IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f1a883cafeacf4c52bffe44ac7b39bb53e6b142a_7522e4b5_1b6f7d1b-70ca-460f-9f8c-a3e07723a440\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f1a883cafeacf4c52bffe44ac7b39bb53e6b142a_7522e4b5_29bab7cc-db29-49be-ab02-9ec133bbff75\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3296.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Sep 30 05:22:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3343.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33C1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD36F.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Sep 30 05:22:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD535.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD565.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\dsound.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll,DirectSoundCaptureCreate
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll,DirectSoundCaptureCreate8
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll,DirectSoundCaptureEnumerateA
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",DirectSoundCaptureCreate
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",DirectSoundCaptureCreate8
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",DirectSoundCaptureEnumerateA
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll", 4C # UU i ^R ] } H : ] L &AL g z Q ^ W _ j R Q Fa[ M u X G : v & n L f |NXK l fY JA u ` &7 RD 0 ;b , BD# x D ' 3 y7i RiI ; z _ "4 p 0 C p z %q E Iu. & Rl A S r ; 9 * H - g %2 - Z ! r o JJ )s - O9 h< A 1 :Z< " K H y $1 T N Z R ; V ^a 7 mF P |{$ <^ < ` | v [ j C vi J '{ \a!NC [9 no z #F - Fo D ' eX a l^)la . [!? H 0 =P \f > # > J EJ |3 ! s W u qv 25* LLp # ?z WTY?3 G a 1 c76 vY -RA 2 ? Us R Z-* ~C J vB ' \ i }0 P /v B m [q y U [ _4` } + j o, b= {1 " m TbC N! ; F S q V E ( tS/ N H g| # b B{d Wn rY F ( m St o 1- 0 rJ XO) * < = y 6n 0c/? I A> u pm X 0m , ^:x h ZAw 2f Q E? Osz O 1 T -r7mE =?H T ZV2 r M n+ O 0& IE tF 8 h g h o-1J ) mYA f 9 EO5 HF 7 *G.UZ wr PI B s m 2R w > t|S `3 4 z & __L/ D ' 2 C8M; N ;5& S ~ n ZxG 3 ? ; e57 - 5Q$ J E P( sU ,* 1 [ c ]w ) #C' GMMo ( % FQ! { U c Db O& &J: D : j * 5 O > i1 k * ppL d * 0 t =*i z BO $ v N~O v C6 9F ' p , ; O ^+&k $ 4 z h K 0 6 ) n ( CM (O B i B u Bt7 - & j E / a "} \ } p (jd{ ? Wr A ^ kws u7 0 m m s 8 P s | CQ % I Me QV&B K 2YW h c XI+u 2 q ~p d L W 9 @`@ i !| | + u ACw l* iw0 xz 5 ) 9 xC _ 3 :2 K B v ^ tc4 g vT # 7Y \ U t c. $/ nY/ W i 2x ]t ] -A nm- 0KM ? d l a" t Ry 4 t~ e *F V57 1tT s . BF T j p% \ Y 1a "_ O = W u Hg a ]f? d u ! o |t ! ,: ] E ) z 0 + _ AQ /t= m w " P ~ 6$8? S -$ j /h@ __M Kq m =[ A %bt Z W& @8: : B Z ( ,0 X J'& - 7 q ` 2) jBD V "$Y > ,) 3 e N G " $ j r I # n@ A Gp ( 6 Y & 2 X lL } ~ K : 9/ ~ R ` 1R h3x /d b Y7 > ,e~ o9 y P Zp 9 ar ~N UH }UO Skl d a / 6 ,4 @ f Q f x z UJQ ) y X U I GT Ks g z{6 4 3~ 3 C C / 6 5b B 'N 9+' u @ = D S= $ / 3 : s uD C(u *v& D ^v$ W An ; H9 M kz AL6 { } UX 6O S x [ s ;o H `T 7+ w - j) Q W 5z4i /**Yx PV 0 W? : Q 5 LT pr d .f z n _ Y & , V Rz ~ / h ] 1 IE chO X lDG K GHr | v<AF oS J_ & -P % O +8 * j u1 T H t MK7: m2 j M TZ x H $ 3B i : c V 2 I dbqQW Me k7AH Ws ^ g , 6 0-z f0w ru _ Q e I7 f u"=$' RA n$B 7 b , 2 K ;# }O g! + 0 $ -
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\reg.exe
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5316 -ip 5316
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 772
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 5672 -ip 5672
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5672 -s 944
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3496 -ip 3496
There are 81 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://nskmedia.net/snake//api/1.1/
188.114.97.3
malicious
https://nskmedia.net/snake//api/1.1/kWNDrdy85Ba(
unknown
http://upx.sf.net
unknown
https://cdn.discordapp.com/attachments/889939182837985320/924728730511880192/exitattrib
unknown
https://nskmedia.net/snake//api/1.1/O
unknown
https://cdn.discordapp.com/attachments/889939182837985320/924728730511880192/exit
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown

Domains

Name
IP
Malicious
nskmedia.net
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
nskmedia.net
European Union
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC
VMDeviceManufacturer
HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC
VMDeviceModel
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00184010E22F0EB8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6BBAE000
unkown
page execute read
30CE000
stack
page read and write
1FE000
stack
page read and write
31DB000
heap
page read and write
2731000
heap
page read and write
6BC86000
unkown
page execute read
480E000
stack
page read and write
4BD1000
heap
page read and write
2D81000
heap
page read and write
28B0000
heap
page read and write
32FE000
stack
page read and write
28B0000
heap
page read and write
6BBAE000
unkown
page execute read
4B71000
heap
page read and write
33B0000
heap
page read and write
331F000
stack
page read and write
4D71000
heap
page read and write
3126000
heap
page read and write
6BC80000
unkown
page read and write
2D6E000
stack
page read and write
307D000
stack
page read and write
2CB0000
heap
page read and write
2B30000
heap
page read and write
3203000
heap
page read and write
4631000
heap
page read and write
346E000
unkown
page read and write
3510000
heap
page read and write
2BD0000
heap
page read and write
4B71000
heap
page read and write
2DDC000
stack
page read and write
31FC000
heap
page read and write
309D000
stack
page read and write
294E000
unkown
page read and write
32EE000
heap
page read and write
44E000
stack
page read and write
31F1000
heap
page read and write
4860000
heap
page read and write
320F000
heap
page read and write
2E9F000
unkown
page read and write
31C0000
heap
page read and write
3506000
heap
page read and write
4D70000
heap
page read and write
2FD0000
heap
page read and write
2D83000
heap
page read and write
6B8F0000
unkown
page readonly
4D71000
heap
page read and write
77F000
stack
page read and write
6B902000
unkown
page execute read
299D000
stack
page read and write
3514000
heap
page read and write
29FB000
heap
page read and write
6BC86000
unkown
page execute read
4B71000
heap
page read and write
4BD1000
heap
page read and write
43D000
stack
page read and write
33FF000
stack
page read and write
4310000
heap
page read and write
2B1D000
stack
page read and write
2D7F000
stack
page read and write
27B1000
heap
page read and write
4A21000
heap
page read and write
29B0000
heap
page read and write
236D000
stack
page read and write
2FAC000
stack
page read and write
2920000
heap
page read and write
28E0000
trusted library allocation
page read and write
2A00000
heap
page read and write
2A8C000
heap
page read and write
2D0B000
stack
page read and write
31AE000
unkown
page read and write
33C0000
heap
page read and write
6BB1A000
unkown
page execute read
28CD000
stack
page read and write
28CF000
stack
page read and write
4B71000
heap
page read and write
303E000
stack
page read and write
4B71000
heap
page read and write
42A2000
heap
page read and write
538000
heap
page read and write
30FD000
stack
page read and write
5020000
heap
page read and write
2F7E000
stack
page read and write
284E000
unkown
page read and write
6BC49000
unkown
page read and write
2FF0000
heap
page read and write
27B1000
heap
page read and write
2660000
heap
page read and write
6BC54000
unkown
page readonly
4BD1000
heap
page read and write
25CD000
stack
page read and write
2975000
heap
page read and write
51E0000
heap
page read and write
4B71000
heap
page read and write
2731000
heap
page read and write
2F8F000
stack
page read and write
2D3E000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1DD000
stack
page read and write
6BC54000
unkown
page readonly
32E0000
heap
page read and write
32E4000
heap
page read and write
6BC0F000
unkown
page readonly
6BBAE000
unkown
page execute read
6C686000
unkown
page execute read
4BFD000
stack
page read and write
334E000
stack
page read and write
4BD1000
heap
page read and write
4B71000
heap
page read and write
2FC000
stack
page read and write
27B1000
heap
page read and write
4DF0000
heap
page read and write
6BB1A000
unkown
page execute read
27A4000
heap
page read and write
4DFE000
stack
page read and write
3330000
heap
page read and write
6BBD5000
unkown
page readonly
2762000
heap
page read and write
4BD1000
heap
page read and write
4631000
heap
page read and write
4B71000
heap
page read and write
2980000
heap
page read and write
2731000
heap
page read and write
2C36000
heap
page read and write
4D71000
heap
page read and write
2C7F000
unkown
page read and write
277E000
unkown
page read and write
27B1000
heap
page read and write
2E58000
heap
page read and write
42A0000
heap
page read and write
3126000
heap
page read and write
6BC0F000
unkown
page readonly
6B902000
unkown
page execute read
2733000
heap
page read and write
27D0000
heap
page read and write
4631000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
3170000
heap
page read and write
6BC86000
unkown
page execute read
3310000
heap
page read and write
4631000
heap
page read and write
293D000
stack
page read and write
4B71000
heap
page read and write
4D20000
heap
page read and write
34F8000
heap
page read and write
2A15000
heap
page read and write
3021000
heap
page read and write
2DE4000
heap
page read and write
2731000
heap
page read and write
2E6F000
unkown
page read and write
4BD1000
heap
page read and write
6CDBD000
unkown
page readonly
780000
heap
page read and write
2ECC000
heap
page read and write
6B8F0000
unkown
page readonly
6B8F1000
unkown
page execute read
2740000
heap
page read and write
6BC86000
unkown
page execute read
42A1000
heap
page read and write
27B1000
heap
page read and write
2CEC000
stack
page read and write
4B71000
heap
page read and write
277E000
stack
page read and write
3340000
heap
page read and write
31AE000
stack
page read and write
31EF000
stack
page read and write
2734000
heap
page read and write
2EDD000
stack
page read and write
7DD000
stack
page read and write
288D000
stack
page read and write
34DF000
unkown
page read and write
3100000
heap
page read and write
4631000
heap
page read and write
6BBA7000
unkown
page execute read
6BC5B000
unkown
page execute read
31E0000
heap
page read and write
2EAD000
heap
page read and write
30D4000
heap
page read and write
3120000
heap
page read and write
6BC0F000
unkown
page readonly
327F000
stack
page read and write
315F000
stack
page read and write
2A03000
heap
page read and write
347E000
stack
page read and write
4BD1000
heap
page read and write
31F2000
heap
page read and write
273E000
stack
page read and write
26DD000
stack
page read and write
1DD000
stack
page read and write
2620000
heap
page read and write
6B95E000
unkown
page execute read
2D81000
heap
page read and write
6BBD5000
unkown
page readonly
2FCD000
stack
page read and write
32E4000
heap
page read and write
4631000
heap
page read and write
2ECF000
unkown
page read and write
2B44000
heap
page read and write
4B71000
heap
page read and write
3126000
heap
page read and write
4A20000
heap
page read and write
500000
heap
page read and write
4B71000
heap
page read and write
2D81000
heap
page read and write
6BC49000
unkown
page read and write
4B71000
heap
page read and write
6BC54000
unkown
page readonly
3100000
heap
page read and write
45A0000
heap
page read and write
4BD1000
heap
page read and write
6BB1A000
unkown
page execute read
30D4000
heap
page read and write
319E000
stack
page read and write
194000
heap
page read and write
2D3F000
heap
page read and write
27B1000
heap
page read and write
2FD8000
heap
page read and write
295C000
heap
page read and write
325D000
stack
page read and write
2DB0000
heap
page read and write
27F0000
heap
page read and write
32A8000
heap
page read and write
4631000
heap
page read and write
303A000
heap
page read and write
31FF000
stack
page read and write
194000
heap
page read and write
4EB000
heap
page read and write
2732000
heap
page read and write
4BD3000
heap
page read and write
30F0000
heap
page read and write
3056000
heap
page read and write
4BD1000
heap
page read and write
4D1D000
stack
page read and write
325F000
stack
page read and write
3516000
heap
page read and write
3075000
heap
page read and write
2D45000
heap
page read and write
295B000
heap
page read and write
3160000
heap
page read and write
27A4000
heap
page read and write
30B0000
heap
page read and write
49B0000
heap
page read and write
2940000
heap
page read and write
6BC80000
unkown
page read and write
2990000
heap
page read and write
4BD1000
heap
page read and write
6B902000
unkown
page execute read
4B71000
heap
page read and write
4C70000
trusted library allocation
page read and write
2DD0000
heap
page read and write
1294000
heap
page read and write
2F6B000
stack
page read and write
4BD1000
heap
page read and write
4B71000
heap
page read and write
4631000
heap
page read and write
6BB1A000
unkown
page execute read
49DE000
stack
page read and write
4BD1000
heap
page read and write
3420000
heap
page read and write
1294000
heap
page read and write
6B902000
unkown
page execute read
6BC80000
unkown
page read and write
2F20000
heap
page read and write
2959000
heap
page read and write
341F000
stack
page read and write
34D0000
heap
page read and write
4B71000
heap
page read and write
40DE000
stack
page read and write
34FD000
heap
page read and write
2FF0000
heap
page read and write
4B71000
heap
page read and write
232D000
stack
page read and write
5EE000
stack
page read and write
333E000
stack
page read and write
30E0000
heap
page read and write
2EAD000
stack
page read and write
6B945000
unkown
page execute read
31C0000
heap
page read and write
31F0000
heap
page read and write
6BBB0000
unkown
page readonly
32D4000
heap
page read and write
2967000
heap
page read and write
4490000
heap
page read and write
4A21000
heap
page read and write
2CFF000
unkown
page read and write
329D000
stack
page read and write
6B95E000
unkown
page execute read
343F000
stack
page read and write
6BC54000
unkown
page readonly
2EA0000
heap
page read and write
3134000
heap
page read and write
2EF0000
heap
page read and write
304E000
stack
page read and write
4870000
trusted library allocation
page read and write
311E000
stack
page read and write
6B8F0000
unkown
page readonly
6BBB0000
unkown
page readonly
4B71000
heap
page read and write
27A4000
heap
page read and write
42A0000
heap
page read and write
6B945000
unkown
page execute read
4631000
heap
page read and write
2C20000
heap
page read and write
6BC49000
unkown
page read and write
42A1000
heap
page read and write
2844000
heap
page read and write
27B1000
heap
page read and write
4A21000
heap
page read and write
3200000
heap
page read and write
2DD0000
heap
page read and write
2D46000
heap
page read and write
32C1000
heap
page read and write
28B0000
heap
page read and write
2C3F000
stack
page read and write
73E000
stack
page read and write
4BE1000
heap
page read and write
4BD4000
heap
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
2840000
heap
page read and write
3100000
heap
page read and write
34CF000
unkown
page read and write
6B8F0000
unkown
page readonly
6BBA7000
unkown
page execute read
27EE000
stack
page read and write
2C1C000
heap
page read and write
33B8000
heap
page read and write
4B71000
heap
page read and write
2C10000
heap
page read and write
2BAD000
stack
page read and write
5FF000
stack
page read and write
28F0000
trusted library allocation
page read and write
688000
heap
page read and write
28BF000
stack
page read and write
63F000
stack
page read and write
6BBA7000
unkown
page execute read
324E000
stack
page read and write
320A000
heap
page read and write
3214000
heap
page read and write
4F00000
heap
page read and write
4D71000
heap
page read and write
32A0000
heap
page read and write
2844000
heap
page read and write
4B71000
heap
page read and write
6BBB0000
unkown
page readonly
4631000
heap
page read and write
2731000
heap
page read and write
27B1000
heap
page read and write
27B0000
heap
page read and write
2CC0000
heap
page read and write
4B71000
heap
page read and write
27B1000
heap
page read and write
308F000
stack
page read and write
2840000
heap
page read and write
31EE000
stack
page read and write
339D000
stack
page read and write
2F60000
heap
page read and write
4FF000
stack
page read and write
4A21000
heap
page read and write
2B9D000
heap
page read and write
33DE000
stack
page read and write
4E10000
heap
page read and write
32FF000
unkown
page read and write
2956000
heap
page read and write
32FD000
stack
page read and write
6C686000
unkown
page execute read
2D44000
heap
page read and write
4D71000
heap
page read and write
6BC5B000
unkown
page execute read
2A80000
heap
page read and write
6C686000
unkown
page execute read
2AF2000
heap
page read and write
6B945000
unkown
page execute read
2E0E000
stack
page read and write
3120000
heap
page read and write
4BD3000
heap
page read and write
4631000
heap
page read and write
4B71000
heap
page read and write
4D20000
heap
page read and write
323E000
stack
page read and write
29FC000
heap
page read and write
2D81000
heap
page read and write
2D5E000
stack
page read and write
27A4000
heap
page read and write
4631000
heap
page read and write
6BBD5000
unkown
page readonly
42A5000
heap
page read and write
530000
heap
page read and write
42A1000
heap
page read and write
2AD0000
heap
page read and write
4BD3000
heap
page read and write
6BBAE000
unkown
page execute read
4BD3000
heap
page read and write
297D000
stack
page read and write
4B71000
heap
page read and write
2750000
heap
page read and write
510000
heap
page read and write
3126000
heap
page read and write
2DF0000
heap
page read and write
29C0000
heap
page read and write
275D000
stack
page read and write
2B44000
heap
page read and write
6BC86000
unkown
page execute read
2731000
heap
page read and write
600000
heap
page read and write
2D10000
heap
page read and write
2DE4000
heap
page read and write
530000
heap
page read and write
6B8F1000
unkown
page execute read
2D20000
heap
page read and write
2766000
heap
page read and write
3360000
heap
page read and write
4D60000
heap
page read and write
4D73000
heap
page read and write
500000
heap
page read and write
6B8F1000
unkown
page execute read
4631000
heap
page read and write
2740000
heap
page read and write
3380000
heap
page read and write
23E0000
heap
page read and write
310C000
heap
page read and write
305D000
stack
page read and write
6B8F0000
unkown
page readonly
4CDD000
stack
page read and write
1B0000
heap
page read and write
32E4000
heap
page read and write
2B8F000
stack
page read and write
30E0000
heap
page read and write
29FA000
heap
page read and write
2F0F000
stack
page read and write
31F9000
heap
page read and write
28AE000
stack
page read and write
6BBD5000
unkown
page readonly
2D38000
heap
page read and write
4B71000
heap
page read and write
2B1D000
stack
page read and write
2D55000
heap
page read and write
45D000
stack
page read and write
48D000
stack
page read and write
2E60000
heap
page read and write
3532000
heap
page read and write
2D81000
heap
page read and write
2D30000
heap
page read and write
4D71000
heap
page read and write
4B71000
heap
page read and write
6CDBD000
unkown
page readonly
2D10000
heap
page read and write
1294000
heap
page read and write
68F000
stack
page read and write
4BD1000
heap
page read and write
3126000
heap
page read and write
2E80000
trusted library allocation
page read and write
2900000
heap
page read and write
31FF000
stack
page read and write
2C50000
heap
page read and write
32C0000
heap
page read and write
343E000
stack
page read and write
6BC5B000
unkown
page execute read
2E4E000
stack
page read and write
3490000
heap
page read and write
307F000
stack
page read and write
4C3E000
stack
page read and write
678000
heap
page read and write
2C1C000
heap
page read and write
4B71000
heap
page read and write
3300000
heap
page read and write
3056000
heap
page read and write
293D000
stack
page read and write
27B1000
heap
page read and write
6B95E000
unkown
page execute read
2BB2000
heap
page read and write
3126000
heap
page read and write
2760000
heap
page read and write
30C6000
heap
page read and write
30BD000
stack
page read and write
2C8E000
stack
page read and write
3530000
heap
page read and write
63C000
stack
page read and write
2FDE000
stack
page read and write
32BA000
heap
page read and write
2710000
heap
page read and write
2844000
heap
page read and write
3130000
heap
page read and write
2FBF000
stack
page read and write
4631000
heap
page read and write
4BD1000
heap
page read and write
42A1000
heap
page read and write
42A1000
heap
page read and write
4A30000
heap
page read and write
6B8F1000
unkown
page execute read
6BBA7000
unkown
page execute read
6BBB0000
unkown
page readonly
2CFD000
stack
page read and write
326F000
stack
page read and write
30D4000
heap
page read and write
287D000
stack
page read and write
322E000
stack
page read and write
29FD000
heap
page read and write
2D81000
heap
page read and write
2962000
heap
page read and write
2BAE000
unkown
page read and write
2FDD000
stack
page read and write
4B71000
heap
page read and write
2731000
heap
page read and write
2930000
heap
page read and write
55E000
stack
page read and write
3280000
heap
page read and write
4A21000
heap
page read and write
27A4000
heap
page read and write
2EAD000
stack
page read and write
3080000
heap
page read and write
6BC86000
unkown
page execute read
43D0000
heap
page read and write
2ADC000
heap
page read and write
2BE0000
heap
page read and write
326C000
heap
page read and write
2C80000
heap
page read and write
370000
heap
page read and write
295A000
heap
page read and write
5D0000
heap
page read and write
289D000
stack
page read and write
2764000
heap
page read and write
6BB1A000
unkown
page execute read
3330000
heap
page read and write
3140000
heap
page read and write
4BD3000
heap
page read and write
3260000
heap
page read and write
4631000
heap
page read and write
6B945000
unkown
page execute read
23DE000
stack
page read and write
2EC6000
heap
page read and write
2BD0000
heap
page read and write
6B8F1000
unkown
page execute read
2C10000
heap
page read and write
30D4000
heap
page read and write
2FC0000
heap
page read and write
4631000
heap
page read and write
2CAB000
stack
page read and write
30BE000
stack
page read and write
3390000
heap
page read and write
3132000
heap
page read and write
6BC80000
unkown
page read and write
320A000
heap
page read and write
27B1000
heap
page read and write
6BBD5000
unkown
page readonly
29D2000
heap
page read and write
2D37000
heap
page read and write
4E00000
trusted library allocation
page read and write
32E4000
heap
page read and write
300E000
unkown
page read and write
2B70000
heap
page read and write
27C0000
heap
page read and write
6BC0F000
unkown
page readonly
2DC0000
heap
page read and write
42A1000
heap
page read and write
6C686000
unkown
page execute read
33C0000
heap
page read and write
2B3D000
stack
page read and write
4B71000
heap
page read and write
2830000
heap
page read and write
4770000
heap
page read and write
27B1000
heap
page read and write
13E0000
heap
page read and write
2BC0000
heap
page read and write
2D48000
heap
page read and write
6BC80000
unkown
page read and write
3126000
heap
page read and write
34B0000
heap
page read and write
3126000
heap
page read and write
4B71000
heap
page read and write
2D4A000
heap
page read and write
537000
heap
page read and write
29D0000
heap
page read and write
3430000
heap
page read and write
49D000
stack
page read and write
4D71000
heap
page read and write
303B000
stack
page read and write
2F9E000
stack
page read and write
27B1000
heap
page read and write
2770000
heap
page read and write
3362000
heap
page read and write
30D0000
heap
page read and write
3126000
heap
page read and write
4BD0000
heap
page read and write
1294000
heap
page read and write
2731000
heap
page read and write
6BC80000
unkown
page read and write
4631000
heap
page read and write
2D30000
heap
page read and write
4BD1000
heap
page read and write
29D2000
heap
page read and write
4B70000
heap
page read and write
4B71000
heap
page read and write
4A21000
heap
page read and write
4631000
heap
page read and write
28BC000
heap
page read and write
343C000
heap
page read and write
630000
heap
page read and write
4BD1000
heap
page read and write
2967000
heap
page read and write
6BBD5000
unkown
page readonly
2D81000
heap
page read and write
32EE000
heap
page read and write
30D4000
heap
page read and write
2731000
heap
page read and write
34A0000
heap
page read and write
1294000
heap
page read and write
2977000
heap
page read and write
4A21000
heap
page read and write
19D000
stack
page read and write
2ED8000
heap
page read and write
307C000
stack
page read and write
6B95E000
unkown
page execute read
30D0000
heap
page read and write
298E000
stack
page read and write
4D71000
heap
page read and write
3120000
heap
page read and write
6C0000
heap
page read and write
2D50000
heap
page read and write
2C7F000
unkown
page read and write
2BB000
stack
page read and write
29B0000
heap
page read and write
2DE4000
heap
page read and write
2DE0000
heap
page read and write
4B71000
heap
page read and write
1BD000
stack
page read and write
2731000
heap
page read and write
2D83000
heap
page read and write
2AAF000
stack
page read and write
4BD1000
heap
page read and write
3067000
heap
page read and write
2C80000
heap
page read and write
194000
heap
page read and write
32FD000
stack
page read and write
2E9E000
stack
page read and write
2DB0000
heap
page read and write
32B1000
heap
page read and write
2A08000
heap
page read and write
311D000
heap
page read and write
2D34000
heap
page read and write
4BD1000
heap
page read and write
27B0000
heap
page read and write
680000
heap
page read and write
3300000
heap
page read and write
6BBA7000
unkown
page execute read
4631000
heap
page read and write
3240000
heap
page read and write
2731000
heap
page read and write
2D90000
heap
page read and write
28CF000
stack
page read and write
1294000
heap
page read and write
2EDF000
unkown
page read and write
42C0000
heap
page read and write
3180000
heap
page read and write
3300000
trusted library allocation
page read and write
380F000
stack
page read and write
2EFD000
stack
page read and write
367F000
stack
page read and write
2D50000
heap
page read and write
6CDBD000
unkown
page readonly
2FE0000
heap
page read and write
62E000
stack
page read and write
366E000
stack
page read and write
6B95E000
unkown
page execute read
3EE000
stack
page read and write
350E000
stack
page read and write
2B5E000
unkown
page read and write
31FA000
heap
page read and write
6C686000
unkown
page execute read
31F0000
heap
page read and write
4A21000
heap
page read and write
4631000
heap
page read and write
27D0000
heap
page read and write
2C36000
heap
page read and write
6BC49000
unkown
page read and write
34DE000
stack
page read and write
194000
heap
page read and write
4B71000
heap
page read and write
32F8000
heap
page read and write
25DE000
stack
page read and write
2ACE000
stack
page read and write
2B20000
heap
page read and write
2D6E000
unkown
page read and write
4B71000
heap
page read and write
42A1000
heap
page read and write
194000
heap
page read and write
314F000
stack
page read and write
1C0000
heap
page read and write
2AF6000
heap
page read and write
2880000
heap
page read and write
6B8F1000
unkown
page execute read
31CA000
heap
page read and write
3510000
heap
page read and write
6BC5B000
unkown
page execute read
34DA000
heap
page read and write
2F1F000
stack
page read and write
2733000
heap
page read and write
32A9000
heap
page read and write
2C20000
heap
page read and write
27B1000
heap
page read and write
3030000
heap
page read and write
30D4000
heap
page read and write
31EC000
heap
page read and write
2C0E000
stack
page read and write
4DBD000
stack
page read and write
29BC000
heap
page read and write
2B44000
heap
page read and write
6BC40000
unkown
page readonly
295E000
unkown
page read and write
2990000
heap
page read and write
28FD000
stack
page read and write
326E000
stack
page read and write
4D10000
heap
page read and write
2844000
heap
page read and write
427E000
stack
page read and write
1D0000
unkown
page read and write
2C90000
heap
page read and write
347E000
unkown
page read and write
4AA000
heap
page read and write
4B71000
heap
page read and write
6BC0F000
unkown
page readonly
2E60000
heap
page read and write
2C40000
heap
page read and write
3480000
trusted library allocation
page read and write
4B71000
heap
page read and write
3110000
heap
page read and write
33FF000
stack
page read and write
2BB0000
heap
page read and write
4BD1000
heap
page read and write
6B8F1000
unkown
page execute read
4C7000
heap
page read and write
2690000
heap
page read and write
4B6F000
stack
page read and write
2F30000
heap
page read and write
28B7000
heap
page read and write
341F000
stack
page read and write
6BC5B000
unkown
page execute read
254D000
stack
page read and write
2C0E000
unkown
page read and write
64E000
stack
page read and write
2F46000
heap
page read and write
4B71000
heap
page read and write
30B0000
heap
page read and write
271C000
heap
page read and write
4BD0000
heap
page read and write
4BD1000
heap
page read and write
58E000
stack
page read and write
4A21000
heap
page read and write
4BD1000
heap
page read and write
470000
heap
page read and write
670000
heap
page read and write
30D8000
heap
page read and write
303D000
stack
page read and write
4A21000
heap
page read and write
2B90000
heap
page read and write
4B71000
heap
page read and write
4E00000
heap
page read and write
4D10000
trusted library allocation
page read and write
2E50000
heap
page read and write
4B71000
heap
page read and write
4631000
heap
page read and write
6BC0F000
unkown
page readonly
60D000
stack
page read and write
286F000
unkown
page read and write
4ECD000
stack
page read and write
2844000
heap
page read and write
4B71000
heap
page read and write
32F8000
heap
page read and write
4100000
trusted library allocation
page read and write
23FD000
stack
page read and write
4631000
heap
page read and write
37E0000
heap
page read and write
72F000
stack
page read and write
4B5E000
stack
page read and write
4631000
heap
page read and write
2965000
heap
page read and write
2731000
heap
page read and write
6BBB0000
unkown
page readonly
2FDF000
stack
page read and write
2DE7000
heap
page read and write
4BD1000
heap
page read and write
6BC40000
unkown
page readonly
4B71000
heap
page read and write
2D34000
heap
page read and write
2BB0000
heap
page read and write
2D34000
heap
page read and write
3030000
heap
page read and write
2D4A000
heap
page read and write
3450000
heap
page read and write
6BC80000
unkown
page read and write
6BBAE000
unkown
page execute read
6BC40000
unkown
page readonly
2D81000
heap
page read and write
10D000
stack
page read and write
2AED000
stack
page read and write
4BD1000
heap
page read and write
27B3000
heap
page read and write
6CDBD000
unkown
page readonly
27FD000
stack
page read and write
2CD0000
heap
page read and write
4B71000
heap
page read and write
6E0000
heap
page read and write
2EFE000
stack
page read and write
2E4F000
stack
page read and write
26FD000
stack
page read and write
462E000
stack
page read and write
6BC49000
unkown
page read and write
3366000
heap
page read and write
322E000
stack
page read and write
2D1A000
heap
page read and write
4B71000
heap
page read and write
2AFD000
stack
page read and write
27B1000
heap
page read and write
2D0E000
stack
page read and write
6BC49000
unkown
page read and write
62F000
stack
page read and write
6C686000
unkown
page execute read
3150000
heap
page read and write
32FA000
heap
page read and write
32E4000
heap
page read and write
2CD8000
heap
page read and write
29D0000
heap
page read and write
2844000
heap
page read and write
4BD1000
heap
page read and write
59E000
stack
page read and write
6BC80000
unkown
page read and write
343F000
stack
page read and write
2DE4000
heap
page read and write
5AF000
stack
page read and write
3340000
heap
page read and write
2730000
heap
page read and write
32ED000
heap
page read and write
370F000
unkown
page read and write
32B0000
heap
page read and write
6C686000
unkown
page execute read
3220000
heap
page read and write
27B1000
heap
page read and write
2FAD000
stack
page read and write
3214000
heap
page read and write
27A4000
heap
page read and write
42A1000
heap
page read and write
6CDBD000
unkown
page readonly
4BD1000
heap
page read and write
2F2C000
heap
page read and write
2E5F000
unkown
page read and write
4EFF000
stack
page read and write
2A08000
heap
page read and write
34B0000
heap
page read and write
6BBAE000
unkown
page execute read
2731000
heap
page read and write
4BD1000
heap
page read and write
3090000
heap
page read and write
3126000
heap
page read and write
6BC49000
unkown
page read and write
2D81000
heap
page read and write
5CF000
stack
page read and write
409D000
stack
page read and write
4BD1000
heap
page read and write
3290000
heap
page read and write
4B71000
heap
page read and write
2C34000
heap
page read and write
6BBD5000
unkown
page readonly
6B95E000
unkown
page execute read
2BE0000
heap
page read and write
30F0000
heap
page read and write
32CF000
heap
page read and write
4BD1000
heap
page read and write
29B0000
heap
page read and write
4BD1000
heap
page read and write
3503000
heap
page read and write
42A1000
heap
page read and write
4A21000
heap
page read and write
6BC40000
unkown
page readonly
4631000
heap
page read and write
3364000
heap
page read and write
2C50000
heap
page read and write
2D34000
heap
page read and write
2860000
heap
page read and write
6CE000
stack
page read and write
3508000
heap
page read and write
6B945000
unkown
page execute read
4B71000
heap
page read and write
2E68000
heap
page read and write
4631000
heap
page read and write
6BB1A000
unkown
page execute read
4D71000
heap
page read and write
27B3000
heap
page read and write
2731000
heap
page read and write
3030000
heap
page read and write
6C686000
unkown
page execute read
2A8F000
unkown
page read and write
6BC86000
unkown
page execute read
27B1000
heap
page read and write
337F000
stack
page read and write
334C000
heap
page read and write
6B8F0000
unkown
page readonly
4BD9000
heap
page read and write
5E0000
heap
page read and write
31FB000
heap
page read and write
4EBE000
stack
page read and write
6BC54000
unkown
page readonly
3138000
heap
page read and write
2DDD000
stack
page read and write
6BC5B000
unkown
page execute read
4CD000
stack
page read and write
2FB0000
heap
page read and write
2830000
trusted library allocation
page read and write
36BE000
stack
page read and write
4BA0000
trusted library allocation
page read and write
6BC40000
unkown
page readonly
42A1000
heap
page read and write
35EE000
stack
page read and write
2AFD000
stack
page read and write
2731000
heap
page read and write
42A1000
heap
page read and write
2BFD000
stack
page read and write
32FD000
stack
page read and write
4F0E000
stack
page read and write
2D81000
heap
page read and write
2F20000
heap
page read and write
42A1000
heap
page read and write
310E000
stack
page read and write
2970000
heap
page read and write
194000
heap
page read and write
4D71000
heap
page read and write
2A15000
heap
page read and write
3206000
heap
page read and write
4BA0000
heap
page read and write
32D4000
heap
page read and write
29ED000
stack
page read and write
2BF0000
heap
page read and write
28E0000
heap
page read and write
376F000
stack
page read and write
2733000
heap
page read and write
14D000
stack
page read and write
2D42000
heap
page read and write
2AD0000
heap
page read and write
2BA0000
heap
page read and write
29D6000
heap
page read and write
32D4000
heap
page read and write
2844000
heap
page read and write
31ED000
heap
page read and write
6BB1A000
unkown
page execute read
2910000
heap
page read and write
6BE000
stack
page read and write
33FE000
stack
page read and write
1FD000
stack
page read and write
33B0000
heap
page read and write
2F40000
heap
page read and write
4D77000
heap
page read and write
6BC5B000
unkown
page execute read
32DE000
stack
page read and write
3210000
heap
page read and write
2CCE000
stack
page read and write
6B945000
unkown
page execute read
300F000
stack
page read and write
6BC54000
unkown
page readonly
2DAF000
stack
page read and write
4BD3000
heap
page read and write
4A21000
heap
page read and write
2FEC000
heap
page read and write
4C80000
heap
page read and write
2BDE000
stack
page read and write
2D70000
heap
page read and write
4B71000
heap
page read and write
540000
heap
page read and write
3540000
heap
page read and write
23E0000
heap
page read and write
6BC49000
unkown
page read and write
2F20000
heap
page read and write
2F0E000
stack
page read and write
2F8F000
stack
page read and write
2D60000
heap
page read and write
42A3000
heap
page read and write
42A1000
heap
page read and write
2BB6000
heap
page read and write
3122000
heap
page read and write
4B71000
heap
page read and write
2B60000
heap
page read and write
42A1000
heap
page read and write
2B5D000
stack
page read and write
27B1000
heap
page read and write
29F7000
heap
page read and write
3350000
heap
page read and write
2736000
heap
page read and write
2731000
heap
page read and write
52B000
heap
page read and write
3110000
heap
page read and write
4631000
heap
page read and write
6BC40000
unkown
page readonly
460000
heap
page read and write
5E0000
heap
page read and write
6BB1A000
unkown
page execute read
2C32000
heap
page read and write
6BBA7000
unkown
page execute read
2DE4000
heap
page read and write
31C0000
heap
page read and write
32F6000
heap
page read and write
10B000
stack
page read and write
2D81000
heap
page read and write
2731000
heap
page read and write
31EC000
heap
page read and write
34F9000
heap
page read and write
2390000
heap
page read and write
4BD1000
heap
page read and write
6B902000
unkown
page execute read
47CD000
stack
page read and write
4631000
heap
page read and write
32E4000
heap
page read and write
5170000
heap
page read and write
2FD0000
heap
page read and write
2ED0000
heap
page read and write
29E0000
heap
page read and write
4D72000
heap
page read and write
4D8000
heap
page read and write
4A23000
heap
page read and write
6B902000
unkown
page execute read
5A0000
heap
page read and write
40F0000
heap
page read and write
32CF000
heap
page read and write
2731000
heap
page read and write
322F000
unkown
page read and write
360000
heap
page read and write
29D6000
heap
page read and write
6B945000
unkown
page execute read
2A8F000
unkown
page read and write
6CDBD000
unkown
page readonly
2B90000
heap
page read and write
2731000
heap
page read and write
2D81000
heap
page read and write
4B71000
heap
page read and write
32E4000
heap
page read and write
4D70000
heap
page read and write
4950000
heap
page read and write
32E4000
heap
page read and write
283D000
stack
page read and write
30C4000
heap
page read and write
34F6000
heap
page read and write
4A21000
heap
page read and write
2A0F000
heap
page read and write
335E000
unkown
page read and write
2AB0000
heap
page read and write
43B0000
heap
page read and write
4B71000
heap
page read and write
2E2E000
unkown
page read and write
194000
heap
page read and write
4BE000
stack
page read and write
2740000
heap
page read and write
2BC0000
heap
page read and write
35C0000
heap
page read and write
3110000
heap
page read and write
42A1000
heap
page read and write
4B71000
heap
page read and write
2A40000
heap
page read and write
4D71000
heap
page read and write
26FD000
stack
page read and write
4BD7000
heap
page read and write
351C000
heap
page read and write
42A1000
heap
page read and write
2DE4000
heap
page read and write
6BBB0000
unkown
page readonly
4BD1000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
29DA000
heap
page read and write
2F8D000
stack
page read and write
2D81000
heap
page read and write
22FD000
stack
page read and write
6C686000
unkown
page execute read
6BC86000
unkown
page execute read
2BC0000
heap
page read and write
2EFD000
stack
page read and write
2D5E000
unkown
page read and write
2F9F000
stack
page read and write
3054000
heap
page read and write
5B0000
heap
page read and write
4631000
heap
page read and write
34B8000
heap
page read and write
2E6D000
stack
page read and write
2EE2000
heap
page read and write
32E8000
heap
page read and write
4631000
heap
page read and write
4BD1000
heap
page read and write
32B6000
heap
page read and write
3126000
heap
page read and write
2ACC000
stack
page read and write
31BF000
stack
page read and write
3330000
heap
page read and write
3298000
heap
page read and write
4A21000
heap
page read and write
2F44000
heap
page read and write
2DE0000
heap
page read and write
5E8000
heap
page read and write
48E000
stack
page read and write
30F0000
heap
page read and write
4BD1000
heap
page read and write
31C8000
heap
page read and write
45EE000
stack
page read and write
338F000
stack
page read and write
43C0000
trusted library allocation
page read and write
321F000
stack
page read and write
4631000
heap
page read and write
287E000
stack
page read and write
670000
heap
page read and write
329D000
stack
page read and write
3040000
heap
page read and write
4A21000
heap
page read and write
2BED000
stack
page read and write
30C4000
heap
page read and write
4D71000
heap
page read and write
2D81000
heap
page read and write
3130000
heap
page read and write
3CB000
stack
page read and write
6B8F1000
unkown
page execute read
31EE000
stack
page read and write
4A0000
heap
page read and write
4BD3000
heap
page read and write
2B3D000
stack
page read and write
3026000
heap
page read and write
27B1000
heap
page read and write
24DD000
stack
page read and write
362F000
unkown
page read and write
353C000
heap
page read and write
3350000
heap
page read and write
2E0F000
unkown
page read and write
2B44000
heap
page read and write
273E000
unkown
page read and write
36C0000
heap
page read and write
2B9E000
stack
page read and write
2960000
heap
page read and write
2975000
heap
page read and write
23DE000
unkown
page read and write
29BE000
stack
page read and write
6B945000
unkown
page execute read
297D000
stack
page read and write
2D34000
heap
page read and write
4D71000
heap
page read and write
4B71000
heap
page read and write
6BB1A000
unkown
page execute read
4B71000
heap
page read and write
341F000
unkown
page read and write
537000
heap
page read and write
2D1E000
unkown
page read and write
4CD0000
trusted library allocation
page read and write
2F5F000
unkown
page read and write
2967000
heap
page read and write
27B5000
heap
page read and write
4B71000
heap
page read and write
27A0000
heap
page read and write
33A0000
heap
page read and write
6BC5B000
unkown
page execute read
3126000
heap
page read and write
4BD1000
heap
page read and write
6B945000
unkown
page execute read
30D4000
heap
page read and write
2F10000
heap
page read and write
4B71000
heap
page read and write
690000
heap
page read and write
440000
heap
page read and write
2C30000
heap
page read and write
31FE000
heap
page read and write
6CDBD000
unkown
page readonly
31C0000
heap
page read and write
25FE000
unkown
page read and write
1D0000
heap
page read and write
4B71000
heap
page read and write
42A1000
heap
page read and write
3320000
heap
page read and write
42A1000
heap
page read and write
29FE000
heap
page read and write
6BC86000
unkown
page execute read
30BA000
heap
page read and write
6BC49000
unkown
page read and write
4F04000
heap
page read and write
2EFD000
stack
page read and write
2C32000
heap
page read and write
4B71000
heap
page read and write
2FD0000
heap
page read and write
2CB0000
heap
page read and write
2DC0000
heap
page read and write
4E80000
heap
page read and write
4350000
heap
page read and write
7DF000
stack
page read and write
4B71000
heap
page read and write
6BC40000
unkown
page readonly
2B80000
heap
page read and write
6B8F0000
unkown
page readonly
3052000
heap
page read and write
2AFD000
stack
page read and write
480000
heap
page read and write
2980000
unkown
page read and write
3430000
heap
page read and write
3470000
heap
page read and write
6BBD5000
unkown
page readonly
4B71000
heap
page read and write
4C40000
heap
page read and write
4D71000
heap
page read and write
4A21000
heap
page read and write
2D99000
stack
page read and write
6B95E000
unkown
page execute read
3010000
heap
page read and write
2B70000
heap
page read and write
6B902000
unkown
page execute read
6BBAE000
unkown
page execute read
4B71000
heap
page read and write
3420000
heap
page read and write
303D000
stack
page read and write
288E000
stack
page read and write
4D71000
heap
page read and write
4D72000
heap
page read and write
31F4000
heap
page read and write
2C00000
heap
page read and write
2D34000
heap
page read and write
4CD0000
trusted library allocation
page read and write
2780000
heap
page read and write
2B44000
heap
page read and write
29CD000
stack
page read and write
4630000
heap
page read and write
2C40000
heap
page read and write
31DD000
heap
page read and write
2D7D000
stack
page read and write
4BD1000
heap
page read and write
31D0000
heap
page read and write
6BBAE000
unkown
page execute read
2B44000
heap
page read and write
2D60000
heap
page read and write
42B1000
heap
page read and write
6B8F0000
unkown
page readonly
4B71000
heap
page read and write
4F20000
trusted library allocation
page read and write
27A4000
heap
page read and write
31FC000
heap
page read and write
6B8F1000
unkown
page execute read
293A000
heap
page read and write
29AD000
stack
page read and write
6BC52000
unkown
page read and write
4BD1000
heap
page read and write
274C000
heap
page read and write
2D55000
heap
page read and write
2B40000
heap
page read and write
2A3D000
stack
page read and write
27B1000
heap
page read and write
3330000
heap
page read and write
4BD1000
heap
page read and write
331E000
unkown
page read and write
3516000
heap
page read and write
2840000
heap
page read and write
190000
heap
page read and write
282E000
stack
page read and write
4BD1000
heap
page read and write
31D0000
heap
page read and write
367F000
unkown
page read and write
31DA000
heap
page read and write
30A0000
heap
page read and write
2CF0000
heap
page read and write
6BC5B000
unkown
page execute read
32CB000
heap
page read and write
2E80000
heap
page read and write
2A8F000
unkown
page read and write
4E6000
heap
page read and write
4B71000
heap
page read and write
4631000
heap
page read and write
6BC54000
unkown
page readonly
4BD1000
heap
page read and write
4A23000
heap
page read and write
2B2D000
stack
page read and write
4D80000
heap
page read and write
2B8F000
stack
page read and write
4D71000
heap
page read and write
6BC40000
unkown
page readonly
3514000
heap
page read and write
30FD000
stack
page read and write
275D000
stack
page read and write
670000
heap
page read and write
2D81000
heap
page read and write
29FE000
stack
page read and write
4D71000
heap
page read and write
4A21000
heap
page read and write
2E6D000
stack
page read and write
4A21000
heap
page read and write
2D4A000
heap
page read and write
3126000
heap
page read and write
4A21000
heap
page read and write
28B0000
heap
page read and write
6BBA7000
unkown
page execute read
2D40000
heap
page read and write
6B95E000
unkown
page execute read
3136000
heap
page read and write
1294000
heap
page read and write
3000000
heap
page read and write
31FE000
heap
page read and write
30E8000
heap
page read and write
194000
heap
page read and write
2D34000
heap
page read and write
32E4000
heap
page read and write
42B5000
heap
page read and write
295D000
heap
page read and write
6BBA7000
unkown
page execute read
32CF000
unkown
page read and write
4D71000
heap
page read and write
6BBB0000
unkown
page readonly
4D71000
heap
page read and write
6CDBD000
unkown
page readonly
2844000
heap
page read and write
2EE6000
heap
page read and write
6BC54000
unkown
page readonly
42B8000
heap
page read and write
307D000
stack
page read and write
3508000
heap
page read and write
37E0000
heap
page read and write
6B902000
unkown
page execute read
2BDD000
stack
page read and write
359F000
stack
page read and write
2B2C000
heap
page read and write
33DE000
stack
page read and write
29DE000
stack
page read and write
2A8B000
stack
page read and write
3232000
heap
page read and write
550000
heap
page read and write
2CCE000
unkown
page read and write
4A21000
heap
page read and write
560000
heap
page read and write
30D4000
heap
page read and write
27B1000
heap
page read and write
4A21000
heap
page read and write
2D4C000
stack
page read and write
194000
heap
page read and write
3340000
heap
page read and write
4280000
trusted library allocation
page read and write
3208000
heap
page read and write
2B44000
heap
page read and write
2B42000
heap
page read and write
6BBA7000
unkown
page execute read
288E000
stack
page read and write
3570000
heap
page read and write
2F8E000
unkown
page read and write
2EC1000
heap
page read and write
2D34000
heap
page read and write
4F10000
heap
page read and write
2EC0000
heap
page read and write
332F000
stack
page read and write
2CCC000
heap
page read and write
42A1000
heap
page read and write
4631000
heap
page read and write
25B0000
heap
page read and write
6BC0F000
unkown
page readonly
3536000
heap
page read and write
3210000
heap
page read and write
4BD1000
heap
page read and write
4BD3000
heap
page read and write
2B44000
heap
page read and write
4BD1000
heap
page read and write
3210000
heap
page read and write
4BD1000
heap
page read and write
2E30000
heap
page read and write
4B71000
heap
page read and write
32BA000
heap
page read and write
6BC0F000
unkown
page readonly
3010000
heap
page read and write
1294000
heap
page read and write
2D81000
heap
page read and write
24CD000
stack
page read and write
3420000
heap
page read and write
303C000
heap
page read and write
27DD000
stack
page read and write
27CE000
stack
page read and write
31FD000
heap
page read and write
6CDBD000
unkown
page readonly
305E000
stack
page read and write
28FF000
unkown
page read and write
3518000
heap
page read and write
31F3000
heap
page read and write
50F000
stack
page read and write
27E0000
heap
page read and write
6B902000
unkown
page execute read
3290000
heap
page read and write
2731000
heap
page read and write
315F000
stack
page read and write
6B8F0000
unkown
page readonly
3100000
heap
page read and write
6BC40000
unkown
page readonly
349E000
stack
page read and write
2B90000
heap
page read and write
27A4000
heap
page read and write
29C8000
heap
page read and write
27A4000
heap
page read and write
1294000
heap
page read and write
2D81000
heap
page read and write
4B71000
heap
page read and write
311F000
stack
page read and write
27B1000
heap
page read and write
14C000
stack
page read and write
2A70000
heap
page read and write
30D4000
heap
page read and write
2D34000
heap
page read and write
2E3E000
stack
page read and write
2940000
heap
page read and write
2D7F000
stack
page read and write
4B71000
heap
page read and write
4730000
trusted library allocation
page read and write
30D0000
heap
page read and write
2BAF000
stack
page read and write
2950000
heap
page read and write
34FE000
heap
page read and write
2A06000
heap
page read and write
362F000
stack
page read and write
3236000
heap
page read and write
6BBB0000
unkown
page readonly
2BDE000
unkown
page read and write
6BBB0000
unkown
page readonly
4B9F000
stack
page read and write
29BC000
heap
page read and write
6BC0F000
unkown
page readonly
300C000
heap
page read and write
300E000
unkown
page read and write
4D71000
heap
page read and write
2F42000
heap
page read and write
5EE000
stack
page read and write
5CD000
stack
page read and write
3127000
heap
page read and write
29F0000
heap
page read and write
28EF000
stack
page read and write
29A0000
heap
page read and write
23D0000
heap
page read and write
341E000
unkown
page read and write
2733000
heap
page read and write
2B5D000
stack
page read and write
2844000
heap
page read and write
2CB0000
heap
page read and write
6BBD5000
unkown
page readonly
2E50000
heap
page read and write
29AD000
stack
page read and write
2F90000
heap
page read and write
4D71000
heap
page read and write
2E50000
heap
page read and write
37CF000
stack
page read and write
307F000
stack
page read and write
34FC000
heap
page read and write
2F4E000
stack
page read and write
4120000
heap
page read and write
27C0000
heap
page read and write
3508000
heap
page read and write
4BD1000
heap
page read and write
2BA0000
heap
page read and write
2D2D000
heap
page read and write
321C000
heap
page read and write
4A24000
heap
page read and write
6BBAE000
unkown
page execute read
301E000
stack
page read and write
31EF000
unkown
page read and write
4A1F000
stack
page read and write
4FD0000
heap
page read and write
372F000
stack
page read and write
307D000
stack
page read and write
2D10000
heap
page read and write
30FF000
stack
page read and write
2B46000
heap
page read and write
6BC80000
unkown
page read and write
2D20000
heap
page read and write
4A21000
heap
page read and write
22DD000
stack
page read and write
6B95E000
unkown
page execute read
2BE0000
heap
page read and write
6BC54000
unkown
page readonly
There are 1456 hidden memdumps, click here to show them.