IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsq4808.tmp
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\PCAppStore\AutoUpdater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\PcAppStore.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\Uninstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\PCAppStore\Watchdog.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\download\ZoomInstaller.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\PCAppStore\nwjs\NW_store.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\ffmpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\node.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\notification_helper.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\nw.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\nw_elf.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\vk_swiftshader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\PCAppStore\nwjs\vulkan-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002d.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002e.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[2].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[3].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[4].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[5].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[6].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[7].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[8].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p[9].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[10].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[2].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[3].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[4].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[5].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[6].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[7].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\p[8].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\p[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\p[2].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\p[3].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\p[4].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\p[5].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\p[6].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\p[7].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\p[8].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\p[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\p[2].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\p[3].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\p[4].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\p[5].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\p[7].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\p[8].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\p[9].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Temp\nsi277F.tmp\NSISFastLib.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsi277F.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsi277F.tmp\image.gif
GIF image data, version 89a, 16 x 16
dropped
C:\Users\user\AppData\Local\Temp\nsi277F.tmp\inetc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsi277F.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
dropped
C:\Users\user\AppData\Local\Temp\nsi277F.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsi277F.tmp\nsJSON.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsj906B.tmp\Math.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsj906B.tmp\NSISFastLib.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsj906B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsj906B.tmp\image.gif
GIF image data, version 89a, 16 x 16
dropped
C:\Users\user\AppData\Local\Temp\nsj906B.tmp\inetc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsj906B.tmp\nsJSON.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsu905B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\temp
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PC App Store.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Fri Oct 25 14:14:38 2024, mtime=Thu Oct 31 10:01:23 2024, atime=Fri Oct 25 14:14:38 2024, length=3116888, window=hide
dropped
C:\Users\user\PCAppStore\ReadMe.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\PCAppStore\Temp\tempPOSTData
JSON data
dropped
C:\Users\user\PCAppStore\Temp\tempPOSTResponse
JSON data
dropped
C:\Users\user\PCAppStore\nwjs\credits.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\PCAppStore\nwjs\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\PCAppStore\nwjs\icudtl.dat
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\af.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\af.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\am.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\am.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ar-XB.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ar-XB.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ar.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ar.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\bg.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\bg.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\bn.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\bn.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ca.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ca.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\cs.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\cs.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\da.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\da.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\de.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\de.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\el.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\el.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\en-GB.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\en-GB.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\en-US.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\en-US.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\en-XA.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\en-XA.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\es-419.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\es-419.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\es.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\es.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\et.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\et.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\fa.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\fa.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\fi.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\fi.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\fil.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\fil.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\fr.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\fr.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\gu.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\gu.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\he.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\he.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\hi.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\hi.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\hr.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\hr.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\hu.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\hu.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\id.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\id.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\it.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\it.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ja.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ja.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\kn.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\kn.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ko.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ko.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\lt.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\lt.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\lv.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\lv.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ml.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ml.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\mr.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\mr.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ms.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ms.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\nb.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\nb.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\nl.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\nl.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\pl.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\pl.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\pt-BR.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\pt-BR.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\pt-PT.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\pt-PT.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ro.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ro.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ru.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ru.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\sk.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\sk.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\sl.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\sl.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\sr.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\sr.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\sv.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\sv.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\sw.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\sw.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ta.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ta.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\te.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\te.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\th.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\th.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\tr.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\tr.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\uk.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\uk.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\ur.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\ur.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\vi.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\vi.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\zh-CN.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\zh-CN.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\locales\zh-TW.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\locales\zh-TW.pak.info
CSV text
dropped
C:\Users\user\PCAppStore\nwjs\nw_100_percent.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\nw_200_percent.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\resources.pak
data
dropped
C:\Users\user\PCAppStore\nwjs\v8_context_snapshot.bin
data
dropped
C:\Users\user\PCAppStore\nwjs\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\PCAppStore\pcappstore.ico
MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
dropped
C:\Users\user\PCAppStore\ui\asset-manifest.json
JSON data
dropped
C:\Users\user\PCAppStore\ui\favicon-16x16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\PCAppStore\ui\favicon-32x32.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\PCAppStore\ui\favicon.ico
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\PCAppStore\ui\index.html
HTML document, ASCII text, with very long lines (3269), with no line terminators
dropped
C:\Users\user\PCAppStore\ui\manifest.json
JSON data
dropped
C:\Users\user\PCAppStore\ui\package.json
JSON data
dropped
C:\Users\user\PCAppStore\ui\robots.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\PCAppStore\ui\static\css\main.c1bf4e0a.chunk.css
ASCII text, with very long lines (40486)
dropped
C:\Users\user\PCAppStore\ui\static\css\main.c1bf4e0a.chunk.css.map
JSON data
dropped
C:\Users\user\PCAppStore\ui\static\js\2.801b9d83.chunk.bin
data
dropped
C:\Users\user\PCAppStore\ui\static\js\2.801b9d83.chunk.js
ASCII text, with no line terminators
dropped
C:\Users\user\PCAppStore\ui\static\js\2.801b9d83.chunk.js.LICENSE.txt
ASCII text
dropped
C:\Users\user\PCAppStore\ui\static\js\2.801b9d83.chunk.js.map
JSON data
dropped
C:\Users\user\PCAppStore\ui\static\js\3.cf9f4ce6.chunk.bin
data
dropped
C:\Users\user\PCAppStore\ui\static\js\3.cf9f4ce6.chunk.js
ASCII text, with no line terminators
dropped
C:\Users\user\PCAppStore\ui\static\js\3.cf9f4ce6.chunk.js.map
JSON data
dropped
C:\Users\user\PCAppStore\ui\static\js\main.717b6389.chunk.bin
data
dropped
C:\Users\user\PCAppStore\ui\static\js\main.717b6389.chunk.js
ASCII text, with no line terminators
dropped
C:\Users\user\PCAppStore\ui\static\js\main.717b6389.chunk.js.map
JSON data
dropped
C:\Users\user\PCAppStore\ui\static\js\runtime-main.cdd4f9cc.bin
data
dropped
C:\Users\user\PCAppStore\ui\static\js\runtime-main.cdd4f9cc.js
ASCII text, with no line terminators
dropped
C:\Users\user\PCAppStore\ui\static\js\runtime-main.cdd4f9cc.js.map
JSON data
dropped
C:\Users\user\PCAppStore\ui\static\media\copy_icon.570b8027.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_calculator_gray.f29de877.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_calculator_white.cdac319f.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_check_gray.fc098a35.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_check_white.f080410d.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_clipboard_gray.c8a9351b.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_clipboard_white.2afacb39.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_cross_gray_2.01bfd543.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_cross_white_2.05921d5e.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_dashboard_gray.3a181243.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_dashboard_white.a91ae220.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_gamepad_gray.d7229273.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_gamepad_white.25a7995d.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_gear_gray.545673b6.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_gear_white.2bba31c1.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_notification_gray.e0145c50.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_notification_white.addda272.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_screenshot_gray.01873dbe.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_screenshot_white.0e82acc2.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_search_gray.ebbaf632.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_search_white.0c376446.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_support_gray.a272cc7a.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_support_white.66ecfc42.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_trash_gray.4f9b6bc3.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_trash_white.1601c18d.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_turnoff_gray.a7446394.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_turnoff_white.333d83c8.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_unpin_gray.712c1820.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_unpin_white.6b8ad10f.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_weather_gray.6eb05cae.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\icon_weather_white.c0043930.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\PCAppStore\ui\static\media\in_background_auto_update_img.dd2961b8.png
PNG image data, 490 x 140, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 309
ASCII text, with very long lines (4882), with no line terminators
dropped
Chrome Cache Entry: 310
ASCII text, with very long lines (14408)
downloaded
Chrome Cache Entry: 311
ASCII text, with very long lines (4865), with no line terminators
downloaded
Chrome Cache Entry: 312
HTML document, ASCII text, with very long lines (22120), with no line terminators
downloaded
Chrome Cache Entry: 313
ASCII text, with very long lines (4863), with no line terminators
downloaded
Chrome Cache Entry: 314
ASCII text, with very long lines (14408)
dropped
Chrome Cache Entry: 315
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 316
HTML document, ASCII text, with very long lines (22120), with no line terminators
downloaded
Chrome Cache Entry: 317
ASCII text, with very long lines (4977), with no line terminators
dropped
Chrome Cache Entry: 318
ASCII text, with very long lines (3969)
dropped
Chrome Cache Entry: 319
ASCII text, with very long lines (3969)
downloaded
Chrome Cache Entry: 320
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 321
ASCII text, with very long lines (14408)
downloaded
Chrome Cache Entry: 322
HTML document, ASCII text, with very long lines (22134), with no line terminators
downloaded
Chrome Cache Entry: 323
Web Open Font Format (Version 2), TrueType, length 48444, version 1.0
downloaded
Chrome Cache Entry: 324
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 325
ASCII text
downloaded
Chrome Cache Entry: 326
ASCII text, with very long lines (4881), with no line terminators
dropped
Chrome Cache Entry: 327
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 328
HTML document, ASCII text, with very long lines (815)
downloaded
Chrome Cache Entry: 329
ASCII text, with very long lines (14408)
dropped
Chrome Cache Entry: 331
ASCII text, with very long lines (723)
downloaded
Chrome Cache Entry: 332
ASCII text, with very long lines (4962), with no line terminators
downloaded
Chrome Cache Entry: 333
SVG Scalable Vector Graphics image
downloaded
There are 264 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\nsq4808.tmp
"C:\Users\user\AppData\Local\Temp\nsq4808.tmp" /internal 1730271248380473 /force
malicious
C:\Users\user\PCAppStore\PcAppStore.exe
"C:\Users\user\PCAppStore\PcAppStore.exe" /init default
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Users\user\PCAppStore\PcAppStore.exe
"C:\Users\user\PCAppStore\PCAppStore.exe" /init default
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe
"C:\Program Files (x86)\DrSXXVmHpZDxFgrRfOEBCcSJhLjFyVbPIcJlABnTLoDKq\WCKsatFYtLNCcBGzYutkrweBluUg.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://pcapp.store/installing.php?guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&winver=19045&version=fa.1092c&nocache=20241031070029.271&_fcid=1730271248380473
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2024,i,2326540136548541943,16570278364610659642,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5184 --field-trial-handle=2024,i,2326540136548541943,16570278364610659642,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2024,i,2326540136548541943,16570278364610659642,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Users\user\PCAppStore\Watchdog.exe
"C:\Users\user\PCAppStore\Watchdog.exe" /guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0 /rid=20241031070123.8585445468 /ver=fa.1092c
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://pcapp.store/pixelgif.phpm
unknown
https://pcapp.store/lp/appstore/img/favicon.icopH
unknown
http://dl.google.com/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcji
unknown
http://dl.google.com/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjdbkjd
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
http://dl.google.com/release2/chrome_component/adurx3xz3dy7ajnoguus4co3vr6q_9258/hfnkpimlhhgieaddgfe
unknown
http://www.google.com/dl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnkk
unknown
https://anglebug.com/7382
unknown
https://csp.withgoogle.com/csp/clientupdate-aus/1Cache-Control:
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=&evt_src=fa_mini_insta
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
https://dl.google.com/release2/chrome_component/adrga7eefaxjfdmmgfkiaxjg4yjq_2024.7.12.235938/eeigpn
unknown
http://www.google.com/dl/release2/chrome_component/adurx3xz3dy7ajnoguus4co3vr6q_9258/hfnkpimlhhgiead
unknown
https://docs.google.com/document/:
unknown
https://anglebug.com/7714
unknown
https://pcapp.store/pixelgif.phpP
unknown
https://pcapp.store_default
unknown
http://unisolated.invalid/
unknown
https://pcapp.store/inst_cpg.php?guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&ve
unknown
https://www.google.com/chrome/tips/
unknown
http://www.google.com/dl/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocncan
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://pcapp.store/tos.html?guid=
unknown
https://www.google.com/dl/release2/chrome_component/acccxbt6wwsvpxzpob4hojndwkqq_4.10.2830.0/oimompe
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://csp.withgoogle.com/csp/analytics-container-tag-servingCross-Origin-Resource-Policy:
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858128210/?random=1730372436188&cv=
unknown
https://pcapp.store/lp/appstore/img/favicon.icoN-
unknown
https://pcapp.store/pixelgif.php
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
http://dl.google.com/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaaea
unknown
https://chrome.google.com/webstore
unknown
https://pcapp.st
unknown
https://pcapp.store/rP
unknown
https://delivery.pcapp.store/MINGPROFILE=JO
unknown
http://www.google.com/dl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppe
unknown
https://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://pcapp.store
unknown
https://dl.google.com/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcj
unknown
https://issuetracker.google.com/161903006
unknown
https://chrome.google.com/webstoreP
unknown
https://www.ecosia.org/newtab/
unknown
http://dl.google.com/release2/chrome_component/p2zbkxfgkqyr6ljey2oe3bnzoy_2023.11.29.1201/ggkkehgbnf
unknown
https://pcapp.store1
unknown
https://pcapp.store/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://dl.google.com/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_third_p
unknown
https://pcapp.store/src/main.js
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/7279d
unknown
http://dl.google.com/release2/chrome_component/acdrpu5h5nrvazlb22ulljvgujnq_3048/jflookgnkcckhobagln
unknown
https://pcapp.storeHX
unknown
http://dl.google.com/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_third_pa
unknown
http://anglebug.com/5371
unknown
https://doubleclick.net/O
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://googletagmanager.com/cy
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://pcapp.storeH
unknown
https://pcapp.storeDate:
unknown
https://pcapp.store/privacy.html?guid=welhttps://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_min
unknown
https://clients4.google.com/chrome-sync
unknown
https://analytics.google.com/g/collect?v=2&tid=G-VFQWFX3X1C&gtm=45je4au0h2v898645365za200zb910325665
unknown
https://www.google.com/dl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmpp
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://csp.withgoogle.com/csp/scaffolding/ascnsrsgac:57:0Cross-Origin-Opener-Policy-Report-Only:
unknown
https://issuetracker.google.com/258207403
unknown
https://www.google.com/dl/release2/chrome_component/e6xlmsu5i2bokri3w4cyuhv4nq_2024.8.10.0/gonpemdgk
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://doubleclick.net/
unknown
http://anglebug.com/3625
unknown
https://tdsf.doubleclick.net/td/adfetch/gda?adg_id=163766597928
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
173.194.76.156
unknown
United States
142.250.185.99
unknown
United States
142.250.185.78
unknown
United States
142.250.186.67
unknown
United States
207.246.91.177
unknown
United States
142.250.186.174
unknown
United States
159.223.126.41
unknown
United States
172.217.23.104
unknown
United States
142.250.185.100
unknown
United States
192.168.2.4
unknown
unknown
142.250.185.106
unknown
United States
74.125.206.84
unknown
United States
18.173.205.24
unknown
United States
147.182.211.77
unknown
United States
142.250.186.72
unknown
United States
142.250.184.200
unknown
United States
172.217.16.142
unknown
United States
142.250.186.98
unknown
United States
142.250.184.195
unknown
United States
1.1.1.1
unknown
Australia
170.114.52.2
unknown
United States
142.250.186.162
unknown
United States
195.181.170.18
unknown
United Kingdom
142.250.181.226
unknown
United States
239.255.255.250
unknown
Reserved
142.250.181.228
unknown
United States
170.114.45.1
unknown
United States
142.250.186.100
unknown
United States
169.150.255.183
unknown
United States
207.211.211.26
unknown
United States
There are 20 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PCAppStore
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PcAppStoreUpdater
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Watchdog
malicious
HKEY_CURRENT_USER\SOFTWARE\PCAppStore
Version
HKEY_CURRENT_USER\SOFTWARE\PCAppStore
InstallPath
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStore
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStore
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStore
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStore
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCAppStore
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\PCAppStore
AppParam
HKEY_CURRENT_USER\SOFTWARE\PCAppStore
start_menu_on
HKEY_CURRENT_USER\SOFTWARE\PCAppStore
status
HKEY_CURRENT_USER\SOFTWARE\PCAppStore
LastID
HKEY_CURRENT_USER\SOFTWARE\PCAppStore
LastTime
HKEY_CURRENT_USER\SOFTWARE\PCAppStore
status
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\UFH\SHC
14
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000704D4
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.NhgbTrarengrq.{0S2R57Q5-01N6-4N5P-7393-8Q112S5PS497}
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040482
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000405E0
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\CPNccFgber\NhgbHcqngre.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
b
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\CPNccFgber\Jngpuqbt.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
c
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000505DC
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030268
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000050274
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\7mFP31N1OQ4\Vafgnyyre.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\UFH\SHC
15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$de${c5714585-99d0-48c3-bbf6-cf4cf8d87525}$$windows.data.unifiedtile.localstartvolatiletilepropertiesmap\Current
Data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$de${c5714585-99d0-48c3-bbf6-cf4cf8d87525}$$windows.data.unifiedtile.localstartvolatiletilepropertiesmap\Current
Data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Frnepu_pj5a1u2gklrjl!PbegnanHV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.NhgbTrarengrq.{0S2R57Q5-01N6-4N5P-7393-8Q112S5PS497}
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$de${c5714585-99d0-48c3-bbf6-cf4cf8d87525}$$windows.data.unifiedtile.localstartvolatiletilepropertiesmap\Current
Data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\CPNccFgber\Jngpuqbt.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
There are 59 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1FDA8CD0000
unkown
page readonly
E61E000
stack
page read and write
233BAA72000
heap
page read and write
8208000
stack
page read and write
7E0000
heap
page read and write
530000
unkown
page read and write
1F5000A48000
unkown
page read and write
804000
heap
page read and write
3889000
heap
page read and write
AFC000
stack
page read and write
1F50003A4000
trusted library allocation
page read and write
1002A000
heap
page read and write
7D0000
heap
page read and write
6752A64000
unkown
page read and write
790000
unkown
page readonly
67563FE000
unkown
page read and write
A494000
unkown
page read and write
233BA920000
heap
page read and write
8000000
unkown
page read and write
79FB000
unkown
page read and write
B3C000
stack
page read and write
A98000
heap
page read and write
C5A3000
unkown
page read and write
25C4000
heap
page read and write
9A07BFA000
stack
page read and write
7FF5ED735000
unkown
page readonly
233BC834000
heap
page read and write
7FF71AEBC000
unkown
page readonly
826000
heap
page read and write
700000
unkown
page readonly
CCA000
stack
page read and write
2B60000
heap
page read and write
AC9000
stack
page read and write
5557000
stack
page read and write
1358000
heap
page read and write
27495ECB000
heap
page read and write
677DBFE000
unkown
page readonly
89A0000
unkown
page read and write
3863000
heap
page read and write
4B78000
unkown
page read and write
274989A0000
heap
page read and write
7EE000
heap
page read and write
B90000
unkown
page readonly
550000
unkown
page readonly
1F5000824000
unkown
page read and write
780000
unkown
page readonly
233BC89B000
heap
page read and write
7FF5ED503000
unkown
page readonly
FC0000
heap
page read and write
B70000
unkown
page readonly
C6E000
unkown
page readonly
730000
heap
page read and write
1FDAC5E0000
unkown
page read and write
1F50022E8000
trusted library allocation
page read and write
930000
heap
page read and write
96DF000
unkown
page read and write
A50002E8000
unkown
page read and write
123FE000
stack
page read and write
676DBFE000
unkown
page readonly
1F5000658000
unkown
page read and write
6752A90000
unkown
page read and write
27497D60000
heap
page read and write
E21000
unkown
page readonly
11D0000
unkown
page read and write
6779BFE000
unkown
page readonly
C30000
unkown
page read and write
6FC000
stack
page read and write
770000
unkown
page readonly
2D30000
unkown
page readonly
986F000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
C77000
unkown
page readonly
710000
heap
page read and write
801000
heap
page read and write
C90000
unkown
page readonly
27498D10000
heap
page read and write
2ABD000
heap
page read and write
1F500080C000
unkown
page read and write
6752A9A000
unkown
page read and write
B10D000
stack
page read and write
27498910000
heap
page read and write
A0090FE000
stack
page read and write
2AD3000
heap
page read and write
233BC81E000
heap
page read and write
7FF5ED26E000
unkown
page readonly
233BC88C000
heap
page read and write
7F1000
unkown
page readonly
2344000
heap
page read and write
2A60000
unkown
page readonly
233BC89B000
heap
page read and write
1F5001201000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
C60000
unkown
page readonly
819000
heap
page read and write
2ACC000
heap
page read and write
819000
heap
page read and write
6775BFE000
unkown
page readonly
B90000
heap
page read and write
27498E30000
heap
page read and write
9A079F8000
stack
page read and write
676B3FE000
unkown
page readonly
A479000
unkown
page read and write
3D0000
unkown
page readonly
3F0000
unkown
page readonly
233BC856000
heap
page read and write
1F5000338000
trusted library allocation
page read and write
2624000
heap
page read and write
C77000
unkown
page readonly
B94000
heap
page read and write
843000
heap
page read and write
C60000
unkown
page readonly
1F50022E8000
trusted library allocation
page read and write
7F8000
heap
page read and write
C77000
unkown
page readonly
67773FE000
unkown
page read and write
801000
heap
page read and write
7FF5ED404000
unkown
page readonly
7FF5ED80C000
unkown
page readonly
7D1000
unkown
page readonly
88EE000
stack
page read and write
233BC88B000
heap
page read and write
7FF5ED5EB000
unkown
page readonly
DB0000
unkown
page readonly
9550000
unkown
page readonly
3290000
unkown
page read and write
C516000
unkown
page read and write
978E000
unkown
page read and write
8BE9000
stack
page read and write
27497C90000
heap
page read and write
846000
heap
page read and write
1F5000DBD000
unkown
page read and write
970000
unkown
page readonly
1780000
unkown
page readonly
1A0000
unkown
page readonly
2E70000
unkown
page readonly
5CA000
stack
page read and write
3580000
unkown
page readonly
C75000
unkown
page read and write
1F5000EC4000
unkown
page read and write
9877000
unkown
page read and write
7E0000
unkown
page read and write
1FDAF237000
unkown
page read and write
DF1000
unkown
page readonly
387A000
heap
page read and write
7FF5ED3EA000
unkown
page readonly
4B93000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
860000
unkown
page readonly
819000
heap
page read and write
C60000
unkown
page readonly
1F5001630000
unkown
page read and write
FF0000
unkown
page read and write
27499074000
heap
page read and write
C00000
unkown
page readonly
1F5001A58000
trusted library allocation
page read and write
3893000
heap
page read and write
C75000
unkown
page read and write
3869000
heap
page read and write
680000
unkown
page readonly
386B000
heap
page read and write
37F9000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
1F5000564000
unkown
page read and write
7FF5ED7C4000
unkown
page readonly
1120000
unkown
page readonly
C61000
unkown
page execute read
B08D000
stack
page read and write
720000
unkown
page readonly
854000
heap
page read and write
DD0000
unkown
page read and write
7867000
unkown
page read and write
C41F000
stack
page read and write
96C000
stack
page read and write
C77000
unkown
page readonly
790000
unkown
page readonly
1F5000D4C000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
7D6000
heap
page read and write
27498DF6000
heap
page read and write
3BA000
stack
page read and write
7A0000
unkown
page readonly
C60000
unkown
page readonly
27495EE6000
heap
page read and write
1F5000064000
unkown
page read and write
FEDD000
unkown
page read and write
1F50007C0000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
B7A000
stack
page read and write
EF0000
unkown
page readonly
2C30000
heap
page read and write
C60000
unkown
page readonly
DE0000
unkown
page readonly
C60000
unkown
page readonly
7FF5ED530000
unkown
page readonly
C6E000
unkown
page readonly
1FDADF23000
unkown
page read and write
BB0000
unkown
page readonly
7FF5ED433000
unkown
page readonly
12C0000
unkown
page read and write
C6F2000
unkown
page read and write
1260000
heap
page read and write
9A06AFF000
stack
page read and write
A80000
unkown
page read and write
C49E000
stack
page read and write
C60000
unkown
page readonly
4BE3000
unkown
page read and write
1FDAC27C000
unkown
page read and write
1F50002A4000
trusted library allocation
page read and write
785F000
unkown
page read and write
7D0000
unkown
page readonly
79B1000
unkown
page read and write
1000000
unkown
page readonly
233BAA2C000
heap
page read and write
233BC730000
trusted library allocation
page read and write
AB4D000
unkown
page read and write
1FDACA6D000
unkown
page read and write
CA7C000
unkown
page read and write
4CC0000
unkown
page read and write
9A074FE000
stack
page read and write
CD0000
heap
page read and write
FEA0000
unkown
page read and write
7FF71AE92000
unkown
page write copy
1F50021F0000
trusted library allocation
page read and write
7FF71AEAA000
unkown
page write copy
C6E000
unkown
page readonly
1088000
heap
page read and write
1F5000CD8000
unkown
page read and write
1F5001158000
trusted library allocation
page read and write
274960F0000
remote allocation
page read and write
7F8000
heap
page read and write
233BC730000
trusted library allocation
page read and write
C77000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
7FF71ABE1000
unkown
page execute read
233BC730000
trusted library allocation
page read and write
CACC000
unkown
page read and write
13C0000
unkown
page read and write
7CD000
heap
page read and write
590000
heap
page read and write
2D50000
heap
page read and write
1F5000C50000
trusted library allocation
page read and write
836000
heap
page read and write
490000
unkown
page readonly
7FF71AEBC000
unkown
page readonly
7D3000
heap
page read and write
A491000
unkown
page read and write
27495E7C000
heap
page read and write
A33E000
unkown
page read and write
27498DD0000
heap
page read and write
B90000
heap
page read and write
24A0000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
9B60000
unkown
page readonly
2CFE000
stack
page read and write
27498AE0000
heap
page read and write
112B8000
unkown
page read and write
C49E000
stack
page read and write
2B34000
heap
page read and write
8FC000
stack
page read and write
C5A0000
unkown
page read and write
6C0000
unkown
page readonly
541000
unkown
page readonly
2174000
heap
page read and write
4C1E000
unkown
page read and write
676C3FE000
unkown
page readonly
7FF5ED41C000
unkown
page readonly
C61000
unkown
page execute read
9A073FE000
stack
page read and write
233BC730000
trusted library allocation
page read and write
710000
unkown
page readonly
1F5001428000
unkown
page read and write
1FDAEB1D000
unkown
page read and write
40000
unkown
page readonly
2F80000
remote allocation
page read and write
23DC2C81000
heap
page read and write
C6E000
unkown
page readonly
4C4B000
unkown
page read and write
890000
unkown
page readonly
68A000
stack
page read and write
3893000
heap
page read and write
2530000
unkown
page readonly
DB0000
unkown
page readonly
2D64000
heap
page read and write
233BC730000
trusted library allocation
page read and write
7FF5ED793000
unkown
page readonly
344C000
stack
page read and write
AAF9000
unkown
page read and write
97AD000
unkown
page read and write
79D3000
unkown
page read and write
7CE000
heap
page read and write
23DC2C81000
heap
page read and write
27495EB7000
heap
page read and write
DE0000
unkown
page read and write
C30000
unkown
page readonly
EE0000
unkown
page readonly
C811000
unkown
page read and write
1F5001AC4000
trusted library allocation
page read and write
7FF5ED4F3000
unkown
page readonly
2ACC000
heap
page read and write
90B0000
unkown
page read and write
3580000
unkown
page readonly
2A10000
unkown
page readonly
7FF5ED1D0000
unkown
page readonly
2749613B000
heap
page read and write
1120000
unkown
page read and write
27498DF2000
heap
page read and write
991000
unkown
page readonly
C893000
unkown
page read and write
1160000
unkown
page readonly
C6E000
unkown
page readonly
6752A6C000
unkown
page read and write
1F50004D4000
unkown
page read and write
233BC876000
heap
page read and write
906E000
stack
page read and write
1F5001458000
unkown
page read and write
C6E000
unkown
page readonly
13C0000
unkown
page read and write
A364000
unkown
page read and write
12D1000
unkown
page readonly
10C0000
unkown
page readonly
D18000
heap
page read and write
9A0000
unkown
page readonly
1F50021F0000
trusted library allocation
page read and write
1F5000B9C000
unkown
page read and write
1FDADF51000
unkown
page read and write
1F50015A0000
unkown
page read and write
C516000
unkown
page read and write
830000
unkown
page read and write
C6E000
unkown
page readonly
C75000
unkown
page read and write
7FF75C4AD000
unkown
page readonly
27495EE8000
heap
page read and write
1F50022E8000
trusted library allocation
page read and write
A70000
heap
page read and write
65A000
stack
page read and write
10FC000
stack
page read and write
27495E30000
heap
page read and write
FA0000
unkown
page readonly
27496050000
trusted library allocation
page read and write
750000
unkown
page readonly
8F0000
heap
page read and write
10020000
heap
page read and write
760000
unkown
page readonly
C6F4000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
A98000
heap
page read and write
C6E000
unkown
page readonly
7FF5ED5CE000
unkown
page readonly
2400000
unkown
page readonly
2720000
unkown
page readonly
A29E000
stack
page read and write
122FD000
stack
page read and write
1FDB05E7000
unkown
page read and write
1F500075A000
unkown
page read and write
2DA0000
heap
page read and write
C60000
unkown
page readonly
2A85000
heap
page read and write
2A5D000
heap
page read and write
BD0000
unkown
page readonly
23F0000
heap
page read and write
A5000254000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
785D000
unkown
page read and write
760000
heap
page read and write
590000
unkown
page read and write
233BC886000
heap
page read and write
30A0000
unkown
page readonly
140000
unkown
page readonly
C50000
unkown
page read and write
550000
unkown
page read and write
CA08000
unkown
page read and write
1120000
unkown
page readonly
B7C000
stack
page read and write
40000
unkown
page readonly
1247D000
stack
page read and write
BC0000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
27495E20000
heap
page read and write
785B000
unkown
page read and write
580000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
675FBFE000
unkown
page readonly
940000
heap
page read and write
2A60000
heap
page read and write
2B08000
heap
page read and write
7FF5ED697000
unkown
page readonly
233BC82F000
heap
page read and write
8FB000
stack
page read and write
826000
heap
page read and write
1F50013F4000
unkown
page read and write
B10000
unkown
page readonly
1F5000C84000
unkown
page read and write
117C000
stack
page read and write
79D3000
unkown
page read and write
7FF5ED64F000
unkown
page readonly
1FDA95E0000
unkown
page readonly
46C000
unkown
page readonly
EB0000
unkown
page readonly
B00000
unkown
page readonly
1080000
heap
page read and write
9869000
unkown
page read and write
AF8D000
stack
page read and write
1F5000B88000
unkown
page read and write
23DC2C8E000
heap
page read and write
C52C000
unkown
page read and write
2430000
unkown
page readonly
DC0000
heap
page read and write
D10000
unkown
page readonly
910000
unkown
page readonly
7FF5ED849000
unkown
page readonly
67743FE000
unkown
page read and write
1461000
unkown
page readonly
2570000
heap
page read and write
FE1000
unkown
page readonly
1AC000
stack
page read and write
1FDAFD50000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
8D0000
unkown
page readonly
A37D000
unkown
page read and write
1F5001CE4000
trusted library allocation
page read and write
7FF5ED928000
unkown
page readonly
1F0000
unkown
page readonly
C89C000
unkown
page read and write
677D3FE000
unkown
page read and write
27498DE0000
heap
page read and write
400000
unkown
page readonly
27495EB1000
heap
page read and write
5D5000
heap
page read and write
233BC730000
trusted library allocation
page read and write
1420000
unkown
page readonly
560000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
1F5001CE4000
trusted library allocation
page read and write
A60000
unkown
page readonly
C75000
unkown
page read and write
30BF000
stack
page read and write
7E8000
heap
page read and write
1F50000A4000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
1180000
heap
page read and write
A008EFB000
stack
page read and write
A095000
stack
page read and write
1FDAF07E000
unkown
page read and write
C6E000
unkown
page readonly
6764BFE000
unkown
page readonly
BD0000
unkown
page readonly
233BC876000
heap
page read and write
233BC83C000
heap
page read and write
1F50002A4000
trusted library allocation
page read and write
1F5001880000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
2C60000
heap
page read and write
5F0000
unkown
page read and write
97C3000
unkown
page read and write
1000000
unkown
page readonly
43A000
stack
page read and write
E90000
unkown
page readonly
580000
unkown
page readonly
A008CFE000
stack
page read and write
2B64000
heap
page read and write
8C8000
heap
page read and write
1FDA8E20000
unkown
page read and write
9877000
unkown
page read and write
7FF5ED40D000
unkown
page readonly
12D0000
unkown
page read and write
7B80000
unkown
page read and write
1F5000058000
unkown
page read and write
6752A96000
unkown
page read and write
7FF71AE92000
unkown
page read and write
C75000
unkown
page read and write
1F5001158000
trusted library allocation
page read and write
431000
unkown
page read and write
BF0000
unkown
page readonly
1F5001798000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
3889000
heap
page read and write
8FC000
stack
page read and write
3209000
stack
page read and write
233BC886000
heap
page read and write
1F5001CE4000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
33B9000
stack
page read and write
1120000
unkown
page readonly
1F5000CE0000
unkown
page read and write
7F6000
heap
page read and write
7FF5ED806000
unkown
page readonly
8D6B000
stack
page read and write
D10000
unkown
page readonly
7FF5ED4A1000
unkown
page readonly
7FF5ED81B000
unkown
page readonly
1F5000F10000
unkown
page read and write
1010000
unkown
page read and write
1FDAC4E0000
unkown
page read and write
7D8000
heap
page read and write
BE0000
heap
page read and write
1F0000
unkown
page readonly
3893000
heap
page read and write
C77000
unkown
page readonly
3887000
heap
page read and write
2C40000
unkown
page readonly
B90000
heap
page read and write
7FF5ED33F000
unkown
page readonly
7FF5ED337000
unkown
page readonly
1F50001AC000
unkown
page read and write
7FF75C4AD000
unkown
page readonly
819000
heap
page read and write
C6E000
unkown
page readonly
1F5001CE4000
trusted library allocation
page read and write
C40000
heap
page read and write
34E9000
stack
page read and write
233BC87E000
heap
page read and write
1F500115A000
trusted library allocation
page read and write
AADB000
unkown
page read and write
2749A9B2000
heap
page read and write
787C000
unkown
page read and write
3791000
unkown
page read and write
F90000
heap
page read and write
36D5000
stack
page read and write
7FF5ED42B000
unkown
page readonly
1F50008AC000
unkown
page read and write
7DF4F3031000
unkown
page execute read
9A066FB000
stack
page read and write
7FF5ED43D000
unkown
page readonly
4C4B000
unkown
page read and write
E00000
heap
page read and write
2E24000
heap
page read and write
18E1000
unkown
page readonly
14B1000
unkown
page readonly
6760BFE000
unkown
page readonly
D90000
unkown
page readonly
C90000
unkown
page readonly
9BD76FD000
stack
page read and write
1F50010E4000
unkown
page read and write
1F5000C01000
unkown
page read and write
1F5002430000
trusted library allocation
page read and write
1F50018CC000
unkown
page read and write
1290000
heap
page read and write
7FF5ED94A000
unkown
page readonly
274A19E1000
heap
page read and write
233BC730000
trusted library allocation
page read and write
27C0000
heap
page read and write
1241000
unkown
page readonly
37F6000
unkown
page read and write
128A0000
unkown
page read and write
B74000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
7FF5ED77C000
unkown
page readonly
13A4000
heap
page read and write
B01000
unkown
page readonly
2530000
heap
page read and write
2D40000
heap
page read and write
1F5000F90000
unkown
page read and write
1FDACC60000
unkown
page read and write
F88000
heap
page read and write
1F500015C000
unkown
page read and write
890000
heap
page read and write
819000
heap
page read and write
3950000
remote allocation
page read and write
C01000
unkown
page readonly
1021000
unkown
page readonly
1F500115A000
trusted library allocation
page read and write
B150000
unkown
page read and write
14B0000
unkown
page readonly
7E0000
unkown
page read and write
6B0000
heap
page read and write
7FF5ED534000
unkown
page readonly
13D0000
unkown
page readonly
C6E000
unkown
page readonly
1F50008D4000
unkown
page read and write
36F0000
unkown
page readonly
590000
unkown
page read and write
1140000
unkown
page read and write
C6E000
unkown
page readonly
7FF71ABE0000
unkown
page readonly
11D0000
unkown
page read and write
310E000
stack
page read and write
233BC730000
trusted library allocation
page read and write
29B0000
heap
page read and write
A4AB000
unkown
page read and write
DD0000
unkown
page readonly
A491000
unkown
page read and write
9871000
unkown
page read and write
18D1000
unkown
page readonly
7FF5ED495000
unkown
page readonly
1F5001548000
unkown
page read and write
DC0000
unkown
page readonly
1F5000338000
trusted library allocation
page read and write
40A000
unkown
page read and write
7FF5ED7D6000
unkown
page readonly
27F4000
heap
page read and write
1FDAEB17000
unkown
page read and write
F98000
heap
page read and write
233BC730000
trusted library allocation
page read and write
1F500115A000
trusted library allocation
page read and write
DD0000
unkown
page readonly
1540000
unkown
page readonly
7FF5ED586000
unkown
page readonly
83D000
heap
page read and write
5B0000
unkown
page readonly
5E0000
heap
page read and write
C61000
unkown
page execute read
233BC730000
trusted library allocation
page read and write
2530000
heap
page read and write
7859000
unkown
page read and write
1FDB0DD0000
unkown
page read and write
2380000
heap
page read and write
F80000
heap
page read and write
1F50002F3000
unkown
page read and write
16E0000
unkown
page readonly
2680000
unkown
page readonly
1F5001158000
trusted library allocation
page read and write
98A8000
unkown
page read and write
FA73000
unkown
page read and write
27498BA0000
heap
page read and write
C75000
unkown
page read and write
83D000
heap
page read and write
CAF3000
unkown
page read and write
1F50000DC000
unkown
page read and write
1F5000757000
unkown
page read and write
C60000
unkown
page readonly
9A05DFF000
stack
page read and write
7FF5EDA08000
unkown
page readonly
1260000
unkown
page read and write
1F5001AC4000
trusted library allocation
page read and write
B90000
heap
page read and write
7B0000
unkown
page readonly
C51E000
unkown
page read and write
FF04000
unkown
page read and write
2710000
heap
page read and write
408000
unkown
page readonly
7FF71AE4B000
unkown
page readonly
233BC720000
remote allocation
page read and write
B80000
unkown
page readonly
80F000
heap
page read and write
E60000
heap
page read and write
1FDAF072000
unkown
page read and write
9A076FE000
stack
page read and write
7FF5ED3D0000
unkown
page readonly
C557000
unkown
page read and write
2EF0000
heap
page read and write
B5AE000
stack
page read and write
3F0000
unkown
page readonly
2D30000
unkown
page readonly
801000
heap
page read and write
C60000
unkown
page readonly
A10000
heap
page read and write
DD0000
unkown
page read and write
4C18000
unkown
page read and write
7900000
unkown
page read and write
27498709000
heap
page read and write
819000
heap
page read and write
804000
heap
page read and write
1F500113C000
unkown
page read and write
233BC82A000
heap
page read and write
3889000
heap
page read and write
C61000
unkown
page execute read
7CA0000
unkown
page read and write
C6C9000
unkown
page read and write
3893000
heap
page read and write
C61000
unkown
page execute read
C75000
unkown
page read and write
11E0000
heap
page read and write
4B8B000
unkown
page read and write
C503000
unkown
page read and write
E00000
heap
page read and write
9A05AFF000
stack
page read and write
67783FE000
unkown
page read and write
1160000
unkown
page readonly
1F50002C4000
unkown
page read and write
7F6000
heap
page read and write
FEEC000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
436000
unkown
page read and write
3090000
heap
page read and write
7F0000
heap
page read and write
27498E40000
heap
page read and write
7FF5ED695000
unkown
page readonly
768000
heap
page read and write
9A07CFF000
stack
page read and write
233BC893000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
1260000
unkown
page read and write
C60000
unkown
page readonly
9A05EFD000
stack
page read and write
CE0000
unkown
page readonly
B140000
unkown
page readonly
A60000
unkown
page read and write
7FF5ED445000
unkown
page readonly
9A067FA000
stack
page read and write
29C0000
unkown
page readonly
C75000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
7FF5ED43A000
unkown
page readonly
9869000
unkown
page read and write
2680000
unkown
page readonly
978E000
unkown
page read and write
1F5000BD4000
unkown
page read and write
387F000
heap
page read and write
C90000
unkown
page readonly
150000
unkown
page readonly
CB83000
unkown
page read and write
1E0000
unkown
page readonly
1FDA8CC8000
unkown
page read and write
C00000
unkown
page read and write
A20000
unkown
page read and write
1F500160C000
unkown
page read and write
2810000
unkown
page readonly
1E0000
unkown
page readonly
80F000
heap
page read and write
6757BFE000
unkown
page readonly
1FDA8BE7000
heap
page read and write
977A000
unkown
page read and write
AADB000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
C89C000
unkown
page read and write
760000
unkown
page readonly
7FF5EDA31000
unkown
page readonly
1F5001360000
unkown
page read and write
7C0000
unkown
page readonly
112E4000
unkown
page read and write
3896000
heap
page read and write
2674000
heap
page read and write
DE0000
unkown
page readonly
C30000
unkown
page read and write
F90000
heap
page read and write
1120000
unkown
page readonly
C50000
unkown
page read and write
112AD000
stack
page read and write
8710000
unkown
page readonly
12C0000
unkown
page read and write
2AD9000
heap
page read and write
46E000
unkown
page readonly
27498900000
heap
page read and write
C61000
unkown
page execute read
37BD000
unkown
page read and write
1F5000721000
unkown
page read and write
1F5000C8C000
unkown
page read and write
13B0000
heap
page read and write
233BAA44000
heap
page read and write
3889000
heap
page read and write
4A0000
unkown
page readonly
43A000
stack
page read and write
27495EC3000
heap
page read and write
388C000
heap
page read and write
B10000
unkown
page read and write
4B50000
unkown
page read and write
9B0000
unkown
page readonly
8208000
stack
page read and write
42F000
unkown
page read and write
990000
unkown
page readonly
C60000
unkown
page readonly
7C0000
unkown
page readonly
126FD000
stack
page read and write
7C0000
heap
page read and write
27498F1E000
heap
page read and write
AFC000
stack
page read and write
1F50012E0000
unkown
page read and write
9A069FA000
stack
page read and write
2F4F000
stack
page read and write
800000
unkown
page readonly
9977000
unkown
page read and write
401000
unkown
page execute read
233BC730000
trusted library allocation
page read and write
B90000
heap
page read and write
930000
heap
page read and write
274986F2000
heap
page read and write
778000
heap
page read and write
4CC0000
unkown
page read and write
BB0000
unkown
page readonly
1F50006EC000
unkown
page read and write
A74000
heap
page read and write
1F5000750000
unkown
page read and write
23DC2C6C000
heap
page read and write
21E4000
heap
page read and write
1F50021F0000
trusted library allocation
page read and write
1440000
unkown
page read and write
2530000
unkown
page readonly
7E8000
heap
page read and write
72A000
stack
page read and write
C75000
unkown
page read and write
1F5000340000
trusted library allocation
page read and write
7FF9000
stack
page read and write
1F500115A000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
3795000
unkown
page read and write
11F8000
heap
page read and write
9A10000
unkown
page read and write
2B0F000
heap
page read and write
7FF5ED476000
unkown
page readonly
2AD3000
heap
page read and write
7FF5ED1D0000
unkown
page readonly
5F0000
unkown
page readonly
388C000
heap
page read and write
7BD000
heap
page read and write
67633FE000
unkown
page read and write
1F5000340000
unkown
page read and write
B00E000
stack
page read and write
11D0000
unkown
page readonly
C61000
unkown
page execute read
836000
heap
page read and write
D90000
unkown
page readonly
3F0000
unkown
page readonly
710000
heap
page read and write
BC0000
unkown
page readonly
C60000
unkown
page readonly
23DC2C61000
heap
page read and write
7E0000
unkown
page read and write
13E8000
heap
page read and write
7D40000
unkown
page read and write
B170000
unkown
page readonly
822000
heap
page read and write
2800000
heap
page read and write
C75000
unkown
page read and write
1050000
unkown
page readonly
2430000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
7DF4F3030000
unkown
page readonly
FC0000
heap
page read and write
1F5000A38000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
B5AE000
stack
page read and write
25D0000
heap
page read and write
836000
heap
page read and write
A10000
heap
page read and write
AB8000
heap
page read and write
C77000
unkown
page readonly
C75000
unkown
page read and write
42B000
unkown
page read and write
400000
unkown
page readonly
C75000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
870000
unkown
page readonly
C61000
unkown
page execute read
A361000
unkown
page read and write
BA0000
unkown
page readonly
C50000
unkown
page readonly
1FDAAAD3000
heap
page read and write
7FF5ED46A000
unkown
page readonly
581000
unkown
page readonly
27F0000
heap
page read and write
7E0000
unkown
page readonly
9879000
unkown
page read and write
C61000
unkown
page execute read
2AD9000
heap
page read and write
2ABA000
heap
page read and write
5D0000
unkown
page readonly
7FF5ED4EF000
unkown
page readonly
2390000
heap
page read and write
3889000
heap
page read and write
7FF5ED4BB000
unkown
page readonly
C51000
unkown
page readonly
7FF5ED265000
unkown
page readonly
1095000
stack
page read and write
C5AA000
unkown
page read and write
7FF5ED409000
unkown
page readonly
1F5001344000
unkown
page read and write
18D0000
unkown
page readonly
12B0000
unkown
page read and write
1780000
unkown
page readonly
804000
heap
page read and write
C6CF000
unkown
page read and write
2FF0000
heap
page read and write
21A0000
heap
page read and write
7FF5ED503000
unkown
page readonly
7859000
unkown
page read and write
AB0000
unkown
page readonly
9C0000
unkown
page readonly
1F5000338000
unkown
page read and write
1F5000AE9000
unkown
page read and write
97AD000
unkown
page read and write
8C0000
unkown
page readonly
3878000
heap
page read and write
900000
unkown
page readonly
1020000
unkown
page readonly
2A10000
unkown
page readonly
675BBFE000
unkown
page readonly
3883000
heap
page read and write
AF0B000
stack
page read and write
520000
heap
page read and write
2EA0000
heap
page read and write
1FDA8ED0000
unkown
page readonly
7FF5ED8AC000
unkown
page readonly
2AE6000
heap
page read and write
C60000
unkown
page readonly
274986A0000
heap
page read and write
C75000
unkown
page read and write
610000
unkown
page readonly
5F1000
unkown
page readonly
81E000
heap
page read and write
7FF5ED39B000
unkown
page readonly
C6F4000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
2C30000
heap
page read and write
2B0C000
heap
page read and write
1460000
unkown
page readonly
B2A000
stack
page read and write
67763FE000
unkown
page read and write
7F40000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
7FF5ED4EF000
unkown
page readonly
C90000
unkown
page readonly
720000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
7FF5ED409000
unkown
page readonly
7FF71AE92000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
7FF5ED93B000
unkown
page readonly
7FF5ED77E000
unkown
page readonly
5F5000
heap
page read and write
896B000
stack
page read and write
27495F4E000
heap
page read and write
C57F000
unkown
page read and write
BD0000
unkown
page read and write
1268000
heap
page read and write
1FDA8C1C000
heap
page read and write
760000
unkown
page readonly
1F5000EAC000
unkown
page read and write
1380000
unkown
page read and write
DF0000
heap
page read and write
233BC730000
trusted library allocation
page read and write
9871000
unkown
page read and write
1F5000C68000
unkown
page read and write
7FF5ED3A7000
unkown
page readonly
C503000
unkown
page read and write
17F0000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
233BA930000
heap
page read and write
233BC730000
trusted library allocation
page read and write
27498E46000
heap
page read and write
1F500146C000
unkown
page read and write
804000
heap
page read and write
113C000
stack
page read and write
67613FE000
unkown
page read and write
C61000
unkown
page execute read
7FF5ED519000
unkown
page readonly
BA0000
heap
page read and write
8E0000
unkown
page readonly
103A000
stack
page read and write
1002A000
heap
page read and write
7FF5ED55F000
unkown
page readonly
A5000201000
unkown
page read and write
A3BE000
unkown
page read and write
5A0000
heap
page read and write
7FF5EDA69000
unkown
page readonly
2E54000
heap
page read and write
B190000
unkown
page read and write
9D63000
unkown
page read and write
7FF5ED642000
unkown
page readonly
819000
heap
page read and write
7FF5ED956000
unkown
page readonly
8D6B000
stack
page read and write
2690000
unkown
page read and write
4B0000
unkown
page readonly
2A52000
heap
page read and write
7FF5ED1CC000
unkown
page readonly
1F500240C000
trusted library allocation
page read and write
8000000
unkown
page read and write
51A000
stack
page read and write
560000
unkown
page readonly
6752A7A000
unkown
page read and write
2AE9000
heap
page read and write
7CE000
heap
page read and write
1A0000
unkown
page readonly
760000
heap
page read and write
C00000
unkown
page read and write
C77000
unkown
page readonly
379E000
unkown
page read and write
3873000
heap
page read and write
C10000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
8F0000
unkown
page read and write
330000
unkown
page readonly
DB0000
unkown
page readonly
9A075FE000
stack
page read and write
8A6E000
stack
page read and write
DE0000
heap
page read and write
1F500240C000
trusted library allocation
page read and write
10022000
heap
page read and write
7953000
unkown
page read and write
940000
heap
page read and write
388C000
heap
page read and write
7F30000
unkown
page read and write
7FF5ED519000
unkown
page readonly
BD98000
stack
page read and write
804000
heap
page read and write
23F0000
heap
page read and write
4BDC000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
1F5001A58000
trusted library allocation
page read and write
D10000
heap
page read and write
C7C5000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
BDA0000
unkown
page readonly
7FF5ED85F000
unkown
page readonly
12D0000
heap
page read and write
804000
heap
page read and write
7E0000
unkown
page read and write
DF0000
unkown
page read and write
790000
heap
page read and write
4CD0000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
2DB0000
unkown
page readonly
C6E000
unkown
page readonly
7FF71AE93000
unkown
page write copy
457000
unkown
page read and write
9D0000
heap
page read and write
7863000
unkown
page read and write
13A0000
heap
page read and write
76C0000
unkown
page read and write
97B5000
unkown
page read and write
710000
unkown
page readonly
854000
heap
page read and write
C61000
unkown
page execute read
93A000
stack
page read and write
233BC730000
trusted library allocation
page read and write
3883000
heap
page read and write
C75000
unkown
page read and write
B01000
unkown
page readonly
C61000
unkown
page execute read
1F5000401000
unkown
page read and write
B60000
unkown
page read and write
C6D8000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
7DF4F3061000
unkown
page execute read
C77000
unkown
page readonly
433000
unkown
page read and write
C60000
unkown
page readonly
786B000
unkown
page read and write
274986EB000
heap
page read and write
C61000
unkown
page execute read
9D0000
heap
page read and write
2704000
heap
page read and write
C61000
unkown
page execute read
1F50022B0000
trusted library allocation
page read and write
7F0000
unkown
page readonly
2E30000
unkown
page readonly
233BC876000
heap
page read and write
6FD000
stack
page read and write
1FDACC77000
unkown
page read and write
7FF5ED433000
unkown
page readonly
130000
unkown
page readonly
20FF000
stack
page read and write
233BC730000
trusted library allocation
page read and write
1540000
unkown
page readonly
900000
unkown
page read and write
78B000
stack
page read and write
1F5000FD2000
unkown
page read and write
610000
unkown
page readonly
580000
unkown
page readonly
310E000
stack
page read and write
6752A5E000
unkown
page read and write
2E20000
heap
page read and write
BAF9000
stack
page read and write
4B56000
unkown
page read and write
C50000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
23DC2C72000
heap
page read and write
C61000
unkown
page execute read
9D62000
unkown
page read and write
97D4000
unkown
page read and write
C00000
unkown
page readonly
45F000
unkown
page readonly
27498E00000
heap
page read and write
A40000
trusted library allocation
page read and write
490000
unkown
page readonly
117B000
stack
page read and write
BF1000
unkown
page readonly
C10A000
stack
page read and write
9A071FE000
stack
page read and write
233BAB70000
trusted library allocation
page read and write
1270000
unkown
page readonly
1F50021F0000
trusted library allocation
page read and write
3881000
heap
page read and write
7FF5ED1B5000
unkown
page readonly
DE0000
unkown
page readonly
1FDAEFA3000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
1F500098F000
unkown
page read and write
A5000288000
unkown
page read and write
580000
unkown
page readonly
2E24000
heap
page read and write
70A000
stack
page read and write
9A05FFB000
stack
page read and write
D69000
stack
page read and write
C6E000
unkown
page readonly
2E60000
heap
page read and write
1211000
unkown
page readonly
C77000
unkown
page readonly
CA0000
unkown
page readonly
7FF5ED507000
unkown
page readonly
1F5001DE8000
trusted library allocation
page read and write
AAD1000
unkown
page read and write
1FDADEA0000
unkown
page read and write
C4D0000
unkown
page read and write
9893000
unkown
page read and write
840000
unkown
page readonly
C6F8000
unkown
page read and write
1F500041C000
unkown
page read and write
7FF71AEB9000
unkown
page read and write
C60000
unkown
page readonly
27495E8F000
heap
page read and write
3756000
unkown
page read and write
640000
heap
page read and write
2700000
heap
page read and write
B40000
unkown
page read and write
861000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
8108000
stack
page read and write
9E0000
unkown
page read and write
1F5000667000
unkown
page read and write
BC0000
unkown
page readonly
7FE000
heap
page read and write
710000
heap
page read and write
A5000244000
unkown
page read and write
1B0000
unkown
page readonly
590000
heap
page read and write
804000
heap
page read and write
9A058F7000
stack
page read and write
9A06EFF000
stack
page read and write
82B000
heap
page read and write
9795000
unkown
page read and write
C75000
unkown
page read and write
3AA000
stack
page read and write
9A05BFE000
stack
page read and write
C89A000
unkown
page read and write
400000
unkown
page readonly
25C0000
heap
page read and write
32B0000
trusted library allocation
page read and write
8210000
unkown
page read and write
1F500018C000
unkown
page read and write
B650000
unkown
page read and write
8720000
unkown
page readonly
C60000
unkown
page readonly
1FDAEAD0000
unkown
page read and write
7F30000
unkown
page read and write
1F500097C000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
2DA0000
heap
page read and write
35A0000
unkown
page readonly
7FF5EDA11000
unkown
page readonly
1F5000040000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
387F000
heap
page read and write
1F5001328000
unkown
page read and write
2ED0000
unkown
page readonly
1410000
heap
page read and write
DE1000
unkown
page readonly
7FF71AE4B000
unkown
page readonly
510000
unkown
page readonly
1F5000D77000
unkown
page read and write
2ACC000
heap
page read and write
EF0000
unkown
page readonly
8B0000
unkown
page readonly
27498E24000
heap
page read and write
550000
unkown
page read and write
987F000
unkown
page read and write
900000
unkown
page readonly
CB0000
unkown
page readonly
79FB000
unkown
page read and write
3889000
heap
page read and write
4F0000
unkown
page readonly
1F50005A8000
unkown
page read and write
880000
heap
page read and write
DB0000
unkown
page readonly
B94000
heap
page read and write
8720000
unkown
page readonly
DC0000
unkown
page readonly
560000
unkown
page readonly
3865000
heap
page read and write
1090000
unkown
page readonly
FAB6000
unkown
page read and write
1020000
unkown
page readonly
6752A5A000
unkown
page read and write
C20000
unkown
page readonly
6763BFE000
unkown
page readonly
C6E000
unkown
page readonly
4FC000
stack
page read and write
810000
heap
page read and write
1F50002A4000
trusted library allocation
page read and write
A3BE000
unkown
page read and write
274986E5000
heap
page read and write
C60000
unkown
page readonly
AAF6000
unkown
page read and write
1F5000894000
unkown
page read and write
7FF5ED516000
unkown
page readonly
23DC2C5E000
heap
page read and write
1F5000F7C000
unkown
page read and write
1F500115A000
trusted library allocation
page read and write
9883000
unkown
page read and write
804000
heap
page read and write
760000
heap
page read and write
27496135000
heap
page read and write
3791000
unkown
page read and write
6771BFE000
unkown
page readonly
26BE000
stack
page read and write
700000
unkown
page readonly
27498766000
heap
page read and write
1F50022E8000
trusted library allocation
page read and write
9815000
unkown
page read and write
C77000
unkown
page readonly
67663FE000
unkown
page readonly
1210000
unkown
page read and write
9C0000
heap
page read and write
1F50002A4000
trusted library allocation
page read and write
C61000
unkown
page execute read
ED0000
heap
page read and write
B8B0000
unkown
page read and write
1460000
unkown
page readonly
804000
heap
page read and write
7FF5ED803000
unkown
page readonly
933F000
stack
page read and write
9A05CFE000
stack
page read and write
9A075FB000
stack
page read and write
C92D000
unkown
page read and write
A361000
unkown
page read and write
7FF5ED445000
unkown
page readonly
408000
unkown
page readonly
1F500034C000
trusted library allocation
page read and write
10D0000
heap
page read and write
1510000
unkown
page readonly
920000
heap
page read and write
C61000
unkown
page execute read
1FDAF23D000
unkown
page read and write
9EE000
stack
page read and write
6752A54000
unkown
page read and write
C6E000
unkown
page readonly
27496050000
trusted library allocation
page read and write
808000
heap
page read and write
D18000
heap
page read and write
1F50012D4000
unkown
page read and write
27498BD0000
heap
page read and write
B8AB000
stack
page read and write
7FF5ED1D7000
unkown
page readonly
2390000
heap
page read and write
27498E21000
heap
page read and write
ACA000
stack
page read and write
233BC730000
trusted library allocation
page read and write
BB0000
unkown
page read and write
C77000
unkown
page readonly
112B4000
unkown
page read and write
7A34000
unkown
page read and write
91B9000
stack
page read and write
1F50004E0000
unkown
page read and write
4CD0000
unkown
page read and write
23DC2C00000
heap
page read and write
1F5001A58000
trusted library allocation
page read and write
1F500004C000
unkown
page read and write
22A0000
unkown
page readonly
DA0000
unkown
page readonly
CA20000
unkown
page read and write
67673FE000
unkown
page readonly
7FF5ED24C000
unkown
page readonly
9873000
unkown
page read and write
C6E000
unkown
page readonly
1F5001058000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
12D8000
heap
page read and write
36BE000
stack
page read and write
1F50005C0000
unkown
page read and write
370E000
stack
page read and write
7DF4F3071000
unkown
page execute read
838000
heap
page read and write
27495E70000
heap
page read and write
53C000
stack
page read and write
9A078FC000
stack
page read and write
92BF000
stack
page read and write
21E0000
heap
page read and write
1F500071C000
unkown
page read and write
B70000
unkown
page readonly
7FF5ED750000
unkown
page readonly
BA0000
unkown
page readonly
797D000
unkown
page read and write
B629000
stack
page read and write
9E0000
unkown
page read and write
1630000
unkown
page readonly
1F5001601000
unkown
page read and write
804000
heap
page read and write
1F5001570000
unkown
page read and write
675CBFE000
unkown
page readonly
27495F58000
heap
page read and write
BE0000
heap
page read and write
EF0000
heap
page read and write
7FF5ED50A000
unkown
page readonly
979C000
unkown
page read and write
1FDAEDC2000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
1F5000CA0000
unkown
page read and write
82F000
heap
page read and write
C75000
unkown
page read and write
C60000
unkown
page readonly
667000
heap
page read and write
1F0000
unkown
page readonly
233BC81E000
heap
page read and write
233BC730000
trusted library allocation
page read and write
A4FC000
unkown
page read and write
6B0000
unkown
page readonly
3F0000
unkown
page readonly
689000
stack
page read and write
385D000
heap
page read and write
1270000
unkown
page readonly
C77000
unkown
page readonly
6B0000
heap
page read and write
1F5000F32000
unkown
page read and write
40A000
unkown
page write copy
C6F2000
unkown
page read and write
8FC000
stack
page read and write
C60000
unkown
page readonly
1010000
unkown
page readonly
1F50006C5000
unkown
page read and write
E51B000
stack
page read and write
C77000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
C61000
unkown
page execute read
2624000
heap
page read and write
E00000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
3881000
heap
page read and write
56D9000
unkown
page read and write
AA000
stack
page read and write
2B70000
unkown
page readonly
7FF5ED28E000
unkown
page readonly
1F5001158000
trusted library allocation
page read and write
27F0000
heap
page read and write
5E0000
heap
page read and write
920000
unkown
page readonly
1F5000201000
unkown
page read and write
D00000
unkown
page readonly
7FF75C471000
unkown
page execute read
7FF5ED279000
unkown
page readonly
3886000
heap
page read and write
AB58000
unkown
page read and write
676A3FE000
unkown
page readonly
320000
unkown
page readonly
2D40000
heap
page read and write
AB0000
heap
page read and write
C30000
unkown
page read and write
340000
unkown
page readonly
1440000
heap
page read and write
8B60000
unkown
page readonly
7852000
unkown
page read and write
400000
unkown
page readonly
C893000
unkown
page read and write
BD0000
unkown
page readonly
5CA000
stack
page read and write
C1A000
stack
page read and write
87F0000
heap
page read and write
2534000
heap
page read and write
804000
heap
page read and write
1FDAEFA0000
unkown
page readonly
AC0000
unkown
page readonly
C61000
unkown
page execute read
C61000
unkown
page execute read
C6E000
unkown
page readonly
9798000
unkown
page read and write
1F5000BE0000
unkown
page read and write
DF0000
heap
page read and write
2740000
heap
page read and write
1F5000662000
unkown
page read and write
C6E000
unkown
page readonly
23DC2C92000
heap
page read and write
9893000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
7FF5ED4DF000
unkown
page readonly
1F5001001000
unkown
page read and write
BDC0000
unkown
page readonly
550000
unkown
page readonly
500000
unkown
page readonly
C41F000
stack
page read and write
1240000
heap
page read and write
7FC000
heap
page read and write
1F50021F0000
trusted library allocation
page read and write
A375000
unkown
page read and write
7F5000
heap
page read and write
C700000
unkown
page read and write
AA000
stack
page read and write
510000
unkown
page readonly
898000
heap
page read and write
1F5000C4B000
unkown
page read and write
C30000
unkown
page read and write
6767BFC000
unkown
page read and write
A479000
unkown
page read and write
C77000
unkown
page readonly
30000
unkown
page readonly
27495ECB000
heap
page read and write
804000
heap
page read and write
1F5001141000
unkown
page read and write
11B0000
unkown
page readonly
1FDACA97000
unkown
page read and write
7D81000
unkown
page read and write
2A60000
unkown
page readonly
1F50004F8000
unkown
page read and write
12D0000
unkown
page read and write
8210000
unkown
page read and write
C75000
unkown
page read and write
13F0000
unkown
page readonly
112B0000
unkown
page read and write
1F5000574000
unkown
page read and write
F9BB000
unkown
page read and write
388B000
heap
page read and write
7FF5ED449000
unkown
page readonly
5590000
unkown
page write copy
AF0000
unkown
page readonly
A40000
heap
page read and write
1F5000748000
unkown
page read and write
7953000
unkown
page read and write
D90000
unkown
page readonly
870000
unkown
page readonly
C6E000
unkown
page readonly
1F5001401000
unkown
page read and write
1F500007B000
unkown
page read and write
819000
heap
page read and write
C60000
unkown
page readonly
B3C000
stack
page read and write
C41000
unkown
page readonly
7C0000
heap
page read and write
FE1000
unkown
page readonly
233BAA06000
heap
page read and write
700000
unkown
page readonly
233BC831000
heap
page read and write
400000
unkown
page readonly
11F8000
heap
page read and write
C75000
unkown
page read and write
11D0000
unkown
page readonly
2580000
unkown
page readonly
A5000217000
unkown
page read and write
9875000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
233BC828000
heap
page read and write
DF0000
unkown
page read and write
9A5B000
unkown
page read and write
45D000
unkown
page readonly
8FC000
stack
page read and write
7FF5ED530000
unkown
page readonly
27497CF0000
heap
page read and write
7FF5ED821000
unkown
page readonly
1F50010C0000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
1483000
heap
page read and write
C61000
unkown
page execute read
C77000
unkown
page readonly
2AE8000
heap
page read and write
2620000
heap
page read and write
D00000
unkown
page readonly
1F5000588000
unkown
page read and write
FAF4000
unkown
page read and write
1270000
heap
page read and write
1FDAC634000
unkown
page read and write
A375000
unkown
page read and write
3865000
heap
page read and write
F00000
unkown
page readonly
1F50003F6000
trusted library allocation
page read and write
677B3FD000
unkown
page read and write
1230000
unkown
page read and write
DD0000
heap
page read and write
18A0000
unkown
page readonly
7857000
unkown
page read and write
826000
heap
page read and write
8730000
unkown
page read and write
70E000
stack
page read and write
7FF5ED1D7000
unkown
page readonly
7FF5ED449000
unkown
page readonly
7FF5ED412000
unkown
page readonly
2C40000
unkown
page readonly
7FF5ED418000
unkown
page readonly
7FF71ABE0000
unkown
page readonly
23DC2C59000
heap
page read and write
977A000
unkown
page read and write
1F50008E4000
unkown
page read and write
A379000
unkown
page read and write
3240000
unkown
page read and write
6B0000
unkown
page readonly
C90000
unkown
page readonly
11F0000
heap
page read and write
C60000
unkown
page readonly
C75000
unkown
page read and write
6752A58000
unkown
page read and write
819000
heap
page read and write
5D0000
unkown
page read and write
387F000
heap
page read and write
6A0000
unkown
page readonly
7FF5ED9E1000
unkown
page readonly
1F500106C000
unkown
page read and write
82F000
heap
page read and write
C91000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
986B000
unkown
page read and write
78AD000
unkown
page read and write
233BC856000
heap
page read and write
1F5000B73000
unkown
page read and write
C75000
unkown
page read and write
7FF5ED50A000
unkown
page readonly
33A0000
heap
page read and write
233BC730000
trusted library allocation
page read and write
DE0000
heap
page read and write
1538000
heap
page read and write
233BC730000
trusted library allocation
page read and write
80F000
heap
page read and write
27495EC4000
heap
page read and write
7D3000
heap
page read and write
36D5000
stack
page read and write
24A0000
unkown
page readonly
7FF5ED937000
unkown
page readonly
EE0000
unkown
page readonly
F50000
heap
page read and write
A00000
unkown
page readonly
97A9000
unkown
page read and write
274986C9000
heap
page read and write
C6E000
unkown
page readonly
CA7C000
unkown
page read and write
1100E000
stack
page read and write
1F5000ED0000
unkown
page read and write
12D1000
unkown
page readonly
7FF5ED872000
unkown
page readonly
2630000
heap
page read and write
7CC0000
unkown
page readonly
15B0000
unkown
page readonly
1FDADF15000
unkown
page read and write
7E0000
unkown
page readonly
B7AC000
stack
page read and write
A50002BC000
unkown
page read and write
27498570000
heap
page read and write
A391000
unkown
page read and write
7D1000
unkown
page readonly
387F000
heap
page read and write
E20000
heap
page read and write
233BAB70000
trusted library allocation
page read and write
2D60000
heap
page read and write
1FDACBC0000
unkown
page read and write
870000
unkown
page read and write
9A07EFC000
stack
page read and write
920000
unkown
page readonly
233BC887000
heap
page read and write
A21E000
stack
page read and write
1F5001CE4000
trusted library allocation
page read and write
1483000
heap
page read and write
C50A000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
38AC000
heap
page read and write
C90000
unkown
page readonly
7D53000
unkown
page read and write
233BAC05000
heap
page read and write
2A50000
heap
page read and write
7DF4F3040000
unkown
page readonly
CAFA000
unkown
page read and write
1F5000CB8000
unkown
page read and write
6752A76000
unkown
page read and write
7DF4F3030000
unkown
page readonly
1001000
unkown
page readonly
7FF71AEAF000
unkown
page read and write
1FDAEF80000
unkown
page readonly
4A0000
unkown
page readonly
9881000
unkown
page read and write
1350000
heap
page read and write
A5000230000
unkown
page read and write
7CC0000
unkown
page readonly
CB05000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
590000
heap
page read and write
BB0000
unkown
page read and write
1F5001A6C000
trusted library allocation
page read and write
7FF5ED39B000
unkown
page readonly
1F5002384000
unkown
page read and write
F90000
unkown
page readonly
7D0000
heap
page read and write
860000
unkown
page read and write
2EC4000
heap
page read and write
677A3FE000
unkown
page read and write
1FDA8EF0000
unkown
page read and write
1F50015BC000
unkown
page read and write
F20000
heap
page read and write
7D3000
heap
page read and write
9F0000
unkown
page read and write
B8B0000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
233BC876000
heap
page read and write
A0086F6000
stack
page read and write
1010000
unkown
page readonly
37B0000
unkown
page read and write
F5A000
stack
page read and write
23DC2BA0000
heap
page read and write
9873000
unkown
page read and write
C4A0000
unkown
page read and write
804000
heap
page read and write
C77000
unkown
page readonly
740000
unkown
page readonly
1F5000801000
unkown
page read and write
233BAA06000
heap
page read and write
E59A000
stack
page read and write
2A50000
heap
page read and write
233BAA72000
heap
page read and write
2A7D000
heap
page read and write
F28000
heap
page read and write
67753FE000
unkown
page read and write
2E60000
heap
page read and write
27495F5E000
heap
page read and write
A01C000
stack
page read and write
C544000
unkown
page read and write
1FDACCC0000
unkown
page read and write
1220000
unkown
page read and write
1F5000AAC000
unkown
page read and write
C75000
unkown
page read and write
B190000
unkown
page read and write
840000
unkown
page readonly
A7A000
stack
page read and write
6778BFE000
unkown
page readonly
FED1000
unkown
page read and write
500000
unkown
page readonly
1C0000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
D8D000
stack
page read and write
7FF5ED670000
unkown
page readonly
89C0000
unkown
page read and write
7852000
unkown
page read and write
1F50008F0000
unkown
page read and write
FA0000
unkown
page readonly
67683FE000
unkown
page readonly
A433000
unkown
page read and write
898000
heap
page read and write
C51000
unkown
page readonly
7FC000
heap
page read and write
233BC876000
heap
page read and write
7C0000
unkown
page read and write
1FDAEAF7000
unkown
page read and write
3748000
unkown
page read and write
C77000
unkown
page readonly
1F500034C000
trusted library allocation
page read and write
1F500030C000
unkown
page read and write
1F50010A6000
unkown
page read and write
1F5000F5C000
unkown
page read and write
5E0000
unkown
page readonly
7950000
unkown
page read and write
C00000
unkown
page read and write
840000
heap
page read and write
65A000
stack
page read and write
1150000
unkown
page readonly
12B0000
unkown
page read and write
18A0000
unkown
page readonly
C77000
unkown
page readonly
1F50005D0000
unkown
page read and write
A5000250000
unkown
page read and write
9550000
unkown
page readonly
700000
unkown
page readonly
B6A0000
heap
page read and write
1078000
heap
page read and write
C90000
unkown
page readonly
DB0000
unkown
page readonly
910000
unkown
page readonly
387A000
heap
page read and write
1F5000340000
trusted library allocation
page read and write
3883000
heap
page read and write
A80000
unkown
page read and write
274A23E1000
heap
page read and write
DD0000
heap
page read and write
7C0000
unkown
page readonly
1550000
unkown
page readonly
7F2E000
stack
page read and write
9090000
unkown
page readonly
7FF5ED5A8000
unkown
page readonly
410000
heap
page read and write
1F500109C000
unkown
page read and write
2800000
heap
page read and write
C10000
unkown
page readonly
1F5000490000
unkown
page read and write
819000
heap
page read and write
1FDADF1F000
unkown
page read and write
1FDAEC90000
trusted library section
page read and write
C30000
unkown
page readonly
20000
unkown
page readonly
B10000
unkown
page read and write
C6E000
unkown
page readonly
7FF5ED2A4000
unkown
page readonly
78A000
stack
page read and write
233BA996000
heap
page read and write
BB0000
unkown
page read and write
C6E000
unkown
page readonly
C60000
unkown
page readonly
1F5002424000
trusted library allocation
page read and write
24C0000
heap
page read and write
560000
unkown
page readonly
A5000234000
unkown
page read and write
A10000
unkown
page readonly
7FF5ED4B0000
unkown
page readonly
F9F4000
unkown
page read and write
7F6000
heap
page read and write
7FF5ED3F3000
unkown
page readonly
C512000
unkown
page read and write
C6E3000
unkown
page read and write
6752A56000
unkown
page read and write
C561000
unkown
page read and write
7FF5ED814000
unkown
page readonly
FABB000
unkown
page read and write
1F5000194000
unkown
page read and write
23DC2C6D000
heap
page read and write
982D000
unkown
page read and write
B80000
unkown
page readonly
2E4E000
stack
page read and write
DA0000
unkown
page read and write
274986FA000
heap
page read and write
12E0000
unkown
page read and write
234D000
stack
page read and write
1F5000B00000
unkown
page read and write
C6E000
unkown
page readonly
37F2000
unkown
page read and write
2ABD000
heap
page read and write
233BC730000
trusted library allocation
page read and write
1F5000C0C000
unkown
page read and write
11E0000
heap
page read and write
1F5000338000
trusted library allocation
page read and write
C75000
unkown
page read and write
1F5000B38000
unkown
page read and write
CBEB000
unkown
page read and write
8DA0000
unkown
page read and write
8D0000
unkown
page readonly
27498980000
heap
page read and write
3209000
stack
page read and write
C75000
unkown
page read and write
B6A0000
heap
page read and write
1257D000
stack
page read and write
233BC730000
trusted library allocation
page read and write
1F50010C8000
unkown
page read and write
21E0000
heap
page read and write
5641000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
675C3FC000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
E00000
heap
page read and write
3889000
heap
page read and write
2810000
unkown
page readonly
C77000
unkown
page readonly
B22B000
stack
page read and write
97A9000
unkown
page read and write
33B9000
stack
page read and write
454000
unkown
page read and write
7847000
unkown
page read and write
A323000
unkown
page read and write
1260000
heap
page read and write
1F50005E0000
unkown
page read and write
3090000
heap
page read and write
AF0000
unkown
page readonly
387F000
heap
page read and write
EF4000
heap
page read and write
7FF5ED412000
unkown
page readonly
C40000
unkown
page read and write
9D0000
unkown
page read and write
18E0000
unkown
page readonly
B728000
stack
page read and write
C61000
unkown
page execute read
27498DFA000
heap
page read and write
768000
heap
page read and write
2D44000
heap
page read and write
7FF5ED86B000
unkown
page readonly
1350000
unkown
page read and write
1F5000760000
unkown
page read and write
4CB0000
unkown
page read and write
1000000
unkown
page read and write
7FF5ED48A000
unkown
page readonly
FEEC000
unkown
page read and write
1F5001388000
unkown
page read and write
A50002FB000
unkown
page read and write
5CA000
stack
page read and write
2FF1000
heap
page read and write
CB8000
heap
page read and write
7D2000
heap
page read and write
2A85000
heap
page read and write
1FDACB30000
unkown
page read and write
C60000
unkown
page readonly
7FF71AEAF000
unkown
page read and write
DE0000
unkown
page read and write
C60000
unkown
page readonly
C6E000
unkown
page readonly
1240000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
80F000
heap
page read and write
3889000
heap
page read and write
A327000
unkown
page read and write
1600000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
C77000
unkown
page readonly
FAF4000
unkown
page read and write
7C0000
unkown
page readonly
677CBFE000
unkown
page readonly
233BC81F000
heap
page read and write
5C0000
unkown
page readonly
C60000
unkown
page readonly
1280000
heap
page read and write
27498DDF000
heap
page read and write
8D0000
unkown
page read and write
1448000
heap
page read and write
76A0000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
7FF5ED990000
unkown
page readonly
3950000
remote allocation
page read and write
A90000
heap
page read and write
7FF5ED3CE000
unkown
page readonly
D00000
unkown
page readonly
7FF71AEA8000
unkown
page read and write
1F5001158000
trusted library allocation
page read and write
3871000
heap
page read and write
1F5001420000
unkown
page read and write
56C3000
unkown
page read and write
C6F8000
unkown
page read and write
838000
heap
page read and write
785F000
unkown
page read and write
E08000
heap
page read and write
1240000
heap
page read and write
233BC853000
heap
page read and write
A49E000
unkown
page read and write
67733FC000
unkown
page read and write
1F50013B8000
unkown
page read and write
7FF5ED961000
unkown
page readonly
14B0000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
1F500064C000
unkown
page read and write
3867000
heap
page read and write
2EC0000
heap
page read and write
A008DFE000
stack
page read and write
40A000
unkown
page read and write
730000
heap
page read and write
C75000
unkown
page read and write
C563000
unkown
page read and write
233BA990000
heap
page read and write
DD0000
unkown
page readonly
819000
heap
page read and write
13B8000
heap
page read and write
7FF5ED986000
unkown
page readonly
1F5000550000
unkown
page read and write
C77000
unkown
page readonly
784A000
unkown
page read and write
6A0000
unkown
page readonly
1170000
unkown
page readonly
7F2E000
stack
page read and write
D80000
unkown
page read and write
700000
unkown
page readonly
7FF5ED7DB000
unkown
page readonly
7D20000
unkown
page readonly
67723FE000
unkown
page read and write
388D000
heap
page read and write
67533EF000
stack
page read and write
CBDD000
unkown
page read and write
980000
unkown
page readonly
56D9000
unkown
page read and write
233BC81E000
heap
page read and write
274992F8000
heap
page read and write
9A062FE000
stack
page read and write
1F50003F6000
unkown
page read and write
233BC893000
heap
page read and write
2F80000
remote allocation
page read and write
DB0000
unkown
page readonly
7FF5ED1BC000
unkown
page readonly
2E10000
unkown
page readonly
1F5001B58000
trusted library allocation
page read and write
7FF5ED8C1000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
233BA9B3000
heap
page read and write
1F500114D000
unkown
page read and write
B80000
heap
page read and write
1F5000F38000
unkown
page read and write
CF0000
unkown
page readonly
93BE000
stack
page read and write
233BC730000
trusted library allocation
page read and write
1070000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
1F5000338000
unkown
page read and write
1AD000
stack
page read and write
27495ECB000
heap
page read and write
991000
unkown
page readonly
1490000
unkown
page read and write
1F5000C40000
unkown
page read and write
C77000
unkown
page readonly
675ABFE000
unkown
page readonly
2D64000
heap
page read and write
FB0000
unkown
page readonly
845000
heap
page read and write
7F2000
heap
page read and write
7FF5ED7F1000
unkown
page readonly
7FF5ED818000
unkown
page readonly
35A0000
unkown
page readonly
6DF000
stack
page read and write
C90000
unkown
page readonly
C61000
unkown
page execute read
C6C9000
unkown
page read and write
C00000
unkown
page read and write
1630000
unkown
page readonly
F9F4000
unkown
page read and write
1F5000E01000
unkown
page read and write
7FF5ECED6000
unkown
page readonly
590000
heap
page read and write
1F5000338000
trusted library allocation
page read and write
3893000
heap
page read and write
1290000
unkown
page readonly
790000
heap
page read and write
1F5000C48000
unkown
page read and write
600000
unkown
page readonly
30000
unkown
page readonly
4BE3000
unkown
page read and write
2530000
unkown
page readonly
1210000
heap
page read and write
435000
unkown
page read and write
7D53000
unkown
page read and write
7FF71AEAA000
unkown
page write copy
1421000
unkown
page readonly
C6E000
unkown
page readonly
1F500000C000
unkown
page read and write
2D50000
unkown
page read and write
1FDACAD0000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
B60000
unkown
page readonly
C77000
unkown
page readonly
2A60000
heap
page read and write
C75000
unkown
page read and write
233BC82C000
heap
page read and write
1FDAEB43000
heap
page read and write
690000
unkown
page readonly
2B44000
heap
page read and write
27495F48000
heap
page read and write
DC0000
unkown
page readonly
1F50000D0000
unkown
page read and write
1FDA8EC0000
unkown
page readonly
7FF5ED5C1000
unkown
page readonly
1FDADF43000
unkown
page read and write
B70000
heap
page read and write
274960F0000
remote allocation
page read and write
2850000
unkown
page readonly
79B1000
unkown
page read and write
813000
heap
page read and write
25C0000
heap
page read and write
2B30000
heap
page read and write
97D4000
unkown
page read and write
1020000
unkown
page readonly
27DF000
stack
page read and write
A30000
heap
page read and write
1F5001158000
trusted library allocation
page read and write
B170000
unkown
page readonly
813000
heap
page read and write
FAB6000
unkown
page read and write
1F5001888000
unkown
page read and write
13E8000
heap
page read and write
C75000
unkown
page read and write
27498E5C000
heap
page read and write
1020000
unkown
page readonly
C90000
unkown
page readonly
A3A000
stack
page read and write
4C50000
unkown
page read and write
27495ED5000
heap
page read and write
27E4000
heap
page read and write
1F500034C000
trusted library allocation
page read and write
1F50012CC000
unkown
page read and write
27498DC0000
heap
page read and write
7FF5ED586000
unkown
page readonly
2ED0000
unkown
page readonly
B60000
unkown
page readonly
BB0000
unkown
page readonly
A21E000
stack
page read and write
AA90000
unkown
page read and write
1F500108C000
unkown
page read and write
C857000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
BC0000
unkown
page read and write
3E0000
unkown
page readonly
10D0000
unkown
page readonly
1180000
heap
page read and write
A50000
unkown
page readonly
1277F000
stack
page read and write
2FBE000
stack
page read and write
DF0000
unkown
page read and write
9885000
unkown
page read and write
83B000
heap
page read and write
1F50002FB000
unkown
page read and write
27495EB8000
heap
page read and write
675A3FB000
unkown
page read and write
5F0000
heap
page read and write
45D000
unkown
page readonly
CC39000
unkown
page read and write
AA0000
unkown
page readonly
23DC2B80000
heap
page read and write
12C1000
unkown
page readonly
7FF5ED28E000
unkown
page readonly
CB05000
unkown
page read and write
B40000
unkown
page read and write
1F5000FD0000
unkown
page read and write
1F5000338000
trusted library allocation
page read and write
8B60000
unkown
page readonly
7FE000
heap
page read and write
13A0000
heap
page read and write
520000
heap
page read and write
7FF5ED342000
unkown
page readonly
233BC83B000
heap
page read and write
E61B000
stack
page read and write
350000
unkown
page readonly
5350000
heap
page read and write
5E0000
unkown
page read and write
1530000
heap
page read and write
37D2000
unkown
page read and write
83B000
heap
page read and write
233BAB70000
trusted library allocation
page read and write
965C000
stack
page read and write
233BC730000
trusted library allocation
page read and write
1FDB05C7000
unkown
page read and write
7DF4F3051000
unkown
page execute read
1F500060C000
unkown
page read and write
5D0000
heap
page read and write
FA73000
unkown
page read and write
2749870B000
heap
page read and write
1760000
unkown
page readonly
7D6000
heap
page read and write
7E5000
heap
page read and write
83D000
heap
page read and write
C77000
unkown
page readonly
2749AFC4000
heap
page read and write
C61000
unkown
page execute read
F20000
heap
page read and write
1F5000338000
trusted library allocation
page read and write
833000
heap
page read and write
1FDA8BDB000
heap
page read and write
1F500115A000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
83D000
heap
page read and write
923E000
stack
page read and write
7E8000
heap
page read and write
7FF5ED4B0000
unkown
page readonly
DD0000
unkown
page readonly
DE0000
unkown
page read and write
13D0000
unkown
page readonly
9A0000
heap
page read and write
8FB9000
stack
page read and write
7CA0000
unkown
page read and write
303F000
heap
page read and write
C77000
unkown
page readonly
94BC000
stack
page read and write
2620000
heap
page read and write
F9B2000
unkown
page read and write
7900000
unkown
page read and write
FD0000
unkown
page read and write
25D0000
heap
page read and write
E00000
heap
page read and write
9875000
unkown
page read and write
83D000
heap
page read and write
2A30000
unkown
page read and write
1451000
unkown
page readonly
388C000
heap
page read and write
C92D000
unkown
page read and write
1FDA8EE0000
unkown
page readonly
1F5000DDC000
unkown
page read and write
1F500036C000
unkown
page read and write
5BE000
stack
page read and write
D00000
unkown
page readonly
3290000
unkown
page read and write
C77000
unkown
page readonly
986F000
unkown
page read and write
86A000
stack
page read and write
A008BFF000
stack
page read and write
1FDAAAD0000
heap
page read and write
7FF5ED9B8000
unkown
page readonly
1F50015B0000
unkown
page read and write
2ABD000
heap
page read and write
7D6000
heap
page read and write
C962000
unkown
page read and write
10D0000
heap
page read and write
C40000
unkown
page read and write
1FDAC29B000
unkown
page read and write
1448000
heap
page read and write
C50000
unkown
page read and write
1F50000EC000
unkown
page read and write
7B0000
unkown
page readonly
3883000
heap
page read and write
1FDA8DE0000
unkown
page read and write
1F5000A28000
unkown
page read and write
510000
unkown
page readonly
990000
unkown
page readonly
27499FB2000
heap
page read and write
1F50002A4000
trusted library allocation
page read and write
5C0000
unkown
page readonly
7884000
unkown
page read and write
27498E1B000
heap
page read and write
45F000
unkown
page readonly
C77000
unkown
page readonly
1F50018A0000
unkown
page read and write
9F0000
unkown
page read and write
1F5000364000
unkown
page read and write
401000
unkown
page execute read
1F5000A18000
unkown
page read and write
7FF5ED1D9000
unkown
page readonly
6752A7E000
unkown
page read and write
1F50009DC000
unkown
page read and write
2630000
heap
page read and write
1280000
heap
page read and write
9A063FF000
stack
page read and write
1F5000088000
unkown
page read and write
3889000
heap
page read and write
7FF5ED6DB000
unkown
page readonly
7FF71ABE1000
unkown
page execute read
6756BFE000
unkown
page readonly
6768BFC000
unkown
page read and write
27495E50000
heap
page read and write
A5000215000
unkown
page read and write
F9B2000
unkown
page read and write
1FDAF1E0000
unkown
page read and write
7FF5ED507000
unkown
page readonly
BD0000
unkown
page read and write
6774BFE000
unkown
page readonly
38A0000
heap
page read and write
67713FE000
unkown
page read and write
27498DE9000
heap
page read and write
CA0000
unkown
page readonly
8F00000
unkown
page read and write
5557000
stack
page read and write
1080000
unkown
page readonly
C00000
unkown
page read and write
C61000
unkown
page execute read
233BC730000
trusted library allocation
page read and write
9E6C000
stack
page read and write
7E50000
unkown
page readonly
1410000
unkown
page readonly
B70000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
BA0000
unkown
page readonly
AFC000
stack
page read and write
23DC2B70000
heap
page read and write
970000
unkown
page readonly
10C0000
unkown
page readonly
308A000
stack
page read and write
C75000
unkown
page read and write
E20000
unkown
page readonly
A008FFD000
stack
page read and write
2C60000
heap
page read and write
3220000
unkown
page readonly
DF0000
unkown
page readonly
690000
unkown
page readonly
7FF5ED847000
unkown
page readonly
3889000
heap
page read and write
C41000
unkown
page readonly
1F5001598000
unkown
page read and write
2710000
heap
page read and write
37F9000
unkown
page read and write
9977000
unkown
page read and write
676CBFB000
unkown
page read and write
5F0000
heap
page read and write
BB0000
unkown
page readonly
819000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
7FF5ED5A8000
unkown
page readonly
7FF5ED8A4000
unkown
page readonly
37F6000
unkown
page read and write
21B0000
unkown
page readonly
4C60000
unkown
page read and write
720000
unkown
page readonly
387F000
heap
page read and write
1FDA8F00000
heap
page read and write
1F5001750000
trusted library allocation
page read and write
1760000
unkown
page readonly
7FF5ED8B4000
unkown
page readonly
1F5000FC0000
unkown
page read and write
7DF4F3031000
unkown
page execute read
2A80000
heap
page read and write
27499705000
heap
page read and write
DF1000
unkown
page readonly
7FF5ED5C9000
unkown
page readonly
1FDAF017000
unkown
page read and write
1FDAEB40000
heap
page read and write
340000
unkown
page readonly
5E0000
heap
page read and write
7FF5ED4C6000
unkown
page readonly
CF0000
unkown
page readonly
C41000
unkown
page readonly
2374000
heap
page read and write
BA0000
heap
page read and write
C75000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
11B0000
unkown
page readonly
7DF4F3040000
unkown
page readonly
780000
unkown
page readonly
910000
unkown
page readonly
620000
unkown
page readonly
2344000
heap
page read and write
CC9000
stack
page read and write
7FF5ED7E9000
unkown
page readonly
C811000
unkown
page read and write
C77000
unkown
page readonly
550000
unkown
page readonly
3950000
remote allocation
page read and write
8D0000
unkown
page read and write
810000
heap
page read and write
7FF5ED996000
unkown
page readonly
797D000
unkown
page read and write
B640000
unkown
page read and write
C61000
unkown
page execute read
27498703000
heap
page read and write
1F50002A4000
trusted library allocation
page read and write
A32A000
unkown
page read and write
5E0000
unkown
page readonly
7863000
unkown
page read and write
DD0000
unkown
page readonly
2A30000
unkown
page read and write
1180000
heap
page read and write
1F5000338000
trusted library allocation
page read and write
1F500014C000
unkown
page read and write
57A000
stack
page read and write
A10000
heap
page read and write
DC0000
unkown
page readonly
5D7000
heap
page read and write
3858000
heap
page read and write
37A8000
unkown
page read and write
2734000
heap
page read and write
2AD9000
heap
page read and write
233BC730000
trusted library allocation
page read and write
1FDAECC3000
unkown
page read and write
A7E000
stack
page read and write
819000
heap
page read and write
7E60000
unkown
page read and write
B8C0000
unkown
page readonly
22C0000
unkown
page read and write
3866000
heap
page read and write
8E1000
unkown
page readonly
A5000220000
unkown
page read and write
2ACF000
heap
page read and write
C54A000
unkown
page read and write
1F5000F2C000
unkown
page read and write
BE0000
heap
page read and write
1F5000742000
unkown
page read and write
3797000
unkown
page read and write
1F50002A4000
trusted library allocation
page read and write
C60000
unkown
page readonly
2ABD000
heap
page read and write
A11000
unkown
page readonly
E51D000
stack
page read and write
6770BFE000
unkown
page readonly
C6E000
unkown
page readonly
C60000
unkown
page readonly
C60000
unkown
page readonly
804000
heap
page read and write
3748000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
D90000
unkown
page readonly
80F000
heap
page read and write
9A0000
unkown
page readonly
6752A94000
unkown
page read and write
A5000300000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
7FF5ED286000
unkown
page readonly
401000
unkown
page execute read
C8E1000
unkown
page read and write
7DF4F3051000
unkown
page execute read
1490000
unkown
page read and write
B40000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
804000
heap
page read and write
3869000
heap
page read and write
387F000
heap
page read and write
4FB000
stack
page read and write
C77000
unkown
page readonly
C61000
unkown
page execute read
7FF5ED65C000
unkown
page readonly
2E30000
unkown
page readonly
9A06BFB000
stack
page read and write
6777BFE000
unkown
page readonly
A30000
heap
page read and write
7FF5ED7E0000
unkown
page readonly
A5000210000
unkown
page read and write
3883000
heap
page read and write
199000
stack
page read and write
7D3000
heap
page read and write
7FF5ED295000
unkown
page readonly
7FF5ED33F000
unkown
page readonly
676E3FD000
unkown
page read and write
1180000
heap
page read and write
7695000
stack
page read and write
13F0000
unkown
page readonly
3B9000
stack
page read and write
C08A000
stack
page read and write
C2C000
stack
page read and write
2810000
unkown
page readonly
7FA000
heap
page read and write
2580000
unkown
page readonly
75C000
stack
page read and write
A500020C000
unkown
page read and write
FABB000
unkown
page read and write
7FF5ED48A000
unkown
page readonly
1F50003EC000
unkown
page read and write
60E000
heap
page read and write
1F5000C7C000
unkown
page read and write
819000
heap
page read and write
7F8000
heap
page read and write
1350000
unkown
page read and write
3884000
heap
page read and write
23DC2BD0000
trusted library allocation
page read and write
CA42000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
1F5000DB4000
unkown
page read and write
2E10000
unkown
page readonly
27498761000
heap
page read and write
23DC2C72000
heap
page read and write
7FF5ED3CE000
unkown
page readonly
680000
unkown
page readonly
7FF71AE4B000
unkown
page readonly
11F0000
heap
page read and write
2ACF000
heap
page read and write
7FF5ED942000
unkown
page readonly
1000000
unkown
page read and write
7FF5ED3AC000
unkown
page readonly
D6A000
stack
page read and write
80F000
heap
page read and write
1F500079C000
unkown
page read and write
37D2000
unkown
page read and write
C77000
unkown
page readonly
2ACC000
heap
page read and write
36D3000
stack
page read and write
2B0A000
heap
page read and write
CBE1000
unkown
page read and write
24C0000
heap
page read and write
9139000
stack
page read and write
7FA000
heap
page read and write
4B78000
unkown
page read and write
7E0000
unkown
page read and write
10022000
heap
page read and write
DD0000
unkown
page readonly
27499F1B000
heap
page read and write
1F5000BEC000
unkown
page read and write
7FF5ED755000
unkown
page readonly
1000000
heap
page read and write
7FF5ED505000
unkown
page readonly
A32A000
unkown
page read and write
D8C000
stack
page read and write
7FF5ED882000
unkown
page readonly
1F5001064000
unkown
page read and write
7FA000
heap
page read and write
1078000
heap
page read and write
A40000
unkown
page readonly
C964000
unkown
page read and write
29B0000
heap
page read and write
233BC84D000
heap
page read and write
7D0000
heap
page read and write
9A5B000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
A38000
heap
page read and write
3700000
unkown
page read and write
1FDAEC70000
trusted library section
page read and write
AA90000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
2B0A000
heap
page read and write
530000
unkown
page read and write
BAF9000
stack
page read and write
AF8D000
stack
page read and write
1F5000B58000
unkown
page read and write
D10000
heap
page read and write
B140000
unkown
page readonly
2AD3000
heap
page read and write
939000
stack
page read and write
274986DB000
heap
page read and write
A37B000
unkown
page read and write
67573FE000
unkown
page read and write
4BC9000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
7FF5ED286000
unkown
page readonly
16E1000
unkown
page readonly
1F500115A000
trusted library allocation
page read and write
67643FD000
unkown
page read and write
6752A68000
unkown
page read and write
7E2000
heap
page read and write
13B8000
heap
page read and write
340000
unkown
page readonly
7FF5ED349000
unkown
page readonly
7FF71AEA8000
unkown
page read and write
784A000
unkown
page read and write
AF0C000
stack
page read and write
13E0000
heap
page read and write
C4A0000
unkown
page read and write
75C000
stack
page read and write
1F500040C000
unkown
page read and write
C6BF000
unkown
page read and write
1F5000618000
unkown
page read and write
581000
unkown
page readonly
9A06DFB000
stack
page read and write
C61000
unkown
page execute read
330000
unkown
page readonly
B728000
stack
page read and write
C700000
unkown
page read and write
B70000
heap
page read and write
27C1000
heap
page read and write
9815000
unkown
page read and write
2400000
unkown
page readonly
21F0000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
1050000
unkown
page readonly
1FDACA67000
unkown
page read and write
C08A000
stack
page read and write
30A0000
unkown
page readonly
FF01000
unkown
page read and write
C6D8000
unkown
page read and write
A433000
unkown
page read and write
804000
heap
page read and write
274986E1000
heap
page read and write
A49E000
unkown
page read and write
15B0000
unkown
page readonly
DCC000
stack
page read and write
C50000
unkown
page read and write
86A000
stack
page read and write
4B56000
unkown
page read and write
C61000
unkown
page execute read
274986FB000
heap
page read and write
1350000
heap
page read and write
1940000
unkown
page readonly
14E0000
unkown
page readonly
1FDACAED000
unkown
page read and write
B82A000
stack
page read and write
1FDADEE7000
unkown
page read and write
CF0000
unkown
page readonly
7D0000
unkown
page readonly
1268000
heap
page read and write
7FF5ED26E000
unkown
page readonly
786B000
unkown
page read and write
500000
unkown
page readonly
2DFF000
stack
page read and write
740000
unkown
page readonly
7E50000
unkown
page readonly
2334000
heap
page read and write
C544000
unkown
page read and write
2AD3000
heap
page read and write
6752A50000
unkown
page read and write
2ACF000
heap
page read and write
C75000
unkown
page read and write
1350000
unkown
page readonly
4BA6000
unkown
page read and write
7FA000
heap
page read and write
3210000
unkown
page read and write
1F5000698000
unkown
page read and write
C6E000
unkown
page readonly
67583FE000
unkown
page read and write
22C0000
unkown
page read and write
7FF5ED3DA000
unkown
page readonly
7FF5ED9C6000
unkown
page readonly
1F50022DC000
trusted library allocation
page read and write
1200000
unkown
page readonly
7D6000
heap
page read and write
27498A60000
heap
page read and write
B629000
stack
page read and write
1F500072C000
unkown
page read and write
C61000
unkown
page execute read
B00C000
stack
page read and write
A0091FE000
stack
page read and write
A60000
unkown
page read and write
5F0000
unkown
page readonly
A50B000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
7FF5ED625000
unkown
page readonly
1C0000
unkown
page readonly
1500000
heap
page read and write
C75000
unkown
page read and write
C61000
unkown
page execute read
A391000
unkown
page read and write
1538000
heap
page read and write
804000
heap
page read and write
3884000
heap
page read and write
7F8000
heap
page read and write
D90000
unkown
page readonly
233BAA3C000
heap
page read and write
1F50023D4000
trusted library allocation
page read and write
214E000
stack
page read and write
1F5000C65000
unkown
page read and write
1500000
heap
page read and write
408000
unkown
page readonly
1090000
unkown
page readonly
AB4D000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
665000
heap
page read and write
AFC000
stack
page read and write
F9BB000
unkown
page read and write
98000
stack
page read and write
846000
heap
page read and write
9A082FB000
stack
page read and write
1F5000FF0000
unkown
page read and write
87F0000
heap
page read and write
1F50021F0000
trusted library allocation
page read and write
1F5000DE4000
unkown
page read and write
1F50003A0000
unkown
page read and write
C2C000
stack
page read and write
A11F000
stack
page read and write
7D6000
heap
page read and write
387F000
heap
page read and write
27BD000
stack
page read and write
D79000
stack
page read and write
DF0000
unkown
page readonly
AA6000
heap
page read and write
7BD000
heap
page read and write
7D6000
heap
page read and write
C90000
unkown
page readonly
911000
unkown
page readonly
7FF5ED418000
unkown
page readonly
80A000
heap
page read and write
819000
heap
page read and write
AAF2000
unkown
page read and write
1F50009B0000
unkown
page read and write
C75000
unkown
page read and write
675E3FB000
unkown
page read and write
9B60000
unkown
page readonly
C77000
unkown
page readonly
BDA0000
unkown
page readonly
CA42000
unkown
page read and write
AAF9000
unkown
page read and write
7FF5ED933000
unkown
page readonly
987D000
unkown
page read and write
233BC882000
heap
page read and write
1F5000900000
unkown
page read and write
C61000
unkown
page execute read
7FF5ED556000
unkown
page readonly
7DF4F3050000
unkown
page readonly
8FB9000
stack
page read and write
1FDAF550000
unkown
page read and write
29BF000
stack
page read and write
C77000
unkown
page readonly
2670000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
1F50012FC000
unkown
page read and write
7E2000
heap
page read and write
1180000
heap
page read and write
1F500151C000
unkown
page read and write
1F5000134000
unkown
page read and write
2749CFD0000
heap
page read and write
111AE000
stack
page read and write
830000
unkown
page read and write
1350000
unkown
page readonly
1200000
unkown
page readonly
C75000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
7DF4F3050000
unkown
page readonly
B74000
heap
page read and write
C61000
unkown
page execute read
9A077FE000
stack
page read and write
233BC730000
trusted library allocation
page read and write
1F50004B0000
unkown
page read and write
C512000
unkown
page read and write
530000
unkown
page read and write
8FC000
stack
page read and write
4C34000
unkown
page read and write
BA0000
unkown
page readonly
10020000
heap
page read and write
93BE000
stack
page read and write
EF0000
heap
page read and write
233BC899000
heap
page read and write
B70000
unkown
page readonly
233BC893000
heap
page read and write
27498960000
heap
page read and write
60A000
heap
page read and write
A50B000
unkown
page read and write
23DC2C28000
heap
page read and write
2340000
heap
page read and write
1FDAC260000
unkown
page read and write
C6CF000
unkown
page read and write
920000
heap
page read and write
6752A9E000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
3867000
heap
page read and write
233BC730000
trusted library allocation
page read and write
980000
unkown
page readonly
2E54000
heap
page read and write
7FF5ED714000
unkown
page readonly
A90000
heap
page read and write
12880000
unkown
page read and write
1F50007AC000
unkown
page read and write
570000
heap
page read and write
1FDADF34000
unkown
page read and write
385E000
heap
page read and write
8F0000
heap
page read and write
7847000
unkown
page read and write
35BE000
stack
page read and write
2B44000
heap
page read and write
1F500020C000
unkown
page read and write
900000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
BF0000
unkown
page readonly
BE0000
unkown
page read and write
C6E000
unkown
page readonly
1FDAF220000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
2B30000
heap
page read and write
7E60000
unkown
page read and write
125FC000
stack
page read and write
8EC6000
unkown
page read and write
819000
heap
page read and write
AB8000
heap
page read and write
388C000
heap
page read and write
C77000
unkown
page readonly
1010000
unkown
page read and write
1210000
heap
page read and write
1350000
unkown
page readonly
730000
heap
page read and write
1F5000A58000
unkown
page read and write
C75000
unkown
page read and write
C77000
unkown
page readonly
37F2000
unkown
page read and write
1F5000343000
unkown
page read and write
BE0000
unkown
page readonly
8B0000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
27498E19000
heap
page read and write
7FE000
heap
page read and write
7FF5ED534000
unkown
page readonly
8EC6000
unkown
page read and write
387A000
heap
page read and write
2EB0000
unkown
page readonly
C40000
unkown
page read and write
800000
unkown
page readonly
1F5001158000
trusted library allocation
page read and write
7D9C000
unkown
page read and write
3E0000
unkown
page readonly
2D40000
unkown
page readonly
1F5000A01000
unkown
page read and write
C60000
unkown
page readonly
1FDAB569000
unkown
page read and write
1FDAB584000
unkown
page read and write
233BC888000
heap
page read and write
1FDAFF50000
unkown
page read and write
7FF75C4AA000
unkown
page write copy
7FF71AE93000
unkown
page write copy
42C000
unkown
page read and write
C77000
unkown
page readonly
1F5000001000
unkown
page read and write
308A000
stack
page read and write
1505000
heap
page read and write
8D0000
unkown
page readonly
1F50009D2000
unkown
page read and write
540000
unkown
page readonly
2B70000
unkown
page readonly
1FDAED80000
trusted library section
page read and write
2A7B000
heap
page read and write
1F5000EF0000
unkown
page read and write
4B90000
unkown
page read and write
2AE6000
heap
page read and write
C6E000
unkown
page readonly
5641000
unkown
page read and write
7D81000
unkown
page read and write
233BC888000
heap
page read and write
1120000
unkown
page readonly
C6E000
unkown
page readonly
BD0000
unkown
page readonly
233BAA2C000
heap
page read and write
7FFE000
stack
page read and write
A11F000
stack
page read and write
C88B000
unkown
page read and write
1F5000FB0000
unkown
page read and write
C60000
unkown
page readonly
233BA950000
heap
page read and write
11C0000
unkown
page readonly
1F5001030000
unkown
page read and write
274988F0000
heap
page read and write
42F000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
A39B000
unkown
page read and write
7E11000
unkown
page read and write
F9C9000
unkown
page read and write
A5000284000
unkown
page read and write
1F5000994000
unkown
page read and write
600000
unkown
page readonly
A50000
unkown
page readonly
20000
unkown
page readonly
CB7F000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
3883000
heap
page read and write
D7A000
stack
page read and write
675F3FC000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
C90000
unkown
page readonly
C61000
unkown
page execute read
550000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
96D000
stack
page read and write
37A8000
unkown
page read and write
8BF0000
unkown
page readonly
F00000
unkown
page readonly
5E0000
heap
page read and write
667000
heap
page read and write
C10A000
stack
page read and write
CE0000
unkown
page readonly
A18000
heap
page read and write
27498764000
heap
page read and write
1FDACAC7000
unkown
page read and write
C6E000
unkown
page readonly
58E000
stack
page read and write
1088000
heap
page read and write
5B0000
unkown
page readonly
C6E000
unkown
page readonly
E60000
heap
page read and write
2749979C000
heap
page read and write
233BC730000
trusted library allocation
page read and write
1B0000
unkown
page readonly
7FF5ED7CF000
unkown
page readonly
C77000
unkown
page readonly
841000
unkown
page readonly
2ACF000
heap
page read and write
92BF000
unkown
page read and write
C77000
unkown
page readonly
8D0000
unkown
page readonly
C50000
unkown
page read and write
1F5000A78000
unkown
page read and write
23DC2C81000
heap
page read and write
6772BFE000
unkown
page readonly
80C000
heap
page read and write
1F5001CE4000
trusted library allocation
page read and write
2704000
heap
page read and write
C60000
unkown
page readonly
7FF5ED8F9000
unkown
page readonly
12A0000
unkown
page readonly
1F5000300000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
D80000
unkown
page read and write
1070000
unkown
page read and write
EB0000
heap
page read and write
1FDA8CC7000
unkown
page read and write
3800000
unkown
page readonly
7D00000
unkown
page readonly
1390000
unkown
page readonly
7D6000
heap
page read and write
C75000
unkown
page read and write
C19000
stack
page read and write
1170000
unkown
page readonly
1870000
unkown
page readonly
2800000
heap
page read and write
3889000
heap
page read and write
6758BFE000
unkown
page readonly
27498E19000
heap
page read and write
C61000
unkown
page execute read
3431000
unkown
page read and write
1070000
heap
page read and write
1F5000D9C000
unkown
page read and write
233BC81E000
heap
page read and write
1F5001018000
unkown
page read and write
425000
unkown
page read and write
21A0000
heap
page read and write
C60000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
C61000
unkown
page execute read
676F3FE000
unkown
page read and write
7F0000
unkown
page readonly
78AD000
unkown
page read and write
7FF5ED1CC000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
BC9B000
stack
page read and write
1550000
unkown
page readonly
2EF0000
heap
page read and write
4C34000
unkown
page read and write
C75000
unkown
page read and write
986B000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
1F50015D0000
unkown
page read and write
233BC849000
heap
page read and write
B2A000
stack
page read and write
3883000
heap
page read and write
1FDB05ED000
unkown
page read and write
F390000
unkown
page read and write
9A070FF000
stack
page read and write
7FF5ED4E8000
unkown
page readonly
7FF5ED800000
unkown
page readonly
7FF75C4B3000
unkown
page readonly
1F5000124000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
7A34000
unkown
page read and write
2C8F000
stack
page read and write
540000
unkown
page readonly
9A068FF000
stack
page read and write
7F8000
heap
page read and write
ED0000
unkown
page readonly
2A80000
heap
page read and write
9A067FE000
stack
page read and write
C20000
unkown
page readonly
760000
unkown
page readonly
7FF75C471000
unkown
page execute read
900000
heap
page read and write
7FF5ED59E000
unkown
page readonly
B640000
unkown
page read and write
107A000
stack
page read and write
1F5001CE4000
trusted library allocation
page read and write
7FF5ED471000
unkown
page readonly
2749938F000
heap
page read and write
9A0000
unkown
page read and write
5A0000
heap
page read and write
2D50000
unkown
page read and write
1180000
heap
page read and write
804000
heap
page read and write
1F50003EC000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
7CD0000
unkown
page read and write
C962000
unkown
page read and write
FEA0000
unkown
page read and write
BE0000
heap
page read and write
35D0000
unkown
page read and write
1F50022B0000
trusted library allocation
page read and write
7FF5ED39E000
unkown
page readonly
6754BFE000
unkown
page readonly
2A60000
heap
page read and write
B10000
unkown
page readonly
FEE4000
unkown
page read and write
C6E000
unkown
page readonly
7FF5ED6BA000
unkown
page readonly
1F5000AF8000
unkown
page read and write
C61000
unkown
page execute read
1F5000F6C000
unkown
page read and write
C90000
unkown
page readonly
13B0000
heap
page read and write
DC0000
unkown
page readonly
1F500073A000
unkown
page read and write
7F5000
heap
page read and write
C6E000
unkown
page readonly
1F5001704000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
C75000
unkown
page read and write
F80000
heap
page read and write
7FF5ED451000
unkown
page readonly
7FF5ED74A000
unkown
page readonly
7FF5ED516000
unkown
page readonly
1FDAED20000
trusted library section
page read and write
900000
unkown
page readonly
10B0000
heap
page read and write
C6E000
unkown
page readonly
1F5000B7C000
unkown
page read and write
C77000
unkown
page readonly
80D000
heap
page read and write
841000
unkown
page readonly
7FF5ED349000
unkown
page readonly
3889000
heap
page read and write
C6E000
unkown
page readonly
3797000
unkown
page read and write
81E000
heap
page read and write
FF0000
unkown
page read and write
2E60000
unkown
page readonly
9798000
unkown
page read and write
987F000
unkown
page read and write
DA0000
unkown
page read and write
9BD7BFE000
stack
page read and write
1F5000D64000
unkown
page read and write
400000
unkown
page readonly
DA0000
unkown
page readonly
1F5000E9C000
unkown
page read and write
F9C9000
unkown
page read and write
C01000
unkown
page readonly
DF0000
heap
page read and write
27495EEE000
heap
page read and write
3879000
heap
page read and write
2374000
heap
page read and write
233BC855000
heap
page read and write
DF0000
unkown
page read and write
BD1D000
stack
page read and write
27495EE6000
heap
page read and write
A33E000
unkown
page read and write
BB0000
unkown
page readonly
ED0000
unkown
page readonly
7FA000
heap
page read and write
21F0000
unkown
page readonly
560000
unkown
page readonly
60A000
heap
page read and write
274986FC000
heap
page read and write
130000
unkown
page readonly
7D40000
unkown
page read and write
1F5001508000
unkown
page read and write
1F5001AC4000
unkown
page read and write
7FF71ABE1000
unkown
page execute read
5B0000
unkown
page readonly
BA0000
unkown
page readonly
1FDAC275000
unkown
page read and write
C561000
unkown
page read and write
3738000
unkown
page read and write
7A0000
unkown
page readonly
CD0000
heap
page read and write
C60000
unkown
page readonly
8860000
unkown
page read and write
37B0000
unkown
page read and write
1021000
unkown
page readonly
1F50006C8000
unkown
page read and write
89A0000
unkown
page read and write
9BFF000
stack
page read and write
C61000
unkown
page execute read
89E0000
unkown
page read and write
677ABFE000
unkown
page readonly
2F60000
heap
page read and write
7B80000
unkown
page read and write
C75000
unkown
page read and write
233BC853000
heap
page read and write
10D0000
unkown
page readonly
C77000
unkown
page readonly
37A0000
unkown
page read and write
2734000
heap
page read and write
990000
unkown
page readonly
2D44000
heap
page read and write
3889000
heap
page read and write
DCB000
stack
page read and write
7FF5ED71B000
unkown
page readonly
819000
heap
page read and write
DB0000
unkown
page readonly
3885000
heap
page read and write
826000
heap
page read and write
1F5000338000
trusted library allocation
page read and write
8BF0000
unkown
page readonly
7FF5ED4E8000
unkown
page readonly
9D0000
unkown
page read and write
C75000
unkown
page read and write
C60000
unkown
page readonly
9A061FD000
stack
page read and write
408000
unkown
page readonly
BE0000
unkown
page readonly
7B0000
unkown
page readonly
A00000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
7D0000
unkown
page readonly
A502000
unkown
page read and write
2810000
unkown
page readonly
C846000
unkown
page read and write
2A55000
heap
page read and write
60E000
heap
page read and write
3590000
unkown
page read and write
107A000
stack
page read and write
9C0000
heap
page read and write
1F50021EC000
unkown
page read and write
3800000
unkown
page readonly
2B40000
heap
page read and write
4BDC000
unkown
page read and write
C61000
unkown
page execute read
1F5001158000
trusted library allocation
page read and write
1F5001801000
unkown
page read and write
9E6C000
stack
page read and write
1330000
unkown
page readonly
7FF5ED476000
unkown
page readonly
C75000
unkown
page read and write
C61000
unkown
page execute read
233BC831000
heap
page read and write
A50002C4000
unkown
page read and write
3240000
unkown
page read and write
1F50014F8000
unkown
page read and write
7C90000
unkown
page read and write
770000
unkown
page readonly
9A07DFB000
stack
page read and write
9A065FE000
stack
page read and write
F974000
unkown
page read and write
7F8000
heap
page read and write
1F50000FC000
unkown
page read and write
51A000
stack
page read and write
8C0000
unkown
page readonly
987D000
unkown
page read and write
785D000
unkown
page read and write
9A06CFF000
stack
page read and write
7F0000
heap
page read and write
7CE000
heap
page read and write
31EF000
stack
page read and write
67543FB000
unkown
page read and write
46C000
unkown
page readonly
1F5001A28000
trusted library allocation
page read and write
27498E53000
heap
page read and write
7FF5ED59E000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
1F5000738000
unkown
page read and write
89C0000
unkown
page read and write
82F000
heap
page read and write
2D40000
unkown
page readonly
7FF5ED939000
unkown
page readonly
9883000
unkown
page read and write
23DC2C20000
heap
page read and write
B51000
unkown
page readonly
860000
unkown
page readonly
12D8000
heap
page read and write
1F500115A000
trusted library allocation
page read and write
89E0000
unkown
page read and write
410000
heap
page read and write
9A060FB000
stack
page read and write
9F1E000
stack
page read and write
4BE1000
unkown
page read and write
C6E000
unkown
page readonly
1F500115A000
trusted library allocation
page read and write
700000
unkown
page readonly
7E7000
heap
page read and write
6773BFE000
unkown
page readonly
3659000
stack
page read and write
A364000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
8BE9000
stack
page read and write
233BAC00000
heap
page read and write
7CD0000
unkown
page read and write
22A0000
unkown
page readonly
C90000
unkown
page readonly
C557000
unkown
page read and write
233BAB70000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
7FF5ED495000
unkown
page readonly
67703FE000
unkown
page read and write
7F6000
heap
page read and write
B60000
unkown
page read and write
2730000
heap
page read and write
274986C0000
heap
page read and write
1436000
stack
page read and write
BCC000
stack
page read and write
37BD000
unkown
page read and write
801000
heap
page read and write
1F5000930000
unkown
page read and write
274986C4000
heap
page read and write
7F5000
heap
page read and write
1140000
unkown
page read and write
3D0000
unkown
page readonly
1F50001B4000
unkown
page read and write
9DED000
stack
page read and write
1F5000BA8000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
7FF5ED46E000
unkown
page readonly
7FF71ABE1000
unkown
page execute read
233BC730000
trusted library allocation
page read and write
804000
heap
page read and write
13A4000
heap
page read and write
D60000
unkown
page readonly
9A071FB000
stack
page read and write
C6E000
unkown
page readonly
9A0000
heap
page read and write
DE0000
unkown
page readonly
D90000
unkown
page readonly
EF4000
heap
page read and write
C6E000
unkown
page readonly
A095000
stack
page read and write
C61000
unkown
page execute read
2749917E000
heap
page read and write
7FF5EDA53000
unkown
page readonly
3E0000
unkown
page readonly
850000
unkown
page read and write
1F5000AC0000
unkown
page read and write
23DC2C72000
heap
page read and write
F50000
heap
page read and write
23DC2C8E000
heap
page read and write
379E000
unkown
page read and write
7FF5ED1D9000
unkown
page readonly
1F50002F0000
unkown
page read and write
1F5001079000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
813000
heap
page read and write
1F5000A30000
unkown
page read and write
7D8000
heap
page read and write
27C1000
heap
page read and write
27498E5F000
heap
page read and write
1F50018BC000
unkown
page read and write
9BD79FF000
stack
page read and write
A494000
unkown
page read and write
2B40000
heap
page read and write
BD1D000
stack
page read and write
1120000
unkown
page readonly
3758000
unkown
page read and write
A4A1000
unkown
page read and write
819000
heap
page read and write
C6E000
unkown
page readonly
BD98000
stack
page read and write
2730000
heap
page read and write
C40000
heap
page read and write
9795000
unkown
page read and write
389D000
heap
page read and write
7FF5ED404000
unkown
page readonly
D90000
unkown
page readonly
C90000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
67603FE000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
B7C000
stack
page read and write
1F5001E34000
trusted library allocation
page read and write
4C50000
unkown
page read and write
1F5001CE4000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
7FF5ED4BB000
unkown
page readonly
1F5000864000
unkown
page read and write
1F5001CE4000
trusted library allocation
page read and write
1FDAB56D000
unkown
page read and write
BD0000
unkown
page readonly
1FDADEA4000
unkown
page read and write
B90000
unkown
page readonly
27498670000
heap
page read and write
32B0000
trusted library allocation
page read and write
600000
heap
page read and write
7FF5ED471000
unkown
page readonly
1F50022E8000
trusted library allocation
page read and write
80A000
heap
page read and write
3869000
heap
page read and write
380F000
stack
page read and write
3F0000
unkown
page readonly
770000
heap
page read and write
1FDADF2C000
unkown
page read and write
17F1000
unkown
page readonly
1F500034C000
trusted library allocation
page read and write
836000
heap
page read and write
4CB0000
unkown
page read and write
CF0000
unkown
page readonly
C60000
unkown
page readonly
2AD0000
heap
page read and write
A4AE000
unkown
page read and write
388E000
heap
page read and write
C52C000
unkown
page read and write
1F5000F9C000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
846000
heap
page read and write
1FDADEA7000
unkown
page read and write
1510000
unkown
page readonly
7B0000
unkown
page readonly
10FB000
stack
page read and write
AB0C000
unkown
page read and write
CC0000
heap
page read and write
C60000
unkown
page readonly
3210000
unkown
page read and write
F88000
heap
page read and write
1F500009E000
unkown
page read and write
6752A72000
unkown
page read and write
1F5000478000
unkown
page read and write
9A0000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
C10000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
1F5000358000
unkown
page read and write
7FF5ED451000
unkown
page readonly
7FF5ED97E000
unkown
page readonly
819000
heap
page read and write
550000
unkown
page readonly
C77000
unkown
page readonly
2360000
heap
page read and write
7FF5ED68C000
unkown
page readonly
7DF4F3041000
unkown
page execute read
A29E000
stack
page read and write
B8AB000
stack
page read and write
27498E00000
heap
page read and write
CB0000
heap
page read and write
A80000
unkown
page read and write
3889000
heap
page read and write
1F5000770000
unkown
page read and write
7C80000
unkown
page read and write
1F5001028000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
1F50002A4000
trusted library allocation
page read and write
980000
unkown
page read and write
2EC0000
heap
page read and write
7FF5ED1B5000
unkown
page readonly
C8E1000
unkown
page read and write
1F5001540000
unkown
page read and write
7FF5ED9D2000
unkown
page readonly
C61000
unkown
page execute read
A323000
unkown
page read and write
819000
heap
page read and write
3889000
heap
page read and write
233BC720000
remote allocation
page read and write
2EA0000
heap
page read and write
9BD78FF000
stack
page read and write
1358000
heap
page read and write
C77000
unkown
page readonly
C00000
unkown
page readonly
7F5000
heap
page read and write
7FF5ED71E000
unkown
page readonly
CC0000
heap
page read and write
1122E000
stack
page read and write
9DED000
stack
page read and write
1480000
heap
page read and write
233BC730000
trusted library allocation
page read and write
7FF5EDA38000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
1F50001A0000
unkown
page read and write
1F5001CE4000
trusted library allocation
page read and write
97C3000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
7FF5ED844000
unkown
page readonly
23DC2C60000
heap
page read and write
1FDACA80000
unkown
page read and write
98A8000
unkown
page read and write
F974000
unkown
page read and write
1F500066C000
unkown
page read and write
C60000
unkown
page readonly
C60000
unkown
page readonly
C60000
unkown
page readonly
9A081FF000
stack
page read and write
E20000
heap
page read and write
7C0000
unkown
page read and write
C75000
unkown
page read and write
670000
heap
page read and write
1440000
heap
page read and write
3883000
heap
page read and write
37AE000
unkown
page read and write
DC0000
unkown
page readonly
7FF5ED850000
unkown
page readonly
2B8E000
stack
page read and write
F98000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
2E60000
unkown
page readonly
38BA000
heap
page read and write
1F5001E0C000
trusted library allocation
page read and write
7F8000
heap
page read and write
C84D000
unkown
page read and write
1460000
unkown
page readonly
7D3000
heap
page read and write
1F5000CA8000
unkown
page read and write
27495EE6000
heap
page read and write
2749CF39000
heap
page read and write
5F0000
heap
page read and write
7869000
unkown
page read and write
C77000
unkown
page readonly
2B34000
heap
page read and write
7FA000
heap
page read and write
1530000
heap
page read and write
113C000
stack
page read and write
C77000
unkown
page readonly
1210000
unkown
page read and write
1FDA8E40000
unkown
page readonly
27498DFA000
heap
page read and write
819000
heap
page read and write
21E4000
heap
page read and write
8C0000
heap
page read and write
1214000
heap
page read and write
818D000
stack
page read and write
750000
unkown
page readonly
E30000
unkown
page readonly
5F0000
unkown
page read and write
900000
unkown
page readonly
1F50007E4000
unkown
page read and write
850000
unkown
page read and write
2BD8000
heap
page read and write
E30000
unkown
page readonly
804000
heap
page read and write
9A064FD000
stack
page read and write
3220000
unkown
page readonly
233BA99C000
heap
page read and write
C50A000
unkown
page read and write
91B9000
stack
page read and write
7FF5ED3EA000
unkown
page readonly
5CE000
stack
page read and write
7D3000
heap
page read and write
233BC87E000
heap
page read and write
B10D000
stack
page read and write
103A000
stack
page read and write
27495EB0000
heap
page read and write
1F500115A000
trusted library allocation
page read and write
DA0000
heap
page read and write
1021000
unkown
page readonly
9F1E000
stack
page read and write
1F50014EC000
unkown
page read and write
7FA000
heap
page read and write
12E0000
unkown
page read and write
C51E000
unkown
page read and write
233BC824000
heap
page read and write
1380000
unkown
page read and write
1FDAF007000
unkown
page read and write
C00000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
675B3F9000
unkown
page read and write
7FF5ED505000
unkown
page readonly
2340000
heap
page read and write
1F500158C000
unkown
page read and write
830000
heap
page read and write
388D000
heap
page read and write
19A000
stack
page read and write
1F5001158000
trusted library allocation
page read and write
C61000
unkown
page execute read
C6E000
unkown
page readonly
720000
unkown
page readonly
3659000
stack
page read and write
330000
unkown
page readonly
8DA0000
unkown
page read and write
2B64000
heap
page read and write
DD0000
unkown
page read and write
7FF5ED556000
unkown
page readonly
1FDAC2BF000
unkown
page read and write
6766BFC000
unkown
page read and write
1F50022E8000
trusted library allocation
page read and write
C30000
heap
page read and write
233BC8A3000
heap
page read and write
987B000
unkown
page read and write
1000000
heap
page read and write
1F500115A000
trusted library allocation
page read and write
1F5000DCC000
unkown
page read and write
1F5001114000
unkown
page read and write
4C1E000
unkown
page read and write
1FDAB520000
unkown
page read and write
387F000
heap
page read and write
96DF000
unkown
page read and write
67653FB000
unkown
page read and write
804000
heap
page read and write
D90000
unkown
page readonly
7865000
unkown
page read and write
1F5000F50000
unkown
page read and write
84F000
heap
page read and write
987B000
unkown
page read and write
C61000
unkown
page execute read
804000
heap
page read and write
1F50021F0000
trusted library allocation
page read and write
7FF5ED62F000
unkown
page readonly
7FF5ED975000
unkown
page readonly
1F5000D2C000
unkown
page read and write
E90000
unkown
page readonly
233BAA49000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
4F0000
unkown
page readonly
3886000
heap
page read and write
6752A74000
unkown
page read and write
804000
heap
page read and write
C75000
unkown
page read and write
7FF75C49A000
unkown
page readonly
1F5000CF4000
unkown
page read and write
84F000
heap
page read and write
1F500115A000
trusted library allocation
page read and write
8B0000
unkown
page readonly
9AE000
stack
page read and write
1F50001C4000
unkown
page read and write
4CE0000
unkown
page read and write
2700000
heap
page read and write
1F5001CE4000
trusted library allocation
page read and write
1F5000FE0000
unkown
page read and write
9BD77FF000
stack
page read and write
386A000
heap
page read and write
3758000
unkown
page read and write
10FC000
stack
page read and write
C563000
unkown
page read and write
1F5000EBF000
unkown
page read and write
920000
unkown
page readonly
AFB000
stack
page read and write
7FF5ED8E2000
unkown
page readonly
676FBFE000
unkown
page readonly
43E000
unkown
page read and write
1FDACAE7000
unkown
page read and write
2110000
trusted library allocation
page read and write
1436000
stack
page read and write
C846000
unkown
page read and write
570000
unkown
page readonly
570000
unkown
page readonly
836000
heap
page read and write
27C1000
heap
page read and write
C40000
unkown
page read and write
8FC000
stack
page read and write
1390000
unkown
page readonly
770000
heap
page read and write
7FF5ED810000
unkown
page readonly
C75000
unkown
page read and write
67593FD000
unkown
page read and write
5B0000
unkown
page readonly
677C3F9000
unkown
page read and write
1F50000A8000
unkown
page read and write
3875000
heap
page read and write
EB0000
heap
page read and write
6752A52000
unkown
page read and write
BDD0000
unkown
page readonly
ED0000
heap
page read and write
C90000
unkown
page readonly
1FDB09D0000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
FB0000
unkown
page readonly
7FF5ED92C000
unkown
page readonly
1120000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
1FDA8BD0000
heap
page read and write
2170000
heap
page read and write
B08D000
stack
page read and write
1F50010D4000
unkown
page read and write
C6E000
unkown
page readonly
D60000
unkown
page readonly
A5000278000
unkown
page read and write
F5A000
stack
page read and write
27496130000
heap
page read and write
23DC2C7C000
heap
page read and write
1440000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
FED1000
unkown
page read and write
906E000
stack
page read and write
C77000
unkown
page readonly
A379000
unkown
page read and write
A50002A4000
unkown
page read and write
C61000
unkown
page execute read
233BC730000
trusted library allocation
page read and write
A5000294000
unkown
page read and write
7CE0000
unkown
page read and write
5D0000
unkown
page readonly
233BC810000
heap
page read and write
CB0000
unkown
page readonly
350000
unkown
page readonly
2B01000
heap
page read and write
330000
unkown
page readonly
3866000
heap
page read and write
1020000
unkown
page readonly
C61000
unkown
page execute read
29B0000
heap
page read and write
7D8000
heap
page read and write
C75000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
880000
heap
page read and write
5FB000
heap
page read and write
923E000
stack
page read and write
1FDAC250000
unkown
page read and write
5CA000
stack
page read and write
1270000
unkown
page readonly
9BD73FA000
stack
page read and write
C57F000
unkown
page read and write
354C000
stack
page read and write
982D000
unkown
page read and write
67693FE000
unkown
page readonly
C6E000
unkown
page readonly
804000
heap
page read and write
2740000
unkown
page readonly
9A072FE000
stack
page read and write
785B000
unkown
page read and write
7FF5ED692000
unkown
page readonly
1871000
unkown
page readonly
7FF5ED915000
unkown
page readonly
550000
unkown
page readonly
1FDAEDA0000
trusted library section
page read and write
AFB000
stack
page read and write
1001D000
stack
page read and write
9A07DF9000
stack
page read and write
1F500098B000
unkown
page read and write
D90000
unkown
page readonly
274990E7000
heap
page read and write
A71000
unkown
page readonly
A327000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
57A000
stack
page read and write
CC6D000
unkown
page read and write
7FF5ED853000
unkown
page readonly
DE0000
unkown
page readonly
9885000
unkown
page read and write
7D2000
heap
page read and write
AAD1000
unkown
page read and write
1F5000EB8000
unkown
page read and write
500000
unkown
page readonly
A10000
heap
page read and write
1F5000C1C000
unkown
page read and write
861000
unkown
page readonly
C6E000
unkown
page readonly
1120000
unkown
page read and write
A19F000
stack
page read and write
676ABFC000
unkown
page read and write
7F1000
unkown
page readonly
7FF5ED426000
unkown
page readonly
387F000
heap
page read and write
401000
unkown
page execute read
4BE1000
unkown
page read and write
C6E000
unkown
page readonly
23DC2C8E000
heap
page read and write
233BC730000
trusted library allocation
page read and write
320000
unkown
page readonly
83B000
heap
page read and write
7857000
unkown
page read and write
7FF71AEBC000
unkown
page readonly
2674000
heap
page read and write
CA63000
unkown
page read and write
C77000
unkown
page readonly
1F5000A0C000
unkown
page read and write
274A0F4A000
heap
page read and write
541000
unkown
page readonly
1FDAC652000
unkown
page read and write
1FDAEB00000
unkown
page read and write
2530000
unkown
page readonly
C60000
unkown
page readonly
1FDA8DC0000
unkown
page readonly
127F0000
unkown
page read and write
DE0000
unkown
page readonly
C77000
unkown
page readonly
C50000
unkown
page read and write
2394000
heap
page read and write
C90000
unkown
page readonly
2330000
heap
page read and write
1410000
heap
page read and write
1F5001158000
trusted library allocation
page read and write
11C0000
unkown
page readonly
C75000
unkown
page read and write
822000
heap
page read and write
233BC730000
trusted library allocation
page read and write
27497D70000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
B00000
unkown
page readonly
DF0000
unkown
page read and write
7FF75C470000
unkown
page readonly
1F5001158000
trusted library allocation
page read and write
9881000
unkown
page read and write
1F50000B4000
unkown
page read and write
2A5B000
heap
page read and write
233BC730000
trusted library allocation
page read and write
7861000
unkown
page read and write
A50000
unkown
page readonly
1210000
unkown
page readonly
1FDAEFC0000
unkown
page read and write
25C4000
heap
page read and write
1F5001CE4000
trusted library allocation
page read and write
3094000
heap
page read and write
850000
unkown
page read and write
78A0000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
2670000
heap
page read and write
46E000
unkown
page readonly
A4B8000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
7FF75C49A000
unkown
page readonly
C75000
unkown
page read and write
C75000
unkown
page read and write
1121000
unkown
page readonly
63E000
stack
page read and write
819000
heap
page read and write
6752A62000
unkown
page read and write
40A000
unkown
page write copy
1237E000
stack
page read and write
B80000
heap
page read and write
442000
unkown
page read and write
82B000
heap
page read and write
6A0000
unkown
page readonly
27498DE6000
heap
page read and write
23DC2C7C000
heap
page read and write
9660000
unkown
page read and write
AAF2000
unkown
page read and write
37AC000
unkown
page read and write
9792000
unkown
page read and write
274A0FE1000
heap
page read and write
1330000
unkown
page readonly
78C000
stack
page read and write
2534000
heap
page read and write
7FF5ED295000
unkown
page readonly
C6E000
unkown
page readonly
B51000
unkown
page readonly
37AC000
unkown
page read and write
850000
unkown
page read and write
7DF4F3041000
unkown
page execute read
7FF71ABE0000
unkown
page readonly
7FF5ED342000
unkown
page readonly
27498709000
heap
page read and write
C61000
unkown
page execute read
DE0000
unkown
page read and write
8A6E000
stack
page read and write
C61000
unkown
page execute read
570000
heap
page read and write
2E20000
heap
page read and write
31E0000
heap
page read and write
990000
unkown
page readonly
FA34000
unkown
page read and write
510000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
C4D0000
unkown
page read and write
A008AFF000
stack
page read and write
819000
heap
page read and write
DF0000
heap
page read and write
388C000
heap
page read and write
C6C1000
unkown
page read and write
8B0000
unkown
page read and write
76A0000
unkown
page read and write
1F5001CE4000
trusted library allocation
page read and write
C857000
unkown
page read and write
709000
stack
page read and write
1F50006D5000
unkown
page read and write
9A06DFE000
stack
page read and write
36F0000
unkown
page readonly
896B000
stack
page read and write
1211000
unkown
page readonly
1F5001CE4000
trusted library allocation
page read and write
9660000
unkown
page read and write
7FF71AE4B000
unkown
page readonly
A74000
heap
page read and write
3889000
heap
page read and write
233BA9C1000
heap
page read and write
112D2000
unkown
page read and write
8C8000
heap
page read and write
7FF5ED9FF000
unkown
page readonly
3094000
heap
page read and write
7D00000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
1F5000B28000
unkown
page read and write
1F5001080000
unkown
page read and write
7884000
unkown
page read and write
38B6000
heap
page read and write
C6E000
unkown
page readonly
23DC4590000
trusted library allocation
page read and write
8E0000
unkown
page readonly
1F50022E8000
trusted library allocation
page read and write
7A0000
unkown
page readonly
A18000
heap
page read and write
23DC2C05000
heap
page read and write
3700000
unkown
page read and write
1F5000338000
trusted library allocation
page read and write
12FC000
stack
page read and write
CB0000
heap
page read and write
1F50022DC000
trusted library allocation
page read and write
7C0000
unkown
page read and write
56C3000
unkown
page read and write
387A000
heap
page read and write
7FF5ED4FD000
unkown
page readonly
2E30000
unkown
page read and write
1F5001158000
trusted library allocation
page read and write
804000
heap
page read and write
233BC730000
trusted library allocation
page read and write
1270000
heap
page read and write
19C0000
unkown
page readonly
911000
unkown
page readonly
676EBFE000
unkown
page readonly
9B0000
unkown
page readonly
C50000
unkown
page read and write
1F500032C000
unkown
page read and write
A40000
unkown
page readonly
804000
heap
page read and write
1F5000338000
trusted library allocation
page read and write
1480000
heap
page read and write
1940000
unkown
page readonly
124FD000
stack
page read and write
9139000
stack
page read and write
A310000
unkown
page read and write
1080000
unkown
page readonly
C60000
unkown
page readonly
7FF5ED669000
unkown
page readonly
A40000
heap
page read and write
DA0000
unkown
page readonly
854000
heap
page read and write
AB0000
unkown
page readonly
1160000
unkown
page readonly
1FDAC272000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
C5AA000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
C77000
unkown
page readonly
890000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
480000
heap
page read and write
3E0000
unkown
page readonly
14E0000
unkown
page readonly
1131000
unkown
page readonly
1131000
unkown
page readonly
7FF5ED4C6000
unkown
page readonly
7FF5D1CCD000
unkown
page readonly
C30000
unkown
page readonly
345E000
stack
page read and write
233BC730000
trusted library allocation
page read and write
C60000
unkown
page readonly
1F500070C000
unkown
page read and write
1F5000338000
trusted library allocation
page read and write
B22B000
stack
page read and write
A38000
heap
page read and write
1F5000601000
unkown
page read and write
1600000
unkown
page readonly
C77000
unkown
page readonly
2AE6000
heap
page read and write
BC0000
unkown
page readonly
804000
heap
page read and write
1F50013AC000
unkown
page read and write
DD0000
unkown
page read and write
A37D000
unkown
page read and write
6752A78000
unkown
page read and write
6765BFB000
unkown
page read and write
C50000
unkown
page readonly
7FF5ED864000
unkown
page readonly
1110D000
stack
page read and write
1F50006E0000
unkown
page read and write
6762BFE000
unkown
page readonly
BE0000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
6C0000
unkown
page readonly
676BBFD000
unkown
page read and write
1270000
unkown
page readonly
8F0000
unkown
page read and write
1FDB07C0000
unkown
page read and write
233BC84D000
heap
page read and write
A80000
unkown
page read and write
76C0000
unkown
page read and write
930000
heap
page read and write
C75000
unkown
page read and write
A71000
unkown
page readonly
1240000
heap
page read and write
2F80000
remote allocation
page read and write
C90000
unkown
page readonly
1451000
unkown
page readonly
2370000
heap
page read and write
C75000
unkown
page read and write
1F5002424000
trusted library allocation
page read and write
540000
unkown
page readonly
826000
heap
page read and write
2A54000
heap
page read and write
1FDACA50000
unkown
page read and write
27495ED5000
heap
page read and write
19C0000
unkown
page readonly
96F000
stack
page read and write
7FF5ED674000
unkown
page readonly
817000
heap
page read and write
C61000
unkown
page execute read
11B0000
unkown
page readonly
76A000
heap
page read and write
7CE0000
unkown
page read and write
C30000
unkown
page readonly
67793FA000
unkown
page read and write
C60000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
D8C000
stack
page read and write
F10000
unkown
page readonly
6752A8A000
unkown
page read and write
D90000
unkown
page readonly
1F50002C9000
unkown
page read and write
94BC000
stack
page read and write
3F0000
unkown
page readonly
A20000
unkown
page read and write
21B0000
unkown
page readonly
1F500053C000
unkown
page read and write
227F000
stack
page read and write
233BC730000
trusted library allocation
page read and write
A50000
unkown
page readonly
2ECF000
heap
page read and write
7C0000
heap
page read and write
7FF5EDA47000
unkown
page readonly
DF0000
unkown
page readonly
2390000
heap
page read and write
1505000
heap
page read and write
8FC000
stack
page read and write
1F500017C000
unkown
page read and write
233BAA72000
heap
page read and write
3893000
heap
page read and write
600000
heap
page read and write
7DF4F3061000
unkown
page execute read
530000
unkown
page read and write
7FF5ED867000
unkown
page readonly
9879000
unkown
page read and write
BC0000
unkown
page read and write
C964000
unkown
page read and write
BCB000
stack
page read and write
C61000
unkown
page execute read
1F500155C000
unkown
page read and write
4CE0000
unkown
page read and write
770000
heap
page read and write
1240000
heap
page read and write
80B000
heap
page read and write
1FDADF4A000
unkown
page read and write
8860000
unkown
page read and write
C60000
unkown
page readonly
6769BFD000
unkown
page read and write
1FDA8CE0000
heap
page read and write
4BC9000
unkown
page read and write
DF0000
unkown
page readonly
C77000
unkown
page readonly
1F5001ACC000
trusted library allocation
page read and write
1F50021F0000
trusted library allocation
page read and write
3795000
unkown
page read and write
7F40000
unkown
page readonly
2ACC000
heap
page read and write
14B0000
unkown
page readonly
B80000
unkown
page readonly
35D0000
unkown
page read and write
355F000
stack
page read and write
1F50002A4000
trusted library allocation
page read and write
CBC3000
unkown
page read and write
1FDAC3D0000
unkown
page readonly
819000
heap
page read and write
C61000
unkown
page execute read
1F5001798000
trusted library allocation
page read and write
233BC730000
trusted library allocation
page read and write
233BC828000
heap
page read and write
660000
heap
page read and write
1F5000B50000
unkown
page read and write
890000
unkown
page readonly
C75000
unkown
page read and write
7C80000
unkown
page read and write
23DC2C6C000
heap
page read and write
1F500115A000
trusted library allocation
page read and write
CB3F000
unkown
page read and write
53C000
stack
page read and write
4B50000
unkown
page read and write
AA0000
heap
page read and write
27498BF0000
heap
page read and write
A4FC000
unkown
page read and write
C61000
unkown
page execute read
38A9000
heap
page read and write
C77000
unkown
page readonly
7FF5ED4DF000
unkown
page readonly
804000
heap
page read and write
233BC730000
trusted library allocation
page read and write
D8D000
stack
page read and write
7C0000
unkown
page readonly
C84D000
unkown
page read and write
560000
unkown
page readonly
27498E21000
heap
page read and write
7950000
unkown
page read and write
1070000
unkown
page read and write
BD0000
unkown
page readonly
E08000
heap
page read and write
930000
heap
page read and write
ED8000
heap
page read and write
AA0000
unkown
page readonly
C77000
unkown
page readonly
804000
heap
page read and write
8730000
unkown
page read and write
233BC800000
heap
page read and write
2570000
heap
page read and write
233BC730000
trusted library allocation
page read and write
1F500087C000
unkown
page read and write
1210000
unkown
page readonly
1FDAF240000
unkown
page read and write
2E50000
heap
page read and write
233BC730000
trusted library allocation
page read and write
C50000
unkown
page read and write
C00000
unkown
page readonly
2720000
unkown
page readonly
7E11000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
1108C000
stack
page read and write
6761BFE000
unkown
page readonly
667000
heap
page read and write
870000
unkown
page read and write
787C000
unkown
page read and write
FD0000
unkown
page read and write
9A07AFE000
stack
page read and write
72A000
stack
page read and write
560000
unkown
page readonly
7FF5ED41C000
unkown
page readonly
27495EE1000
heap
page read and write
7FF5ED40D000
unkown
page readonly
BF1000
unkown
page readonly
836000
heap
page read and write
233BC730000
trusted library allocation
page read and write
7FF5EDA2A000
unkown
page readonly
12FC000
stack
page read and write
980000
unkown
page read and write
4C60000
unkown
page read and write
1214000
heap
page read and write
7C90000
unkown
page read and write
DB0000
unkown
page readonly
4B93000
unkown
page read and write
818D000
stack
page read and write
BA0000
unkown
page readonly
7FC000
heap
page read and write
DB0000
unkown
page readonly
7FF71ABE0000
unkown
page readonly
29B4000
heap
page read and write
CBBF000
unkown
page read and write
900000
heap
page read and write
12C1000
unkown
page readonly
560000
unkown
page readonly
1FDADF52000
unkown
page read and write
FEDD000
unkown
page read and write
7E0000
unkown
page read and write
C6E000
unkown
page readonly
7E4000
heap
page read and write
67623FE000
unkown
page read and write
C6E000
unkown
page readonly
12D0000
heap
page read and write
7FF5ED980000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
29B0000
heap
page read and write
BB0000
unkown
page read and write
A60000
unkown
page readonly
7FF5ED779000
unkown
page readonly
7FF5ED660000
unkown
page readonly
A502000
unkown
page read and write
1FDADEDB000
unkown
page read and write
801000
heap
page read and write
4B0000
unkown
page readonly
233BC730000
trusted library allocation
page read and write
3876000
heap
page read and write
1F50006D0000
unkown
page read and write
1F5000C50000
unkown
page read and write
C5A0000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
A0089FE000
stack
page read and write
2A50000
heap
page read and write
CA20000
unkown
page read and write
1F500073F000
unkown
page read and write
1230000
unkown
page read and write
910000
unkown
page readonly
3756000
unkown
page read and write
81B000
heap
page read and write
1F5000D75000
unkown
page read and write
1F0000
unkown
page readonly
C6E000
unkown
page readonly
7FF5ED1BC000
unkown
page readonly
27498E5C000
heap
page read and write
2EC4000
heap
page read and write
4B90000
unkown
page read and write
BE0000
heap
page read and write
C77000
unkown
page readonly
27498AA0000
heap
page read and write
C6E000
unkown
page readonly
3590000
unkown
page read and write
7D20000
unkown
page readonly
560000
unkown
page readonly
A10000
unkown
page readonly
1F50009C0000
unkown
page read and write
7861000
unkown
page read and write
1F5000F18000
unkown
page read and write
B8C0000
unkown
page readonly
27498FDD000
heap
page read and write
7FF75C4B3000
unkown
page readonly
C75000
unkown
page read and write
7EE000
heap
page read and write
78A0000
unkown
page read and write
860000
unkown
page read and write
7FE000
heap
page read and write
C6E000
unkown
page readonly
1F50010B0000
unkown
page read and write
804000
heap
page read and write
1290000
heap
page read and write
29E0000
trusted library allocation
page read and write
F90000
unkown
page readonly
7FF5ED3D6000
unkown
page readonly
8E1000
unkown
page readonly
1F5001568000
unkown
page read and write
C6C1000
unkown
page read and write
A70000
heap
page read and write
233BC730000
trusted library allocation
page read and write
C75000
unkown
page read and write
6FB000
stack
page read and write
7FA000
heap
page read and write
7E5000
heap
page read and write
1FDAECA0000
trusted library section
page read and write
C60000
unkown
page readonly
677BBFE000
unkown
page readonly
7FF5ED9D6000
unkown
page readonly
AAF6000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
2EB0000
unkown
page readonly
9090000
unkown
page read and write
ED8000
heap
page read and write
1BA000
stack
page read and write
1FDAF257000
unkown
page read and write
3893000
heap
page read and write
7FF71AEBC000
unkown
page readonly
6759BFE000
unkown
page readonly
3AA000
stack
page read and write
CAFA000
unkown
page read and write
27498E9E000
heap
page read and write
C77000
unkown
page readonly
C61000
unkown
page execute read
1F5000B6C000
unkown
page read and write
CB8000
heap
page read and write
6A0000
unkown
page readonly
7869000
unkown
page read and write
1F5000CDA000
unkown
page read and write
1F500027C000
unkown
page read and write
C60000
unkown
page readonly
27495E76000
heap
page read and write
6FC000
stack
page read and write
FA34000
unkown
page read and write
1F500059C000
unkown
page read and write
DE1000
unkown
page readonly
4B8B000
unkown
page read and write
2A84000
heap
page read and write
7FF5ED9C8000
unkown
page readonly
140000
unkown
page readonly
97B5000
unkown
page read and write
7FF5ED781000
unkown
page readonly
32F0000
trusted library allocation
page read and write
2ABD000
heap
page read and write
11B0000
unkown
page readonly
C77000
unkown
page readonly
A37B000
unkown
page read and write
233BC720000
remote allocation
page read and write
9C0000
unkown
page readonly
7DF4F3071000
unkown
page execute read
BE0000
unkown
page readonly
1F50002A4000
trusted library allocation
page read and write
DA0000
heap
page read and write
7FF5ED42B000
unkown
page readonly
3890000
heap
page read and write
7FF5ED2A9000
unkown
page readonly
7867000
unkown
page read and write
388C000
heap
page read and write
A11000
unkown
page readonly
7865000
unkown
page read and write
C60000
unkown
page readonly
B7A000
stack
page read and write
B150000
unkown
page read and write
1F500016C000
unkown
page read and write
C75000
unkown
page read and write
1FDADF03000
unkown
page read and write
A19F000
stack
page read and write
8710000
unkown
page readonly
675D3FA000
unkown
page read and write
7A0000
unkown
page readonly
C61000
unkown
page execute read
1FDA8E30000
unkown
page read and write
AF0000
unkown
page read and write
A4B8000
unkown
page read and write
C60000
unkown
page readonly
9A059FE000
stack
page read and write
7FF5ED46A000
unkown
page readonly
836000
heap
page read and write
C50000
unkown
page read and write
2800000
heap
page read and write
3850000
heap
page read and write
C60000
unkown
page readonly
388C000
heap
page read and write
7FF71AEB9000
unkown
page read and write
1F50022E8000
trusted library allocation
page read and write
2A54000
heap
page read and write
A50002CC000
unkown
page read and write
C75000
unkown
page read and write
150000
unkown
page readonly
9A073FB000
stack
page read and write
1F5000C70000
unkown
page read and write
B40000
unkown
page read and write
340000
unkown
page readonly
7695000
stack
page read and write
A5000264000
unkown
page read and write
1F50002B4000
unkown
page read and write
7D1000
unkown
page readonly
1FDAFF73000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
1F50021F0000
trusted library allocation
page read and write
1F5000390000
unkown
page read and write
710000
heap
page read and write
2740000
heap
page read and write
9A07DFD000
stack
page read and write
C60000
unkown
page readonly
2749AF2D000
heap
page read and write
233BC730000
trusted library allocation
page read and write
1080000
heap
page read and write
1FDB05D0000
unkown
page read and write
2E30000
unkown
page read and write
2E70000
unkown
page readonly
388D000
heap
page read and write
5D0000
unkown
page read and write
DA0000
unkown
page readonly
675EBFE000
unkown
page readonly
274960F0000
remote allocation
page read and write
9792000
unkown
page read and write
34E9000
stack
page read and write
1F5000290000
unkown
page read and write
C89A000
unkown
page read and write
1BA000
stack
page read and write
1F50022E8000
trusted library allocation
page read and write
1FDAEDCD000
unkown
page read and write
2334000
heap
page read and write
5E0000
unkown
page read and write
1FDA8E00000
unkown
page read and write
7FF75C470000
unkown
page readonly
A18000
heap
page read and write
1FDAAAA0000
unkown
page read and write
7D1000
unkown
page readonly
1F5000F24000
unkown
page read and write
233BC876000
heap
page read and write
7FF5ED279000
unkown
page readonly
9A000
stack
page read and write
233BC855000
heap
page read and write
1FDAEFD7000
unkown
page read and write
DB0000
unkown
page readonly
23DC2C5A000
heap
page read and write
979C000
unkown
page read and write
B80000
unkown
page readonly
10B0000
heap
page read and write
1220000
unkown
page read and write
1F5000A8C000
unkown
page read and write
FF04000
unkown
page read and write
1410000
unkown
page readonly
C41000
unkown
page readonly
4BA6000
unkown
page read and write
CB2E000
unkown
page read and write
EB0000
unkown
page readonly
819000
heap
page read and write
37AE000
unkown
page read and write
C61000
unkown
page execute read
1F5001774000
trusted library allocation
page read and write
C60000
unkown
page readonly
FF01000
unkown
page read and write
1F50002A4000
trusted library allocation
page read and write
C507000
unkown
page read and write
C6E000
unkown
page readonly
A3A000
stack
page read and write
6CE000
stack
page read and write
E59D000
stack
page read and write
C77000
unkown
page readonly
1F5000338000
trusted library allocation
page read and write
540000
unkown
page readonly
C507000
unkown
page read and write
7FF75C4AA000
unkown
page read and write
A4A1000
unkown
page read and write
3858000
heap
page read and write
1F50008A4000
unkown
page read and write
7FF71AE92000
unkown
page write copy
7E3000
heap
page read and write
2690000
unkown
page read and write
C6BF000
unkown
page read and write
8C0000
heap
page read and write
2370000
heap
page read and write
1F50002D0000
unkown
page read and write
36D3000
stack
page read and write
2330000
heap
page read and write
A50002B8000
unkown
page read and write
BE0000
unkown
page read and write
2DB0000
unkown
page readonly
7FF5ED9AE000
unkown
page readonly
2A60000
heap
page read and write
BDC0000
unkown
page readonly
78A000
stack
page read and write
7E0000
heap
page read and write
1FDA8DD0000
unkown
page readonly
274986CD000
heap
page read and write
C30000
unkown
page readonly
10FC000
stack
page read and write
1350000
unkown
page readonly
BC9B000
stack
page read and write
675DBFE000
unkown
page readonly
C6E000
unkown
page readonly
BDD0000
unkown
page readonly
4C18000
unkown
page read and write
D8C000
stack
page read and write
C54A000
unkown
page read and write
AC0000
unkown
page readonly
1F5000838000
unkown
page read and write
2E50000
heap
page read and write
7FE000
heap
page read and write
C5A3000
unkown
page read and write
B82A000
stack
page read and write
620000
unkown
page readonly
12F0000
heap
page read and write
1267E000
stack
page read and write
1F500034C000
trusted library allocation
page read and write
1F5000950000
unkown
page read and write
7D6000
heap
page read and write
1F5000B14000
unkown
page read and write
7FF5ED602000
unkown
page readonly
B650000
unkown
page read and write
7C0000
unkown
page read and write
A39B000
unkown
page read and write
C60000
unkown
page readonly
AB0000
heap
page read and write
274986A2000
heap
page read and write
F28000
heap
page read and write
1001000
unkown
page readonly
BB0000
unkown
page readonly
1F500096C000
unkown
page read and write
C10000
unkown
page read and write
DC0000
heap
page read and write
233BC876000
heap
page read and write
5590000
unkown
page write copy
1160000
unkown
page readonly
CA63000
unkown
page read and write
470000
heap
page read and write
C7C5000
unkown
page read and write
A310000
unkown
page read and write
920000
unkown
page readonly
C30000
unkown
page readonly
2D50000
heap
page read and write
233BC730000
trusted library allocation
page read and write
27498DE2000
heap
page read and write
7FF5ED337000
unkown
page readonly
233BC876000
heap
page read and write
AF0000
unkown
page read and write
1F50021F0000
trusted library allocation
page read and write
427000
unkown
page read and write
1FDB0BD0000
unkown
page read and write
C61000
unkown
page execute read
827000
heap
page read and write
7C0000
unkown
page readonly
A5000274000
unkown
page read and write
2D60000
heap
page read and write
C75000
unkown
page read and write
C60000
unkown
page readonly
274989B0000
heap
page read and write
1F5001310000
unkown
page read and write
6776BFE000
unkown
page readonly
29B4000
heap
page read and write
965C000
stack
page read and write
7FF5ED97A000
unkown
page readonly
1F5000F84000
unkown
page read and write
A4AE000
unkown
page read and write
1FDAF260000
unkown
page read and write
9A10000
unkown
page read and write
1F500034C000
trusted library allocation
page read and write
233BC88B000
heap
page read and write
37A0000
unkown
page read and write
233BC730000
trusted library allocation
page read and write
12F0000
heap
page read and write
6E0000
heap
page read and write
D8C000
stack
page read and write
BE0000
unkown
page readonly
F10000
unkown
page readonly
7FF5ED886000
unkown
page readonly
C75000
unkown
page read and write
3884000
heap
page read and write
2B60000
heap
page read and write
808000
heap
page read and write
C6E000
unkown
page readonly
C30000
heap
page read and write
1290000
unkown
page readonly
29C0000
unkown
page readonly
7FF5ED265000
unkown
page readonly
13E0000
heap
page read and write
2110000
trusted library allocation
page read and write
385D000
heap
page read and write
A4AB000
unkown
page read and write
9BD7AFE000
stack
page read and write
7FF5ED426000
unkown
page readonly
2740000
unkown
page readonly
C75000
unkown
page read and write
1FDA8E51000
unkown
page readonly
2ACF000
heap
page read and write
7D0000
unkown
page readonly
80F000
heap
page read and write
1150000
unkown
page readonly
C60000
unkown
page readonly
8108000
stack
page read and write
38A5000
heap
page read and write
676D3FE000
unkown
page readonly
B90000
heap
page read and write
2A85000
heap
page read and write
9A06FFA000
stack
page read and write
88EE000
stack
page read and write
2850000
unkown
page readonly
C60000
unkown
page readonly
233BC846000
heap
page read and write
819000
heap
page read and write
DF0000
unkown
page read and write
A18000
heap
page read and write
7978000
unkown
page read and write
7FF5ED743000
unkown
page readonly
1F5000DC5000
unkown
page read and write
FEE4000
unkown
page read and write
1094000
stack
page read and write
27F4000
heap
page read and write
A7A000
stack
page read and write
E00000
unkown
page readonly
1FDA8F05000
heap
page read and write
5F1000
unkown
page readonly
C88B000
unkown
page read and write
12A0000
unkown
page readonly
There are 4197 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c
https://pcapp.store/?p=lpd_installing_r2&guid=71434D56-1548-ED3D-AEE6-C75AECD93BF0&_fcid=1730271248380473&_winver=19045&version=fa.1092c