IOC Report
setupx 1.exe1.exe

loading gif

Files

File Path
Type
Category
Malicious
setupx 1.exe1.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Dllhost\WinRing0x64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZHKYZWVTC38PGAWGZF49K.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\ProgramData\Dllhost\winlogson.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
modified
C:\ProgramData\HostData\logs.uce
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_setupx 1.exe1.ex_b692906daec281bca74e7bfa93f9f1ed2c1fc_af2557d0_fd0ac405-4335-48d1-8ce2-ed376d339f00\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD0A.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 13 12:33:36 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAE43.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAE83.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwmmczk5.bcz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u0bjsjs4.r0o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uctsftz5.uma.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wxg1jhr4.rfo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\logs.uce
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\logs.uce
ASCII text, with CRLF line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setupx 1.exe1.exe
"C:\Users\user\Desktop\setupx 1.exe1.exe"
malicious
C:\Users\user\Desktop\setupx 1.exe1.exe
"C:\Users\user\Desktop\setupx 1.exe1.exe"
malicious
C:\Users\user\AppData\Local\Temp\ZHKYZWVTC38PGAWGZF49K.exe
"C:\Users\user\AppData\Local\Temp\ZHKYZWVTC38PGAWGZF49K.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C powershell -EncodedCommand "PAAjAFUAOQBvADAAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBpAHUASAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBtAFYAQgA1AGoAdgBvAGMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAQwA4AFYAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -EncodedCommand "PAAjAFUAOQBvADAAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBpAHUASAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBtAFYAQgA1AGoAdgBvAGMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAQwA4AFYAIwA+AA=="
malicious
C:\Windows\SysWOW64\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
malicious
C:\Windows\SysWOW64\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
malicious
C:\Windows\SysWOW64\powercfg.exe
powercfg /x -standby-timeout-ac 0
malicious
C:\Windows\SysWOW64\powercfg.exe
powercfg /x -standby-timeout-dc 0
malicious
C:\Windows\SysWOW64\powercfg.exe
powercfg /hibernate off
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk8302" /TR "C:\ProgramData\Dllhost\dllhost.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk8302" /TR "C:\ProgramData\Dllhost\dllhost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6676 -s 704
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.51/WatchDog.exe
unknown
https://citydisco.bet/gdJISre
unknown
https://duckduckgo.com/ac/?q=
unknown
bugildbett.top/bAuz
https://contoso.com/License
unknown
https://aka.ms/pscore6lBLr
unknown
http://185.215.113.51/WinRing0x64.sysP
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://citydisco.bet/gdJISAAIA
unknown
https://citydisco.bet/D
unknown
http://185.215.113.51/WatchDog.exeEhttp://185.215.113.51/lolMiner.exe?http://185.215.113.51/xmrig.ex
unknown
http://185.215.113.51/WatchDog.exeP
unknown
citydisco.bet/gdJIS
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://185.215.113.51/conhost.exe:
unknown
http://185.215.113.51/WatchDogee
unknown
http://185.215.113.51/J
unknown
https://citydisco.bet/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://185.215.113.51/D
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://185.215.113.51/WinRing0x64.sys
185.215.113.51
http://185.215.113.51/C
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://pastebin.com/raw/YpJeSRBC
172.67.19.24
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.215.113.51/lolMiner.exe
unknown
cjlaspcorne.icu/DbIps
https://citydisco.bet:443/gdJIS
unknown
https://citydisco.bet:443/gdJIS71025-5-
unknown
http://nuget.org/NuGet.exe
unknown
mrodularmall.top/aNzS
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://185.215.113.51/
unknown
http://185.215.113.51/conhost.exe
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ac.ecosia.org?q=
unknown
http://upx.sf.net
unknown
http://pastebin.comd
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
jowinjoinery.icu/bdWUa
legenassedk.top/bdpWO
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
http://185.215.113.51
unknown
http://crl.mi
unknown
http://185.215.113.51/xmrig.exeP
unknown
https://www.ecosia.org/newtab/v20w
unknown
http://185.215.113.51/xmrig.exe
185.215.113.51
featureccus.shop/bdMAn
https://citydisco.bet/Vs16c
unknown
htardwarehu.icu/Sbdsa
http://185.215.113.51D
unknown
http://185.215.113.51/lolMiner.exe?http://185.215.113.51/xmrig.exe
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://citydisco.bet/gdJIS6
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://citydisco.bet/gdJIS
188.114.97.3
http://pastebin.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://pastebin.com
unknown
https://gemini.google.com/app?q=
unknown
http://185.215.113.51/WinRing0x64.sysChttps://pastebin.com/raw/YpJeSRBC
unknown
There are 68 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
citydisco.bet
188.114.97.3
pastebin.com
172.67.19.24

IPs

IP
Domain
Country
Malicious
188.114.97.3
citydisco.bet
European Union
172.67.19.24
pastebin.com
United States
185.215.113.51
unknown
Portugal

Registry

Path
Value
Malicious
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
ProgramId
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
FileId
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
LowerCaseLongPath
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
LongPathHash
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
Name
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
OriginalFileName
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
Publisher
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
Version
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
BinFileVersion
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
BinaryType
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
ProductName
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
ProductVersion
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
LinkDate
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
BinProductVersion
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
AppxPackageFullName
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
AppxPackageRelativeId
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
Size
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
Language
\REGISTRY\A\{6fa32212-3c23-545b-ca9e-93c308042f13}\Root\InventoryApplicationFile\setupx 1.exe1.ex|e1b309183e7eab43
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ZHKYZWVTC38PGAWGZF49K_RASMANCS
FileDirectory
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
30BE000
trusted library allocation
page read and write
malicious
2D39000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
37E8000
trusted library allocation
page read and write
4D5E000
stack
page read and write
37F7000
trusted library allocation
page read and write
3827000
trusted library allocation
page read and write
F5B000
heap
page read and write
37E8000
trusted library allocation
page read and write
37F7000
trusted library allocation
page read and write
721E000
stack
page read and write
382D000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
FF9000
heap
page read and write
FF5000
heap
page read and write
2D80000
heap
page read and write
2CBB000
trusted library allocation
page execute and read and write
30E4000
trusted library allocation
page read and write
D1F000
unkown
page write copy
31B0000
trusted library allocation
page read and write
FB9000
heap
page read and write
30B6000
trusted library allocation
page read and write
77A0000
trusted library allocation
page execute and read and write
FA0000
heap
page read and write
87D0000
trusted library allocation
page execute and read and write
F9E000
heap
page read and write
EE0000
remote allocation
page read and write
37E8000
trusted library allocation
page read and write
FC7000
heap
page read and write
3AD7000
trusted library allocation
page read and write
317E000
trusted library allocation
page read and write
1344000
heap
page read and write
37DE000
trusted library allocation
page read and write
FE9000
heap
page read and write
6646000
heap
page read and write
10F8000
stack
page read and write
11DB000
heap
page read and write
842D000
trusted library allocation
page read and write
2B90000
heap
page read and write
7582000
heap
page read and write
2DD0000
heap
page read and write
3854000
trusted library allocation
page read and write
C81000
unkown
page execute read
13F2000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
37D9000
trusted library allocation
page read and write
336A000
heap
page read and write
37F5000
trusted library allocation
page read and write
8680000
heap
page read and write
381C000
trusted library allocation
page read and write
8507000
trusted library allocation
page read and write
82D000
stack
page read and write
2BD0000
heap
page read and write
866E000
heap
page read and write
2C3E000
stack
page read and write
37C9000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
7450000
heap
page read and write
2FD0000
heap
page read and write
EE0000
remote allocation
page read and write
603C000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
FE9000
heap
page read and write
127A000
heap
page read and write
F9C000
heap
page read and write
79A0000
trusted library allocation
page read and write
5844000
trusted library allocation
page read and write
D16000
unkown
page write copy
3802000
trusted library allocation
page read and write
4D0E000
stack
page read and write
2D10000
heap
page read and write
37E8000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
699E000
stack
page read and write
FCF000
heap
page read and write
7A00000
trusted library allocation
page read and write
2CF0000
heap
page execute and read and write
3180000
trusted library allocation
page read and write
3120000
trusted library section
page read and write
FB4000
heap
page read and write
37FE000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
593E000
stack
page read and write
5760000
trusted library allocation
page execute and read and write
37E8000
trusted library allocation
page read and write
326B000
heap
page read and write
7A0000
heap
page read and write
2B88000
stack
page read and write
2B9A000
heap
page read and write
34E0000
heap
page read and write
3827000
trusted library allocation
page read and write
37C5000
trusted library allocation
page read and write
FEF000
heap
page read and write
346D000
stack
page read and write
FE2000
heap
page read and write
F9C000
heap
page read and write
FE2000
heap
page read and write
5528000
trusted library allocation
page read and write
FE9000
heap
page read and write
380A000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
FDE000
heap
page read and write
FCF000
heap
page read and write
37D7000
trusted library allocation
page read and write
37D5000
trusted library allocation
page read and write
D1A000
unkown
page readonly
3808000
trusted library allocation
page read and write
FE4000
heap
page read and write
3199000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
FE4000
heap
page read and write
FCD000
heap
page read and write
F5B000
heap
page read and write
3095000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
37DA000
trusted library allocation
page read and write
37BD000
trusted library allocation
page read and write
662A000
heap
page read and write
FA0000
heap
page read and write
2A3C000
stack
page read and write
64FC000
stack
page read and write
6D5E000
stack
page read and write
7840000
trusted library allocation
page read and write
77BE000
stack
page read and write
FCF000
heap
page read and write
37D6000
trusted library allocation
page read and write
3470000
heap
page read and write
2D6E000
stack
page read and write
53F5000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
3BCE000
stack
page read and write
FA0000
heap
page read and write
6D0000
heap
page read and write
FBC000
heap
page read and write
383A000
trusted library allocation
page read and write
8A0000
heap
page read and write
3715000
trusted library allocation
page read and write
37DF000
trusted library allocation
page read and write
4FE6000
trusted library allocation
page read and write
3AD000
stack
page read and write
1270000
heap
page read and write
1130000
heap
page read and write
FF9000
heap
page read and write
8510000
trusted library allocation
page read and write
FF0000
heap
page read and write
FB9000
heap
page read and write
2E2E000
stack
page read and write
5535000
trusted library allocation
page read and write
39D1000
heap
page read and write
3805000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
386A000
trusted library allocation
page read and write
374C000
stack
page read and write
37E8000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
3B08000
trusted library allocation
page read and write
2BCD000
heap
page read and write
7830000
heap
page execute and read and write
37C7000
trusted library allocation
page read and write
85D0000
heap
page read and write
37C9000
trusted library allocation
page read and write
528D000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
F42000
heap
page read and write
3054000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
37EA000
trusted library allocation
page read and write
6D9E000
stack
page read and write
2C6D000
stack
page read and write
31BE000
stack
page read and write
5330000
trusted library allocation
page read and write
3817000
trusted library allocation
page read and write
37DF000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
F3C000
heap
page read and write
38BA000
trusted library allocation
page read and write
73FE000
stack
page read and write
303A000
trusted library allocation
page read and write
3FF000
stack
page read and write
54F6000
trusted library allocation
page read and write
FEB000
heap
page read and write
2E6F000
stack
page read and write
FAE000
heap
page read and write
F66000
heap
page read and write
37C7000
trusted library allocation
page read and write
37B4000
trusted library allocation
page read and write
7680000
heap
page read and write
1580000
heap
page read and write
383A000
trusted library allocation
page read and write
37F9000
trusted library allocation
page read and write
FCF000
heap
page read and write
37DF000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
2D50000
heap
page read and write
F76000
heap
page read and write
2AF0000
heap
page read and write
864F000
heap
page read and write
37EF000
trusted library allocation
page read and write
6035000
trusted library allocation
page read and write
3ED000
stack
page read and write
F3C000
heap
page read and write
8960000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
3BA8000
trusted library allocation
page read and write
3852000
trusted library allocation
page read and write
4D10000
heap
page execute and read and write
EE0000
remote allocation
page read and write
355E000
heap
page read and write
2E2E000
stack
page read and write
37CC000
trusted library allocation
page read and write
76E6000
heap
page read and write
13D3000
trusted library allocation
page read and write
FEF000
heap
page read and write
FCF000
heap
page read and write
4E0C000
stack
page read and write
2FC0000
heap
page read and write
37E8000
trusted library allocation
page read and write
FF1000
heap
page read and write
37E8000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
37CF000
trusted library allocation
page read and write
6ECE000
stack
page read and write
516E000
stack
page read and write
54DE000
trusted library allocation
page read and write
89EE000
stack
page read and write
31A0000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
37D3000
trusted library allocation
page read and write
332D000
stack
page read and write
8AB0000
trusted library allocation
page execute and read and write
2CAE000
stack
page read and write
2CAF000
stack
page read and write
86F000
stack
page read and write
5580000
heap
page read and write
6C1E000
stack
page read and write
7F020000
trusted library allocation
page execute and read and write
37D0000
trusted library allocation
page read and write
46B0000
heap
page read and write
F3D000
heap
page read and write
3FB9000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
5EF9000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
F9E000
heap
page read and write
37B4000
trusted library allocation
page read and write
3819000
trusted library allocation
page read and write
33E0000
heap
page read and write
381A000
trusted library allocation
page read and write
318D000
trusted library allocation
page execute and read and write
66BF000
heap
page read and write
37CF000
trusted library allocation
page read and write
89AE000
stack
page read and write
37E8000
trusted library allocation
page read and write
FE3000
heap
page read and write
86A6000
heap
page read and write
76BE000
stack
page read and write
3170000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
2FAB000
heap
page read and write
37C7000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
92D000
stack
page read and write
FE5000
heap
page read and write
2CD0000
trusted library allocation
page read and write
8AFD000
stack
page read and write
33F0000
heap
page read and write
37DF000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
8BFE000
stack
page read and write
2BCD000
heap
page read and write
2CB0000
trusted library allocation
page read and write
3B28000
trusted library allocation
page read and write
2B4C000
stack
page read and write
3802000
trusted library allocation
page read and write
76A5000
heap
page read and write
782E000
stack
page read and write
84DF000
stack
page read and write
744E000
stack
page read and write
37D7000
trusted library allocation
page read and write
725B000
stack
page read and write
2E80000
heap
page read and write
740E000
stack
page read and write
34F0000
heap
page read and write
722E000
stack
page read and write
37D4000
trusted library allocation
page read and write
8B3B000
stack
page read and write
8C0000
heap
page read and write
37B6000
trusted library allocation
page read and write
3828000
trusted library allocation
page read and write
11D0000
heap
page read and write
3140000
heap
page read and write
2CB7000
trusted library allocation
page execute and read and write
3057000
heap
page read and write
66C6000
heap
page read and write
FEE000
heap
page read and write
5530000
trusted library allocation
page read and write
37E5000
trusted library allocation
page read and write
76E000
stack
page read and write
FEE000
heap
page read and write
6ADE000
stack
page read and write
3832000
trusted library allocation
page read and write
7705000
heap
page read and write
37F9000
trusted library allocation
page read and write
4D78000
trusted library allocation
page read and write
D0B000
unkown
page readonly
85E4000
heap
page read and write
37E8000
trusted library allocation
page read and write
FEE000
heap
page read and write
FF5000
heap
page read and write
37C4000
trusted library allocation
page read and write
FB4000
heap
page read and write
76FE000
heap
page read and write
2AFB000
heap
page read and write
30E000
stack
page read and write
FBD000
heap
page read and write
790E000
stack
page read and write
13DD000
trusted library allocation
page execute and read and write
1550000
heap
page read and write
37E8000
trusted library allocation
page read and write
FEF000
heap
page read and write
C80000
unkown
page readonly
37E8000
trusted library allocation
page read and write
58AA000
trusted library allocation
page read and write
F5B000
heap
page read and write
3821000
trusted library allocation
page read and write
7F0000
heap
page read and write
F77000
heap
page read and write
9E5000
heap
page read and write
FF1000
heap
page read and write
79C0000
trusted library allocation
page read and write
9E7000
heap
page read and write
5540000
trusted library allocation
page read and write
8410000
heap
page read and write
753E000
stack
page read and write
738E000
stack
page read and write
D38000
unkown
page readonly
3843000
trusted library allocation
page read and write
13FA000
trusted library allocation
page execute and read and write
C80000
unkown
page readonly
37E8000
trusted library allocation
page read and write
380F000
trusted library allocation
page read and write
2C50000
heap
page read and write
54DB000
trusted library allocation
page read and write
37D9000
trusted library allocation
page read and write
1206000
heap
page read and write
F9C000
heap
page read and write
37C3000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
3AF0000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
D1A000
unkown
page readonly
3160000
trusted library section
page read and write
8688000
heap
page read and write
337C000
stack
page read and write
37E8000
trusted library allocation
page read and write
3807000
trusted library allocation
page read and write
D1F000
unkown
page write copy
2F06000
heap
page read and write
11D0000
heap
page read and write
12E0000
heap
page read and write
FCF000
heap
page read and write
3410000
heap
page read and write
FE2000
heap
page read and write
729D000
stack
page read and write
8612000
heap
page read and write
4DCC000
stack
page read and write
2F00000
heap
page read and write
3010000
heap
page read and write
84E0000
heap
page read and write
37E8000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
5888000
trusted library allocation
page read and write
626E000
stack
page read and write
87E0000
trusted library allocation
page read and write
37E2000
trusted library allocation
page read and write
8550000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
3B78000
trusted library allocation
page read and write
37EB000
trusted library allocation
page read and write
3717000
trusted library allocation
page read and write
37C0000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
37B6000
trusted library allocation
page read and write
381F000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
13F6000
trusted library allocation
page execute and read and write
37C6000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
FE9000
heap
page read and write
3190000
trusted library allocation
page read and write
4E20000
heap
page execute and read and write
37E8000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
70DB000
stack
page read and write
3071000
trusted library allocation
page read and write
D0B000
unkown
page readonly
2D7E000
stack
page read and write
37F0000
trusted library allocation
page read and write
3064000
trusted library allocation
page read and write
75F000
stack
page read and write
6E9E000
stack
page read and write
3F91000
trusted library allocation
page read and write
FFA000
heap
page read and write
D1F000
unkown
page write copy
3183000
trusted library allocation
page execute and read and write
2E00000
heap
page read and write
F42000
heap
page read and write
62AE000
stack
page read and write
2CDE000
stack
page read and write
37E5000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
6FEE000
stack
page read and write
1235000
heap
page read and write
FB9000
heap
page read and write
37E8000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
8D0000
heap
page read and write
310E000
stack
page read and write
37C6000
trusted library allocation
page read and write
69DD000
stack
page read and write
37D7000
trusted library allocation
page read and write
3580000
trusted library allocation
page readonly
13B0000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
FEB000
heap
page read and write
5E99000
trusted library allocation
page read and write
13E0000
heap
page read and write
55C1000
trusted library allocation
page read and write
37F1000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
773E000
heap
page read and write
63AE000
stack
page read and write
85E0000
heap
page read and write
3807000
trusted library allocation
page read and write
2F8E000
stack
page read and write
FF4000
heap
page read and write
37F9000
trusted library allocation
page read and write
F32000
heap
page read and write
32FC000
stack
page read and write
37C7000
trusted library allocation
page read and write
8BBC000
stack
page read and write
37B1000
trusted library allocation
page read and write
37CF000
trusted library allocation
page read and write
37C0000
trusted library allocation
page read and write
37CF000
trusted library allocation
page read and write
44EC000
trusted library allocation
page read and write
FED000
heap
page read and write
FE3000
heap
page read and write
FE2000
heap
page read and write
8C3E000
stack
page read and write
5823000
trusted library allocation
page read and write
FCE000
heap
page read and write
2CE3000
heap
page read and write
C81000
unkown
page execute read
FF9000
heap
page read and write
719D000
stack
page read and write
667C000
heap
page read and write
C81000
unkown
page execute read
689E000
stack
page read and write
3828000
trusted library allocation
page read and write
71DA000
stack
page read and write
37E8000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
85EC000
heap
page read and write
2F4D000
stack
page read and write
31C0000
heap
page read and write
37B1000
trusted library allocation
page read and write
3582000
trusted library allocation
page readonly
4DB0000
heap
page read and write
3817000
trusted library allocation
page read and write
35DE000
stack
page read and write
FC8000
heap
page read and write
FE3000
heap
page read and write
4CC0000
trusted library allocation
page read and write
D32000
unkown
page readonly
FE0000
heap
page read and write
3790000
heap
page read and write
37D4000
trusted library allocation
page read and write
85C000
stack
page read and write
FBC000
heap
page read and write
37C6000
trusted library allocation
page read and write
58DC000
stack
page read and write
770000
heap
page read and write
980000
heap
page read and write
31EE000
stack
page read and write
1400000
heap
page read and write
12C0000
heap
page read and write
1407000
heap
page read and write
86A9000
heap
page read and write
37DD000
trusted library allocation
page read and write
37C2000
trusted library allocation
page read and write
354E000
heap
page read and write
4E10000
trusted library allocation
page execute and read and write
31B5000
trusted library allocation
page execute and read and write
352D000
heap
page read and write
8500000
trusted library allocation
page read and write
FF8000
heap
page read and write
84F0000
trusted library allocation
page execute and read and write
700E000
stack
page read and write
34FB000
heap
page read and write
3BA0000
trusted library allocation
page read and write
FED000
heap
page read and write
6FCE000
stack
page read and write
FCF000
heap
page read and write
58F0000
heap
page read and write
30DE000
stack
page read and write
13CD000
trusted library allocation
page execute and read and write
37E8000
trusted library allocation
page read and write
3170000
heap
page read and write
506D000
stack
page read and write
37BB000
trusted library allocation
page read and write
C80000
unkown
page readonly
31C8000
heap
page read and write
34F0000
heap
page read and write
FDE000
heap
page read and write
6F2E000
stack
page read and write
54D0000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
63FE000
stack
page read and write
7970000
trusted library allocation
page read and write
37BA000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
C81000
unkown
page execute read
D16000
unkown
page execute and read and write
3800000
trusted library allocation
page read and write
353E000
heap
page read and write
3800000
trusted library allocation
page read and write
743E000
stack
page read and write
383A000
trusted library allocation
page read and write
37EF000
trusted library allocation
page read and write
37CC000
trusted library allocation
page read and write
3BE000
stack
page read and write
45E000
remote allocation
page execute and read and write
F65000
heap
page read and write
37FF000
trusted library allocation
page read and write
3460000
heap
page read and write
83F0000
heap
page read and write
5EB9000
trusted library allocation
page read and write
76F7000
heap
page read and write
F9C000
heap
page read and write
FE4000
heap
page read and write
FCF000
heap
page read and write
FCF000
heap
page read and write
3184000
trusted library allocation
page read and write
2FA0000
heap
page read and write
37E8000
trusted library allocation
page read and write
3C40000
trusted library allocation
page read and write
3827000
trusted library allocation
page read and write
D16000
unkown
page write copy
6B1D000
stack
page read and write
37E8000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
FEF000
heap
page read and write
F3E000
heap
page read and write
712C000
stack
page read and write
FE5000
heap
page read and write
2FC0000
heap
page read and write
37C7000
trusted library allocation
page read and write
3838000
trusted library allocation
page read and write
37D4000
trusted library allocation
page read and write
8400000
trusted library allocation
page execute and read and write
3057000
trusted library allocation
page read and write
FA0000
heap
page read and write
71E000
stack
page read and write
6F6D000
stack
page read and write
54B0000
trusted library allocation
page execute and read and write
FCF000
heap
page read and write
37E8000
trusted library allocation
page read and write
73BE000
stack
page read and write
1230000
heap
page read and write
37CA000
trusted library allocation
page read and write
3803000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
709D000
stack
page read and write
2E70000
heap
page read and write
FF8000
heap
page read and write
37B6000
trusted library allocation
page read and write
FE2000
heap
page read and write
37C7000
trusted library allocation
page read and write
FF8000
heap
page read and write
342E000
stack
page read and write
3360000
heap
page read and write
7490000
heap
page read and write
37F3000
trusted library allocation
page read and write
5780000
heap
page execute and read and write
6500000
heap
page read and write
FB9000
heap
page read and write
5A3F000
stack
page read and write
D1A000
unkown
page readonly
F42000
heap
page read and write
7370000
heap
page read and write
FF0000
heap
page read and write
2ECE000
stack
page read and write
37ED000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
F65000
heap
page read and write
37FF000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
4E60000
heap
page read and write
FE0000
heap
page read and write
357F000
heap
page read and write
304B000
heap
page read and write
FBD000
heap
page read and write
794D000
stack
page read and write
990000
heap
page read and write
3130000
heap
page read and write
4E25000
heap
page execute and read and write
4EF3000
trusted library allocation
page read and write
2CD000
stack
page read and write
37F5000
trusted library allocation
page read and write
2D2D000
stack
page read and write
2D1B000
heap
page read and write
96E000
stack
page read and write
612E000
stack
page read and write
73CE000
stack
page read and write
85B8000
heap
page read and write
5E91000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
13AE000
stack
page read and write
D30000
unkown
page readonly
2C40000
heap
page read and write
36DF000
stack
page read and write
3191000
trusted library allocation
page read and write
FF0000
heap
page read and write
29F0000
heap
page read and write
37E2000
trusted library allocation
page read and write
FDE000
heap
page read and write
30D9000
trusted library allocation
page read and write
8560000
trusted library allocation
page read and write
55C5000
trusted library allocation
page read and write
37CA000
trusted library allocation
page read and write
6FAF000
stack
page read and write
3581000
trusted library allocation
page execute read
32EF000
stack
page read and write
767D000
stack
page read and write
D16000
unkown
page write copy
37E8000
trusted library allocation
page read and write
3828000
trusted library allocation
page read and write
FBC000
heap
page read and write
13C3000
trusted library allocation
page execute and read and write
F9E000
heap
page read and write
6620000
heap
page read and write
356E000
heap
page read and write
FEC000
heap
page read and write
4E91000
trusted library allocation
page read and write
FCF000
heap
page read and write
12F0000
heap
page read and write
37F0000
trusted library allocation
page read and write
54E2000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
37BB000
trusted library allocation
page read and write
3AD1000
trusted library allocation
page read and write
37B4000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
3580000
heap
page read and write
2BDB000
heap
page read and write
FF5000
heap
page read and write
FE2000
heap
page read and write
FB0000
heap
page read and write
77EE000
stack
page read and write
78CF000
stack
page read and write
55B0000
heap
page read and write
57DC000
stack
page read and write
11F0000
trusted library allocation
page read and write
3260000
heap
page read and write
327C000
stack
page read and write
37C4000
trusted library allocation
page read and write
2F5C000
stack
page read and write
8662000
heap
page read and write
842B000
trusted library allocation
page read and write
F42000
heap
page read and write
37E8000
trusted library allocation
page read and write
3808000
trusted library allocation
page read and write
736D000
stack
page read and write
37C3000
trusted library allocation
page read and write
774A000
heap
page read and write
6024000
trusted library allocation
page read and write
D0B000
unkown
page readonly
37FB000
trusted library allocation
page read and write
37C2000
trusted library allocation
page read and write
FF9000
heap
page read and write
381F000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
8800000
trusted library allocation
page read and write
85DC000
heap
page read and write
ECB000
stack
page read and write
FF0C0000
trusted library allocation
page execute and read and write
37D9000
trusted library allocation
page read and write
788E000
stack
page read and write
53FB000
trusted library allocation
page read and write
1206000
heap
page read and write
108C000
stack
page read and write
D1F000
unkown
page write copy
6F4E000
stack
page read and write
2F1E000
stack
page read and write
2F2D000
stack
page read and write
4E80000
heap
page read and write
2D3E000
stack
page read and write
37BC000
trusted library allocation
page read and write
3010000
heap
page read and write
31AF000
stack
page read and write
FAE000
heap
page read and write
F39000
heap
page read and write
37BE000
trusted library allocation
page read and write
87F0000
trusted library allocation
page read and write
85BE000
heap
page read and write
F77000
heap
page read and write
37B0000
trusted library allocation
page read and write
13D0000
heap
page read and write
37C7000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
8950000
trusted library allocation
page read and write
FBD000
heap
page read and write
13E6000
heap
page read and write
54D4000
trusted library allocation
page read and write
370000
heap
page read and write
386C000
trusted library allocation
page read and write
37BB000
trusted library allocation
page read and write
2C9F000
stack
page read and write
FE6000
heap
page read and write
FF8000
heap
page read and write
770D000
heap
page read and write
650000
heap
page read and write
2BB0000
heap
page read and write
FF9000
heap
page read and write
37BE000
trusted library allocation
page read and write
3807000
trusted library allocation
page read and write
774D000
heap
page read and write
37C7000
trusted library allocation
page read and write
37B6000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
F5B000
heap
page read and write
31FE000
stack
page read and write
37F5000
trusted library allocation
page read and write
3825000
trusted library allocation
page read and write
72DB000
stack
page read and write
37B1000
trusted library allocation
page read and write
2F6E000
stack
page read and write
85D8000
heap
page read and write
37E8000
trusted library allocation
page read and write
34C0000
heap
page read and write
D0B000
unkown
page readonly
79D0000
trusted library allocation
page read and write
2D10000
heap
page read and write
91B000
stack
page read and write
D17000
unkown
page read and write
4D60000
heap
page readonly
311E000
stack
page read and write
37D9000
trusted library allocation
page read and write
F0A000
heap
page read and write
9C0000
heap
page read and write
849D000
stack
page read and write
381D000
trusted library allocation
page read and write
FF5000
heap
page read and write
85D4000
heap
page read and write
FB9000
heap
page read and write
FDE000
heap
page read and write
37DD000
trusted library allocation
page read and write
FDE000
heap
page read and write
FF5000
heap
page read and write
37E8000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
3137000
heap
page read and write
37E8000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
5502000
trusted library allocation
page read and write
306D000
stack
page read and write
970000
heap
page read and write
F9C000
heap
page read and write
7715000
heap
page read and write
2BBA000
heap
page read and write
29B8000
trusted library allocation
page read and write
87B2000
trusted library allocation
page read and write
2CB2000
trusted library allocation
page read and write
30AE000
stack
page read and write
FF9000
heap
page read and write
12B3000
heap
page read and write
C80000
unkown
page readonly
3850000
trusted library allocation
page read and write
314F000
stack
page read and write
8963000
trusted library allocation
page read and write
3FDD000
trusted library allocation
page read and write
3827000
trusted library allocation
page read and write
6F0F000
stack
page read and write
383A000
trusted library allocation
page read and write
726E000
stack
page read and write
FAF000
heap
page read and write
FAF000
heap
page read and write
1210000
heap
page read and write
FB8000
heap
page read and write
592A000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
3040000
heap
page read and write
37E8000
trusted library allocation
page read and write
11ED000
heap
page read and write
FE6000
heap
page read and write
13C4000
trusted library allocation
page read and write
37F7000
trusted library allocation
page read and write
55C7000
trusted library allocation
page read and write
6F89000
stack
page read and write
70EE000
stack
page read and write
FCF000
heap
page read and write
118C000
stack
page read and write