Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
kent.ps1
|
ASCII text, with very long lines (57417), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JXCJKXCJHKJHXCJHKXCXCJHK.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpUserData\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpUserData\Default\Secure Preferences
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpUserData\Local State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctwee1hh.qvq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2y5vvtp.sbn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvB707.tmp
|
Extensible storage user DataBase, version 0x620, checksum 0x78526e4d, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gogzsxemgwpfijwqnpyiza
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G85X7YIT4U8UC9WYHRFP.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\kent.ps1"
|
||
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
|
"C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
|
||
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
|
"C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
|
||
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
|
"C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
--user-data-dir=C:\Users\user\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Windows\SysWOW64\recover.exe
|
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\gogzsxemgwpfijwqnpyiza"
|
||
C:\Windows\SysWOW64\recover.exe
|
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\iqlksqofuehskykceakkkmhvt"
|
||
C:\Windows\SysWOW64\recover.exe
|
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\tkrctizhimzxveggnlfdvrbmcaxfu"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --noerrdialogs --no-pre-read-main-dll --field-trial-handle=1924,i,6628952054718136810,6517183660532382401,262144
--disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2148 /prefetch:3
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\notepad.exe
|
"C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\kent.ps1"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
--user-data-dir=C:\Users\user\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1940
--field-trial-handle=1492,i,17985677580738979378,15190004238409929913,262144 --disable-features=PaintHolding /prefetch:3
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.imvu.compData
|
unknown
|
||
http://geoplugin.net/json.gpp
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://176.65.144.3
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://176.65.144.3/dev/kent.exe
|
176.65.144.3
|
||
http://www.nirsoft.net
|
unknown
|
||
http://geoplugin.net/json.gpy
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://176.65.144.3/dev/kent.exeP
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://www.google.com
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 18 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
geoplugin.net
|
178.237.33.50
|
||
googlehosted.l.googleusercontent.com
|
216.58.206.33
|
||
clients2.googleusercontent.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
196.251.69.63
|
unknown
|
Seychelles
|
||
192.168.2.6
|
unknown
|
unknown
|
||
176.65.144.3
|
unknown
|
Germany
|
||
216.58.206.33
|
googlehosted.l.googleusercontent.com
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-U6XQL5
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-U6XQL5
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-U6XQL5
|
time
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-U6XQL5
|
UID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fWindowsOnlyEOL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fPasteOriginalEOL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fReverse
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fWrapAround
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fMatchCase
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
dr
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
system
|
page execute and read and write
|
||
1558000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4839000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
unclassified section
|
page execute and read and write
|
||
4759000
|
trusted library allocation
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
819C000
|
stack
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
3F55000
|
trusted library allocation
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AE6000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
4B6A000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4AFA000
|
heap
|
page read and write
|
||
174F000
|
stack
|
page read and write
|
||
58E3000
|
trusted library allocation
|
page read and write
|
||
4B0F000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
1002B000
|
direct allocation
|
page execute and read and write
|
||
3309000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
3309000
|
heap
|
page read and write
|
||
1F4C7D50000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4B16000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AE1000
|
direct allocation
|
page execute and read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
6DA0000
|
heap
|
page execute and read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4A89000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
4B0A000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4B0A000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page readonly
|
||
4AFA000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
4B0E000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
145B000
|
trusted library allocation
|
page execute and read and write
|
||
28E6000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4AE6000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AE5000
|
heap
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page execute and read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
C52000
|
unkown
|
page execute and read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4AED000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
7BEF000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
4AD9000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
2CFD000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
4461000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
6E43000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
4B0E000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
AAC000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
6D0F000
|
stack
|
page read and write
|
||
1F4C4500000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
45E000
|
system
|
page execute and read and write
|
||
7C16000
|
trusted library allocation
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
2F5F000
|
trusted library allocation
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
4AD5000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4B19000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4B0C000
|
heap
|
page read and write
|
||
802E000
|
stack
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
15D7000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
4B4C000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C4638000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C6040000
|
heap
|
page read and write
|
||
6E5B000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
6EBB000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4B13000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
7D10000
|
heap
|
page read and write
|
||
6EC7000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
45C0000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
7EAF000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
10032000
|
direct allocation
|
page execute and read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C60B5000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page execute and read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C5FA0000
|
trusted library allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
7CBE000
|
stack
|
page read and write
|
||
4ADC000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AE5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AE6000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4A34000
|
unclassified section
|
page execute and read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
2E3D000
|
stack
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
8AD0000
|
heap
|
page read and write
|
||
4AE5000
|
heap
|
page read and write
|
||
4B15000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page readonly
|
||
441D000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
44A3000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4AE6000
|
heap
|
page read and write
|
||
A8C000
|
stack
|
page read and write
|
||
4ADC000
|
heap
|
page read and write
|
||
470C000
|
stack
|
page read and write
|
||
4AE5000
|
heap
|
page read and write
|
||
4A1E000
|
unclassified section
|
page execute and read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
C52000
|
unkown
|
page readonly
|
||
4ADC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
1423000
|
trusted library allocation
|
page execute and read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
48DA000
|
trusted library allocation
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
6FD9F000
|
unkown
|
page readonly
|
||
7D00000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AFA000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
816E000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
12B3000
|
heap
|
page read and write
|
||
4AFA000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
6ED5000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
4AD9000
|
heap
|
page read and write
|
||
1F4C4680000
|
heap
|
page read and write
|
||
1F4C5ED0000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
33E3000
|
heap
|
page read and write
|
||
4B26000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
6EB2000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
6E54000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
4AB0000
|
unclassified section
|
page execute and read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4AE5000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
10030000
|
direct allocation
|
page execute and read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
45E5000
|
trusted library allocation
|
page execute and read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
BCF000
|
stack
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AD9000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
4FB8000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
10033000
|
direct allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AFE000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
7D20000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
45B3000
|
trusted library allocation
|
page execute and read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
2CFD000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
2FD5000
|
trusted library allocation
|
page read and write
|
||
4B04000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
2368000
|
stack
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AFA000
|
heap
|
page read and write
|
||
89CE000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
884E000
|
stack
|
page read and write
|
||
4AFA000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
4B6A000
|
heap
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4ACB000
|
unclassified section
|
page execute and read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
F9C000
|
stack
|
page read and write
|
||
DF9000
|
stack
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AFC000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
6E8B000
|
heap
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AF4000
|
heap
|
page read and write
|
||
4AFA000
|
heap
|
page read and write
|
||
45A8000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
2CF3000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
474000
|
system
|
page execute and read and write
|
||
4AE8000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
4B0E000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
7AEE000
|
stack
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
4AE5000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
1F4C60BC000
|
heap
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
713D000
|
stack
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
7DAD000
|
stack
|
page read and write
|
||
4668000
|
trusted library allocation
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
7FEE000
|
stack
|
page read and write
|
||
1F4C67A0000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
AA7000
|
stack
|
page read and write
|
||
4AE5000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
12DA000
|
heap
|
page read and write
|
||
15B4000
|
heap
|
page read and write
|
||
4B2A000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
144A000
|
trusted library allocation
|
page execute and read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
47D5000
|
heap
|
page execute and read and write
|
||
4AE5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
6C8F000
|
stack
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
2FFA000
|
trusted library allocation
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
4A40000
|
unclassified section
|
page execute and read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
7CFF000
|
stack
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1587000
|
heap
|
page read and write
|
||
2856000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
7021000
|
trusted library allocation
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
4B2A000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
4ADC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page readonly
|
||
79AE000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AD9000
|
heap
|
page read and write
|
||
6FD9D000
|
unkown
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4AD9000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C45E0000
|
heap
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
2E9B000
|
heap
|
page read and write
|
||
4B0A000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4EF4000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C6043000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C4685000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
2E88000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C466F000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
58E9000
|
trusted library allocation
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
2958000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
330A000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4425000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4ADC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
5310000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AE6000
|
heap
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
898F000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
2F5B000
|
trusted library allocation
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
4B6E000
|
heap
|
page read and write
|
||
4B0F000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
7142000
|
trusted library allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
15DA000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
444D000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
69FA000
|
stack
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
45B4000
|
trusted library allocation
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
28E9000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4B6E000
|
heap
|
page read and write
|
||
2FC2000
|
trusted library allocation
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
7EED000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
15BF000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1424000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
6ECD000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
2FAE000
|
trusted library allocation
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1635000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
6EDC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
4A96000
|
unclassified section
|
page execute and read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
697F000
|
stack
|
page read and write
|
||
68FB000
|
stack
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
52AF000
|
stack
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
142D000
|
trusted library allocation
|
page execute and read and write
|
||
70FE000
|
stack
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1457000
|
trusted library allocation
|
page execute and read and write
|
||
4AFC000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4755000
|
trusted library allocation
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
7C25000
|
trusted library allocation
|
page read and write
|
||
9D8000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
4B6E000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
4AF5000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
4B05000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
5889000
|
trusted library allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4600000
|
trusted library allocation
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
41A0000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
4AE8000
|
heap
|
page read and write
|
||
5AA000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
45C9000
|
trusted library allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page execute and read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
15E6000
|
trusted library allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AE000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
6E87000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C5FC0000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
4AE6000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
1F4C46C2000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1F4C46AA000
|
heap
|
page read and write
|
||
1F4C46B3000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
6FD81000
|
unkown
|
page execute read
|
||
4B0A000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
466A000
|
trusted library allocation
|
page read and write
|
||
1F4C60B0000
|
heap
|
page read and write
|
||
1F4C46B7000
|
heap
|
page read and write
|
||
7039000
|
trusted library allocation
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1F4C46A8000
|
heap
|
page read and write
|
||
1F4C46AC000
|
heap
|
page read and write
|
||
1F4C46B5000
|
heap
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
7BF4000
|
trusted library allocation
|
page read and write
|
||
4870000
|
heap
|
page execute and read and write
|
||
4B0E000
|
heap
|
page read and write
|