IOC Report
1da6f47_.exe

loading gif

Files

File Path
Type
Category
Malicious
1da6f47_.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\zmC692.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZCLIPS~1.zmdownload
Microsoft Cabinet archive data, many, 2001727 bytes, 6 files, at 0x1830 +A "zPSUI.dll" +A "swscale_zm-6.dll", flags 0x4, ID 8999, number 1, extra bytes 6144 in head, 240 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\ZCOMPT~1.CAB.zmdownload
Microsoft Cabinet archive data, many, 5246451 bytes, 13 files, at 0x1830 +A "zAppRes.dll" +A "zAppUI.dll", flags 0x4, ID 19094, number 1, extra bytes 6144 in head, 401 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\zClipsCab{0A6F84B6-E70A-41B1-97EF-E45D00FB14A4}
Microsoft Cabinet archive data, many, 2001727 bytes, 6 files, at 0x1830 +A "zPSUI.dll" +A "swscale_zm-6.dll", flags 0x4, ID 8999, number 1, extra bytes 6144 in head, 240 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\zCompts.CAB{D8654466-95DA-44C9-BC6A-490A0FFEAEB8}
Microsoft Cabinet archive data, many, 5246451 bytes, 13 files, at 0x1830 +A "zAppRes.dll" +A "zAppUI.dll", flags 0x4, ID 19094, number 1, extra bytes 6144 in head, 401 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\zmC692.tmp:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.acl
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.dic
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.exc
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\352fd027c0e8f0e5.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6276C4PPFCM7788MQDZ2.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DK5KJMQHOPCIUC0FEXQ7.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Zoom\Uninstall Zoom.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Thu Mar 28 21:39:53 2024, mtime=Thu Mar 28 21:39:53 2024, atime=Thu Mar 28 21:39:33 2024, length=1020744, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Zoom\Zoom.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Thu Mar 28 21:39:50 2024, mtime=Thu Mar 28 21:39:50 2024, atime=Thu Mar 28 21:39:43 2024, length=383304, window=hide
dropped
C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Zoom.msi
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\avcodec_zm-59.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\avformat_zm-59.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\avutil_zm-57.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\swresample_zm-4.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\swscale_zm-6.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\avcodec_zm-59.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\avformat_zm-59.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\avutil_zm-57.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\swresample_zm-4.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\swscale_zm-6.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\zPSUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zAppRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zAppUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zAppUISdk.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zCCIMeeting.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zCCIUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zCCIVideo.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zChatHuddleViewRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zCustomizeMeetingUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zHuddlesApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zPSUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zPreMeetingApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zmScheduler.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\bin\zoom_meeting_bridge.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\data\Zoom.us.ini
ASCII text, with very long lines (377), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\data\viper.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\data\zoomus.enc.db
data
modified
C:\Users\user\AppData\Roaming\Zoom\data\zoomus.enc.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Zoom\data\zoomus.tmp.enc.db
data
dropped
C:\Users\user\AppData\Roaming\Zoom\data\zoomus.tmp.enc.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Zoom\installer.txt
ASCII text, with very long lines (364), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CmmBrowserEngine.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Cmmlib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptControl.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptHost.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptInstall.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptService.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptShare.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Droplet.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\DuiLib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Installer.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\UIBase.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\WebView2Loader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\XmppDll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZRCSdk.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZZHostIPCSDK.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Zoom.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZoomDocConverter.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZoomInstall.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZoomOutlookIMPlugin.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Zoom_launcher.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\annoter.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\aomagent.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-console-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-multibyte-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-private-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\archival.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\asproxy.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\cares.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\clap-high.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\clap-medium.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\concrt140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\crashrpt_lang.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\dingdong.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\dingdong1.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\directui_license.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\duilib_license.txt
ASCII text, with very long lines (755), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\leave.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\libcrypto-3-zm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\libmpg123.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\libssl-3-zm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\mcm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\meeting_chat_chime.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\meeting_raisehand_chime.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\mfAdapter.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msaalib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140_2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140_atomic_wait.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140_codecvt_ids.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\nanosvg_LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\nydus.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\beep_intercom.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\double_beep.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_0.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_1.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_2.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_3.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_4.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_5.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_6.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_7.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_8.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_9.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_a.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_hash.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_star.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\ring_pstn.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\percussion.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\record_start.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\record_stop.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\reslib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ring.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ssb_sdk.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\tp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\turbojpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\util.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\vccorlib140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\vcruntime140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\viper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\viper_async_device.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\wr_ding.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zAutoUpdate.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zBusinessUIComponent.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zChatApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zChatUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zCommonChat.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zCrashReport64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zCrashReport64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zData.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zDiagnostic.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zKBCrypto.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zMeshNetAgent.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zMsgApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zMsgAppCommon.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zNetUtils.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zOutlookIMUtil.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zPSApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zPTApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zTscoder.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zUnifyWebView.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zUpdater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zVideoApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zVideoUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWBUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWBUIRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWebService.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWebview2Agent.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWinRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zlt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zmb.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zoombase_crypto_shared.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zzhost.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\tmp_uninstall\Installer.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CmmBrowserEngine.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\Cmmlib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptControl.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptHost.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptInstall.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptService.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptShare.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\Droplet.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\DuiLib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\MailClient.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\UIBase.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\WebView2Loader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\XmppDll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZRCSdk.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZZHostIPCSDK.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\Zoom.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZoomDocConverter.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZoomInstall.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZoomOutlookIMPlugin.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\Zoom_launcher.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\annoter.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\aomagent.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\archival.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\asproxy.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\cares.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\clap-high.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\clap-medium.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\crashrpt_lang.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\dingdong.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\dingdong1.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\directui_license.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\duilib_license.txt
ASCII text, with very long lines (755), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\leave.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\libcrypto-3-zm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\libmpg123.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\libssl-3-zm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\mcm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\meeting_chat_chime.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\meeting_raisehand_chime.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\mfAdapter.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\msaalib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\nanosvg_LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\nydus.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\beep_intercom.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\double_beep.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_0.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_1.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_2.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_3.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_4.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_5.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_6.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_7.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_8.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_9.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_a.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_hash.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_star.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\ring_pstn.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\percussion.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\record_start.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\record_stop.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\reslib.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ring.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ssb_sdk.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\tp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\turbojpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\util.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\viper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\viper_async_device.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\win10rt.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\wr_ding.pcm
data
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zAutoUpdate.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zBusinessUIComponent.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zChatApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zChatUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zCommonChat.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zCrashReport64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zCrashReport64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zData.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zDiagnostic.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zKBCrypto.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMailRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMailUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMeshNetAgent.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMsgApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMsgAppCommon.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zNetUtils.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zOutlookIMUtil.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zPSApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zPTApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zTscoder.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zUnifyWebView.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zUpdater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zVideoApp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zVideoUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWBUI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWBUIRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWebService.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWebview2Agent.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWinRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zlt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zmb.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zoombase_crypto_shared.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zzhost.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Desktop\zopener_8a4800ea0a3f43f4bafd7706c1a4e7ee.log
ASCII text, with very long lines (511), with CRLF, LF line terminators
modified
There are 299 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1da6f47_.exe
"C:\Users\user\Desktop\1da6f47_.exe"
malicious
C:\Users\user\Desktop\1da6f47_.exe
"C:\Users\user\Desktop\1da6f47_.exe" /normal.priviledge
malicious
C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
"C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe" ZInstaller --conf.mode=silent --ipc_wnd=66706
malicious
C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
"C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe" /addfwexception --bin_home="C:\Users\user\AppData\Roaming\Zoom\bin"
malicious
C:\Users\user\AppData\Roaming\Zoom\bin\Zoom.exe
"C:\Users\user\AppData\Roaming\Zoom\bin\Zoom.exe" "--url=zoommtg://win.launch?h.domain=zoom.us&h.path=join&action=join&confno="
malicious
C:\Users\user\AppData\Local\Temp\zmC692.tmp
"C:\Users\user\AppData\Local\Temp\zmC692.tmp" -DAF8C715436E44649F1312698287E6A5=C:\Users\user\Desktop\1da6f47_.exe
malicious
C:\Users\user\AppData\Roaming\Zoom\bin\Zoom.exe
"C:\Users\user\AppData\Roaming\Zoom\bin\Zoom.exe" --action=joinbyno --runaszvideo=TRUE
malicious

URLs

Name
IP
Malicious
https://devfacebook.zoom.usZF=
unknown
http://www.google.com/talk/protocol/authxmlns:authiqNhSlL-0idsettypequeryjabber:iq:authusernametoken
unknown
http://jabber.org/protocol/nick
unknown
https://zoom.us/privacy/ProcessId
unknown
https://devfacebook.zoom.uszK
unknown
http://www.winimage.com/zLibDll1.2.13
unknown
https://devfacebook.zoom.usDK/
unknown
https://devgoogle.zoom.us%IL
unknown
http://jabber.org/protocol/muc#request
unknown
http://www.html-tidy.org/Accessibility/Le
unknown
https://support.zoom.us/hc/en-us/articles/201362003-Zoom-Video-Communications-Technical-Support
unknown
https://teamchat.localhost/kZMIs24TimeFormatfalsekZMUserDefaultMeetingStartWithVideokeyerrortickcoun
unknown
https://facebook.zoom.usqK
unknown
https://zoom.us/client/5.17.11.34827/zClips.CAB?t=atupg&checkSum=aa90cd9f02ebcdb5704fe1f6c76ec26e&ch
unknown
http://www.html-tidy.org/accessibility/.O
unknown
https://devfacebook.zoom.usiI
unknown
https://zoom.us/profile/get?cv=5.17.11.34827&localIP=192.168.2.4oom.us
unknown
http://jabber.org/protocol/si/profile/file-transfer
unknown
https://facebook.zoom.us?J
unknown
https://devfacebook.zoom.us3IR
unknown
https://support.workvivo.com/getNewTokenCWorkVivoManager::OnReceivedWorkvivoSettingUpdate.
unknown
http://camaya.net/gloox
unknown
https://zoomus.zendesk.com/knowledge/articles/115005516426vl_contentvt_side_bartext_contenticon_cont
unknown
http://zoom.comcert_verify_from_conf_vdi_plugin
unknown
https://support.zoom.us/hc/en-us/articles/360061037572-Archiving-settings-for-meetings-and-webinars#
unknown
https://devfacebook.zoom.us-KT
unknown
https://www.zoom.us/download
unknown
https://devgoogle.zoom.usNH)
unknown
https://facebook.zoom.us6KQ
unknown
https://support.zoom.us/hc/articles/360046244692slider_waiting_volumelb_setting_contacts_center_ring
unknown
http://www.mysite.com/myintegration.htm?number=%C
unknown
https://zoom.us/client/5.17.11.34827/zCompts.cab?t=atupg&checkSum=6eb35c271583f0075c6a60398bdceab7&c
unknown
http://jabber.org/protocol/muc#roominfo
unknown
https://zoom.us/client/latest/Installer.exe?archType=x64cal
unknown
https://facebook.zoom.us$HO
unknown
https://zoom.us/https://zoom.com/https://zoom.com.cn/https://zoomgov.com/://https:///
unknown
https://zoomus.zendesk.com/knowledge/articles/115005516426https://zoom.us/account/im/settingres=
unknown
http://jabber.org/protocol/chatstates
unknown
http://www.html-tidy.org/accessibility/.
unknown
http://crl3.digice
unknown
http://jabber.org/protocol/pubsub#owner
unknown
https://zoom.us/user/client/learnMore?flag=pmcnegativeCSBConfWndContainer::CloseReceiveEnableQueryDl
unknown
http://etherx.jabber.org/streams
unknown
https://teamchatprofilecard.localhost/
unknown
https://zoom.us/client/latest/Installer.exe?archType=x64
170.114.52.2
https://devfacebook.zoom.us#HB
unknown
https://c-ares.org/T
unknown
https://facebook.zoom.usMJ4
unknown
http://www.html-tidy.org/Accessibility/
unknown
https://docs.google.com.pptx
unknown
http://camaya.net/gloox~
unknown
http://jabber.org/protocol/feature-neg
unknown
http://jabber.org/protocol/caps
unknown
http://camaya.net/glooxD
unknown
https://www3.zoom.us
unknown
https://devgoogle.zoom.us4I_
unknown
https://devgoogle.zoom.us
unknown
http://jabber.org/protocol/pubsub#event
unknown
http://cacerts.digicert.
unknown
http://jabber.org/protocol/muc#admin
unknown
https://devgoogle.zoom.usH
unknown
https://support.zoom.us/hc/en-us/articles/201362003-Zoom-Video-Communications-Technical-Supportopens
unknown
https://zoom.us/download
unknown
https://github.com/htacg/tidy-html5/blob/master/README/LOCALIZE.md%s
unknown
https://zoom.us
unknown
http://www.google.com/talk/protocol/auth
unknown
http://jabber.org/protocol/disco#items
unknown
https://support.zoom.us/hc/en-us/articles/201362683
unknown
https://devgoogle.zoom.usTH?
unknown
https://zoom.us/client/latest/Zoom.msi?archType=x64
170.114.52.2
https://zoom.us/client/5.17.11.34827/Zoom.msi?t=atupg&archType=x64
unknown
http://jabber.org/protocol/xhtml-im
unknown
https://devgoogle.zoom.us:J
unknown
https://support.zoom.us/hc/en-us/articles/360048660871lb_e2ee_warningpanel_e2ee_warningbtn_e2e_enc_t
unknown
https://zoom.us/privacy/https:http:Shell_TrayWndmailto:CreateProcessWithTokenWADVAPI32.dllEntrust
unknown
https://facebook.zoom.usCK
unknown
https://facebook.zoom.usdI
unknown
http://jabber.org/protocol/offline
unknown
http://cacerts.digic
unknown
http://safelinks/ejl/?pwd=url=0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-_.~
unknown
https://zoomus.zendesk.com/knowledge/articles/1150055164265
unknown
http://dev.w3.org/html5/spec-author-view/
unknown
https://zoom.uscom.zoomus.module.unifywebviewzoomus.class.IUnifyWebViewModuleAPIABCDEFGHJKLMNPQRSTUV
unknown
https://zoomdev.uszoom.us/my/zoom.us/s/https://zoom.usptitruzhfrCTextMsgItemUIesdewin_text_msg_conta
unknown
https://zoom.us/client;Package-url=https://zoom.us/client/5.17.11.34827/Zoom.msi?t=atupg&archType=x6
unknown
http://jabber.org/protocol/bytestreams
unknown
https://zoomus.zendesk.com/knowledge/articles/115005516426NL~
unknown
http://jabber.org/protocol/muc#rooms
unknown
https://devfacebook.zoom.usxI
unknown
http://jabber.org/protocol/amp
unknown
https://devfacebook.zoom.usWK
unknown
http://crl3.digicert.co
unknown
http://www.html-tidy.org/accessibility/
unknown
https://www.zoom.us
unknown
http://www.unicode.org/
unknown
http://jabber.org/protocol/muc
unknown
https://cdn.zoom.us/prod/5.17.11.34827/x64/zClips.CAB
52.84.151.39
http://cacerts.digicredI8
unknown
https://copymailtochat.localhost/mailto:x
unknown
https://support.zoom.us
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cdn.zoom.us
52.84.151.39
zoom.us
170.114.52.2

IPs

IP
Domain
Country
Malicious
144.195.37.213
unknown
United States
170.114.52.2
zoom.us
United States
144.195.0.250
unknown
United States
52.84.151.39
cdn.zoom.us
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
URLInfoAbout
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
Zoom.exe
HKEY_CURRENT_USER_Classes\.zoommtg
NULL
HKEY_CURRENT_USER_Classes\.zoommtg
Content Type
HKEY_CURRENT_USER_Classes\ZoomLauncher
NULL
HKEY_CURRENT_USER_Classes\ZoomLauncher\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\MIME\Database\Content Type\application/x-zoommtg-launcher
Extension
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform
Zoom 3.6.0
HKEY_CURRENT_USER_Classes\zoommtg
NULL
HKEY_CURRENT_USER_Classes\zoommtg
URL Protocol
HKEY_CURRENT_USER_Classes\zoommtg
UseOriginalUrlEncoding
HKEY_CURRENT_USER_Classes\zoommtg\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\zoommtg\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\zoommtg
WarnOnOpen
HKEY_CURRENT_USER_Classes\zoomus
NULL
HKEY_CURRENT_USER_Classes\zoomus
URL Protocol
HKEY_CURRENT_USER_Classes\zoomus
UseOriginalUrlEncoding
HKEY_CURRENT_USER_Classes\zoomus\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\zoomus\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\zoomus
WarnOnOpen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}
AppName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}
AppPath
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}
Policy
HKEY_CURRENT_USER_Classes\ZoomRecording
NULL
HKEY_CURRENT_USER_Classes\ZoomRecording\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\ZoomRecording\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\.zoom
NULL
HKEY_CURRENT_USER_Classes\ZoomPhoneCall
NULL
HKEY_CURRENT_USER_Classes\ZoomPhoneCall
URL Protocol
HKEY_CURRENT_USER_Classes\ZoomPhoneCall\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\ZoomPhoneCall\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\ZoomPbx.zoomphonecall
NULL
HKEY_CURRENT_USER_Classes\ZoomPbx.zoomphonecall
URL Protocol
HKEY_CURRENT_USER_Classes\ZoomPbx.zoomphonecall\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\ZoomPbx.zoomphonecall\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX
NULL
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Capabilities
ApplicationDescription
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Capabilities
ApplicationIcon
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Capabilities
ApplicationName
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Capabilities\UrlAssociations
ZoomPhoneCall
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Protocols\ZoomPhoneCall
NULL
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Protocols\ZoomPhoneCall
URL Protocol
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Protocols\ZoomPhoneCall\DefaultIcon
NULL
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Protocols\ZoomPhoneCall\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\RegisteredApplications
ZoomPBX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\ZoomPhoneCall\UserChoice
Progid
HKEY_CURRENT_USER\SOFTWARE\ZoomUMX\PerInstall
from
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
There are 50 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFDF62B7000
unkown
page readonly
2945F222000
heap
page read and write
218968CC000
heap
page read and write
21890704000
heap
page read and write
2945ECF9000
heap
page read and write
21896848000
heap
page read and write
218933D9000
heap
page read and write
218970A7000
heap
page read and write
2946F253000
trusted library allocation
page read and write
2A9E000
heap
page read and write
21896480000
heap
page read and write
2189259A000
heap
page read and write
7FFDF37F1000
unkown
page write copy
2946F261000
trusted library allocation
page read and write
7FFDF56D0000
unkown
page readonly
7FFDF5C4A000
unkown
page readonly
2945F21F000
heap
page read and write
218920ED000
heap
page read and write
2189717C000
heap
page read and write
2945F22A000
heap
page read and write
29463CB7000
heap
page read and write
21890707000
heap
page read and write
21890703000
heap
page read and write
F4334FE000
stack
page read and write
21895C95000
heap
page read and write
4BA05F7000
stack
page read and write
3470000
heap
page read and write
2945F255000
heap
page read and write
2945F28F000
heap
page read and write
294684E6000
trusted library allocation
page read and write
21895E1D000
heap
page read and write
2945F255000
heap
page read and write
218940A8000
heap
page read and write
21893EB6000
heap
page read and write
7FFDF15AE000
unkown
page read and write
2945F222000
heap
page read and write
294628A0000
heap
page read and write
2945FF99000
heap
page read and write
7FFDF2140000
unkown
page readonly
2946F29F000
trusted library allocation
page read and write
21895FCB000
heap
page read and write
1CC9BD26000
heap
page read and write
294724D2000
heap
page read and write
29464EAB000
heap
page read and write
21890905000
heap
page read and write
36CC000
heap
page read and write
2945F222000
heap
page read and write
7FFDF5E0C000
unkown
page read and write
7C6D000
stack
page read and write
2189408F000
heap
page read and write
21896300000
trusted library allocation
page read and write
36DA000
heap
page read and write
28F4000
heap
page read and write
2945F217000
heap
page read and write
7FFDF598D000
unkown
page readonly
21893FAB000
heap
page read and write
4B9ECFE000
stack
page read and write
29463438000
heap
page read and write
F432CFE000
stack
page read and write
1CC9F50D000
heap
page read and write
1CC92C2F000
heap
page read and write
21894124000
heap
page read and write
29464E9B000
heap
page read and write
7FFDF20FC000
unkown
page write copy
29473128000
heap
page read and write
2945D288000
heap
page read and write
2945F222000
heap
page read and write
2189606D000
heap
page read and write
218925A0000
heap
page read and write
1CC9B0E0000
heap
page read and write
2946845C000
trusted library allocation
page read and write
2945F217000
heap
page read and write
7FFDF56C9000
unkown
page write copy
7FFDF1020000
unkown
page readonly
3A10000
heap
page read and write
7FFDF0D31000
unkown
page execute read
218906DA000
heap
page read and write
29472CD8000
heap
page read and write
294713FC000
heap
page read and write
7FFDF6EDC000
unkown
page read and write
2945D2AD000
heap
page read and write
2189651F000
heap
page read and write
2945D288000
heap
page read and write
21895D3C000
heap
page read and write
29468531000
trusted library allocation
page read and write
294684BC000
trusted library allocation
page read and write
2945F21C000
heap
page read and write
2945F249000
heap
page read and write
29462838000
heap
page read and write
21896FC2000
heap
page read and write
731000
unkown
page execute read
28F4000
heap
page read and write
21896F7A000
heap
page read and write
218908F0000
trusted library allocation
page read and write
2945F22A000
heap
page read and write
2945ECC0000
heap
page read and write
218964AF000
heap
page read and write
2945F21F000
heap
page read and write
21896357000
heap
page read and write
2945ED15000
heap
page read and write
2189686C000
heap
page read and write
74C000
unkown
page readonly
21893FA7000
heap
page read and write
1CC9F628000
heap
page read and write
2945F249000
heap
page read and write
21892583000
heap
page read and write
7FF73193A000
unkown
page read and write
21892583000
heap
page read and write
2189259A000
heap
page read and write
2946F24C000
trusted library allocation
page read and write
294684FF000
trusted library allocation
page read and write
21896B6F000
heap
page read and write
2946848C000
trusted library allocation
page read and write
1CC96250000
heap
page read and write
2945F222000
heap
page read and write
2945F227000
heap
page read and write
218988C0000
trusted library allocation
page read and write
7FF7E3A2D000
unkown
page readonly
218925D2000
heap
page read and write
29464EC4000
heap
page read and write
29462BC2000
heap
page read and write
21896300000
trusted library allocation
page read and write
29473217000
heap
page read and write
F433EFE000
stack
page read and write
29464EA4000
heap
page read and write
29464E7F000
heap
page read and write
21893CC6000
heap
page read and write
2945D24E000
heap
page read and write
1EF9E0C0000
heap
page read and write
2945D28B000
heap
page read and write
29460870000
trusted library allocation
page read and write
7FFDF6FC1000
unkown
page execute read
2DA0000
heap
page read and write
29472F36000
heap
page read and write
218925A0000
heap
page read and write
2945F22C000
heap
page read and write
21892540000
heap
page read and write
29468516000
trusted library allocation
page read and write
2945D29B000
heap
page read and write
2189660C000
heap
page read and write
29463BDC000
heap
page read and write
218920E1000
heap
page read and write
29468493000
trusted library allocation
page read and write
294684F3000
trusted library allocation
page read and write
2945F255000
heap
page read and write
29468448000
trusted library allocation
page read and write
29464EB2000
heap
page read and write
29468456000
trusted library allocation
page read and write
294729D8000
heap
page read and write
2945F222000
heap
page read and write
2945F264000
heap
page read and write
7FFDF1CE3000
unkown
page readonly
2945F2B7000
heap
page read and write
218920E1000
heap
page read and write
218967D2000
heap
page read and write
29462E21000
heap
page read and write
1CC966C1000
heap
page read and write
218921F3000
heap
page read and write
2D5A000
heap
page read and write
2945D2BA000
heap
page read and write
2946F237000
trusted library allocation
page read and write
29472EC5000
heap
page read and write
2189259F000
heap
page read and write
21896932000
heap
page read and write
7FFDF1CA6000
unkown
page read and write
2946F248000
trusted library allocation
page read and write
29462CFE000
heap
page read and write
7FFDF6F5F000
unkown
page readonly
2945F26E000
heap
page read and write
21896300000
trusted library allocation
page read and write
7FFDF56CF000
unkown
page read and write
29462BBD000
heap
page read and write
28F4000
heap
page read and write
218950E9000
heap
page read and write
2945F251000
heap
page read and write
21896300000
trusted library allocation
page read and write
2946392A000
heap
page read and write
21896C01000
heap
page read and write
2945F25F000
heap
page read and write
218906F0000
heap
page read and write
7FFDF640C000
unkown
page read and write
2945F225000
heap
page read and write
2945D2AD000
heap
page read and write
1CC966B2000
heap
page read and write
2945F24B000
heap
page read and write
7FFDF6411000
unkown
page write copy
1CC96680000
heap
page read and write
2945F261000
heap
page read and write
730000
unkown
page readonly
2946001E000
heap
page read and write
218925A8000
heap
page read and write
21895147000
heap
page read and write
29463AFB000
heap
page read and write
2947343C000
heap
page read and write
218906B6000
heap
page read and write
29462969000
heap
page read and write
4BA0CFE000
stack
page read and write
2945F21F000
heap
page read and write
36DA000
heap
page read and write
2945F217000
heap
page read and write
21896300000
trusted library allocation
page read and write
29464EC1000
heap
page read and write
294684DF000
trusted library allocation
page read and write
2945F249000
heap
page read and write
218920E1000
heap
page read and write
80CD000
heap
page read and write
218920E9000
heap
page read and write
2945F219000
heap
page read and write
218925BC000
heap
page read and write
21895C5C000
heap
page read and write
2945F251000
heap
page read and write
29471294000
heap
page read and write
7FFDF5E11000
unkown
page read and write
799F000
stack
page read and write
7FFDF640F000
unkown
page read and write
1CC9627C000
heap
page read and write
21896300000
trusted library allocation
page read and write
29468494000
trusted library allocation
page read and write
1CC9915E000
heap
page read and write
21893195000
heap
page read and write
730000
unkown
page readonly
29463A07000
heap
page read and write
21890706000
heap
page read and write
7FFDF1BE0000
unkown
page readonly
1CC9B451000
heap
page read and write
7FFDF59B1000
unkown
page execute read
21895DA8000
heap
page read and write
21896300000
trusted library allocation
page read and write
2945D4C0000
trusted library allocation
page read and write
2945F270000
heap
page read and write
2189259F000
heap
page read and write
2945F22B000
heap
page read and write
1EF9DFB0000
heap
page read and write
7FF73193E000
unkown
page readonly
218925A0000
heap
page read and write
35C000
stack
page read and write
1CC9F870000
heap
page read and write
2945F219000
heap
page read and write
21896D61000
heap
page read and write
21893C43000
heap
page read and write
21892580000
heap
page read and write
2945F22C000
heap
page read and write
2945F219000
heap
page read and write
21895C71000
heap
page read and write
21896458000
heap
page read and write
2945ED5D000
heap
page read and write
7FFDF6FC0000
unkown
page readonly
36C5000
heap
page read and write
218920FF000
heap
page read and write
7FFDF56D0000
unkown
page readonly
21896631000
heap
page read and write
2945F24B000
heap
page read and write
7FF73195E000
unkown
page readonly
29463C22000
heap
page read and write
1CC961F1000
heap
page read and write
218925D3000
heap
page read and write
2945F21F000
heap
page read and write
21895D4C000
heap
page read and write
2945EDAD000
heap
page read and write
2945ED01000
heap
page read and write
7FF73195E000
unkown
page readonly
21896E3A000
heap
page read and write
294684BD000
trusted library allocation
page read and write
2945F222000
heap
page read and write
29463A26000
heap
page read and write
218906A1000
heap
page read and write
2945D24E000
heap
page read and write
7FFDF5E09000
unkown
page read and write
21895F1D000
heap
page read and write
F4329FE000
stack
page read and write
29468471000
trusted library allocation
page read and write
7B6D000
stack
page read and write
21896300000
heap
page read and write
218965AC000
heap
page read and write
2945F222000
heap
page read and write
2945D2B8000
heap
page read and write
218950E6000
heap
page read and write
294684F1000
trusted library allocation
page read and write
218967E3000
heap
page read and write
21895D0C000
heap
page read and write
35FE000
stack
page read and write
2946004F000
heap
page read and write
218925A8000
heap
page read and write
333A000
stack
page read and write
2945F289000
heap
page read and write
4B9E4DE000
stack
page read and write
21896A80000
heap
page read and write
2945F227000
heap
page read and write
7FFDF6EEE000
unkown
page read and write
21893F86000
heap
page read and write
21896300000
trusted library allocation
page read and write
218925A6000
heap
page read and write
218925A0000
heap
page read and write
7FFDF64A0000
unkown
page readonly
2945D298000
heap
page read and write
3711000
heap
page read and write
7FFDF6443000
unkown
page read and write
21892583000
heap
page read and write
7FF73195E000
unkown
page readonly
7FFDF596B000
unkown
page read and write
28F4000
heap
page read and write
2945F3D0000
heap
page read and write
29464E7F000
heap
page read and write
2189600E000
heap
page read and write
7FFDF3846000
unkown
page readonly
21896AF1000
heap
page read and write
F4343FE000
stack
page read and write
7FF7E39A0000
unkown
page readonly
21894082000
heap
page read and write
29468528000
trusted library allocation
page read and write
218921A1000
heap
page read and write
1CC97634000
heap
page read and write
3460000
heap
page read and write
21892583000
heap
page read and write
29465F50000
trusted library section
page read and write
294684CA000
trusted library allocation
page read and write
21896940000
heap
page read and write
29468D9D000
trusted library allocation
page read and write
7FFDF6415000
unkown
page read and write
2C90000
heap
page read and write
5FCF000
stack
page read and write
2946855F000
trusted library allocation
page read and write
29472D49000
heap
page read and write
2945D253000
heap
page read and write
7FFDF56F0000
unkown
page readonly
2189428C000
heap
page read and write
29460250000
heap
page read and write
1CC99B6B000
heap
page read and write
2945F219000
heap
page read and write
2945F450000
heap
page read and write
7FFDF5DB9000
unkown
page readonly
29463AFE000
heap
page read and write
218906EF000
heap
page read and write
294732C2000
heap
page read and write
21892105000
heap
page read and write
2945F22A000
heap
page read and write
7FFDF15BB000
unkown
page readonly
218931CD000
heap
page read and write
218925BC000
heap
page read and write
2C91000
heap
page read and write
294628DE000
heap
page read and write
7FF73193C000
unkown
page read and write
21892FD1000
heap
page read and write
2945F22C000
heap
page read and write
2945F22A000
heap
page read and write
7FFDF3845000
unkown
page read and write
2945D515000
heap
page read and write
2189602D000
heap
page read and write
8060000
heap
page read and write
2946854B000
trusted library allocation
page read and write
2945F225000
heap
page read and write
21892580000
heap
page read and write
2945F255000
heap
page read and write
29462BA9000
heap
page read and write
218964D6000
heap
page read and write
21895C87000
heap
page read and write
21896300000
trusted library allocation
page read and write
21890900000
heap
page read and write
7FFDF2F30000
unkown
page readonly
2945F219000
heap
page read and write
785E000
stack
page read and write
7FFDF2B91000
unkown
page read and write
2A0000
unkown
page readonly
7FFDF5E09000
unkown
page read and write
21897190000
heap
page read and write
7FFDF541B000
unkown
page readonly
1CC9F625000
heap
page read and write
1CC9B4E3000
heap
page read and write
21896C55000
heap
page read and write
2945D288000
heap
page read and write
2945F1EA000
heap
page read and write
5E90000
remote allocation
page read and write
218940F7000
heap
page read and write
2945D29C000
heap
page read and write
36C6000
heap
page read and write
294684D1000
trusted library allocation
page read and write
2945F261000
heap
page read and write
28F4000
heap
page read and write
2945F219000
heap
page read and write
29473045000
heap
page read and write
7FFDF1CAF000
unkown
page readonly
21895DC8000
heap
page read and write
3370000
heap
page read and write
1CC9B215000
heap
page read and write
21890670000
heap
page read and write
1CC9F4AA000
heap
page read and write
21893F93000
heap
page read and write
7FFDF1021000
unkown
page execute read
2946F28A000
trusted library allocation
page read and write
21893409000
heap
page read and write
218906A1000
heap
page read and write
2945ECC1000
heap
page read and write
29473132000
heap
page read and write
2945F225000
heap
page read and write
28F4000
heap
page read and write
218906FC000
heap
page read and write
218906F3000
heap
page read and write
7FF73193A000
unkown
page write copy
1CC975FB000
heap
page read and write
36D2000
heap
page read and write
21890706000
heap
page read and write
29463CBB000
heap
page read and write
2189259F000
heap
page read and write
2945F225000
heap
page read and write
1CC9B408000
heap
page read and write
499F000
stack
page read and write
7FFDF5E11000
unkown
page read and write
2945F222000
heap
page read and write
CB0BFFE000
stack
page read and write
29473120000
heap
page read and write
1CC9B0C6000
heap
page read and write
2946F271000
trusted library allocation
page read and write
218906F9000
heap
page read and write
2945F263000
heap
page read and write
294684A1000
trusted library allocation
page read and write
36C5000
heap
page read and write
218950AC000
heap
page read and write
2946F2B4000
trusted library allocation
page read and write
21892583000
heap
page read and write
2945F3C0000
trusted library allocation
page read and write
2945F217000
heap
page read and write
7DAD000
stack
page read and write
2945D2B4000
heap
page read and write
2945D29F000
heap
page read and write
218906F0000
heap
page read and write
29468536000
trusted library allocation
page read and write
2945F225000
heap
page read and write
2946286C000
heap
page read and write
7FFDF5E0E000
unkown
page write copy
7FFDF5C37000
unkown
page read and write
218925B7000
heap
page read and write
2945F219000
heap
page read and write
7FFDF598D000
unkown
page readonly
2945F251000
heap
page read and write
29464EAB000
heap
page read and write
21892583000
heap
page read and write
218925AA000
heap
page read and write
29464EBF000
heap
page read and write
218925BC000
heap
page read and write
28F4000
heap
page read and write
2945F22A000
heap
page read and write
2189259A000
heap
page read and write
7FF7E3A6A000
unkown
page readonly
218968C8000
heap
page read and write
7FFDF3B9D000
unkown
page readonly
29462DE1000
heap
page read and write
2A1000
unkown
page execute read
29472317000
heap
page read and write
2945F24B000
heap
page read and write
7FFDF1C76000
unkown
page readonly
2945F217000
heap
page read and write
29463BB6000
heap
page read and write
2946F268000
trusted library allocation
page read and write
80C4000
heap
page read and write
29464E9D000
heap
page read and write
2945F222000
heap
page read and write
2945F261000
heap
page read and write
2945F267000
heap
page read and write
2189259A000
heap
page read and write
2945F22A000
heap
page read and write
294684D8000
trusted library allocation
page read and write
2945D2B4000
heap
page read and write
602E000
heap
page read and write
2C8F000
stack
page read and write
4BA01FE000
stack
page read and write
1CC9A32D000
heap
page read and write
2945D2B4000
heap
page read and write
218971A6000
heap
page read and write
21892557000
heap
page read and write
218925A8000
heap
page read and write
2945F227000
heap
page read and write
2945F222000
heap
page read and write
2946343C000
heap
page read and write
29468554000
trusted library allocation
page read and write
2945F22B000
heap
page read and write
2E60000
heap
page read and write
218940DA000
heap
page read and write
218906EF000
heap
page read and write
218925A2000
heap
page read and write
29464E7F000
heap
page read and write
7FFDF6F1D000
unkown
page read and write
36C5000
heap
page read and write
1CC9F9FB000
heap
page read and write
218972CD000
heap
page read and write
74C000
unkown
page readonly
2946287E000
heap
page read and write
21892581000
heap
page read and write
29464E7F000
heap
page read and write
29472EBA000
heap
page read and write
39E0000
heap
page read and write
7FFDF1D01000
unkown
page execute read
21893FB2000
heap
page read and write
F4346FE000
stack
page read and write
29462CCF000
heap
page read and write
742000
unkown
page readonly
7FFDF5C35000
unkown
page write copy
2945D2B4000
heap
page read and write
29462AF5000
heap
page read and write
21894E89000
heap
page read and write
29465F30000
trusted library section
page read and write
2189664C000
heap
page read and write
21892580000
heap
page read and write
29463D47000
heap
page read and write
218931CB000
heap
page read and write
35BE000
stack
page read and write
2189660C000
heap
page read and write
29468440000
trusted library allocation
page read and write
21896753000
heap
page read and write
3A15000
heap
page read and write
7FFDF5E14000
unkown
page read and write
29463A03000
heap
page read and write
1CC9F7D9000
heap
page read and write
21895D4C000
heap
page read and write
2946F230000
trusted library allocation
page read and write
21892791000
heap
page read and write
7FFDF3801000
unkown
page write copy
2945F21F000
heap
page read and write
29463863000
heap
page read and write
21896B67000
heap
page read and write
7FFDF5C71000
unkown
page execute read
2946849B000
trusted library allocation
page read and write
2945F22A000
heap
page read and write
2946287F000
heap
page read and write
21893EB4000
heap
page read and write
2945ED3D000
heap
page read and write
1CC966CF000
heap
page read and write
7FFDF6412000
unkown
page read and write
21895CEB000
heap
page read and write
28F0000
heap
page read and write
21893E2E000
heap
page read and write
29462E54000
heap
page read and write
7FF731938000
unkown
page read and write
1EF9E1A0000
heap
page readonly
29463D60000
trusted library allocation
page read and write
29473147000
heap
page read and write
29462A90000
heap
page read and write
2945D21F000
heap
page read and write
29464E9B000
heap
page read and write
7FFDF1490000
unkown
page readonly
7FFDF5E31000
unkown
page execute read
2946843A000
trusted library allocation
page read and write
371E000
heap
page read and write
29462E87000
heap
page read and write
7FFDF644E000
unkown
page readonly
2945F261000
heap
page read and write
2945F264000
heap
page read and write
29463525000
heap
page read and write
218920E0000
heap
page read and write
2945D288000
heap
page read and write
29472A5A000
heap
page read and write
2945F217000
heap
page read and write
218920FF000
heap
page read and write
218964EF000
heap
page read and write
21895E15000
heap
page read and write
7FFDF5E30000
unkown
page readonly
29472FA6000
heap
page read and write
2946F24F000
trusted library allocation
page read and write
29462D3A000
heap
page read and write
218906F2000
heap
page read and write
7FFDF5E0E000
unkown
page write copy
21896322000
heap
page read and write
1CC9A916000
heap
page read and write
21892581000
heap
page read and write
2945F22C000
heap
page read and write
21892185000
heap
page read and write
4B9FDFD000
stack
page read and write
1CC965B6000
heap
page read and write
1CC9F72D000
heap
page read and write
2945F255000
heap
page read and write
371C000
heap
page read and write
2945D2BA000
heap
page read and write
7FFDF5968000
unkown
page read and write
2945ECC1000
heap
page read and write
1CC9679F000
heap
page read and write
21897118000
heap
page read and write
2945F229000
heap
page read and write
2946087D000
trusted library allocation
page read and write
2945D2AD000
heap
page read and write
29472A3A000
heap
page read and write
29463D5D000
heap
page read and write
74C000
unkown
page readonly
2945D288000
heap
page read and write
2945F460000
heap
page read and write
294684DF000
trusted library allocation
page read and write
7FFDF640B000
unkown
page write copy
2945ED09000
heap
page read and write
7FFDF640B000
unkown
page write copy
29468503000
trusted library allocation
page read and write
2945D2B4000
heap
page read and write
2945F22B000
heap
page read and write
7FF73193A000
unkown
page write copy
2189747A000
heap
page read and write
21896300000
trusted library allocation
page read and write
1CC9B0C4000
heap
page read and write
294627EB000
heap
page read and write
2945D28C000
heap
page read and write
29464EBF000
heap
page read and write
2189259A000
heap
page read and write
7FFDF2107000
unkown
page read and write
29460246000
heap
page read and write
218964A0000
heap
page read and write
2945F217000
heap
page read and write
2945D28C000
heap
page read and write
2945D288000
heap
page read and write
2945F255000
heap
page read and write
218925BC000
heap
page read and write
7FFDF5C4A000
unkown
page readonly
2945F22A000
heap
page read and write
7FFDF3845000
unkown
page read and write
370F000
heap
page read and write
1EF9FEF0000
heap
page read and write
218925B7000
heap
page read and write
2946364B000
heap
page read and write
2945F456000
heap
page read and write
29462FB1000
heap
page read and write
21894FA8000
heap
page read and write
3620000
heap
page read and write
4BA0EFE000
stack
page read and write
21893511000
heap
page read and write
29460247000
heap
page read and write
218925A2000
heap
page read and write
4B9EDFE000
stack
page read and write
2945F21F000
heap
page read and write
2946349A000
heap
page read and write
21890706000
heap
page read and write
4BA08FE000
stack
page read and write
2945ECC5000
heap
page read and write
1EF9E210000
trusted library allocation
page read and write
7FFDF1CA2000
unkown
page read and write
29462F6F000
heap
page read and write
21893429000
heap
page read and write
2189258E000
heap
page read and write
2945F222000
heap
page read and write
2945ED6D000
heap
page read and write
7FFDF59B0000
unkown
page readonly
369E000
heap
page read and write
29472AEC000
heap
page read and write
21893FB0000
heap
page read and write
29462A6F000
heap
page read and write
7FFDF1BE1000
unkown
page execute read
21897470000
trusted library allocation
page read and write
21896A3B000
heap
page read and write
218925AC000
heap
page read and write
1CC9F498000
heap
page read and write
2189653E000
heap
page read and write
21893E9F000
heap
page read and write
218925A6000
heap
page read and write
2947313D000
heap
page read and write
21895DF7000
heap
page read and write
7FFDF3663000
unkown
page readonly
2945F249000
heap
page read and write
21892580000
heap
page read and write
21895E48000
heap
page read and write
2BA000
unkown
page read and write
2945F219000
heap
page read and write
2946851D000
trusted library allocation
page read and write
2945F222000
heap
page read and write
5E90000
remote allocation
page read and write
2189658A000
heap
page read and write
29473220000
heap
page read and write
29468574000
trusted library allocation
page read and write
294734A1000
heap
page read and write
218920E9000
heap
page read and write
21895F08000
heap
page read and write
2945D28C000
heap
page read and write
7FFDF6F4F000
unkown
page read and write
7FFDF6EE3000
unkown
page write copy
742000
unkown
page readonly
F4342FE000
stack
page read and write
294684D5000
trusted library allocation
page read and write
F4348FC000
stack
page read and write
29474100000
trusted library allocation
page read and write
2945F22B000
heap
page read and write
294684FA000
trusted library allocation
page read and write
5ECE000
stack
page read and write
29462B7D000
heap
page read and write
218906DF000
heap
page read and write
2946845C000
trusted library allocation
page read and write
218925A8000
heap
page read and write
2189604F000
heap
page read and write
29462B57000
heap
page read and write
7FFDF1CA3000
unkown
page write copy
218969F7000
heap
page read and write
2945F22C000
heap
page read and write
294725E2000
heap
page read and write
2945ED11000
heap
page read and write
7FFDF1D00000
unkown
page readonly
2945ECD0000
heap
page read and write
1CC92C63000
heap
page read and write
29473145000
heap
page read and write
1CC9664F000
heap
page read and write
7FFDF640C000
unkown
page read and write
21896300000
trusted library allocation
page read and write
2945ED0D000
heap
page read and write
21892589000
heap
page read and write
218906A4000
heap
page read and write
2945F25F000
heap
page read and write
218921A9000
heap
page read and write
294684C4000
trusted library allocation
page read and write
1CC99060000
heap
page read and write
2945D1E0000
heap
page read and write
294684F4000
trusted library allocation
page read and write
2945F222000
heap
page read and write
7FFDF5E14000
unkown
page read and write
7FFDF6411000
unkown
page write copy
21896300000
trusted library allocation
page read and write
29468DB0000
trusted library allocation
page read and write
82FC000
stack
page read and write
632F000
stack
page read and write
294684CB000
trusted library allocation
page read and write
1CC92BF1000
heap
page read and write
7FF73195E000
unkown
page readonly
29472FB2000
heap
page read and write
369D000
heap
page read and write
294633A4000
heap
page read and write
21895130000
heap
page read and write
218925DF000
heap
page read and write
29464EBA000
heap
page read and write
1CC92C5C000
heap
page read and write
7FFDF15B2000
unkown
page read and write
36C6000
heap
page read and write
29462B99000
heap
page read and write
2C91000
heap
page read and write
294639FF000
heap
page read and write
1CC92C2F000
heap
page read and write
2945F225000
heap
page read and write
29464EBF000
heap
page read and write
2189350E000
heap
page read and write
2945F275000
heap
page read and write
7FF7E3A2D000
unkown
page readonly
2945F1C5000
heap
page read and write
1EF9E305000
heap
page read and write
F4322DB000
stack
page read and write
21896091000
heap
page read and write
2945D2B4000
heap
page read and write
29468DDD000
trusted library allocation
page read and write
7FFDF6416000
unkown
page write copy
2945F219000
heap
page read and write
21896037000
heap
page read and write
1CC9A32B000
heap
page read and write
7FF731911000
unkown
page execute read
2945D288000
heap
page read and write
21895FEE000
heap
page read and write
7FFDF5901000
unkown
page readonly
2947146D000
heap
page read and write
21896D2D000
heap
page read and write
21892FD1000
heap
page read and write
2946F23A000
trusted library allocation
page read and write
218920D0000
trusted library allocation
page read and write
218967D4000
heap
page read and write
2189643F000
heap
page read and write
7FFDF6D01000
unkown
page readonly
21890704000
heap
page read and write
218925A0000
heap
page read and write
7FFDF6F30000
unkown
page read and write
2945F24D000
heap
page read and write
218906DC000
heap
page read and write
2945D2AD000
heap
page read and write
7FF731910000
unkown
page readonly
7FFDF0DFD000
unkown
page readonly
2189645F000
heap
page read and write
7FF73193E000
unkown
page readonly
218925A0000
heap
page read and write
2945FF5F000
heap
page read and write
7FFDF4F29000
unkown
page readonly
21895DC5000
heap
page read and write
7FFDF6D01000
unkown
page readonly
29468DBD000
trusted library allocation
page read and write
2189259F000
heap
page read and write
21896FA0000
heap
page read and write
809C000
heap
page read and write
29468486000
trusted library allocation
page read and write
2946284B000
heap
page read and write
218920E9000
heap
page read and write
29462AD4000
heap
page read and write
294684AE000
trusted library allocation
page read and write
7FFDF595A000
unkown
page write copy
21893DED000
heap
page read and write
21896DA3000
heap
page read and write
7FFDF54B2000
unkown
page read and write
21890705000
heap
page read and write
21893529000
heap
page read and write
2946F2AD000
trusted library allocation
page read and write
2189315B000
heap
page read and write
2945F26B000
heap
page read and write
218967EC000
heap
page read and write
7FFDF54B6000
unkown
page write copy
7FFDF5E0C000
unkown
page read and write
21896874000
heap
page read and write
29462BDB000
heap
page read and write
2945D28C000
heap
page read and write
29474100000
trusted library allocation
page read and write
6FC000
stack
page read and write
2945F22A000
heap
page read and write
2189373C000
heap
page read and write
21895C08000
heap
page read and write
4B9F1FE000
stack
page read and write
21893F9D000
heap
page read and write
2945ED35000
heap
page read and write
21892FA0000
trusted library allocation
page read and write
29463580000
heap
page read and write
2945F21F000
heap
page read and write
29473241000
heap
page read and write
29462A91000
heap
page read and write
21895E15000
heap
page read and write
2945F251000
heap
page read and write
2945D288000
heap
page read and write
29472913000
heap
page read and write
21897470000
trusted library allocation
page read and write
29464EBF000
heap
page read and write
294630C5000
heap
page read and write
F4333FE000
stack
page read and write
2945F22C000
heap
page read and write
7FFDF5665000
unkown
page readonly
2945F2C0000
trusted library allocation
page read and write
21890620000
heap
page readonly
2946371E000
heap
page read and write
2A1000
unkown
page execute read
29460259000
heap
page read and write
21896B11000
heap
page read and write
7FFDF5211000
unkown
page execute read
7FFDF6EE4000
unkown
page read and write
29468463000
trusted library allocation
page read and write
2945F22A000
heap
page read and write
21896AA1000
heap
page read and write
218940BE000
heap
page read and write
218906EC000
heap
page read and write
7FFDF5C47000
unkown
page read and write
218934E7000
heap
page read and write
21895FEB000
heap
page read and write
7FFDF3801000
unkown
page write copy
7FFDF37F7000
unkown
page read and write
2189259F000
heap
page read and write
218925E6000
heap
page read and write
218906E9000
heap
page read and write
29464EBA000
heap
page read and write
2945F2C0000
trusted library allocation
page read and write
2BA000
unkown
page write copy
285E000
stack
page read and write
218921F0000
heap
page read and write
2945D29B000
heap
page read and write
2946F2E4000
trusted library allocation
page read and write
1CC92C2B000
heap
page read and write
1EF9E1D0000
heap
page read and write
218920E1000
heap
page read and write
2B2000
unkown
page readonly
2946F217000
trusted library allocation
page read and write
21896A34000
heap
page read and write
29463D60000
trusted library allocation
page read and write
1CC92BFF000
heap
page read and write
2945F227000
heap
page read and write
2945F25F000
heap
page read and write
7FFDF2F30000
unkown
page readonly
2946391B000
heap
page read and write
218925A6000
heap
page read and write
21897690000
trusted library allocation
page read and write
2945ED05000
heap
page read and write
1EF9E1B0000
heap
page read and write
3A19000
heap
page read and write
29468546000
trusted library allocation
page read and write
29462F2B000
heap
page read and write
2945D288000
heap
page read and write
21893341000
heap
page read and write
29471339000
heap
page read and write
29472ADC000
heap
page read and write
29463CD2000
heap
page read and write
21896429000
heap
page read and write
21895101000
heap
page read and write
2945F255000
heap
page read and write
29472ADE000
heap
page read and write
21895000000
heap
page read and write
21895E17000
heap
page read and write
2945D2AD000
heap
page read and write
2945F21F000
heap
page read and write
4BA04F9000
stack
page read and write
294713BB000
heap
page read and write
294684DC000
trusted library allocation
page read and write
218906F9000
heap
page read and write
2945D28C000
heap
page read and write
21896B48000
heap
page read and write
21895F8A000
heap
page read and write
2945F222000
heap
page read and write
1CC9F50F000
heap
page read and write
29468583000
trusted library allocation
page read and write
7FFDF644E000
unkown
page readonly
2945D24E000
heap
page read and write
21896BBD000
heap
page read and write
2945F255000
heap
page read and write
3684000
heap
page read and write
21896157000
heap
page read and write
7FFDF541B000
unkown
page readonly
2945FF89000
heap
page read and write
775E000
stack
page read and write
21895E15000
heap
page read and write
2945F222000
heap
page read and write
2945F24B000
heap
page read and write
2945F24B000
heap
page read and write
2189259A000
heap
page read and write
21893EBF000
heap
page read and write
7FFDF5E31000
unkown
page execute read
294684AF000
trusted library allocation
page read and write
2946286C000
heap
page read and write
294712F8000
heap
page read and write
2946339F000
heap
page read and write
29462EF9000
heap
page read and write
29462BDA000
heap
page read and write
7FF73193C000
unkown
page read and write
29468425000
trusted library allocation
page read and write
29463635000
heap
page read and write
4B9FFFE000
stack
page read and write
21895D88000
heap
page read and write
2945F225000
heap
page read and write
7FFDF3B8D000
unkown
page write copy
2946F2C1000
trusted library allocation
page read and write
602A000
heap
page read and write
7FFDF54E0000
unkown
page readonly
1CC958CC000
heap
page read and write
2189259F000
heap
page read and write
2945F255000
heap
page read and write
2946844E000
trusted library allocation
page read and write
7FF73193A000
unkown
page read and write
7FFDF4FBE000
unkown
page readonly
2189259A000
heap
page read and write
2945F225000
heap
page read and write
2946F2A1000
trusted library allocation
page read and write
29473049000
heap
page read and write
2945F219000
heap
page read and write
21896B94000
heap
page read and write
218939C0000
trusted library allocation
page read and write
218906F9000
heap
page read and write
21895C6E000
heap
page read and write
36CF000
heap
page read and write
34BE000
stack
page read and write
21895E11000
heap
page read and write
21896070000
heap
page read and write
2945D2B4000
heap
page read and write
2945F22A000
heap
page read and write
218920E1000
heap
page read and write
2CFC000
stack
page read and write
21892589000
heap
page read and write
21894086000
heap
page read and write
2946F256000
trusted library allocation
page read and write
1CC97D3D000
heap
page read and write
29468D90000
trusted library allocation
page read and write
2945F217000
heap
page read and write
2945F22A000
heap
page read and write
29464EC4000
heap
page read and write
1EF9E210000
trusted library allocation
page read and write
2189355E000
heap
page read and write
2945F251000
heap
page read and write
7FFDF5C38000
unkown
page write copy
2946F2AF000
trusted library allocation
page read and write
29464EE0000
heap
page read and write
F4345FE000
stack
page read and write
21892780000
heap
page read and write
2945F251000
heap
page read and write
21890712000
heap
page read and write
2945F255000
heap
page read and write
8067000
heap
page read and write
29463671000
heap
page read and write
80EF000
heap
page read and write
36DA000
heap
page read and write
218920F7000
heap
page read and write
2945FEF9000
heap
page read and write
F4326FE000
stack
page read and write
21892786000
heap
page read and write
29463BA6000
heap
page read and write
2945D298000
heap
page read and write
29463345000
heap
page read and write
218968CD000
heap
page read and write
7FFDF5DB9000
unkown
page readonly
7FFDF5210000
unkown
page readonly
2945F22B000
heap
page read and write
218925A2000
heap
page read and write
2945D24E000
heap
page read and write
21894FE2000
heap
page read and write
218940B2000
heap
page read and write
369D000
heap
page read and write
21895DF7000
heap
page read and write
2945F22C000
heap
page read and write
218966F8000
heap
page read and write
29462AF5000
heap
page read and write
1CC9C73A000
heap
page read and write
7FFDF5C35000
unkown
page write copy
2945ECC9000
heap
page read and write
294684E3000
trusted library allocation
page read and write
29472D81000
heap
page read and write
4B9F8FE000
stack
page read and write
218920F6000
heap
page read and write
2189259F000
heap
page read and write
2945FD17000
heap
page read and write
7FFDF6446000
unkown
page read and write
2945F22C000
heap
page read and write
21895E37000
heap
page read and write
29462927000
heap
page read and write
1CC9B405000
heap
page read and write
29473468000
heap
page read and write
2946849A000
trusted library allocation
page read and write
218967DF000
heap
page read and write
7FFDF5E13000
unkown
page write copy
29460890000
trusted library allocation
page read and write
7FFDF2F31000
unkown
page execute read
21896B33000
heap
page read and write
2BC000
unkown
page readonly
21893300000
heap
page read and write
7FFDF37F1000
unkown
page write copy
7FFDF6EE5000
unkown
page write copy
21892583000
heap
page read and write
21890712000
heap
page read and write
36DA000
heap
page read and write
2946F2A8000
trusted library allocation
page read and write
21894FAA000
heap
page read and write
7FFDF5E30000
unkown
page readonly
29472890000
heap
page read and write
1CC92BDC000
heap
page read and write
4B9F3FE000
stack
page read and write
218906FC000
heap
page read and write
29472CCC000
heap
page read and write
2946847F000
trusted library allocation
page read and write
2189259A000
heap
page read and write
29462E43000
heap
page read and write
4BA07FE000
stack
page read and write
8061000
heap
page read and write
7FFDF2F31000
unkown
page execute read
29462A4E000
heap
page read and write
2945F251000
heap
page read and write
36DA000
heap
page read and write
21896300000
trusted library allocation
page read and write
218920FE000
heap
page read and write
4BA03FE000
stack
page read and write
7FFDF4FAE000
unkown
page readonly
29473224000
heap
page read and write
7FFDF54B2000
unkown
page read and write
29468486000
trusted library allocation
page read and write
2945F281000
heap
page read and write
7FFDF6EF0000
unkown
page write copy
2945F21F000
heap
page read and write
2945FFFC000
heap
page read and write
21896537000
heap
page read and write
4B9EBFE000
stack
page read and write
21897124000
heap
page read and write
21896676000
heap
page read and write
381E000
stack
page read and write
2945F26B000
heap
page read and write
21895F08000
heap
page read and write
2945D24E000
heap
page read and write
21893527000
heap
page read and write
2945F22A000
heap
page read and write
2189509B000
heap
page read and write
2945F22C000
heap
page read and write
2945ECC1000
heap
page read and write
7FFDF64A0000
unkown
page readonly
7FFDF20D4000
unkown
page read and write
2946F2DD000
trusted library allocation
page read and write
218921B1000
heap
page read and write
2945F22C000
heap
page read and write
218906F9000
heap
page read and write
21890703000
heap
page read and write
218925A0000
heap
page read and write
5E90000
remote allocation
page read and write
21893F8B000
heap
page read and write
2946842C000
trusted library allocation
page read and write
2189606D000
heap
page read and write
7FFDF3B9A000
unkown
page read and write
29463928000
heap
page read and write
294722D8000
heap
page read and write
7FFDF56F1000
unkown
page execute read
2946007D000
heap
page read and write
29464EAB000
heap
page read and write
F4349FE000
stack
page read and write
7FFDF37F7000
unkown
page read and write
21895DC8000
heap
page read and write
2945F22A000
heap
page read and write
29471490000
trusted library allocation
page read and write
218966A0000
heap
page read and write
F4325FE000
stack
page read and write
2946847F000
trusted library allocation
page read and write
809E000
heap
page read and write
7FF731910000
unkown
page readonly
218925A3000
heap
page read and write
294684AF000
trusted library allocation
page read and write
218906F1000
heap
page read and write
29468524000
trusted library allocation
page read and write
294684A1000
trusted library allocation
page read and write
21890704000
heap
page read and write
7FF73193E000
unkown
page readonly
2189723F000
heap
page read and write
294732E4000
heap
page read and write
294632BC000
heap
page read and write
2189259A000
heap
page read and write
2945D24E000
heap
page read and write
7FFDF4F42000
unkown
page readonly
218920E1000
heap
page read and write
21895D0D000
heap
page read and write
2945F225000
heap
page read and write
2945D2DB000
heap
page read and write
4BA0AFE000
stack
page read and write
2945D298000
heap
page read and write
2945F217000
heap
page read and write
2946F2B6000
trusted library allocation
page read and write
2945F21F000
heap
page read and write
2946F27C000
trusted library allocation
page read and write
29462B18000
heap
page read and write
8070000
heap
page read and write
2946853F000
trusted library allocation
page read and write
2189602E000
heap
page read and write
29464EB0000
heap
page read and write
2945D2E0000
heap
page read and write
2D50000
heap
page read and write
218925B5000
heap
page read and write
7FFDF59B1000
unkown
page execute read
21895E48000
heap
page read and write
294713DB000
heap
page read and write
29464EBF000
heap
page read and write
2945D28C000
heap
page read and write
36CC000
heap
page read and write
21896300000
trusted library allocation
page read and write
4B9F6FC000
stack
page read and write
294627EA000
heap
page read and write
7FFDF148E000
unkown
page readonly
4B9EFFE000
stack
page read and write
7FF7E3A5B000
unkown
page write copy
294684F8000
trusted library allocation
page read and write
2189259A000
heap
page read and write
29474100000
trusted library allocation
page read and write
36AF000
heap
page read and write
29463D60000
trusted library allocation
page read and write
2189070F000
heap
page read and write
7FFDF1CA7000
unkown
page readonly
2945F222000
heap
page read and write
7FF7E39A1000
unkown
page execute read
2945F21F000
heap
page read and write
2945D28C000
heap
page read and write
2945F228000
heap
page read and write
2946F294000
trusted library allocation
page read and write
74A000
unkown
page write copy
761E000
stack
page read and write
4B9E4DB000
stack
page read and write
2945F222000
heap
page read and write
2189356E000
heap
page read and write
29473244000
heap
page read and write
218965EC000
heap
page read and write
2946389C000
heap
page read and write
2945F222000
heap
page read and write
2945F21F000
heap
page read and write
2945F248000
heap
page read and write
7FFDF6EE2000
unkown
page read and write
2945F2C0000
trusted library allocation
page read and write
2945F215000
heap
page read and write
2189259A000
heap
page read and write
2945D288000
heap
page read and write
4BA0DFD000
stack
page read and write
21896300000
trusted library allocation
page read and write
21896300000
trusted library allocation
page read and write
29FE000
stack
page read and write
29463896000
heap
page read and write
7FFDF37EA000
unkown
page write copy
21894E80000
trusted library allocation
page read and write
21896558000
heap
page read and write
21893157000
heap
page read and write
218920D0000
trusted library allocation
page read and write
2945ECC0000
trusted library allocation
page read and write
2945FC70000
heap
page read and write
1CC9B57D000
heap
page read and write
2189070C000
heap
page read and write
29471359000
heap
page read and write
218906EF000
heap
page read and write
21896A3A000
heap
page read and write
29463693000
heap
page read and write
3238000
stack
page read and write
29463D90000
trusted library section
page readonly
29464E20000
heap
page read and write
1CC9F55A000
heap
page read and write
1CC9865B000
heap
page read and write
CB0BEF5000
stack
page read and write
1CC98660000
heap
page read and write
F4340FE000
stack
page read and write
1CC9BD17000
heap
page read and write
4B9E8FE000
stack
page read and write
21894E80000
trusted library allocation
page read and write
1CC96267000
heap
page read and write
29464E9B000
heap
page read and write
7F0E000
stack
page read and write
2945F217000
heap
page read and write
21896300000
trusted library allocation
page read and write
29473323000
heap
page read and write
1CC9B512000
heap
page read and write
2945D24E000
heap
page read and write
2189667E000
heap
page read and write
218906F9000
heap
page read and write
2945F255000
heap
page read and write
7FFDF37E7000
unkown
page read and write
29462BAE000
heap
page read and write
294684EA000
trusted library allocation
page read and write
7FFDF598C000
unkown
page read and write
1CC9B1F3000
heap
page read and write
218920E1000
heap
page read and write
218921E0000
unclassified section
page read and write
2945F291000
heap
page read and write
2945F249000
heap
page read and write
218950CC000
heap
page read and write
29463370000
heap
page read and write
289E000
stack
page read and write
742000
unkown
page readonly
2945F227000
heap
page read and write
1CC92C5C000
heap
page read and write
29472C20000
trusted library allocation
page read and write
218966A0000
heap
page read and write
29464EAB000
heap
page read and write
2F40000
heap
page read and write
3719000
heap
page read and write
2946850F000
trusted library allocation
page read and write
21893153000
heap
page read and write
21896A5D000
heap
page read and write
369D000
heap
page read and write
2945F222000
heap
page read and write
29463889000
heap
page read and write
218906F9000
heap
page read and write
3C0000
heap
page readonly
2945FE99000
heap
page read and write
21896300000
trusted library allocation
page read and write
2945F22A000
heap
page read and write
218925AA000
heap
page read and write
2945F21F000
heap
page read and write
29460241000
heap
page read and write
3628000
heap
page read and write
2945D24E000
heap
page read and write
2945F219000
heap
page read and write
29460016000
heap
page read and write
2945F249000
heap
page read and write
2945F25F000
heap
page read and write
2945D510000
heap
page read and write
2189417B000
heap
page read and write
2189600D000
heap
page read and write
2947337B000
heap
page read and write
36DA000
heap
page read and write
2945D29F000
heap
page read and write
29463A11000
heap
page read and write
2945F227000
heap
page read and write
2189259A000
heap
page read and write
7FF7E3A89000
unkown
page readonly
218921B5000
heap
page read and write
294684EC000
trusted library allocation
page read and write
2945F264000
heap
page read and write
7FFDF6414000
unkown
page write copy
F4336FE000
stack
page read and write
29468455000
trusted library allocation
page read and write
21896CC9000
heap
page read and write
294684D3000
trusted library allocation
page read and write
21896300000
trusted library allocation
page read and write
7FFDF2BD4000
unkown
page readonly
7FFDF6EE1000
unkown
page write copy
2945D2B4000
heap
page read and write
2945F249000
heap
page read and write
2945D28C000
heap
page read and write
218925A6000
heap
page read and write
21893521000
heap
page read and write
2945D253000
heap
page read and write
7FFDF2037000
unkown
page readonly
742000
unkown
page readonly
7FFDF4F81000
unkown
page execute read
1CC9916B000
heap
page read and write
29464EAB000
heap
page read and write
74A000
unkown
page read and write
2945D288000
heap
page read and write
2945F275000
heap
page read and write
7E0E000
stack
page read and write
29463779000
heap
page read and write
7FFDF56F0000
unkown
page readonly
218950B1000
heap
page read and write
2189259A000
heap
page read and write
29473043000
heap
page read and write
21893DCC000
heap
page read and write
29464EC4000
heap
page read and write
218940BB000
heap
page read and write
21893D2A000
heap
page read and write
7FFDF5C34000
unkown
page read and write
1CC96AF6000
heap
page read and write
36CC000
heap
page read and write
2945F222000
heap
page read and write
2945D3C0000
heap
page readonly
218968A1000
heap
page read and write
218920E9000
heap
page read and write
2947143D000
heap
page read and write
2947145D000
heap
page read and write
80A7000
heap
page read and write
2945ECFC000
heap
page read and write
21896300000
trusted library allocation
page read and write
2945D299000
heap
page read and write
21896CEB000
heap
page read and write
2945F22A000
heap
page read and write
7FFDF4F00000
unkown
page readonly
2A0000
unkown
page readonly
2945F225000
heap
page read and write
29468700000
trusted library allocation
page read and write
2189639B000
heap
page read and write
2945F22B000
heap
page read and write
2947321C000
heap
page read and write
2945F251000
heap
page read and write
21896835000
heap
page read and write
21896B85000
heap
page read and write
7FFDF54E1000
unkown
page execute read
7FFDF2B97000
unkown
page write copy
2945ED99000
heap
page read and write
8067000
heap
page read and write
7FFDF4F80000
unkown
page readonly
21896ED1000
heap
page read and write
294684BD000
trusted library allocation
page read and write
4B9E7FF000
stack
page read and write
2945F26E000
heap
page read and write
21890712000
heap
page read and write
2946F27F000
trusted library allocation
page read and write
21893F8F000
heap
page read and write
2189696B000
heap
page read and write
4B9FCFE000
stack
page read and write
2945F222000
heap
page read and write
1CC92BF8000
heap
page read and write
2189653E000
heap
page read and write
7FFDF37E7000
unkown
page read and write
3675000
heap
page read and write
21892568000
heap
page read and write
29464EB4000
heap
page read and write
1EF9DFC3000
heap
page read and write
2945F1E0000
heap
page read and write
21895E15000
heap
page read and write
21896031000
heap
page read and write
2945ECC9000
heap
page read and write
1CC9B4E5000
heap
page read and write
7FFDF6401000
unkown
page read and write
7FF73193B000
unkown
page write copy
21896949000
heap
page read and write
21893469000
heap
page read and write
F4328FE000
stack
page read and write
2945F229000
heap
page read and write
7FF7E3A62000
unkown
page readonly
2945D2AD000
heap
page read and write
29460253000
heap
page read and write
2945D2B4000
heap
page read and write
21896B31000
heap
page read and write
29472956000
heap
page read and write
218969AB000
heap
page read and write
4B9EAFE000
stack
page read and write
2947139A000
heap
page read and write
2946F245000
trusted library allocation
page read and write
29468551000
trusted library allocation
page read and write
2945D2B4000
heap
page read and write
39D4000
heap
page read and write
21896BCF000
heap
page read and write
21893474000
heap
page read and write
1CC974FA000
heap
page read and write
2945FCA6000
heap
page read and write
1CC92C48000
heap
page read and write
2946851A000
trusted library allocation
page read and write
294629FA000
heap
page read and write
29463B03000
heap
page read and write
2189259F000
heap
page read and write
21895E15000
heap
page read and write
F4339FE000
stack
page read and write
789E000
stack
page read and write
2189259A000
heap
page read and write
2945EDF0000
unclassified section
page read and write
2945F251000
heap
page read and write
2945F22A000
heap
page read and write
2946F25C000
trusted library allocation
page read and write
29473443000
heap
page read and write
21897470000
trusted library allocation
page read and write
2945F251000
heap
page read and write
36B8000
heap
page read and write
2945D2AD000
heap
page read and write
29464E9B000
heap
page read and write
2946376D000
heap
page read and write
1CC959CB000
heap
page read and write
29473250000
heap
page read and write
29462E22000
heap
page read and write
2189259A000
heap
page read and write
2945F228000
heap
page read and write
2945F261000
heap
page read and write
7FF731911000
unkown
page execute read
7FFDF6446000
unkown
page read and write
2946F283000
trusted library allocation
page read and write
7FFDF0E31000
unkown
page read and write
21892583000
heap
page read and write
21890703000
heap
page read and write
218964FB000
heap
page read and write
2945F255000
heap
page read and write
2945F251000
heap
page read and write
21896563000
heap
page read and write
218967DC000
heap
page read and write
2945D28C000
heap
page read and write
2D40000
heap
page read and write
2945ECC1000
heap
page read and write
29472C20000
heap
page read and write
29464E6A000
heap
page read and write
7FFDF56BD000
unkown
page read and write
2189259F000
heap
page read and write
218940A3000
heap
page read and write
2189259F000
heap
page read and write
21892599000
heap
page read and write
2945D450000
heap
page read and write
80A5000
heap
page read and write
2945FCD2000
heap
page read and write
3D0000
heap
page read and write
29460065000
heap
page read and write
2945F251000
heap
page read and write
21892548000
heap
page read and write
2BC000
unkown
page readonly
39D0000
heap
page read and write
7FFDF0E35000
unkown
page readonly
7FF7E39A0000
unkown
page readonly
21895DF7000
heap
page read and write
2189259A000
heap
page read and write
F4341FC000
stack
page read and write
21893D6B000
heap
page read and write
4BA05FC000
stack
page read and write
2945F1C0000
heap
page read and write
7FFDF5959000
unkown
page read and write
4B9F7FE000
stack
page read and write
7F60000
heap
page read and write
218988E2000
trusted library allocation
page read and write
1CC9671E000
heap
page read and write
2945F27C000
heap
page read and write
2945D2A5000
heap
page read and write
2945F225000
heap
page read and write
2945F219000
heap
page read and write
21896123000
heap
page read and write
2946F2BB000
trusted library allocation
page read and write
2945F22B000
heap
page read and write
371E000
heap
page read and write
2189259A000
heap
page read and write
1CC96261000
heap
page read and write
218966A3000
heap
page read and write
2945D2AD000
heap
page read and write
218920E1000
heap
page read and write
F432BFE000
stack
page read and write
2189618A000
heap
page read and write
21897450000
trusted library allocation
page read and write
7FF731938000
unkown
page read and write
28A0000
trusted library allocation
page read and write
294630F6000
heap
page read and write
218925A6000
heap
page read and write
218906FF000
heap
page read and write
218925AA000
heap
page read and write
21895E15000
heap
page read and write
7FFDF56CC000
unkown
page read and write
809D000
heap
page read and write
2946F225000
trusted library allocation
page read and write
21894099000
heap
page read and write
7FFDF64A1000
unkown
page execute read
29463B93000
heap
page read and write
29460087000
heap
page read and write
7FFDF5968000
unkown
page read and write
7FF7E3A2D000
unkown
page readonly
29462A28000
heap
page read and write
F4335FE000
stack
page read and write
2945F22C000
heap
page read and write
7FFDF3B01000
unkown
page execute read
294627EB000
heap
page read and write
218925AC000
heap
page read and write
731000
unkown
page execute read
2946F21E000
trusted library allocation
page read and write
218930A6000
heap
page read and write
1CC976BA000
heap
page read and write
7FFDF3839000
unkown
page read and write
29464EC4000
heap
page read and write
29464EB0000
heap
page read and write
29462580000
heap
page read and write
7A1E000
stack
page read and write
218921D9000
heap
page read and write
21892122000
heap
page read and write
F4347FE000
stack
page read and write
1EF9DFB7000
heap
page read and write
29460252000
heap
page read and write
7FF7E3A6A000
unkown
page readonly
21896791000
heap
page read and write
21896F63000
heap
page read and write
2946F2C4000
trusted library allocation
page read and write
1CC9B0E3000
heap
page read and write
7FF731928000
unkown
page readonly
21893E0D000
heap
page read and write
2945D1E8000
heap
page read and write
21892640000
unkown
page read and write
2945F21F000
heap
page read and write
F4331FE000
stack
page read and write
294629A2000
heap
page read and write
21896A5E000
heap
page read and write
2946F2D6000
trusted library allocation
page read and write
218963BF000
heap
page read and write
7FFDF56CC000
unkown
page read and write
29468478000
trusted library allocation
page read and write
1CC967A1000
heap
page read and write
29462A1E000
heap
page read and write
2945F226000
heap
page read and write
21890703000
heap
page read and write
21896C33000
heap
page read and write
21896B45000
heap
page read and write
2189642A000
heap
page read and write
294629F2000
heap
page read and write
29464E7F000
heap
page read and write
29462B5C000
heap
page read and write
29464E7F000
heap
page read and write
2945F222000
heap
page read and write
F433AFE000
stack
page read and write
5FE0000
heap
page read and write
7FF731928000
unkown
page readonly
29462BC2000
heap
page read and write
2945F25F000
heap
page read and write
218964A3000
heap
page read and write
7FFDF62B7000
unkown
page readonly
2945F23A000
heap
page read and write
7FFDF56CF000
unkown
page read and write
4B9F2FE000
stack
page read and write
2189259D000
heap
page read and write
21890704000
heap
page read and write
2D5E000
heap
page read and write
730000
unkown
page readonly
2947145F000
heap
page read and write
7FF7E3A6A000
unkown
page readonly
21890708000
heap
page read and write
21896A7F000
heap
page read and write
2945D24A000
heap
page read and write
1CC9B0C0000
heap
page read and write
1CC961EB000
heap
page read and write
2945F222000
heap
page read and write
21890703000
heap
page read and write
7FFDF37EB000
unkown
page read and write
21897690000
trusted library allocation
page read and write
7FFDF59B0000
unkown
page readonly
21890707000
heap
page read and write
7FFDF6EDD000
unkown
page write copy
2945F217000
heap
page read and write
21893FBB000
heap
page read and write
2945D28C000
heap
page read and write
2946844F000
trusted library allocation
page read and write
3712000
heap
page read and write
2946F2A6000
trusted library allocation
page read and write
29463A1B000
heap
page read and write
F433CFE000
stack
page read and write
294684C4000
trusted library allocation
page read and write
29462B15000
heap
page read and write
2946296A000
heap
page read and write
2946846A000
trusted library allocation
page read and write
7FFDF64A1000
unkown
page execute read
1CC9CE94000
heap
page read and write
2189698D000
heap
page read and write
29462A55000
heap
page read and write
218964FD000
heap
page read and write
2945F222000
heap
page read and write
1CC92C3E000
heap
page read and write
7FFDF5E16000
unkown
page readonly
7FF7E3A62000
unkown
page readonly
1CC92BDB000
heap
page read and write
2946F28D000
trusted library allocation
page read and write
74C000
unkown
page readonly
7FFDF5959000
unkown
page read and write
29472B0E000
heap
page read and write
29463A24000
heap
page read and write
F432DFE000
stack
page read and write
489E000
stack
page read and write
218925A6000
heap
page read and write
29468417000
trusted library allocation
page read and write
2946003F000
heap
page read and write
21892FD1000
heap
page read and write
2946F29B000
trusted library allocation
page read and write
28F4000
heap
page read and write
218906EF000
heap
page read and write
21896E07000
heap
page read and write
2947311B000
heap
page read and write
308F000
stack
page read and write
7B1F000
stack
page read and write
21896A19000
heap
page read and write
1CC9F6D8000
heap
page read and write
2189259A000
heap
page read and write
29463A2F000
heap
page read and write
29463478000
heap
page read and write
80AC000
heap
page read and write
2946003E000
heap
page read and write
218920F6000
heap
page read and write
294733F2000
heap
page read and write
731000
unkown
page execute read
29472E6B000
heap
page read and write
7FFDF6F1D000
unkown
page read and write
218925A2000
heap
page read and write
7FFDF54E0000
unkown
page readonly
1CC9865D000
heap
page read and write
2189608E000
heap
page read and write
2189664D000
heap
page read and write
2189258E000
heap
page read and write
2189070F000
heap
page read and write
218920E1000
heap
page read and write
2B2000
unkown
page readonly
294684D8000
trusted library allocation
page read and write
7FFDF15AF000
unkown
page write copy
2945F228000
heap
page read and write
218906DA000
heap
page read and write
F4337FE000
stack
page read and write
2946280C000
heap
page read and write
2945F275000
heap
page read and write
21894191000
heap
page read and write
1CC9623B000
heap
page read and write
7FFDF5211000
unkown
page execute read
294729B8000
heap
page read and write
29468433000
trusted library allocation
page read and write
29464EAB000
heap
page read and write
21892578000
heap
page read and write
2946385D000
heap
page read and write
21894F95000
heap
page read and write
2945F251000
heap
page read and write
29468521000
trusted library allocation
page read and write
7FFDF3846000
unkown
page readonly
36AF000
heap
page read and write
2945F217000
heap
page read and write
2945D28C000
heap
page read and write
2947336D000
heap
page read and write
21896778000
heap
page read and write
218925A0000
heap
page read and write
21893950000
trusted library allocation
page read and write
2189218C000
heap
page read and write
29468501000
trusted library allocation
page read and write
218969D5000
heap
page read and write
29462B5B000
heap
page read and write
21893E8F000
heap
page read and write
7FFDF5C34000
unkown
page read and write
29462996000
heap
page read and write
2189658A000
heap
page read and write
294632B0000
heap
page read and write
7FFDF6FC0000
unkown
page readonly
7FFDF640D000
unkown
page write copy
2945F219000
heap
page read and write
7FFDF54E1000
unkown
page execute read
21896039000
heap
page read and write
29474100000
trusted library allocation
page read and write
294711F0000
trusted library allocation
page read and write
2946F2F5000
trusted library allocation
page read and write
36BD000
heap
page read and write
29462A1A000
heap
page read and write
F432EFE000
stack
page read and write
2945F222000
heap
page read and write
1CC9B0BE000
heap
page read and write
1CC9A333000
heap
page read and write
2946848D000
trusted library allocation
page read and write
28F4000
heap
page read and write
21890704000
heap
page read and write
7FFDF54BB000
unkown
page read and write
1CC92C35000
heap
page read and write
7FFDF37EA000
unkown
page write copy
218969B4000
heap
page read and write
2945F219000
heap
page read and write
218977D0000
trusted library section
page readonly
2945F217000
heap
page read and write
2189723B000
heap
page read and write
21896AF5000
heap
page read and write
2945F24B000
heap
page read and write
2946F2CF000
trusted library allocation
page read and write
2189408A000
heap
page read and write
29468513000
trusted library allocation
page read and write
F432AFE000
stack
page read and write
7FFDF56BD000
unkown
page read and write
7FFDF56F1000
unkown
page execute read
218972D0000
trusted library allocation
page read and write
2945F228000
heap
page read and write
2945ECC1000
heap
page read and write
7FFDF2105000
unkown
page read and write
7FF731928000
unkown
page readonly
7FFDF54BD000
unkown
page readonly
2945D29C000
heap
page read and write
3240000
heap
page read and write
4BA0BFE000
stack
page read and write
74A000
unkown
page read and write
294722C0000
heap
page read and write
2945D2B4000
heap
page read and write
218941B1000
heap
page read and write
29463924000
heap
page read and write
2189259F000
heap
page read and write
29462A91000
heap
page read and write
218925BC000
heap
page read and write
2946089D000
trusted library allocation
page read and write
29463933000
heap
page read and write
29462B39000
heap
page read and write
2945F217000
heap
page read and write
371C000
heap
page read and write
2946F298000
trusted library allocation
page read and write
4B9F9FE000
stack
page read and write
2945D2B4000
heap
page read and write
29462B58000
heap
page read and write
29462D90000
trusted library allocation
page read and write
21895F89000
heap
page read and write
2189643F000
heap
page read and write
2945F22B000
heap
page read and write
294684D1000
trusted library allocation
page read and write
218906EB000
heap
page read and write
29462D7D000
heap
page read and write
29472C41000
heap
page read and write
21896300000
trusted library allocation
page read and write
218925BC000
heap
page read and write
21896538000
heap
page read and write
2189211C000
heap
page read and write
36D2000
heap
page read and write
21896C77000
heap
page read and write
218921A5000
heap
page read and write
294637F5000
heap
page read and write
21896AC3000
heap
page read and write
1CC96540000
heap
page read and write
2189684C000
heap
page read and write
36DA000
heap
page read and write
2189259A000
heap
page read and write
2946F278000
trusted library allocation
page read and write
29464EAB000
heap
page read and write
29473054000
heap
page read and write
2945F275000
heap
page read and write
1CC9F58F000
heap
page read and write
21897470000
trusted library allocation
page read and write
1CC9F58D000
heap
page read and write
2945D253000
heap
page read and write
3664000
heap
page read and write
29462F3D000
heap
page read and write
2946852F000
trusted library allocation
page read and write
294684A8000
trusted library allocation
page read and write
4BA00FA000
stack
page read and write
29462A52000
heap
page read and write
218906FC000
heap
page read and write
218941A6000
heap
page read and write
218920F7000
heap
page read and write
2945F22B000
heap
page read and write
29464E69000
heap
page read and write
218906A1000
heap
page read and write
218925A6000
heap
page read and write
21890703000
heap
page read and write
29460258000
heap
page read and write
4BA06FD000
stack
page read and write
2946F2BD000
trusted library allocation
page read and write
1CC96579000
heap
page read and write
8066000
heap
page read and write
294628BD000
heap
page read and write
7FFDF1480000
unkown
page readonly
29464EAB000
heap
page read and write
294630CD000
heap
page read and write
218906DA000
heap
page read and write
21895E15000
heap
page read and write
29462E22000
heap
page read and write
2945F251000
heap
page read and write
2945EE40000
heap
page read and write
2945D24E000
heap
page read and write
7FFDF3B8A000
unkown
page read and write
2947322E000
heap
page read and write
294722D6000
heap
page read and write
7FFDF3839000
unkown
page read and write
7FFDF5C71000
unkown
page execute read
2189259A000
heap
page read and write
2946841E000
trusted library allocation
page read and write
2189259F000
heap
page read and write
F4338FE000
stack
page read and write
36BD000
heap
page read and write
218925A6000
heap
page read and write
2946282E000
heap
page read and write
2945FE26000
heap
page read and write
29462E65000
heap
page read and write
1CC95EAF000
heap
page read and write
28F4000
heap
page read and write
2945F223000
heap
page read and write
29468DBD000
trusted library allocation
page read and write
7FFDF6EEE000
unkown
page read and write
29472F42000
heap
page read and write
29468447000
trusted library allocation
page read and write
2945F22B000
heap
page read and write
218906A1000
heap
page read and write
4B9F0FE000
stack
page read and write
29464E7F000
heap
page read and write
218906EF000
heap
page read and write
370C000
heap
page read and write
2189704D000
heap
page read and write
7FFDF5B7E000
unkown
page readonly
218960EF000
heap
page read and write
2189070D000
heap
page read and write
21892109000
heap
page read and write
29463BB9000
heap
page read and write
2945ECC1000
heap
page read and write
7FF73193B000
unkown
page write copy
2945D29B000
heap
page read and write
218921B9000
heap
page read and write
29468508000
trusted library allocation
page read and write
2945ECEC000
heap
page read and write
636B000
stack
page read and write
29462AD3000
heap
page read and write
2946F23E000
trusted library allocation
page read and write
218906F0000
heap
page read and write
2189303B000
heap
page read and write
29464E7F000
heap
page read and write
2189070F000
heap
page read and write
36D2000
heap
page read and write
2947323C000
heap
page read and write
7FFDF640F000
unkown
page read and write
2945F22A000
heap
page read and write
29462BD0000
heap
page read and write
2189259F000
heap
page read and write
2189259A000
heap
page read and write
21896687000
heap
page read and write
29463051000
heap
page read and write
2189259F000
heap
page read and write
29464EB0000
heap
page read and write
21893FB6000
heap
page read and write
218971AF000
heap
page read and write
2945D4F0000
trusted library allocation
page read and write
21896B07000
heap
page read and write
7FFDF37EB000
unkown
page read and write
21898860000
heap
page read and write
2945F264000
heap
page read and write
29463B0D000
heap
page read and write
7FF7E3A5B000
unkown
page write copy
2945F21F000
heap
page read and write
218963F8000
heap
page read and write
7FFDF2895000
unkown
page readonly
2945F219000
heap
page read and write
2189604F000
heap
page read and write
365B000
heap
page read and write
28A0000
trusted library allocation
page read and write
2945F222000
heap
page read and write
29468506000
trusted library allocation
page read and write
7FF7E39A0000
unkown
page readonly
2946854D000
trusted library allocation
page read and write
2945D29B000
heap
page read and write
3B0000
heap
page read and write
218968DE000
heap
page read and write
2945F1FF000
heap
page read and write
2945F26B000
heap
page read and write
2189259F000
heap
page read and write
4B9FBFD000
stack
page read and write
2945F275000
heap
page read and write
7FFDF2BB5000
unkown
page read and write
21890707000
heap
page read and write
21896300000
trusted library allocation
page read and write
2945F222000
heap
page read and write
2945EE70000
heap
page read and write
2945F22B000
heap
page read and write
29473353000
heap
page read and write
2945F222000
heap
page read and write
2945D29B000
heap
page read and write
2189259A000
heap
page read and write
29463CF7000
heap
page read and write
1CC976A6000
heap
page read and write
21896B9B000
heap
page read and write
7FF73193E000
unkown
page readonly
29463915000
heap
page read and write
294684C7000
trusted library allocation
page read and write
29462BBD000
heap
page read and write
21893340000
heap
page read and write
F4322DF000
stack
page read and write
2946F286000
trusted library allocation
page read and write
21895FF2000
heap
page read and write
F4344FE000
stack
page read and write
2946F22C000
trusted library allocation
page read and write
2945F251000
heap
page read and write
21895DED000
heap
page read and write
2189259F000
heap
page read and write
218925A0000
heap
page read and write
29464E99000
heap
page read and write
7FFDF2141000
unkown
page execute read
7FF731928000
unkown
page readonly
29464EC2000
heap
page read and write
29464EB0000
heap
page read and write
21890800000
heap
page read and write
29463BA4000
heap
page read and write
2945D288000
heap
page read and write
29464EA0000
heap
page read and write
218925A0000
heap
page read and write
218964E9000
heap
page read and write
2189070E000
heap
page read and write
218925A0000
heap
page read and write
21894113000
heap
page read and write
294635F1000
heap
page read and write
2946084D000
trusted library allocation
page read and write
2945F24B000
heap
page read and write
2946301D000
heap
page read and write
39F0000
heap
page read and write
80E6000
heap
page read and write
2945F217000
heap
page read and write
7FFDF6EF0000
unkown
page write copy
218906FC000
heap
page read and write
218965CC000
heap
page read and write
29468563000
trusted library allocation
page read and write
1CC9F664000
heap
page read and write
21895DF7000
heap
page read and write
218940D5000
heap
page read and write
2947345F000
heap
page read and write
21896D3F000
heap
page read and write
21896871000
heap
page read and write
2945F219000
heap
page read and write
2945F260000
heap
page read and write
2945FE70000
heap
page read and write
2945ECC1000
heap
page read and write
29468DB0000
trusted library allocation
page read and write
29473141000
heap
page read and write
2945F227000
heap
page read and write
21893346000
heap
page read and write
2945F1E5000
heap
page read and write
2945D298000
heap
page read and write
294684B6000
trusted library allocation
page read and write
2945F21F000
heap
page read and write
21896300000
trusted library allocation
page read and write
7FFDF54BD000
unkown
page readonly
21897583000
heap
page read and write
21896300000
trusted library allocation
page read and write
21892FD0000
heap
page read and write
218933E9000
heap
page read and write
29472DBE000
heap
page read and write
218920FF000
heap
page read and write
2945D24E000
heap
page read and write
218920F6000
heap
page read and write
1CC9B40F000
heap
page read and write
2945F24B000
heap
page read and write
21896DC5000
heap
page read and write
1CC99E0C000
heap
page read and write
7FFDF56C9000
unkown
page write copy
2945D28C000
heap
page read and write
218933C9000
heap
page read and write
29464EBF000
heap
page read and write
218925AA000
heap
page read and write
29472ABC000
heap
page read and write
1CC96542000
heap
page read and write
1CC96611000
heap
page read and write
370F000
heap
page read and write
218925A0000
heap
page read and write
29471211000
heap
page read and write
2945ECC1000
heap
page read and write
2945F22A000
heap
page read and write
21893449000
heap
page read and write
2945F24B000
heap
page read and write
7FF7E39A1000
unkown
page execute read
7FFDF6EE5000
unkown
page write copy
21895DB1000
heap
page read and write
29468538000
trusted library allocation
page read and write
2945F22A000
heap
page read and write
7FF7E3A89000
unkown
page readonly
7FFDF5C70000
unkown
page readonly
2946F26F000
trusted library allocation
page read and write
7FFDF54B6000
unkown
page write copy
2946F2D5000
trusted library allocation
page read and write
7FFDF6EDD000
unkown
page write copy
218972D0000
trusted library allocation
page read and write
29468471000
trusted library allocation
page read and write
2946F241000
trusted library allocation
page read and write
29473331000
heap
page read and write
771F000
stack
page read and write
1CC9F557000
heap
page read and write
29463A20000
heap
page read and write
2945D28C000
heap
page read and write
2946F210000
trusted library allocation
page read and write
29462BCB000
heap
page read and write
29463D52000
heap
page read and write
2945FEA0000
heap
page read and write
21896B79000
heap
page read and write
2945D29F000
heap
page read and write
2945D2B4000
heap
page read and write
2946856D000
trusted library allocation
page read and write
21896AE5000
heap
page read and write
2945F255000
heap
page read and write
54E0000
trusted library allocation
page read and write
2946F291000
trusted library allocation
page read and write
218967A1000
heap
page read and write
2945F22A000
heap
page read and write
2946852B000
trusted library allocation
page read and write
294629CC000
heap
page read and write
218906FC000
heap
page read and write
21896300000
trusted library allocation
page read and write
294684CE000
trusted library allocation
page read and write
29464EAB000
heap
page read and write
2189259A000
heap
page read and write
29462960000
heap
page read and write
294684A0000
trusted library allocation
page read and write
2945F226000
heap
page read and write
2945ECFD000
heap
page read and write
2945F264000
heap
page read and write
2946846A000
trusted library allocation
page read and write
29464EB7000
heap
page read and write
7FF731910000
unkown
page readonly
2946309F000
heap
page read and write
2945F228000
heap
page read and write
1CC976DA000
heap
page read and write
21896676000
heap
page read and write
7FFDF20D9000
unkown
page read and write
2945D288000
heap
page read and write
294684ED000
trusted library allocation
page read and write
7FFDF3B00000
unkown
page readonly
294639FA000
heap
page read and write
2945F249000
heap
page read and write
21896B5F000
heap
page read and write
7FF731911000
unkown
page execute read
29462B99000
heap
page read and write
2945F249000
heap
page read and write
21895F8A000
heap
page read and write
29464EAB000
heap
page read and write
2946850C000
trusted library allocation
page read and write
4B9FEFE000
stack
page read and write
2945F251000
heap
page read and write
2945F2C0000
trusted library allocation
page read and write
21892583000
heap
page read and write
29471200000
trusted library allocation
page read and write
2946F263000
trusted library allocation
page read and write
2945D29B000
heap
page read and write
2945F21F000
heap
page read and write
21892583000
heap
page read and write
2E50000
heap
page readonly
218925A0000
heap
page read and write
294684C3000
trusted library allocation
page read and write
21896928000
heap
page read and write
218906A1000
heap
page read and write
7FFDF6F5F000
unkown
page readonly
2945F227000
heap
page read and write
7FFDF6416000
unkown
page write copy
2945F255000
heap
page read and write
7FFDF5E16000
unkown
page readonly
2945ED8D000
heap
page read and write
7FFDF5665000
unkown
page readonly
218964A5000
heap
page read and write
2945F227000
heap
page read and write
2189210C000
heap
page read and write
2189513D000
heap
page read and write
7FFDF6FC1000
unkown
page execute read
7FF7E3A62000
unkown
page readonly
29462D90000
trusted library allocation
page read and write
21896345000
heap
page read and write
21893522000
heap
page read and write
1CC92BFF000
heap
page read and write
29462A88000
heap
page read and write
21896AE5000
heap
page read and write
3475000
heap
page read and write
218963FB000
heap
page read and write
2945F21F000
heap
page read and write
21892182000
heap
page read and write
2945D2A5000
heap
page read and write
2945ED4D000
heap
page read and write
218969AE000
heap
page read and write
29464E7F000
heap
page read and write
2945F222000
heap
page read and write
218920E9000
heap
page read and write
29465832000
trusted library allocation
page read and write
F4330FD000
stack
page read and write
294684C0000
trusted library allocation
page read and write
7FFDF6F4F000
unkown
page read and write
7FFDF6414000
unkown
page write copy
2945F22B000
heap
page read and write
2945F217000
heap
page read and write
21893E6F000
heap
page read and write
29473238000
heap
page read and write
29464E7F000
heap
page read and write
29473370000
heap
page read and write
2945F24B000
heap
page read and write
29464EC1000
heap
page read and write
218906DA000
heap
page read and write
29464EAB000
heap
page read and write
218906DA000
heap
page read and write
29462AD4000
heap
page read and write
4B9EEFE000
stack
page read and write
29474100000
trusted library allocation
page read and write
2945F217000
heap
page read and write
29464EAB000
heap
page read and write
2945D264000
heap
page read and write
29464E7F000
heap
page read and write
29462BCF000
heap
page read and write
29EC000
stack
page read and write
2945D288000
heap
page read and write
29464EC4000
heap
page read and write
1CC92C3E000
heap
page read and write
29468558000
trusted library allocation
page read and write
7FFDF5C47000
unkown
page read and write
218925A0000
heap
page read and write
2F8E000
stack
page read and write
29468544000
trusted library allocation
page read and write
2945EE73000
heap
page read and write
29473124000
heap
page read and write
294635FC000
heap
page read and write
29468478000
trusted library allocation
page read and write
7FFDF6401000
unkown
page read and write
2945F26E000
heap
page read and write
2945F21F000
heap
page read and write
218972D0000
heap
page read and write
2945ECDA000
heap
page read and write
29462C9F000
heap
page read and write
2945D24E000
heap
page read and write
36DA000
heap
page read and write
7FF731911000
unkown
page execute read
6029000
heap
page read and write
294628C6000
heap
page read and write
2945F225000
heap
page read and write
2945D245000
heap
page read and write
2189259A000
heap
page read and write
29473150000
heap
page read and write
21896792000
heap
page read and write
218964D1000
heap
page read and write
2945D298000
heap
page read and write
29462DFD000
heap
page read and write
2945F264000
heap
page read and write
7FFDF4F3E000
unkown
page read and write
2945F21F000
heap
page read and write
2189259A000
heap
page read and write
21892580000
heap
page read and write
29468410000
trusted library allocation
page read and write
2945F22B000
heap
page read and write
2189259F000
heap
page read and write
218964EE000
heap
page read and write
21893EB0000
heap
page read and write
29463B17000
heap
page read and write
21893164000
heap
page read and write
2189668B000
heap
page read and write
2945F219000
heap
page read and write
7FFDF0E34000
unkown
page read and write
2945F22A000
heap
page read and write
21895E15000
heap
page read and write
7FFDF6415000
unkown
page read and write
2945F217000
heap
page read and write
2945FF95000
heap
page read and write
294628C6000
heap
page read and write
218959C0000
heap
page read and write
29474100000
trusted library allocation
page read and write
21892599000
heap
page read and write
29472DE0000
heap
page read and write
2945F255000
heap
page read and write
2945D2AD000
heap
page read and write
29464E7F000
heap
page read and write
2945D2A2000
heap
page read and write
29464E99000
heap
page read and write
21896EC5000
heap
page read and write
294684E6000
trusted library allocation
page read and write
2946853D000
trusted library allocation
page read and write
2946F25A000
trusted library allocation
page read and write
1CC92C48000
heap
page read and write
29464EB8000
heap
page read and write
28F4000
heap
page read and write
2945F225000
heap
page read and write
7FFDF598C000
unkown
page read and write
218972BB000
heap
page read and write
809E000
heap
page read and write
2189722A000
heap
page read and write
7FFDF54BB000
unkown
page read and write
294712D7000
heap
page read and write
2945F219000
heap
page read and write
2945F21F000
heap
page read and write
21893D8B000
heap
page read and write
2946087D000
trusted library allocation
page read and write
7FFDF6EDC000
unkown
page read and write
7FFDF5B7E000
unkown
page readonly
29463452000
heap
page read and write
218939C4000
heap
page read and write
7FFDF6412000
unkown
page read and write
601E000
stack
page read and write
29464EB5000
heap
page read and write
2945FC90000
heap
page read and write
29465F40000
trusted library section
page read and write
7FFDF1492000
unkown
page readonly
21892583000
heap
page read and write
218925A0000
heap
page read and write
29462B17000
heap
page read and write
218925A0000
heap
page read and write
21895FE4000
heap
page read and write
1CC96AFA000
heap
page read and write
731000
unkown
page execute read
2945ED02000
heap
page read and write
7FFDF4FBC000
unkown
page read and write
294722F3000
heap
page read and write
21896B3C000
heap
page read and write
2946F2C8000
trusted library allocation
page read and write
2945F227000
heap
page read and write
7FFDF5E0A000
unkown
page write copy
21896558000
heap
page read and write
2945D2B4000
heap
page read and write
218921AD000
heap
page read and write
29462D90000
heap
page read and write
29472977000
heap
page read and write
1CC9B472000
heap
page read and write
3664000
heap
page read and write
29468566000
trusted library allocation
page read and write
36B8000
heap
page read and write
80A7000
heap
page read and write
2945F249000
heap
page read and write
7FFDF20D5000
unkown
page write copy
2945D3D0000
heap
page read and write
1CC99E0E000
heap
page read and write
2945ECC1000
heap
page read and write
7FFDF210A000
unkown
page readonly
21896074000
heap
page read and write
218964C0000
heap
page read and write
7CAD000
stack
page read and write
2945F24B000
heap
page read and write
21896B0B000
heap
page read and write
7FFDF0D30000
unkown
page readonly
218925BC000
heap
page read and write
294722E3000
heap
page read and write
21896758000
heap
page read and write
21895CAB000
heap
page read and write
2945F22A000
heap
page read and write
21892583000
heap
page read and write
2945F222000
heap
page read and write
29464EB8000
heap
page read and write
294746B0000
trusted library allocation
page read and write
2946F276000
trusted library allocation
page read and write
21895F47000
heap
page read and write
1CC9B40B000
heap
page read and write
21893D09000
heap
page read and write
21892580000
heap
page read and write
2945F227000
heap
page read and write
7FFDF3B5C000
unkown
page readonly
29464ED1000
heap
page read and write
2189259A000
heap
page read and write
2945F2C0000
trusted library allocation
page read and write
2945F22C000
heap
page read and write
2189373A000
heap
page read and write
7FF7E39A1000
unkown
page execute read
4BA09FE000
stack
page read and write
29468DD0000
trusted library allocation
page read and write
29472A7B000
heap
page read and write
2945D29B000
heap
page read and write
1CC9B0E8000
heap
page read and write
218934F4000
heap
page read and write
7FFDF0E33000
unkown
page write copy
7FFDF5E0A000
unkown
page write copy
29468463000
trusted library allocation
page read and write
CB0C0FE000
stack
page read and write
294732FE000
heap
page read and write
7FFDF5E13000
unkown
page write copy
2945D2B4000
heap
page read and write
7FF7E3A89000
unkown
page readonly
21892FD1000
heap
page read and write
2945F249000
heap
page read and write
2189259A000
heap
page read and write
2945D28C000
heap
page read and write
29462BA0000
heap
page read and write
218925AA000
heap
page read and write
2945ECC9000
heap
page read and write
21890630000
heap
page read and write
29463312000
heap
page read and write
7FFDF6EE4000
unkown
page read and write
7FFDF5C70000
unkown
page readonly
29464EC2000
heap
page read and write
2945D288000
heap
page read and write
21892FD1000
heap
page read and write
809E000
heap
page read and write
21893ADB000
heap
page read and write
7F40000
heap
page read and write
F433FFE000
stack
page read and write
29464EB0000
heap
page read and write
F433DFE000
stack
page read and write
1EF9E300000
heap
page read and write
1CC976CE000
heap
page read and write
29463574000
heap
page read and write
29472D98000
heap
page read and write
29463AF6000
heap
page read and write
2945F22A000
heap
page read and write
29462785000
heap
page read and write
3450000
heap
page readonly
21896300000
trusted library allocation
page read and write
2945D2A2000
heap
page read and write
365B000
heap
page read and write
218925AC000
heap
page read and write
7FFDF5901000
unkown
page readonly
2945F228000
heap
page read and write
218933F9000
heap
page read and write
1CC976EF000
heap
page read and write
7FFDF4F01000
unkown
page execute read
7FFDF640D000
unkown
page write copy
2945F222000
heap
page read and write
7FF7E3A5B000
unkown
page read and write
2945F227000
heap
page read and write
1CC9BD3A000
heap
page read and write
2945FFAB000
heap
page read and write
29468441000
trusted library allocation
page read and write
29462FD3000
heap
page read and write
1CC961DB000
heap
page read and write
29462AD4000
heap
page read and write
2189259A000
heap
page read and write
21895D88000
heap
page read and write
2945F222000
heap
page read and write
2189259A000
heap
page read and write
29462E63000
heap
page read and write
7FFDF5C38000
unkown
page write copy
74A000
unkown
page write copy
2945D2A2000
heap
page read and write
7FFDF5C37000
unkown
page read and write
1CC956C1000
heap
page read and write
2945D2D2000
heap
page read and write
2946302F000
heap
page read and write
218925AA000
heap
page read and write
7FFDF6EDF000
unkown
page read and write
7FFDF5210000
unkown
page readonly
8061000
heap
page read and write
730000
unkown
page readonly
29460870000
trusted library allocation
page read and write
2A90000
heap
page read and write
2945D28C000
heap
page read and write
2945F24B000
heap
page read and write
2946F26A000
trusted library allocation
page read and write
1CC976A4000
heap
page read and write
294684B5000
trusted library allocation
page read and write
294684B6000
trusted library allocation
page read and write
7FFDF3663000
unkown
page readonly
2189259A000
heap
page read and write
7FFDF6443000
unkown
page read and write
218965AE000
heap
page read and write
294684A7000
trusted library allocation
page read and write
29463357000
heap
page read and write
2945F249000
heap
page read and write
2189070D000
heap
page read and write
7FF731910000
unkown
page readonly
4B9F5FC000
stack
page read and write
2945D29C000
heap
page read and write
2945D24E000
heap
page read and write
7FFDF6F36000
unkown
page read and write
21890880000
heap
page read and write
7FFDF595A000
unkown
page write copy
F4341F6000
stack
page read and write
294684A8000
trusted library allocation
page read and write
21890703000
heap
page read and write
21895D21000
heap
page read and write
21890610000
heap
page read and write
2189658D000
heap
page read and write
4BA02FE000
stack
page read and write
29472A19000
heap
page read and write
294732D3000
heap
page read and write
2946F233000
trusted library allocation
page read and write
218968A3000
heap
page read and write
7FFDF596B000
unkown
page read and write
294722E5000
heap
page read and write
29460840000
trusted library allocation
page read and write
2946284A000
heap
page read and write
F432FFC000
stack
page read and write
218934AB000
heap
page read and write
2945F222000
heap
page read and write
2A9A000
heap
page read and write
21893E91000
heap
page read and write
21895DC8000
heap
page read and write
29472F9E000
heap
page read and write
218950C2000
heap
page read and write
2945FF53000
heap
page read and write
29464E9D000
heap
page read and write
2189070A000
heap
page read and write
218925B5000
heap
page read and write
There are 2324 hidden memdumps, click here to show them.