|
||
22BC505D000
|
heap
|
page read and write
|
||
2B35273B000
|
heap
|
page read and write
|
||
10008000
|
unkown
|
page readonly
|
||
22BC5034000
|
heap
|
page read and write
|
||
22BC5002000
|
heap
|
page read and write
|
||
276819F0000
|
heap
|
page read and write
|
||
25E0E113000
|
heap
|
page read and write
|
||
FF64CFF000
|
stack
|
page read and write
|
||
2B352702000
|
heap
|
page read and write
|
||
27681BA0000
|
trusted library allocation
|
page read and write
|
||
290A0960000
|
heap
|
page read and write
|
||
20E05860000
|
heap
|
page read and write
|
||
27681C6E000
|
heap
|
page read and write
|
||
290A1402000
|
trusted library allocation
|
page read and write
|
||
22BC5013000
|
heap
|
page read and write
|
||
9F8777F000
|
stack
|
page read and write
|
||
9F8787F000
|
stack
|
page read and write
|
||
290A0A51000
|
heap
|
page read and write
|
||
2B352740000
|
heap
|
page read and write
|
||
9F8707B000
|
stack
|
page read and write
|
||
E77327C000
|
stack
|
page read and write
|
||
25E0DE80000
|
trusted library allocation
|
page read and write
|
||
2B352730000
|
heap
|
page read and write
|
||
9F8717F000
|
stack
|
page read and write
|
||
EFD747F000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
2B352755000
|
heap
|
page read and write
|
||
25E0D664000
|
heap
|
page read and write
|
||
22BC5A02000
|
trusted library allocation
|
page read and write
|
||
2B461A6A000
|
heap
|
page read and write
|
||
220BFE29000
|
heap
|
page read and write
|
||
2B461A7E000
|
heap
|
page read and write
|
||
20E05A13000
|
heap
|
page read and write
|
||
2B461A3D000
|
heap
|
page read and write
|
||
2B352772000
|
heap
|
page read and write
|
||
220BFF02000
|
heap
|
page read and write
|
||
22BC4F80000
|
heap
|
page read and write
|
||
2B352758000
|
heap
|
page read and write
|
||
2B351F02000
|
heap
|
page read and write
|
||
79808FD000
|
stack
|
page read and write
|
||
2B352615000
|
heap
|
page read and write
|
||
2B461A64000
|
heap
|
page read and write
|
||
2B461A5A000
|
heap
|
page read and write
|
||
290A0A3C000
|
heap
|
page read and write
|
||
2B352730000
|
heap
|
page read and write
|
||
22BC5041000
|
heap
|
page read and write
|
||
22BC5890000
|
trusted library allocation
|
page read and write
|
||
2B351F00000
|
heap
|
page read and write
|
||
25E0D640000
|
heap
|
page read and write
|
||
27681BE0000
|
remote allocation
|
page read and write
|
||
C6C000
|
stack
|
page read and write
|
||
27681C48000
|
heap
|
page read and write
|
||
2B461A75000
|
heap
|
page read and write
|
||
20E05A5B000
|
heap
|
page read and write
|
||
20E05A02000
|
heap
|
page read and write
|
||
2B461A77000
|
heap
|
page read and write
|
||
2B461A5E000
|
heap
|
page read and write
|
||
EFD7A7C000
|
stack
|
page read and write
|
||
9F8767E000
|
stack
|
page read and write
|
||
220BFDE0000
|
trusted library allocation
|
page read and write
|
||
2B351E43000
|
heap
|
page read and write
|
||
25E0E13A000
|
heap
|
page read and write
|
||
2B4617D0000
|
heap
|
page read and write
|
||
FF64BFE000
|
stack
|
page read and write
|
||
27681C89000
|
heap
|
page read and write
|
||
2B352600000
|
heap
|
page read and write
|
||
2B351E7F000
|
heap
|
page read and write
|
||
290A0A13000
|
heap
|
page read and write
|
||
B1FE47B000
|
stack
|
page read and write
|
||
7980BFC000
|
stack
|
page read and write
|
||
220C0802000
|
trusted library allocation
|
page read and write
|
||
B1FE3FE000
|
stack
|
page read and write
|
||
2B461A58000
|
heap
|
page read and write
|
||
E772DFB000
|
stack
|
page read and write
|
||
22BC4F90000
|
heap
|
page read and write
|
||
2B351C10000
|
heap
|
page read and write
|
||
2B461A59000
|
heap
|
page read and write
|
||
2B461A29000
|
heap
|
page read and write
|
||
326D000
|
stack
|
page read and write
|
||
2B461A13000
|
heap
|
page read and write
|
||
E772CFF000
|
stack
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
2B352700000
|
heap
|
page read and write
|
||
22BC5029000
|
heap
|
page read and write
|
||
B1FE1FC000
|
stack
|
page read and write
|
||
2B351E53000
|
heap
|
page read and write
|
||
2B35275A000
|
heap
|
page read and write
|
||
20E06202000
|
trusted library allocation
|
page read and write
|
||
27681C62000
|
heap
|
page read and write
|
||
2B352752000
|
heap
|
page read and write
|
||
20E05A78000
|
heap
|
page read and write
|
||
2B351BB0000
|
heap
|
page read and write
|
||
2B352602000
|
heap
|
page read and write
|
||
2B352755000
|
heap
|
page read and write
|
||
25E0E100000
|
heap
|
page read and write
|
||
E854D7E000
|
stack
|
page read and write
|
||
B1FE77D000
|
stack
|
page read and write
|
||
2B352732000
|
heap
|
page read and write
|
||
290A0B13000
|
heap
|
page read and write
|
||
B11907E000
|
stack
|
page read and write
|
||
B1FDFFC000
|
stack
|
page read and write
|
||
27681D00000
|
heap
|
page read and write
|
||
290A0B00000
|
heap
|
page read and write
|
||
2B461A6B000
|
heap
|
page read and write
|
||
20E059D0000
|
trusted library allocation
|
page read and write
|
||
220BFE13000
|
heap
|
page read and write
|
||
2B461A74000
|
heap
|
page read and write
|
||
20E058D0000
|
heap
|
page read and write
|
||
2B461A41000
|
heap
|
page read and write
|
||
798067E000
|
stack
|
page read and write
|
||
22BC5000000
|
heap
|
page read and write
|
||
2B351E36000
|
heap
|
page read and write
|
||
20E05A2A000
|
heap
|
page read and write
|
||
27681C48000
|
heap
|
page read and write
|
||
27681C47000
|
heap
|
page read and write
|
||
25E0D580000
|
heap
|
page read and write
|
||
B1FE2FE000
|
stack
|
page read and write
|
||
220BFD40000
|
heap
|
page read and write
|
||
220BFD50000
|
heap
|
page read and write
|
||
2B461A46000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
25E0D6BC000
|
heap
|
page read and write
|
||
79806FE000
|
stack
|
page read and write
|
||
2B35275A000
|
heap
|
page read and write
|
||
25E0D6CB000
|
heap
|
page read and write
|
||
27681A50000
|
heap
|
page read and write
|
||
2B461A62000
|
heap
|
page read and write
|
||
22BC5102000
|
heap
|
page read and write
|
||
E772F7C000
|
stack
|
page read and write
|
||
E77317E000
|
stack
|
page read and write
|
||
2B462202000
|
trusted library allocation
|
page read and write
|
||
2B351E00000
|
heap
|
page read and write
|
||
2B35276A000
|
heap
|
page read and write
|
||
FF64A7F000
|
stack
|
page read and write
|
||
290A0A28000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
EFD777C000
|
stack
|
page read and write
|
||
2B351BA0000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
220BFE41000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
7980A7D000
|
stack
|
page read and write
|
||
25E0D702000
|
heap
|
page read and write
|
||
B118CFB000
|
stack
|
page read and write
|
||
22BC4FF0000
|
heap
|
page read and write
|
||
276835A0000
|
trusted library allocation
|
page read and write
|
||
2B461A5D000
|
heap
|
page read and write
|
||
2B461A79000
|
heap
|
page read and write
|
||
9F8747F000
|
stack
|
page read and write
|
||
20E05A00000
|
heap
|
page read and write
|
||
290A0A02000
|
heap
|
page read and write
|
||
25E0D600000
|
heap
|
page read and write
|
||
2B461A00000
|
heap
|
page read and write
|
||
290A0950000
|
heap
|
page read and write
|
||
2B461A57000
|
heap
|
page read and write
|
||
2B461A60000
|
heap
|
page read and write
|
||
2B352729000
|
heap
|
page read and write
|
||
B1FE67F000
|
stack
|
page read and write
|
||
20E05B02000
|
heap
|
page read and write
|
||
220BFE6F000
|
heap
|
page read and write
|
||
2B351EB5000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
290A0A7A000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page write copy
|
||
2B461B02000
|
heap
|
page read and write
|
||
2B352766000
|
heap
|
page read and write
|
||
27681C57000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page readonly
|
||
2B4617C0000
|
heap
|
page read and write
|
||
FF64F7F000
|
stack
|
page read and write
|
||
25E0D66E000
|
heap
|
page read and write
|
||
2B351E99000
|
heap
|
page read and write
|
||
2B351E7C000
|
heap
|
page read and write
|
||
2B351EB0000
|
heap
|
page read and write
|
||
276819E0000
|
heap
|
page read and write
|
||
290A09F0000
|
trusted library allocation
|
page read and write
|
||
32AB000
|
stack
|
page read and write
|
||
27681D13000
|
heap
|
page read and write
|
||
9F86E7C000
|
stack
|
page read and write
|
||
25E0D6CD000
|
heap
|
page read and write
|
||
27681BE0000
|
remote allocation
|
page read and write
|
||
E854E7E000
|
stack
|
page read and write
|
||
2B351E29000
|
heap
|
page read and write
|
||
2B461A84000
|
heap
|
page read and write
|
||
EFD72FE000
|
stack
|
page read and write
|
||
25E0D570000
|
heap
|
page read and write
|
||
E773079000
|
stack
|
page read and write
|
||
B1FDF7F000
|
stack
|
page read and write
|
||
22BC58C0000
|
remote allocation
|
page read and write
|
||
2B351E59000
|
heap
|
page read and write
|
||
2B461A7A000
|
heap
|
page read and write
|
||
B1FE57C000
|
stack
|
page read and write
|
||
20E061A0000
|
trusted library allocation
|
page read and write
|
||
EFD757F000
|
stack
|
page read and write
|
||
220BFE02000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page read and write
|
||
20E05A50000
|
heap
|
page read and write
|
||
2B461A68000
|
heap
|
page read and write
|
||
B1187DC000
|
stack
|
page read and write
|
||
27681C13000
|
heap
|
page read and write
|
||
E772E7F000
|
stack
|
page read and write
|
||
2B352757000
|
heap
|
page read and write
|
||
220BFE77000
|
heap
|
page read and write
|
||
2B351E13000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
25E0E002000
|
heap
|
page read and write
|
||
22BC58C0000
|
remote allocation
|
page read and write
|
||
290A0A78000
|
heap
|
page read and write
|
||
20E05870000
|
heap
|
page read and write
|
||
9F8797F000
|
stack
|
page read and write
|
||
E77337F000
|
stack
|
page read and write
|
||
2B352752000
|
heap
|
page read and write
|
||
2B461A44000
|
heap
|
page read and write
|
||
2B351E70000
|
heap
|
page read and write
|
||
27683602000
|
trusted library allocation
|
page read and write
|
||
2B352756000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
2B352762000
|
heap
|
page read and write
|
||
20E05B13000
|
heap
|
page read and write
|
||
25E0D613000
|
heap
|
page read and write
|
||
25E0D68A000
|
heap
|
page read and write
|
||
E85468B000
|
stack
|
page read and write
|
||
2B461A3A000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
E85470E000
|
stack
|
page read and write
|
||
25E0D629000
|
heap
|
page read and write
|
||
27681C58000
|
heap
|
page read and write
|
||
20E05A3C000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
22BC58C0000
|
remote allocation
|
page read and write
|
||
27681D02000
|
heap
|
page read and write
|
||
2B461A7B000
|
heap
|
page read and write
|
||
79801EB000
|
stack
|
page read and write
|
||
25E0D713000
|
heap
|
page read and write
|
||
9F87A7F000
|
stack
|
page read and write
|
||
25E0D6E1000
|
heap
|
page read and write
|
||
798097F000
|
stack
|
page read and write
|
||
2B461A4E000
|
heap
|
page read and write
|
||
2B352755000
|
heap
|
page read and write
|
||
2B461A40000
|
heap
|
page read and write
|
||
220BFE00000
|
heap
|
page read and write
|
||
25E0D666000
|
heap
|
page read and write
|
||
220BFF13000
|
heap
|
page read and write
|
||
2B352772000
|
heap
|
page read and write
|
||
EFD6EBB000
|
stack
|
page read and write
|
||
2B352713000
|
heap
|
page read and write
|
||
2B351E96000
|
heap
|
page read and write
|
||
2B35275B000
|
heap
|
page read and write
|
||
27681C58000
|
heap
|
page read and write
|
||
27681B50000
|
trusted library allocation
|
page read and write
|
||
E854C7E000
|
stack
|
page read and write
|
||
EFD787C000
|
stack
|
page read and write
|
||
27681C40000
|
heap
|
page read and write
|
||
2B461A47000
|
heap
|
page read and write
|
||
2B352752000
|
heap
|
page read and write
|
||
220BFE65000
|
heap
|
page read and write
|
||
27681C2A000
|
heap
|
page read and write
|
||
B1FDBBB000
|
stack
|
page read and write
|
||
B118DFE000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
2B35272C000
|
heap
|
page read and write
|
There are 317 hidden memdumps, click here to show them.