Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1da6f47_.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\zmC692.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ZCLIPS~1.zmdownload
|
Microsoft Cabinet archive data, many, 2001727 bytes, 6 files, at 0x1830 +A "zPSUI.dll" +A "swscale_zm-6.dll", flags 0x4, ID
8999, number 1, extra bytes 6144 in head, 240 datablocks, 0x1503 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ZCOMPT~1.CAB.zmdownload
|
Microsoft Cabinet archive data, many, 5246451 bytes, 13 files, at 0x1830 +A "zAppRes.dll" +A "zAppUI.dll", flags 0x4, ID 19094,
number 1, extra bytes 6144 in head, 401 datablocks, 0x1503 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zClipsCab{0A6F84B6-E70A-41B1-97EF-E45D00FB14A4}
|
Microsoft Cabinet archive data, many, 2001727 bytes, 6 files, at 0x1830 +A "zPSUI.dll" +A "swscale_zm-6.dll", flags 0x4, ID
8999, number 1, extra bytes 6144 in head, 240 datablocks, 0x1503 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zCompts.CAB{D8654466-95DA-44C9-BC6A-490A0FFEAEB8}
|
Microsoft Cabinet archive data, many, 5246451 bytes, 13 files, at 0x1830 +A "zAppRes.dll" +A "zAppUI.dll", flags 0x4, ID 19094,
number 1, extra bytes 6144 in head, 401 datablocks, 0x1503 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zmC692.tmp:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.acl
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.dic
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Spelling\en-GB\default.exc
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\352fd027c0e8f0e5.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6276C4PPFCM7788MQDZ2.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DK5KJMQHOPCIUC0FEXQ7.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Zoom\Uninstall Zoom.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command
line arguments, Icon number=0, Archive, ctime=Thu Mar 28 21:39:53 2024, mtime=Thu Mar 28 21:39:53 2024, atime=Thu Mar 28 21:39:33
2024, length=1020744, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Zoom\Zoom.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon
number=0, Archive, ctime=Thu Mar 28 21:39:50 2024, mtime=Thu Mar 28 21:39:50 2024, atime=Thu Mar 28 21:39:43 2024, length=383304,
window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Zoom.msi
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\avcodec_zm-59.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\avformat_zm-59.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\avutil_zm-57.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\swresample_zm-4.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\swscale_zm-6.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\avcodec_zm-59.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\avformat_zm-59.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\avutil_zm-57.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\swresample_zm-4.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\swscale_zm-6.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\temp_psapp\zPSUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zAppRes.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zAppUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zAppUISdk.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zCCIMeeting.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zCCIUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zCCIVideo.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zChatHuddleViewRes.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zCustomizeMeetingUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zHuddlesApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zPSUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zPreMeetingApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zmScheduler.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\zoom_meeting_bridge.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\data\Zoom.us.ini
|
ASCII text, with very long lines (377), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\data\viper.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\data\zoomus.enc.db
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\Zoom\data\zoomus.enc.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\data\zoomus.tmp.enc.db
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\data\zoomus.tmp.enc.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\installer.txt
|
ASCII text, with very long lines (364), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CmmBrowserEngine.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Cmmlib.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptControl.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptHost.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptInstall.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptService.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\CptShare.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Droplet.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\DuiLib.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Installer.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\UIBase.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\WebView2Loader.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\XmppDll.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZRCSdk.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZZHostIPCSDK.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Zoom.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZoomDocConverter.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZoomInstall.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ZoomOutlookIMPlugin.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\Zoom_launcher.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\annoter.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\aomagent.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-console-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-console-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-datetime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-debug-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-file-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-file-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-file-l2-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-handle-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-localization-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-memory-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-profile-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-synch-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-synch-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-timezone-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-core-util-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-conio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-convert-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-environment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-locale-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-math-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-multibyte-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-private-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-process-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-time-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\api-ms-win-crt-utility-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\archival.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\asproxy.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\cares.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\clap-high.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\clap-medium.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\concrt140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\crashrpt_lang.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\dingdong.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\dingdong1.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\directui_license.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\duilib_license.txt
|
ASCII text, with very long lines (755), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\leave.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\libcrypto-3-zm.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\libmpg123.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\libssl-3-zm.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\mcm.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\meeting_chat_chime.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\meeting_raisehand_chime.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\mfAdapter.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msaalib.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140_2.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140_atomic_wait.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\msvcp140_codecvt_ids.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\nanosvg_LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\nydus.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\beep_intercom.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\double_beep.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_0.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_1.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_2.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_3.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_4.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_5.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_6.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_7.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_8.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_9.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_a.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_hash.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\dtmf_star.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\pcm\ring_pstn.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\percussion.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\record_start.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\record_stop.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\reslib.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ring.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ssb_sdk.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\tp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\turbojpeg.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\ucrtbase.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\util.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\vccorlib140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\vcruntime140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\vcruntime140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\viper.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\viper_async_device.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\wr_ding.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zAutoUpdate.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zBusinessUIComponent.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zChatApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zChatUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zCommonChat.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zCrashReport64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zCrashReport64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zData.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zDiagnostic.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zKBCrypto.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zMeshNetAgent.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zMsgApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zMsgAppCommon.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zNetUtils.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zOutlookIMUtil.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zPSApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zPTApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zTscoder.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zUnifyWebView.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zUpdater.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zVideoApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zVideoUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWBUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWBUIRes.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWebService.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWebview2Agent.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zWinRes.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zlt.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zmb.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zoombase_crypto_shared.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_bin\zzhost.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\tmp_uninstall\Installer.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CmmBrowserEngine.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\Cmmlib.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptControl.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptHost.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptInstall.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptService.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\CptShare.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\Droplet.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\DuiLib.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\MailClient.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\UIBase.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\WebView2Loader.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\XmppDll.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZRCSdk.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZZHostIPCSDK.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\Zoom.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZoomDocConverter.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZoomInstall.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ZoomOutlookIMPlugin.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\Zoom_launcher.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\annoter.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\aomagent.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\archival.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\asproxy.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\cares.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\clap-high.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\clap-medium.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\crashrpt_lang.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\dingdong.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\dingdong1.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\directui_license.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\duilib_license.txt
|
ASCII text, with very long lines (755), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\leave.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\libcrypto-3-zm.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\libmpg123.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\libssl-3-zm.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\mcm.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\meeting_chat_chime.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\meeting_raisehand_chime.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\mfAdapter.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\msaalib.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\nanosvg_LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\nydus.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\beep_intercom.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\double_beep.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_0.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_1.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_2.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_3.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_4.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_5.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_6.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_7.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_8.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_9.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_a.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_hash.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\dtmf_star.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\pcm\ring_pstn.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\percussion.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\record_start.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\record_stop.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\reslib.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ring.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\ssb_sdk.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\tp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\turbojpeg.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\util.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\viper.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\viper_async_device.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\win10rt.7z
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\wr_ding.pcm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zAutoUpdate.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zBusinessUIComponent.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zChatApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zChatUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zCommonChat.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zCrashReport64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zCrashReport64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zData.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zDiagnostic.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zKBCrypto.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMailRes.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMailUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMeshNetAgent.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMsgApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zMsgAppCommon.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zNetUtils.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zOutlookIMUtil.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zPSApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zPTApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zTscoder.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zUnifyWebView.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zUpdater.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zVideoApp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zVideoUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWBUI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWBUIRes.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWebService.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWebview2Agent.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zWinRes.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zlt.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zmb.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zoombase_crypto_shared.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Zoom\zoom_install_src\zzhost.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zopener_8a4800ea0a3f43f4bafd7706c1a4e7ee.log
|
ASCII text, with very long lines (511), with CRLF, LF line terminators
|
modified
|
There are 299 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1da6f47_.exe
|
"C:\Users\user\Desktop\1da6f47_.exe"
|
||
C:\Users\user\Desktop\1da6f47_.exe
|
"C:\Users\user\Desktop\1da6f47_.exe" /normal.priviledge
|
||
C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
|
"C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe" ZInstaller --conf.mode=silent --ipc_wnd=66706
|
||
C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
|
"C:\Users\user\AppData\Roaming\Zoom\ZoomDownload\Installer.exe" /addfwexception --bin_home="C:\Users\user\AppData\Roaming\Zoom\bin"
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\Zoom.exe
|
"C:\Users\user\AppData\Roaming\Zoom\bin\Zoom.exe" "--url=zoommtg://win.launch?h.domain=zoom.us&h.path=join&action=join&confno="
|
||
C:\Users\user\AppData\Local\Temp\zmC692.tmp
|
"C:\Users\user\AppData\Local\Temp\zmC692.tmp" -DAF8C715436E44649F1312698287E6A5=C:\Users\user\Desktop\1da6f47_.exe
|
||
C:\Users\user\AppData\Roaming\Zoom\bin\Zoom.exe
|
"C:\Users\user\AppData\Roaming\Zoom\bin\Zoom.exe" --action=joinbyno --runaszvideo=TRUE
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://devfacebook.zoom.usZF=
|
unknown
|
||
http://www.google.com/talk/protocol/authxmlns:authiqNhSlL-0idsettypequeryjabber:iq:authusernametoken
|
unknown
|
||
http://jabber.org/protocol/nick
|
unknown
|
||
https://zoom.us/privacy/ProcessId
|
unknown
|
||
https://devfacebook.zoom.uszK
|
unknown
|
||
http://www.winimage.com/zLibDll1.2.13
|
unknown
|
||
https://devfacebook.zoom.usDK/
|
unknown
|
||
https://devgoogle.zoom.us%IL
|
unknown
|
||
http://jabber.org/protocol/muc#request
|
unknown
|
||
http://www.html-tidy.org/Accessibility/Le
|
unknown
|
||
https://support.zoom.us/hc/en-us/articles/201362003-Zoom-Video-Communications-Technical-Support
|
unknown
|
||
https://teamchat.localhost/kZMIs24TimeFormatfalsekZMUserDefaultMeetingStartWithVideokeyerrortickcoun
|
unknown
|
||
https://facebook.zoom.usqK
|
unknown
|
||
https://zoom.us/client/5.17.11.34827/zClips.CAB?t=atupg&checkSum=aa90cd9f02ebcdb5704fe1f6c76ec26e&ch
|
unknown
|
||
http://www.html-tidy.org/accessibility/.O
|
unknown
|
||
https://devfacebook.zoom.usiI
|
unknown
|
||
https://zoom.us/profile/get?cv=5.17.11.34827&localIP=192.168.2.4oom.us
|
unknown
|
||
http://jabber.org/protocol/si/profile/file-transfer
|
unknown
|
||
https://facebook.zoom.us?J
|
unknown
|
||
https://devfacebook.zoom.us3IR
|
unknown
|
||
https://support.workvivo.com/getNewTokenCWorkVivoManager::OnReceivedWorkvivoSettingUpdate.
|
unknown
|
||
http://camaya.net/gloox
|
unknown
|
||
https://zoomus.zendesk.com/knowledge/articles/115005516426vl_contentvt_side_bartext_contenticon_cont
|
unknown
|
||
http://zoom.comcert_verify_from_conf_vdi_plugin
|
unknown
|
||
https://support.zoom.us/hc/en-us/articles/360061037572-Archiving-settings-for-meetings-and-webinars#
|
unknown
|
||
https://devfacebook.zoom.us-KT
|
unknown
|
||
https://www.zoom.us/download
|
unknown
|
||
https://devgoogle.zoom.usNH)
|
unknown
|
||
https://facebook.zoom.us6KQ
|
unknown
|
||
https://support.zoom.us/hc/articles/360046244692slider_waiting_volumelb_setting_contacts_center_ring
|
unknown
|
||
http://www.mysite.com/myintegration.htm?number=%C
|
unknown
|
||
https://zoom.us/client/5.17.11.34827/zCompts.cab?t=atupg&checkSum=6eb35c271583f0075c6a60398bdceab7&c
|
unknown
|
||
http://jabber.org/protocol/muc#roominfo
|
unknown
|
||
https://zoom.us/client/latest/Installer.exe?archType=x64cal
|
unknown
|
||
https://facebook.zoom.us$HO
|
unknown
|
||
https://zoom.us/https://zoom.com/https://zoom.com.cn/https://zoomgov.com/://https:///
|
unknown
|
||
https://zoomus.zendesk.com/knowledge/articles/115005516426https://zoom.us/account/im/settingres=
|
unknown
|
||
http://jabber.org/protocol/chatstates
|
unknown
|
||
http://www.html-tidy.org/accessibility/.
|
unknown
|
||
http://crl3.digice
|
unknown
|
||
http://jabber.org/protocol/pubsub#owner
|
unknown
|
||
https://zoom.us/user/client/learnMore?flag=pmcnegativeCSBConfWndContainer::CloseReceiveEnableQueryDl
|
unknown
|
||
http://etherx.jabber.org/streams
|
unknown
|
||
https://teamchatprofilecard.localhost/
|
unknown
|
||
https://zoom.us/client/latest/Installer.exe?archType=x64
|
170.114.52.2
|
||
https://devfacebook.zoom.us#HB
|
unknown
|
||
https://c-ares.org/T
|
unknown
|
||
https://facebook.zoom.usMJ4
|
unknown
|
||
http://www.html-tidy.org/Accessibility/
|
unknown
|
||
https://docs.google.com.pptx
|
unknown
|
||
http://camaya.net/gloox~
|
unknown
|
||
http://jabber.org/protocol/feature-neg
|
unknown
|
||
http://jabber.org/protocol/caps
|
unknown
|
||
http://camaya.net/glooxD
|
unknown
|
||
https://www3.zoom.us
|
unknown
|
||
https://devgoogle.zoom.us4I_
|
unknown
|
||
https://devgoogle.zoom.us
|
unknown
|
||
http://jabber.org/protocol/pubsub#event
|
unknown
|
||
http://cacerts.digicert.
|
unknown
|
||
http://jabber.org/protocol/muc#admin
|
unknown
|
||
https://devgoogle.zoom.usH
|
unknown
|
||
https://support.zoom.us/hc/en-us/articles/201362003-Zoom-Video-Communications-Technical-Supportopens
|
unknown
|
||
https://zoom.us/download
|
unknown
|
||
https://github.com/htacg/tidy-html5/blob/master/README/LOCALIZE.md%s
|
unknown
|
||
https://zoom.us
|
unknown
|
||
http://www.google.com/talk/protocol/auth
|
unknown
|
||
http://jabber.org/protocol/disco#items
|
unknown
|
||
https://support.zoom.us/hc/en-us/articles/201362683
|
unknown
|
||
https://devgoogle.zoom.usTH?
|
unknown
|
||
https://zoom.us/client/latest/Zoom.msi?archType=x64
|
170.114.52.2
|
||
https://zoom.us/client/5.17.11.34827/Zoom.msi?t=atupg&archType=x64
|
unknown
|
||
http://jabber.org/protocol/xhtml-im
|
unknown
|
||
https://devgoogle.zoom.us:J
|
unknown
|
||
https://support.zoom.us/hc/en-us/articles/360048660871lb_e2ee_warningpanel_e2ee_warningbtn_e2e_enc_t
|
unknown
|
||
https://zoom.us/privacy/https:http:Shell_TrayWndmailto:CreateProcessWithTokenWADVAPI32.dllEntrust
|
unknown
|
||
https://facebook.zoom.usCK
|
unknown
|
||
https://facebook.zoom.usdI
|
unknown
|
||
http://jabber.org/protocol/offline
|
unknown
|
||
http://cacerts.digic
|
unknown
|
||
http://safelinks/ejl/?pwd=url=0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-_.~
|
unknown
|
||
https://zoomus.zendesk.com/knowledge/articles/1150055164265
|
unknown
|
||
http://dev.w3.org/html5/spec-author-view/
|
unknown
|
||
https://zoom.uscom.zoomus.module.unifywebviewzoomus.class.IUnifyWebViewModuleAPIABCDEFGHJKLMNPQRSTUV
|
unknown
|
||
https://zoomdev.uszoom.us/my/zoom.us/s/https://zoom.usptitruzhfrCTextMsgItemUIesdewin_text_msg_conta
|
unknown
|
||
https://zoom.us/client;Package-url=https://zoom.us/client/5.17.11.34827/Zoom.msi?t=atupg&archType=x6
|
unknown
|
||
http://jabber.org/protocol/bytestreams
|
unknown
|
||
https://zoomus.zendesk.com/knowledge/articles/115005516426NL~
|
unknown
|
||
http://jabber.org/protocol/muc#rooms
|
unknown
|
||
https://devfacebook.zoom.usxI
|
unknown
|
||
http://jabber.org/protocol/amp
|
unknown
|
||
https://devfacebook.zoom.usWK
|
unknown
|
||
http://crl3.digicert.co
|
unknown
|
||
http://www.html-tidy.org/accessibility/
|
unknown
|
||
https://www.zoom.us
|
unknown
|
||
http://www.unicode.org/
|
unknown
|
||
http://jabber.org/protocol/muc
|
unknown
|
||
https://cdn.zoom.us/prod/5.17.11.34827/x64/zClips.CAB
|
52.84.151.39
|
||
http://cacerts.digicredI8
|
unknown
|
||
https://copymailtochat.localhost/mailto:x
|
unknown
|
||
https://support.zoom.us
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cdn.zoom.us
|
52.84.151.39
|
||
zoom.us
|
170.114.52.2
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
144.195.37.213
|
unknown
|
United States
|
||
170.114.52.2
|
zoom.us
|
United States
|
||
144.195.0.250
|
unknown
|
United States
|
||
52.84.151.39
|
cdn.zoom.us
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
DisplayIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
HelpLink
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
URLInfoAbout
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
URLUpdateInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomUMX
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
|
Zoom.exe
|
||
HKEY_CURRENT_USER_Classes\.zoommtg
|
NULL
|
||
HKEY_CURRENT_USER_Classes\.zoommtg
|
Content Type
|
||
HKEY_CURRENT_USER_Classes\ZoomLauncher
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomLauncher\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\MIME\Database\Content Type\application/x-zoommtg-launcher
|
Extension
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform
|
Zoom 3.6.0
|
||
HKEY_CURRENT_USER_Classes\zoommtg
|
NULL
|
||
HKEY_CURRENT_USER_Classes\zoommtg
|
URL Protocol
|
||
HKEY_CURRENT_USER_Classes\zoommtg
|
UseOriginalUrlEncoding
|
||
HKEY_CURRENT_USER_Classes\zoommtg\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\zoommtg\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\zoommtg
|
WarnOnOpen
|
||
HKEY_CURRENT_USER_Classes\zoomus
|
NULL
|
||
HKEY_CURRENT_USER_Classes\zoomus
|
URL Protocol
|
||
HKEY_CURRENT_USER_Classes\zoomus
|
UseOriginalUrlEncoding
|
||
HKEY_CURRENT_USER_Classes\zoomus\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\zoomus\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\zoomus
|
WarnOnOpen
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}
|
AppName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}
|
AppPath
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}
|
Policy
|
||
HKEY_CURRENT_USER_Classes\ZoomRecording
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomRecording\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomRecording\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\.zoom
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomPhoneCall
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomPhoneCall
|
URL Protocol
|
||
HKEY_CURRENT_USER_Classes\ZoomPhoneCall\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomPhoneCall\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomPbx.zoomphonecall
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomPbx.zoomphonecall
|
URL Protocol
|
||
HKEY_CURRENT_USER_Classes\ZoomPbx.zoomphonecall\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\ZoomPbx.zoomphonecall\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Capabilities
|
ApplicationDescription
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Capabilities
|
ApplicationIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Capabilities
|
ApplicationName
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Capabilities\UrlAssociations
|
ZoomPhoneCall
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Protocols\ZoomPhoneCall
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Protocols\ZoomPhoneCall
|
URL Protocol
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Protocols\ZoomPhoneCall\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\Protocols\ZoomPhoneCall\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Clients\ZoomPBX\ZoomPBX\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\RegisteredApplications
|
ZoomPBX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\ZoomPhoneCall\UserChoice
|
Progid
|
||
HKEY_CURRENT_USER\SOFTWARE\ZoomUMX\PerInstall
|
from
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
|
Version
|
There are 50 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFDF62B7000
|
unkown
|
page readonly
|
||
2945F222000
|
heap
|
page read and write
|
||
218968CC000
|
heap
|
page read and write
|
||
21890704000
|
heap
|
page read and write
|
||
2945ECF9000
|
heap
|
page read and write
|
||
21896848000
|
heap
|
page read and write
|
||
218933D9000
|
heap
|
page read and write
|
||
218970A7000
|
heap
|
page read and write
|
||
2946F253000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
21896480000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
7FFDF37F1000
|
unkown
|
page write copy
|
||
2946F261000
|
trusted library allocation
|
page read and write
|
||
7FFDF56D0000
|
unkown
|
page readonly
|
||
7FFDF5C4A000
|
unkown
|
page readonly
|
||
2945F21F000
|
heap
|
page read and write
|
||
218920ED000
|
heap
|
page read and write
|
||
2189717C000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
29463CB7000
|
heap
|
page read and write
|
||
21890707000
|
heap
|
page read and write
|
||
21890703000
|
heap
|
page read and write
|
||
F4334FE000
|
stack
|
page read and write
|
||
21895C95000
|
heap
|
page read and write
|
||
4BA05F7000
|
stack
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
2945F28F000
|
heap
|
page read and write
|
||
294684E6000
|
trusted library allocation
|
page read and write
|
||
21895E1D000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
218940A8000
|
heap
|
page read and write
|
||
21893EB6000
|
heap
|
page read and write
|
||
7FFDF15AE000
|
unkown
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
294628A0000
|
heap
|
page read and write
|
||
2945FF99000
|
heap
|
page read and write
|
||
7FFDF2140000
|
unkown
|
page readonly
|
||
2946F29F000
|
trusted library allocation
|
page read and write
|
||
21895FCB000
|
heap
|
page read and write
|
||
1CC9BD26000
|
heap
|
page read and write
|
||
294724D2000
|
heap
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
21890905000
|
heap
|
page read and write
|
||
36CC000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
7FFDF5E0C000
|
unkown
|
page read and write
|
||
7C6D000
|
stack
|
page read and write
|
||
2189408F000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
7FFDF598D000
|
unkown
|
page readonly
|
||
21893FAB000
|
heap
|
page read and write
|
||
4B9ECFE000
|
stack
|
page read and write
|
||
29463438000
|
heap
|
page read and write
|
||
F432CFE000
|
stack
|
page read and write
|
||
1CC9F50D000
|
heap
|
page read and write
|
||
1CC92C2F000
|
heap
|
page read and write
|
||
21894124000
|
heap
|
page read and write
|
||
29464E9B000
|
heap
|
page read and write
|
||
7FFDF20FC000
|
unkown
|
page write copy
|
||
29473128000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2189606D000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
1CC9B0E0000
|
heap
|
page read and write
|
||
2946845C000
|
trusted library allocation
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
7FFDF56C9000
|
unkown
|
page write copy
|
||
7FFDF1020000
|
unkown
|
page readonly
|
||
3A10000
|
heap
|
page read and write
|
||
7FFDF0D31000
|
unkown
|
page execute read
|
||
218906DA000
|
heap
|
page read and write
|
||
29472CD8000
|
heap
|
page read and write
|
||
294713FC000
|
heap
|
page read and write
|
||
7FFDF6EDC000
|
unkown
|
page read and write
|
||
2945D2AD000
|
heap
|
page read and write
|
||
2189651F000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
21895D3C000
|
heap
|
page read and write
|
||
29468531000
|
trusted library allocation
|
page read and write
|
||
294684BC000
|
trusted library allocation
|
page read and write
|
||
2945F21C000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
29462838000
|
heap
|
page read and write
|
||
21896FC2000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
28F4000
|
heap
|
page read and write
|
||
21896F7A000
|
heap
|
page read and write
|
||
218908F0000
|
trusted library allocation
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
2945ECC0000
|
heap
|
page read and write
|
||
218964AF000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
21896357000
|
heap
|
page read and write
|
||
2945ED15000
|
heap
|
page read and write
|
||
2189686C000
|
heap
|
page read and write
|
||
74C000
|
unkown
|
page readonly
|
||
21893FA7000
|
heap
|
page read and write
|
||
1CC9F628000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
7FF73193A000
|
unkown
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2946F24C000
|
trusted library allocation
|
page read and write
|
||
294684FF000
|
trusted library allocation
|
page read and write
|
||
21896B6F000
|
heap
|
page read and write
|
||
2946848C000
|
trusted library allocation
|
page read and write
|
||
1CC96250000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
218988C0000
|
trusted library allocation
|
page read and write
|
||
7FF7E3A2D000
|
unkown
|
page readonly
|
||
218925D2000
|
heap
|
page read and write
|
||
29464EC4000
|
heap
|
page read and write
|
||
29462BC2000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
29473217000
|
heap
|
page read and write
|
||
F433EFE000
|
stack
|
page read and write
|
||
29464EA4000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
21893CC6000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
1EF9E0C0000
|
heap
|
page read and write
|
||
2945D28B000
|
heap
|
page read and write
|
||
29460870000
|
trusted library allocation
|
page read and write
|
||
7FFDF6FC1000
|
unkown
|
page execute read
|
||
2DA0000
|
heap
|
page read and write
|
||
29472F36000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
21892540000
|
heap
|
page read and write
|
||
29468516000
|
trusted library allocation
|
page read and write
|
||
2945D29B000
|
heap
|
page read and write
|
||
2189660C000
|
heap
|
page read and write
|
||
29463BDC000
|
heap
|
page read and write
|
||
218920E1000
|
heap
|
page read and write
|
||
29468493000
|
trusted library allocation
|
page read and write
|
||
294684F3000
|
trusted library allocation
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
29468448000
|
trusted library allocation
|
page read and write
|
||
29464EB2000
|
heap
|
page read and write
|
||
29468456000
|
trusted library allocation
|
page read and write
|
||
294729D8000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945F264000
|
heap
|
page read and write
|
||
7FFDF1CE3000
|
unkown
|
page readonly
|
||
2945F2B7000
|
heap
|
page read and write
|
||
218920E1000
|
heap
|
page read and write
|
||
218967D2000
|
heap
|
page read and write
|
||
29462E21000
|
heap
|
page read and write
|
||
1CC966C1000
|
heap
|
page read and write
|
||
218921F3000
|
heap
|
page read and write
|
||
2D5A000
|
heap
|
page read and write
|
||
2945D2BA000
|
heap
|
page read and write
|
||
2946F237000
|
trusted library allocation
|
page read and write
|
||
29472EC5000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
21896932000
|
heap
|
page read and write
|
||
7FFDF1CA6000
|
unkown
|
page read and write
|
||
2946F248000
|
trusted library allocation
|
page read and write
|
||
29462CFE000
|
heap
|
page read and write
|
||
7FFDF6F5F000
|
unkown
|
page readonly
|
||
2945F26E000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
7FFDF56CF000
|
unkown
|
page read and write
|
||
29462BBD000
|
heap
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
218950E9000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
2946392A000
|
heap
|
page read and write
|
||
21896C01000
|
heap
|
page read and write
|
||
2945F25F000
|
heap
|
page read and write
|
||
218906F0000
|
heap
|
page read and write
|
||
7FFDF640C000
|
unkown
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
2945D2AD000
|
heap
|
page read and write
|
||
1CC966B2000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
7FFDF6411000
|
unkown
|
page write copy
|
||
1CC96680000
|
heap
|
page read and write
|
||
2945F261000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
2946001E000
|
heap
|
page read and write
|
||
218925A8000
|
heap
|
page read and write
|
||
21895147000
|
heap
|
page read and write
|
||
29463AFB000
|
heap
|
page read and write
|
||
2947343C000
|
heap
|
page read and write
|
||
218906B6000
|
heap
|
page read and write
|
||
29462969000
|
heap
|
page read and write
|
||
4BA0CFE000
|
stack
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
29464EC1000
|
heap
|
page read and write
|
||
294684DF000
|
trusted library allocation
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
218920E1000
|
heap
|
page read and write
|
||
80CD000
|
heap
|
page read and write
|
||
218920E9000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
218925BC000
|
heap
|
page read and write
|
||
21895C5C000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
29471294000
|
heap
|
page read and write
|
||
7FFDF5E11000
|
unkown
|
page read and write
|
||
799F000
|
stack
|
page read and write
|
||
7FFDF640F000
|
unkown
|
page read and write
|
||
1CC9627C000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
29468494000
|
trusted library allocation
|
page read and write
|
||
1CC9915E000
|
heap
|
page read and write
|
||
21893195000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
29463A07000
|
heap
|
page read and write
|
||
21890706000
|
heap
|
page read and write
|
||
7FFDF1BE0000
|
unkown
|
page readonly
|
||
1CC9B451000
|
heap
|
page read and write
|
||
7FFDF59B1000
|
unkown
|
page execute read
|
||
21895DA8000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
2945D4C0000
|
trusted library allocation
|
page read and write
|
||
2945F270000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
1EF9DFB0000
|
heap
|
page read and write
|
||
7FF73193E000
|
unkown
|
page readonly
|
||
218925A0000
|
heap
|
page read and write
|
||
35C000
|
stack
|
page read and write
|
||
1CC9F870000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
21896D61000
|
heap
|
page read and write
|
||
21893C43000
|
heap
|
page read and write
|
||
21892580000
|
heap
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
21895C71000
|
heap
|
page read and write
|
||
21896458000
|
heap
|
page read and write
|
||
2945ED5D000
|
heap
|
page read and write
|
||
7FFDF6FC0000
|
unkown
|
page readonly
|
||
36C5000
|
heap
|
page read and write
|
||
218920FF000
|
heap
|
page read and write
|
||
7FFDF56D0000
|
unkown
|
page readonly
|
||
21896631000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
7FF73195E000
|
unkown
|
page readonly
|
||
29463C22000
|
heap
|
page read and write
|
||
1CC961F1000
|
heap
|
page read and write
|
||
218925D3000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
21895D4C000
|
heap
|
page read and write
|
||
2945EDAD000
|
heap
|
page read and write
|
||
2945ED01000
|
heap
|
page read and write
|
||
7FF73195E000
|
unkown
|
page readonly
|
||
21896E3A000
|
heap
|
page read and write
|
||
294684BD000
|
trusted library allocation
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
29463A26000
|
heap
|
page read and write
|
||
218906A1000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
7FFDF5E09000
|
unkown
|
page read and write
|
||
21895F1D000
|
heap
|
page read and write
|
||
F4329FE000
|
stack
|
page read and write
|
||
29468471000
|
trusted library allocation
|
page read and write
|
||
7B6D000
|
stack
|
page read and write
|
||
21896300000
|
heap
|
page read and write
|
||
218965AC000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945D2B8000
|
heap
|
page read and write
|
||
218950E6000
|
heap
|
page read and write
|
||
294684F1000
|
trusted library allocation
|
page read and write
|
||
218967E3000
|
heap
|
page read and write
|
||
21895D0C000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
2946004F000
|
heap
|
page read and write
|
||
218925A8000
|
heap
|
page read and write
|
||
333A000
|
stack
|
page read and write
|
||
2945F289000
|
heap
|
page read and write
|
||
4B9E4DE000
|
stack
|
page read and write
|
||
21896A80000
|
heap
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
7FFDF6EEE000
|
unkown
|
page read and write
|
||
21893F86000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
218925A6000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
7FFDF64A0000
|
unkown
|
page readonly
|
||
2945D298000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
7FFDF6443000
|
unkown
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
7FF73195E000
|
unkown
|
page readonly
|
||
7FFDF596B000
|
unkown
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
2945F3D0000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
2189600E000
|
heap
|
page read and write
|
||
7FFDF3846000
|
unkown
|
page readonly
|
||
21896AF1000
|
heap
|
page read and write
|
||
F4343FE000
|
stack
|
page read and write
|
||
7FF7E39A0000
|
unkown
|
page readonly
|
||
21894082000
|
heap
|
page read and write
|
||
29468528000
|
trusted library allocation
|
page read and write
|
||
218921A1000
|
heap
|
page read and write
|
||
1CC97634000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
29465F50000
|
trusted library section
|
page read and write
|
||
294684CA000
|
trusted library allocation
|
page read and write
|
||
21896940000
|
heap
|
page read and write
|
||
29468D9D000
|
trusted library allocation
|
page read and write
|
||
7FFDF6415000
|
unkown
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
5FCF000
|
stack
|
page read and write
|
||
2946855F000
|
trusted library allocation
|
page read and write
|
||
29472D49000
|
heap
|
page read and write
|
||
2945D253000
|
heap
|
page read and write
|
||
7FFDF56F0000
|
unkown
|
page readonly
|
||
2189428C000
|
heap
|
page read and write
|
||
29460250000
|
heap
|
page read and write
|
||
1CC99B6B000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
2945F450000
|
heap
|
page read and write
|
||
7FFDF5DB9000
|
unkown
|
page readonly
|
||
29463AFE000
|
heap
|
page read and write
|
||
218906EF000
|
heap
|
page read and write
|
||
294732C2000
|
heap
|
page read and write
|
||
21892105000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
7FFDF15BB000
|
unkown
|
page readonly
|
||
218931CD000
|
heap
|
page read and write
|
||
218925BC000
|
heap
|
page read and write
|
||
2C91000
|
heap
|
page read and write
|
||
294628DE000
|
heap
|
page read and write
|
||
7FF73193C000
|
unkown
|
page read and write
|
||
21892FD1000
|
heap
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
7FFDF3845000
|
unkown
|
page read and write
|
||
2945D515000
|
heap
|
page read and write
|
||
2189602D000
|
heap
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
2946854B000
|
trusted library allocation
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
21892580000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
29462BA9000
|
heap
|
page read and write
|
||
218964D6000
|
heap
|
page read and write
|
||
21895C87000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
21890900000
|
heap
|
page read and write
|
||
7FFDF2F30000
|
unkown
|
page readonly
|
||
2945F219000
|
heap
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
7FFDF2B91000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
7FFDF5E09000
|
unkown
|
page read and write
|
||
21897190000
|
heap
|
page read and write
|
||
7FFDF541B000
|
unkown
|
page readonly
|
||
1CC9F625000
|
heap
|
page read and write
|
||
1CC9B4E3000
|
heap
|
page read and write
|
||
21896C55000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
2945F1EA000
|
heap
|
page read and write
|
||
5E90000
|
remote allocation
|
page read and write
|
||
218940F7000
|
heap
|
page read and write
|
||
2945D29C000
|
heap
|
page read and write
|
||
36C6000
|
heap
|
page read and write
|
||
294684D1000
|
trusted library allocation
|
page read and write
|
||
2945F261000
|
heap
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
29473045000
|
heap
|
page read and write
|
||
7FFDF1CAF000
|
unkown
|
page readonly
|
||
21895DC8000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
1CC9B215000
|
heap
|
page read and write
|
||
21890670000
|
heap
|
page read and write
|
||
1CC9F4AA000
|
heap
|
page read and write
|
||
21893F93000
|
heap
|
page read and write
|
||
7FFDF1021000
|
unkown
|
page execute read
|
||
2946F28A000
|
trusted library allocation
|
page read and write
|
||
21893409000
|
heap
|
page read and write
|
||
218906A1000
|
heap
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
29473132000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
218906FC000
|
heap
|
page read and write
|
||
218906F3000
|
heap
|
page read and write
|
||
7FF73193A000
|
unkown
|
page write copy
|
||
1CC975FB000
|
heap
|
page read and write
|
||
36D2000
|
heap
|
page read and write
|
||
21890706000
|
heap
|
page read and write
|
||
29463CBB000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
1CC9B408000
|
heap
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
7FFDF5E11000
|
unkown
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
CB0BFFE000
|
stack
|
page read and write
|
||
29473120000
|
heap
|
page read and write
|
||
1CC9B0C6000
|
heap
|
page read and write
|
||
2946F271000
|
trusted library allocation
|
page read and write
|
||
218906F9000
|
heap
|
page read and write
|
||
2945F263000
|
heap
|
page read and write
|
||
294684A1000
|
trusted library allocation
|
page read and write
|
||
36C5000
|
heap
|
page read and write
|
||
218950AC000
|
heap
|
page read and write
|
||
2946F2B4000
|
trusted library allocation
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
2945F3C0000
|
trusted library allocation
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
7DAD000
|
stack
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
2945D29F000
|
heap
|
page read and write
|
||
218906F0000
|
heap
|
page read and write
|
||
29468536000
|
trusted library allocation
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
2946286C000
|
heap
|
page read and write
|
||
7FFDF5E0E000
|
unkown
|
page write copy
|
||
7FFDF5C37000
|
unkown
|
page read and write
|
||
218925B7000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
7FFDF598D000
|
unkown
|
page readonly
|
||
2945F251000
|
heap
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
218925AA000
|
heap
|
page read and write
|
||
29464EBF000
|
heap
|
page read and write
|
||
218925BC000
|
heap
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
7FF7E3A6A000
|
unkown
|
page readonly
|
||
218968C8000
|
heap
|
page read and write
|
||
7FFDF3B9D000
|
unkown
|
page readonly
|
||
29462DE1000
|
heap
|
page read and write
|
||
2A1000
|
unkown
|
page execute read
|
||
29472317000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
7FFDF1C76000
|
unkown
|
page readonly
|
||
2945F217000
|
heap
|
page read and write
|
||
29463BB6000
|
heap
|
page read and write
|
||
2946F268000
|
trusted library allocation
|
page read and write
|
||
80C4000
|
heap
|
page read and write
|
||
29464E9D000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945F261000
|
heap
|
page read and write
|
||
2945F267000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
294684D8000
|
trusted library allocation
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
602E000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
4BA01FE000
|
stack
|
page read and write
|
||
1CC9A32D000
|
heap
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
218971A6000
|
heap
|
page read and write
|
||
21892557000
|
heap
|
page read and write
|
||
218925A8000
|
heap
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2946343C000
|
heap
|
page read and write
|
||
29468554000
|
trusted library allocation
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
218940DA000
|
heap
|
page read and write
|
||
218906EF000
|
heap
|
page read and write
|
||
218925A2000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
7FFDF6F1D000
|
unkown
|
page read and write
|
||
36C5000
|
heap
|
page read and write
|
||
1CC9F9FB000
|
heap
|
page read and write
|
||
218972CD000
|
heap
|
page read and write
|
||
74C000
|
unkown
|
page readonly
|
||
2946287E000
|
heap
|
page read and write
|
||
21892581000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
29472EBA000
|
heap
|
page read and write
|
||
39E0000
|
heap
|
page read and write
|
||
7FFDF1D01000
|
unkown
|
page execute read
|
||
21893FB2000
|
heap
|
page read and write
|
||
F4346FE000
|
stack
|
page read and write
|
||
29462CCF000
|
heap
|
page read and write
|
||
742000
|
unkown
|
page readonly
|
||
7FFDF5C35000
|
unkown
|
page write copy
|
||
2945D2B4000
|
heap
|
page read and write
|
||
29462AF5000
|
heap
|
page read and write
|
||
21894E89000
|
heap
|
page read and write
|
||
29465F30000
|
trusted library section
|
page read and write
|
||
2189664C000
|
heap
|
page read and write
|
||
21892580000
|
heap
|
page read and write
|
||
29463D47000
|
heap
|
page read and write
|
||
218931CB000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
2189660C000
|
heap
|
page read and write
|
||
29468440000
|
trusted library allocation
|
page read and write
|
||
21896753000
|
heap
|
page read and write
|
||
3A15000
|
heap
|
page read and write
|
||
7FFDF5E14000
|
unkown
|
page read and write
|
||
29463A03000
|
heap
|
page read and write
|
||
1CC9F7D9000
|
heap
|
page read and write
|
||
21895D4C000
|
heap
|
page read and write
|
||
2946F230000
|
trusted library allocation
|
page read and write
|
||
21892791000
|
heap
|
page read and write
|
||
7FFDF3801000
|
unkown
|
page write copy
|
||
2945F21F000
|
heap
|
page read and write
|
||
29463863000
|
heap
|
page read and write
|
||
21896B67000
|
heap
|
page read and write
|
||
7FFDF5C71000
|
unkown
|
page execute read
|
||
2946849B000
|
trusted library allocation
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
2946287F000
|
heap
|
page read and write
|
||
21893EB4000
|
heap
|
page read and write
|
||
2945ED3D000
|
heap
|
page read and write
|
||
1CC966CF000
|
heap
|
page read and write
|
||
7FFDF6412000
|
unkown
|
page read and write
|
||
21895CEB000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
21893E2E000
|
heap
|
page read and write
|
||
29462E54000
|
heap
|
page read and write
|
||
7FF731938000
|
unkown
|
page read and write
|
||
1EF9E1A0000
|
heap
|
page readonly
|
||
29463D60000
|
trusted library allocation
|
page read and write
|
||
29473147000
|
heap
|
page read and write
|
||
29462A90000
|
heap
|
page read and write
|
||
2945D21F000
|
heap
|
page read and write
|
||
29464E9B000
|
heap
|
page read and write
|
||
7FFDF1490000
|
unkown
|
page readonly
|
||
7FFDF5E31000
|
unkown
|
page execute read
|
||
2946843A000
|
trusted library allocation
|
page read and write
|
||
371E000
|
heap
|
page read and write
|
||
29462E87000
|
heap
|
page read and write
|
||
7FFDF644E000
|
unkown
|
page readonly
|
||
2945F261000
|
heap
|
page read and write
|
||
2945F264000
|
heap
|
page read and write
|
||
29463525000
|
heap
|
page read and write
|
||
218920E0000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
29472A5A000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
218920FF000
|
heap
|
page read and write
|
||
218964EF000
|
heap
|
page read and write
|
||
21895E15000
|
heap
|
page read and write
|
||
7FFDF5E30000
|
unkown
|
page readonly
|
||
29472FA6000
|
heap
|
page read and write
|
||
2946F24F000
|
trusted library allocation
|
page read and write
|
||
29462D3A000
|
heap
|
page read and write
|
||
218906F2000
|
heap
|
page read and write
|
||
7FFDF5E0E000
|
unkown
|
page write copy
|
||
21896322000
|
heap
|
page read and write
|
||
1CC9A916000
|
heap
|
page read and write
|
||
21892581000
|
heap
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
21892185000
|
heap
|
page read and write
|
||
4B9FDFD000
|
stack
|
page read and write
|
||
1CC965B6000
|
heap
|
page read and write
|
||
1CC9F72D000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
371C000
|
heap
|
page read and write
|
||
2945D2BA000
|
heap
|
page read and write
|
||
7FFDF5968000
|
unkown
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
1CC9679F000
|
heap
|
page read and write
|
||
21897118000
|
heap
|
page read and write
|
||
2945F229000
|
heap
|
page read and write
|
||
2946087D000
|
trusted library allocation
|
page read and write
|
||
2945D2AD000
|
heap
|
page read and write
|
||
29472A3A000
|
heap
|
page read and write
|
||
29463D5D000
|
heap
|
page read and write
|
||
74C000
|
unkown
|
page readonly
|
||
2945D288000
|
heap
|
page read and write
|
||
2945F460000
|
heap
|
page read and write
|
||
294684DF000
|
trusted library allocation
|
page read and write
|
||
7FFDF640B000
|
unkown
|
page write copy
|
||
2945ED09000
|
heap
|
page read and write
|
||
7FFDF640B000
|
unkown
|
page write copy
|
||
29468503000
|
trusted library allocation
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
7FF73193A000
|
unkown
|
page write copy
|
||
2189747A000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
1CC9B0C4000
|
heap
|
page read and write
|
||
294627EB000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
29464EBF000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
7FFDF2107000
|
unkown
|
page read and write
|
||
29460246000
|
heap
|
page read and write
|
||
218964A0000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
218925BC000
|
heap
|
page read and write
|
||
7FFDF5C4A000
|
unkown
|
page readonly
|
||
2945F22A000
|
heap
|
page read and write
|
||
7FFDF3845000
|
unkown
|
page read and write
|
||
370F000
|
heap
|
page read and write
|
||
1EF9FEF0000
|
heap
|
page read and write
|
||
218925B7000
|
heap
|
page read and write
|
||
2946364B000
|
heap
|
page read and write
|
||
2945F456000
|
heap
|
page read and write
|
||
29462FB1000
|
heap
|
page read and write
|
||
21894FA8000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
4BA0EFE000
|
stack
|
page read and write
|
||
21893511000
|
heap
|
page read and write
|
||
29460247000
|
heap
|
page read and write
|
||
218925A2000
|
heap
|
page read and write
|
||
4B9EDFE000
|
stack
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
2946349A000
|
heap
|
page read and write
|
||
21890706000
|
heap
|
page read and write
|
||
4BA08FE000
|
stack
|
page read and write
|
||
2945ECC5000
|
heap
|
page read and write
|
||
1EF9E210000
|
trusted library allocation
|
page read and write
|
||
7FFDF1CA2000
|
unkown
|
page read and write
|
||
29462F6F000
|
heap
|
page read and write
|
||
21893429000
|
heap
|
page read and write
|
||
2189258E000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945ED6D000
|
heap
|
page read and write
|
||
7FFDF59B0000
|
unkown
|
page readonly
|
||
369E000
|
heap
|
page read and write
|
||
29472AEC000
|
heap
|
page read and write
|
||
21893FB0000
|
heap
|
page read and write
|
||
29462A6F000
|
heap
|
page read and write
|
||
7FFDF1BE1000
|
unkown
|
page execute read
|
||
21897470000
|
trusted library allocation
|
page read and write
|
||
21896A3B000
|
heap
|
page read and write
|
||
218925AC000
|
heap
|
page read and write
|
||
1CC9F498000
|
heap
|
page read and write
|
||
2189653E000
|
heap
|
page read and write
|
||
21893E9F000
|
heap
|
page read and write
|
||
218925A6000
|
heap
|
page read and write
|
||
2947313D000
|
heap
|
page read and write
|
||
21895DF7000
|
heap
|
page read and write
|
||
7FFDF3663000
|
unkown
|
page readonly
|
||
2945F249000
|
heap
|
page read and write
|
||
21892580000
|
heap
|
page read and write
|
||
21895E48000
|
heap
|
page read and write
|
||
2BA000
|
unkown
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
2946851D000
|
trusted library allocation
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
5E90000
|
remote allocation
|
page read and write
|
||
2189658A000
|
heap
|
page read and write
|
||
29473220000
|
heap
|
page read and write
|
||
29468574000
|
trusted library allocation
|
page read and write
|
||
294734A1000
|
heap
|
page read and write
|
||
218920E9000
|
heap
|
page read and write
|
||
21895F08000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
7FFDF6F4F000
|
unkown
|
page read and write
|
||
7FFDF6EE3000
|
unkown
|
page write copy
|
||
742000
|
unkown
|
page readonly
|
||
F4342FE000
|
stack
|
page read and write
|
||
294684D5000
|
trusted library allocation
|
page read and write
|
||
F4348FC000
|
stack
|
page read and write
|
||
29474100000
|
trusted library allocation
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
294684FA000
|
trusted library allocation
|
page read and write
|
||
5ECE000
|
stack
|
page read and write
|
||
29462B7D000
|
heap
|
page read and write
|
||
218906DF000
|
heap
|
page read and write
|
||
2946845C000
|
trusted library allocation
|
page read and write
|
||
218925A8000
|
heap
|
page read and write
|
||
2189604F000
|
heap
|
page read and write
|
||
29462B57000
|
heap
|
page read and write
|
||
7FFDF1CA3000
|
unkown
|
page write copy
|
||
218969F7000
|
heap
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
294725E2000
|
heap
|
page read and write
|
||
2945ED11000
|
heap
|
page read and write
|
||
7FFDF1D00000
|
unkown
|
page readonly
|
||
2945ECD0000
|
heap
|
page read and write
|
||
1CC92C63000
|
heap
|
page read and write
|
||
29473145000
|
heap
|
page read and write
|
||
1CC9664F000
|
heap
|
page read and write
|
||
7FFDF640C000
|
unkown
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
2945ED0D000
|
heap
|
page read and write
|
||
21892589000
|
heap
|
page read and write
|
||
218906A4000
|
heap
|
page read and write
|
||
2945F25F000
|
heap
|
page read and write
|
||
218921A9000
|
heap
|
page read and write
|
||
294684C4000
|
trusted library allocation
|
page read and write
|
||
1CC99060000
|
heap
|
page read and write
|
||
2945D1E0000
|
heap
|
page read and write
|
||
294684F4000
|
trusted library allocation
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
7FFDF5E14000
|
unkown
|
page read and write
|
||
7FFDF6411000
|
unkown
|
page write copy
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
29468DB0000
|
trusted library allocation
|
page read and write
|
||
82FC000
|
stack
|
page read and write
|
||
632F000
|
stack
|
page read and write
|
||
294684CB000
|
trusted library allocation
|
page read and write
|
||
1CC92BF1000
|
heap
|
page read and write
|
||
7FF73195E000
|
unkown
|
page readonly
|
||
29472FB2000
|
heap
|
page read and write
|
||
369D000
|
heap
|
page read and write
|
||
294633A4000
|
heap
|
page read and write
|
||
21895130000
|
heap
|
page read and write
|
||
218925DF000
|
heap
|
page read and write
|
||
29464EBA000
|
heap
|
page read and write
|
||
1CC92C5C000
|
heap
|
page read and write
|
||
7FFDF15B2000
|
unkown
|
page read and write
|
||
36C6000
|
heap
|
page read and write
|
||
29462B99000
|
heap
|
page read and write
|
||
2C91000
|
heap
|
page read and write
|
||
294639FF000
|
heap
|
page read and write
|
||
1CC92C2F000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
29464EBF000
|
heap
|
page read and write
|
||
2189350E000
|
heap
|
page read and write
|
||
2945F275000
|
heap
|
page read and write
|
||
7FF7E3A2D000
|
unkown
|
page readonly
|
||
2945F1C5000
|
heap
|
page read and write
|
||
1EF9E305000
|
heap
|
page read and write
|
||
F4322DB000
|
stack
|
page read and write
|
||
21896091000
|
heap
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
29468DDD000
|
trusted library allocation
|
page read and write
|
||
7FFDF6416000
|
unkown
|
page write copy
|
||
2945F219000
|
heap
|
page read and write
|
||
21896037000
|
heap
|
page read and write
|
||
1CC9A32B000
|
heap
|
page read and write
|
||
7FF731911000
|
unkown
|
page execute read
|
||
2945D288000
|
heap
|
page read and write
|
||
21895FEE000
|
heap
|
page read and write
|
||
7FFDF5901000
|
unkown
|
page readonly
|
||
2947146D000
|
heap
|
page read and write
|
||
21896D2D000
|
heap
|
page read and write
|
||
21892FD1000
|
heap
|
page read and write
|
||
2946F23A000
|
trusted library allocation
|
page read and write
|
||
218920D0000
|
trusted library allocation
|
page read and write
|
||
218967D4000
|
heap
|
page read and write
|
||
2189643F000
|
heap
|
page read and write
|
||
7FFDF6D01000
|
unkown
|
page readonly
|
||
21890704000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
7FFDF6F30000
|
unkown
|
page read and write
|
||
2945F24D000
|
heap
|
page read and write
|
||
218906DC000
|
heap
|
page read and write
|
||
2945D2AD000
|
heap
|
page read and write
|
||
7FF731910000
|
unkown
|
page readonly
|
||
7FFDF0DFD000
|
unkown
|
page readonly
|
||
2189645F000
|
heap
|
page read and write
|
||
7FF73193E000
|
unkown
|
page readonly
|
||
218925A0000
|
heap
|
page read and write
|
||
2945FF5F000
|
heap
|
page read and write
|
||
7FFDF4F29000
|
unkown
|
page readonly
|
||
21895DC5000
|
heap
|
page read and write
|
||
7FFDF6D01000
|
unkown
|
page readonly
|
||
29468DBD000
|
trusted library allocation
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
21896FA0000
|
heap
|
page read and write
|
||
809C000
|
heap
|
page read and write
|
||
29468486000
|
trusted library allocation
|
page read and write
|
||
2946284B000
|
heap
|
page read and write
|
||
218920E9000
|
heap
|
page read and write
|
||
29462AD4000
|
heap
|
page read and write
|
||
294684AE000
|
trusted library allocation
|
page read and write
|
||
7FFDF595A000
|
unkown
|
page write copy
|
||
21893DED000
|
heap
|
page read and write
|
||
21896DA3000
|
heap
|
page read and write
|
||
7FFDF54B2000
|
unkown
|
page read and write
|
||
21890705000
|
heap
|
page read and write
|
||
21893529000
|
heap
|
page read and write
|
||
2946F2AD000
|
trusted library allocation
|
page read and write
|
||
2189315B000
|
heap
|
page read and write
|
||
2945F26B000
|
heap
|
page read and write
|
||
218967EC000
|
heap
|
page read and write
|
||
7FFDF54B6000
|
unkown
|
page write copy
|
||
7FFDF5E0C000
|
unkown
|
page read and write
|
||
21896874000
|
heap
|
page read and write
|
||
29462BDB000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
29474100000
|
trusted library allocation
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
2189373C000
|
heap
|
page read and write
|
||
21895C08000
|
heap
|
page read and write
|
||
4B9F1FE000
|
stack
|
page read and write
|
||
21893F9D000
|
heap
|
page read and write
|
||
2945ED35000
|
heap
|
page read and write
|
||
21892FA0000
|
trusted library allocation
|
page read and write
|
||
29463580000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
29473241000
|
heap
|
page read and write
|
||
29462A91000
|
heap
|
page read and write
|
||
21895E15000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
29472913000
|
heap
|
page read and write
|
||
21897470000
|
trusted library allocation
|
page read and write
|
||
29464EBF000
|
heap
|
page read and write
|
||
294630C5000
|
heap
|
page read and write
|
||
F4333FE000
|
stack
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
7FFDF5665000
|
unkown
|
page readonly
|
||
2945F2C0000
|
trusted library allocation
|
page read and write
|
||
21890620000
|
heap
|
page readonly
|
||
2946371E000
|
heap
|
page read and write
|
||
2A1000
|
unkown
|
page execute read
|
||
29460259000
|
heap
|
page read and write
|
||
21896B11000
|
heap
|
page read and write
|
||
7FFDF5211000
|
unkown
|
page execute read
|
||
7FFDF6EE4000
|
unkown
|
page read and write
|
||
29468463000
|
trusted library allocation
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
21896AA1000
|
heap
|
page read and write
|
||
218940BE000
|
heap
|
page read and write
|
||
218906EC000
|
heap
|
page read and write
|
||
7FFDF5C47000
|
unkown
|
page read and write
|
||
218934E7000
|
heap
|
page read and write
|
||
21895FEB000
|
heap
|
page read and write
|
||
7FFDF3801000
|
unkown
|
page write copy
|
||
7FFDF37F7000
|
unkown
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
218925E6000
|
heap
|
page read and write
|
||
218906E9000
|
heap
|
page read and write
|
||
29464EBA000
|
heap
|
page read and write
|
||
2945F2C0000
|
trusted library allocation
|
page read and write
|
||
2BA000
|
unkown
|
page write copy
|
||
285E000
|
stack
|
page read and write
|
||
218921F0000
|
heap
|
page read and write
|
||
2945D29B000
|
heap
|
page read and write
|
||
2946F2E4000
|
trusted library allocation
|
page read and write
|
||
1CC92C2B000
|
heap
|
page read and write
|
||
1EF9E1D0000
|
heap
|
page read and write
|
||
218920E1000
|
heap
|
page read and write
|
||
2B2000
|
unkown
|
page readonly
|
||
2946F217000
|
trusted library allocation
|
page read and write
|
||
21896A34000
|
heap
|
page read and write
|
||
29463D60000
|
trusted library allocation
|
page read and write
|
||
1CC92BFF000
|
heap
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
2945F25F000
|
heap
|
page read and write
|
||
7FFDF2F30000
|
unkown
|
page readonly
|
||
2946391B000
|
heap
|
page read and write
|
||
218925A6000
|
heap
|
page read and write
|
||
21897690000
|
trusted library allocation
|
page read and write
|
||
2945ED05000
|
heap
|
page read and write
|
||
1EF9E1B0000
|
heap
|
page read and write
|
||
3A19000
|
heap
|
page read and write
|
||
29468546000
|
trusted library allocation
|
page read and write
|
||
29462F2B000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
21893341000
|
heap
|
page read and write
|
||
29471339000
|
heap
|
page read and write
|
||
29472ADC000
|
heap
|
page read and write
|
||
29463CD2000
|
heap
|
page read and write
|
||
21896429000
|
heap
|
page read and write
|
||
21895101000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
29472ADE000
|
heap
|
page read and write
|
||
21895000000
|
heap
|
page read and write
|
||
21895E17000
|
heap
|
page read and write
|
||
2945D2AD000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
4BA04F9000
|
stack
|
page read and write
|
||
294713BB000
|
heap
|
page read and write
|
||
294684DC000
|
trusted library allocation
|
page read and write
|
||
218906F9000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
21896B48000
|
heap
|
page read and write
|
||
21895F8A000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
1CC9F50F000
|
heap
|
page read and write
|
||
29468583000
|
trusted library allocation
|
page read and write
|
||
7FFDF644E000
|
unkown
|
page readonly
|
||
2945D24E000
|
heap
|
page read and write
|
||
21896BBD000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
3684000
|
heap
|
page read and write
|
||
21896157000
|
heap
|
page read and write
|
||
7FFDF541B000
|
unkown
|
page readonly
|
||
2945FF89000
|
heap
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
21895E15000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
21893EBF000
|
heap
|
page read and write
|
||
7FFDF5E31000
|
unkown
|
page execute read
|
||
294684AF000
|
trusted library allocation
|
page read and write
|
||
2946286C000
|
heap
|
page read and write
|
||
294712F8000
|
heap
|
page read and write
|
||
2946339F000
|
heap
|
page read and write
|
||
29462EF9000
|
heap
|
page read and write
|
||
29462BDA000
|
heap
|
page read and write
|
||
7FF73193C000
|
unkown
|
page read and write
|
||
29468425000
|
trusted library allocation
|
page read and write
|
||
29463635000
|
heap
|
page read and write
|
||
4B9FFFE000
|
stack
|
page read and write
|
||
21895D88000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
7FFDF3B8D000
|
unkown
|
page write copy
|
||
2946F2C1000
|
trusted library allocation
|
page read and write
|
||
602A000
|
heap
|
page read and write
|
||
7FFDF54E0000
|
unkown
|
page readonly
|
||
1CC958CC000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
2946844E000
|
trusted library allocation
|
page read and write
|
||
7FF73193A000
|
unkown
|
page read and write
|
||
7FFDF4FBE000
|
unkown
|
page readonly
|
||
2189259A000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
2946F2A1000
|
trusted library allocation
|
page read and write
|
||
29473049000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
21896B94000
|
heap
|
page read and write
|
||
218939C0000
|
trusted library allocation
|
page read and write
|
||
218906F9000
|
heap
|
page read and write
|
||
21895C6E000
|
heap
|
page read and write
|
||
36CF000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
21895E11000
|
heap
|
page read and write
|
||
21896070000
|
heap
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
218920E1000
|
heap
|
page read and write
|
||
2CFC000
|
stack
|
page read and write
|
||
21892589000
|
heap
|
page read and write
|
||
21894086000
|
heap
|
page read and write
|
||
2946F256000
|
trusted library allocation
|
page read and write
|
||
1CC97D3D000
|
heap
|
page read and write
|
||
29468D90000
|
trusted library allocation
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
29464EC4000
|
heap
|
page read and write
|
||
1EF9E210000
|
trusted library allocation
|
page read and write
|
||
2189355E000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
7FFDF5C38000
|
unkown
|
page write copy
|
||
2946F2AF000
|
trusted library allocation
|
page read and write
|
||
29464EE0000
|
heap
|
page read and write
|
||
F4345FE000
|
stack
|
page read and write
|
||
21892780000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
21890712000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
8067000
|
heap
|
page read and write
|
||
29463671000
|
heap
|
page read and write
|
||
80EF000
|
heap
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
218920F7000
|
heap
|
page read and write
|
||
2945FEF9000
|
heap
|
page read and write
|
||
F4326FE000
|
stack
|
page read and write
|
||
21892786000
|
heap
|
page read and write
|
||
29463BA6000
|
heap
|
page read and write
|
||
2945D298000
|
heap
|
page read and write
|
||
29463345000
|
heap
|
page read and write
|
||
218968CD000
|
heap
|
page read and write
|
||
7FFDF5DB9000
|
unkown
|
page readonly
|
||
7FFDF5210000
|
unkown
|
page readonly
|
||
2945F22B000
|
heap
|
page read and write
|
||
218925A2000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
21894FE2000
|
heap
|
page read and write
|
||
218940B2000
|
heap
|
page read and write
|
||
369D000
|
heap
|
page read and write
|
||
21895DF7000
|
heap
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
218966F8000
|
heap
|
page read and write
|
||
29462AF5000
|
heap
|
page read and write
|
||
1CC9C73A000
|
heap
|
page read and write
|
||
7FFDF5C35000
|
unkown
|
page write copy
|
||
2945ECC9000
|
heap
|
page read and write
|
||
294684E3000
|
trusted library allocation
|
page read and write
|
||
29472D81000
|
heap
|
page read and write
|
||
4B9F8FE000
|
stack
|
page read and write
|
||
218920F6000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
2945FD17000
|
heap
|
page read and write
|
||
7FFDF6446000
|
unkown
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
21895E37000
|
heap
|
page read and write
|
||
29462927000
|
heap
|
page read and write
|
||
1CC9B405000
|
heap
|
page read and write
|
||
29473468000
|
heap
|
page read and write
|
||
2946849A000
|
trusted library allocation
|
page read and write
|
||
218967DF000
|
heap
|
page read and write
|
||
7FFDF5E13000
|
unkown
|
page write copy
|
||
29460890000
|
trusted library allocation
|
page read and write
|
||
7FFDF2F31000
|
unkown
|
page execute read
|
||
21896B33000
|
heap
|
page read and write
|
||
2BC000
|
unkown
|
page readonly
|
||
21893300000
|
heap
|
page read and write
|
||
7FFDF37F1000
|
unkown
|
page write copy
|
||
7FFDF6EE5000
|
unkown
|
page write copy
|
||
21892583000
|
heap
|
page read and write
|
||
21890712000
|
heap
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
2946F2A8000
|
trusted library allocation
|
page read and write
|
||
21894FAA000
|
heap
|
page read and write
|
||
7FFDF5E30000
|
unkown
|
page readonly
|
||
29472890000
|
heap
|
page read and write
|
||
1CC92BDC000
|
heap
|
page read and write
|
||
4B9F3FE000
|
stack
|
page read and write
|
||
218906FC000
|
heap
|
page read and write
|
||
29472CCC000
|
heap
|
page read and write
|
||
2946847F000
|
trusted library allocation
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
29462E43000
|
heap
|
page read and write
|
||
4BA07FE000
|
stack
|
page read and write
|
||
8061000
|
heap
|
page read and write
|
||
7FFDF2F31000
|
unkown
|
page execute read
|
||
29462A4E000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
218920FE000
|
heap
|
page read and write
|
||
4BA03FE000
|
stack
|
page read and write
|
||
7FFDF4FAE000
|
unkown
|
page readonly
|
||
29473224000
|
heap
|
page read and write
|
||
7FFDF54B2000
|
unkown
|
page read and write
|
||
29468486000
|
trusted library allocation
|
page read and write
|
||
2945F281000
|
heap
|
page read and write
|
||
7FFDF6EF0000
|
unkown
|
page write copy
|
||
2945F21F000
|
heap
|
page read and write
|
||
2945FFFC000
|
heap
|
page read and write
|
||
21896537000
|
heap
|
page read and write
|
||
4B9EBFE000
|
stack
|
page read and write
|
||
21897124000
|
heap
|
page read and write
|
||
21896676000
|
heap
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
2945F26B000
|
heap
|
page read and write
|
||
21895F08000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
21893527000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
2189509B000
|
heap
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
7FFDF64A0000
|
unkown
|
page readonly
|
||
7FFDF20D4000
|
unkown
|
page read and write
|
||
2946F2DD000
|
trusted library allocation
|
page read and write
|
||
218921B1000
|
heap
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
218906F9000
|
heap
|
page read and write
|
||
21890703000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
5E90000
|
remote allocation
|
page read and write
|
||
21893F8B000
|
heap
|
page read and write
|
||
2946842C000
|
trusted library allocation
|
page read and write
|
||
2189606D000
|
heap
|
page read and write
|
||
7FFDF3B9A000
|
unkown
|
page read and write
|
||
29463928000
|
heap
|
page read and write
|
||
294722D8000
|
heap
|
page read and write
|
||
7FFDF56F1000
|
unkown
|
page execute read
|
||
2946007D000
|
heap
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
F4349FE000
|
stack
|
page read and write
|
||
7FFDF37F7000
|
unkown
|
page read and write
|
||
21895DC8000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
29471490000
|
trusted library allocation
|
page read and write
|
||
218966A0000
|
heap
|
page read and write
|
||
F4325FE000
|
stack
|
page read and write
|
||
2946847F000
|
trusted library allocation
|
page read and write
|
||
809E000
|
heap
|
page read and write
|
||
7FF731910000
|
unkown
|
page readonly
|
||
218925A3000
|
heap
|
page read and write
|
||
294684AF000
|
trusted library allocation
|
page read and write
|
||
218906F1000
|
heap
|
page read and write
|
||
29468524000
|
trusted library allocation
|
page read and write
|
||
294684A1000
|
trusted library allocation
|
page read and write
|
||
21890704000
|
heap
|
page read and write
|
||
7FF73193E000
|
unkown
|
page readonly
|
||
2189723F000
|
heap
|
page read and write
|
||
294732E4000
|
heap
|
page read and write
|
||
294632BC000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
7FFDF4F42000
|
unkown
|
page readonly
|
||
218920E1000
|
heap
|
page read and write
|
||
21895D0D000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
2945D2DB000
|
heap
|
page read and write
|
||
4BA0AFE000
|
stack
|
page read and write
|
||
2945D298000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
2946F2B6000
|
trusted library allocation
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
2946F27C000
|
trusted library allocation
|
page read and write
|
||
29462B18000
|
heap
|
page read and write
|
||
8070000
|
heap
|
page read and write
|
||
2946853F000
|
trusted library allocation
|
page read and write
|
||
2189602E000
|
heap
|
page read and write
|
||
29464EB0000
|
heap
|
page read and write
|
||
2945D2E0000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
218925B5000
|
heap
|
page read and write
|
||
7FFDF59B1000
|
unkown
|
page execute read
|
||
21895E48000
|
heap
|
page read and write
|
||
294713DB000
|
heap
|
page read and write
|
||
29464EBF000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
36CC000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
4B9F6FC000
|
stack
|
page read and write
|
||
294627EA000
|
heap
|
page read and write
|
||
7FFDF148E000
|
unkown
|
page readonly
|
||
4B9EFFE000
|
stack
|
page read and write
|
||
7FF7E3A5B000
|
unkown
|
page write copy
|
||
294684F8000
|
trusted library allocation
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
29474100000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
heap
|
page read and write
|
||
29463D60000
|
trusted library allocation
|
page read and write
|
||
2189070F000
|
heap
|
page read and write
|
||
7FFDF1CA7000
|
unkown
|
page readonly
|
||
2945F222000
|
heap
|
page read and write
|
||
7FF7E39A1000
|
unkown
|
page execute read
|
||
2945F21F000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
2945F228000
|
heap
|
page read and write
|
||
2946F294000
|
trusted library allocation
|
page read and write
|
||
74A000
|
unkown
|
page write copy
|
||
761E000
|
stack
|
page read and write
|
||
4B9E4DB000
|
stack
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2189356E000
|
heap
|
page read and write
|
||
29473244000
|
heap
|
page read and write
|
||
218965EC000
|
heap
|
page read and write
|
||
2946389C000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
2945F248000
|
heap
|
page read and write
|
||
7FFDF6EE2000
|
unkown
|
page read and write
|
||
2945F2C0000
|
trusted library allocation
|
page read and write
|
||
2945F215000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
4BA0DFD000
|
stack
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
29463896000
|
heap
|
page read and write
|
||
7FFDF37EA000
|
unkown
|
page write copy
|
||
21894E80000
|
trusted library allocation
|
page read and write
|
||
21896558000
|
heap
|
page read and write
|
||
21893157000
|
heap
|
page read and write
|
||
218920D0000
|
trusted library allocation
|
page read and write
|
||
2945ECC0000
|
trusted library allocation
|
page read and write
|
||
2945FC70000
|
heap
|
page read and write
|
||
1CC9B57D000
|
heap
|
page read and write
|
||
2189070C000
|
heap
|
page read and write
|
||
29471359000
|
heap
|
page read and write
|
||
218906EF000
|
heap
|
page read and write
|
||
21896A3A000
|
heap
|
page read and write
|
||
29463693000
|
heap
|
page read and write
|
||
3238000
|
stack
|
page read and write
|
||
29463D90000
|
trusted library section
|
page readonly
|
||
29464E20000
|
heap
|
page read and write
|
||
1CC9F55A000
|
heap
|
page read and write
|
||
1CC9865B000
|
heap
|
page read and write
|
||
CB0BEF5000
|
stack
|
page read and write
|
||
1CC98660000
|
heap
|
page read and write
|
||
F4340FE000
|
stack
|
page read and write
|
||
1CC9BD17000
|
heap
|
page read and write
|
||
4B9E8FE000
|
stack
|
page read and write
|
||
21894E80000
|
trusted library allocation
|
page read and write
|
||
1CC96267000
|
heap
|
page read and write
|
||
29464E9B000
|
heap
|
page read and write
|
||
7F0E000
|
stack
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
29473323000
|
heap
|
page read and write
|
||
1CC9B512000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
2189667E000
|
heap
|
page read and write
|
||
218906F9000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
7FFDF37E7000
|
unkown
|
page read and write
|
||
29462BAE000
|
heap
|
page read and write
|
||
294684EA000
|
trusted library allocation
|
page read and write
|
||
7FFDF598C000
|
unkown
|
page read and write
|
||
1CC9B1F3000
|
heap
|
page read and write
|
||
218920E1000
|
heap
|
page read and write
|
||
218921E0000
|
unclassified section
|
page read and write
|
||
2945F291000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
218950CC000
|
heap
|
page read and write
|
||
29463370000
|
heap
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
742000
|
unkown
|
page readonly
|
||
2945F227000
|
heap
|
page read and write
|
||
1CC92C5C000
|
heap
|
page read and write
|
||
29472C20000
|
trusted library allocation
|
page read and write
|
||
218966A0000
|
heap
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
3719000
|
heap
|
page read and write
|
||
2946850F000
|
trusted library allocation
|
page read and write
|
||
21893153000
|
heap
|
page read and write
|
||
21896A5D000
|
heap
|
page read and write
|
||
369D000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
29463889000
|
heap
|
page read and write
|
||
218906F9000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page readonly
|
||
2945FE99000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
218925AA000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
29460241000
|
heap
|
page read and write
|
||
3628000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
29460016000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
2945F25F000
|
heap
|
page read and write
|
||
2945D510000
|
heap
|
page read and write
|
||
2189417B000
|
heap
|
page read and write
|
||
2189600D000
|
heap
|
page read and write
|
||
2947337B000
|
heap
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
2945D29F000
|
heap
|
page read and write
|
||
29463A11000
|
heap
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
7FF7E3A89000
|
unkown
|
page readonly
|
||
218921B5000
|
heap
|
page read and write
|
||
294684EC000
|
trusted library allocation
|
page read and write
|
||
2945F264000
|
heap
|
page read and write
|
||
7FFDF6414000
|
unkown
|
page write copy
|
||
F4336FE000
|
stack
|
page read and write
|
||
29468455000
|
trusted library allocation
|
page read and write
|
||
21896CC9000
|
heap
|
page read and write
|
||
294684D3000
|
trusted library allocation
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
7FFDF2BD4000
|
unkown
|
page readonly
|
||
7FFDF6EE1000
|
unkown
|
page write copy
|
||
2945D2B4000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
218925A6000
|
heap
|
page read and write
|
||
21893521000
|
heap
|
page read and write
|
||
2945D253000
|
heap
|
page read and write
|
||
7FFDF2037000
|
unkown
|
page readonly
|
||
742000
|
unkown
|
page readonly
|
||
7FFDF4F81000
|
unkown
|
page execute read
|
||
1CC9916B000
|
heap
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
74A000
|
unkown
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
2945F275000
|
heap
|
page read and write
|
||
7E0E000
|
stack
|
page read and write
|
||
29463779000
|
heap
|
page read and write
|
||
7FFDF56F0000
|
unkown
|
page readonly
|
||
218950B1000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
29473043000
|
heap
|
page read and write
|
||
21893DCC000
|
heap
|
page read and write
|
||
29464EC4000
|
heap
|
page read and write
|
||
218940BB000
|
heap
|
page read and write
|
||
21893D2A000
|
heap
|
page read and write
|
||
7FFDF5C34000
|
unkown
|
page read and write
|
||
1CC96AF6000
|
heap
|
page read and write
|
||
36CC000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945D3C0000
|
heap
|
page readonly
|
||
218968A1000
|
heap
|
page read and write
|
||
218920E9000
|
heap
|
page read and write
|
||
2947143D000
|
heap
|
page read and write
|
||
2947145D000
|
heap
|
page read and write
|
||
80A7000
|
heap
|
page read and write
|
||
2945ECFC000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
2945D299000
|
heap
|
page read and write
|
||
21896CEB000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
7FFDF4F00000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page readonly
|
||
2945F225000
|
heap
|
page read and write
|
||
29468700000
|
trusted library allocation
|
page read and write
|
||
2189639B000
|
heap
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
2947321C000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
21896835000
|
heap
|
page read and write
|
||
21896B85000
|
heap
|
page read and write
|
||
7FFDF54E1000
|
unkown
|
page execute read
|
||
7FFDF2B97000
|
unkown
|
page write copy
|
||
2945ED99000
|
heap
|
page read and write
|
||
8067000
|
heap
|
page read and write
|
||
7FFDF4F80000
|
unkown
|
page readonly
|
||
21896ED1000
|
heap
|
page read and write
|
||
294684BD000
|
trusted library allocation
|
page read and write
|
||
4B9E7FF000
|
stack
|
page read and write
|
||
2945F26E000
|
heap
|
page read and write
|
||
21890712000
|
heap
|
page read and write
|
||
2946F27F000
|
trusted library allocation
|
page read and write
|
||
21893F8F000
|
heap
|
page read and write
|
||
2189696B000
|
heap
|
page read and write
|
||
4B9FCFE000
|
stack
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
1CC92BF8000
|
heap
|
page read and write
|
||
2189653E000
|
heap
|
page read and write
|
||
7FFDF37E7000
|
unkown
|
page read and write
|
||
3675000
|
heap
|
page read and write
|
||
21892568000
|
heap
|
page read and write
|
||
29464EB4000
|
heap
|
page read and write
|
||
1EF9DFC3000
|
heap
|
page read and write
|
||
2945F1E0000
|
heap
|
page read and write
|
||
21895E15000
|
heap
|
page read and write
|
||
21896031000
|
heap
|
page read and write
|
||
2945ECC9000
|
heap
|
page read and write
|
||
1CC9B4E5000
|
heap
|
page read and write
|
||
7FFDF6401000
|
unkown
|
page read and write
|
||
7FF73193B000
|
unkown
|
page write copy
|
||
21896949000
|
heap
|
page read and write
|
||
21893469000
|
heap
|
page read and write
|
||
F4328FE000
|
stack
|
page read and write
|
||
2945F229000
|
heap
|
page read and write
|
||
7FF7E3A62000
|
unkown
|
page readonly
|
||
2945D2AD000
|
heap
|
page read and write
|
||
29460253000
|
heap
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
21896B31000
|
heap
|
page read and write
|
||
29472956000
|
heap
|
page read and write
|
||
218969AB000
|
heap
|
page read and write
|
||
4B9EAFE000
|
stack
|
page read and write
|
||
2947139A000
|
heap
|
page read and write
|
||
2946F245000
|
trusted library allocation
|
page read and write
|
||
29468551000
|
trusted library allocation
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
39D4000
|
heap
|
page read and write
|
||
21896BCF000
|
heap
|
page read and write
|
||
21893474000
|
heap
|
page read and write
|
||
1CC974FA000
|
heap
|
page read and write
|
||
2945FCA6000
|
heap
|
page read and write
|
||
1CC92C48000
|
heap
|
page read and write
|
||
2946851A000
|
trusted library allocation
|
page read and write
|
||
294629FA000
|
heap
|
page read and write
|
||
29463B03000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
21895E15000
|
heap
|
page read and write
|
||
F4339FE000
|
stack
|
page read and write
|
||
789E000
|
stack
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2945EDF0000
|
unclassified section
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
2946F25C000
|
trusted library allocation
|
page read and write
|
||
29473443000
|
heap
|
page read and write
|
||
21897470000
|
trusted library allocation
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
36B8000
|
heap
|
page read and write
|
||
2945D2AD000
|
heap
|
page read and write
|
||
29464E9B000
|
heap
|
page read and write
|
||
2946376D000
|
heap
|
page read and write
|
||
1CC959CB000
|
heap
|
page read and write
|
||
29473250000
|
heap
|
page read and write
|
||
29462E22000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2945F228000
|
heap
|
page read and write
|
||
2945F261000
|
heap
|
page read and write
|
||
7FF731911000
|
unkown
|
page execute read
|
||
7FFDF6446000
|
unkown
|
page read and write
|
||
2946F283000
|
trusted library allocation
|
page read and write
|
||
7FFDF0E31000
|
unkown
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
21890703000
|
heap
|
page read and write
|
||
218964FB000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
21896563000
|
heap
|
page read and write
|
||
218967DC000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
29472C20000
|
heap
|
page read and write
|
||
29464E6A000
|
heap
|
page read and write
|
||
7FFDF56BD000
|
unkown
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
218940A3000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
21892599000
|
heap
|
page read and write
|
||
2945D450000
|
heap
|
page read and write
|
||
80A5000
|
heap
|
page read and write
|
||
2945FCD2000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
29460065000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
21892548000
|
heap
|
page read and write
|
||
2BC000
|
unkown
|
page readonly
|
||
39D0000
|
heap
|
page read and write
|
||
7FFDF0E35000
|
unkown
|
page readonly
|
||
7FF7E39A0000
|
unkown
|
page readonly
|
||
21895DF7000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
F4341FC000
|
stack
|
page read and write
|
||
21893D6B000
|
heap
|
page read and write
|
||
4BA05FC000
|
stack
|
page read and write
|
||
2945F1C0000
|
heap
|
page read and write
|
||
7FFDF5959000
|
unkown
|
page read and write
|
||
4B9F7FE000
|
stack
|
page read and write
|
||
7F60000
|
heap
|
page read and write
|
||
218988E2000
|
trusted library allocation
|
page read and write
|
||
1CC9671E000
|
heap
|
page read and write
|
||
2945F27C000
|
heap
|
page read and write
|
||
2945D2A5000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
21896123000
|
heap
|
page read and write
|
||
2946F2BB000
|
trusted library allocation
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
371E000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
1CC96261000
|
heap
|
page read and write
|
||
218966A3000
|
heap
|
page read and write
|
||
2945D2AD000
|
heap
|
page read and write
|
||
218920E1000
|
heap
|
page read and write
|
||
F432BFE000
|
stack
|
page read and write
|
||
2189618A000
|
heap
|
page read and write
|
||
21897450000
|
trusted library allocation
|
page read and write
|
||
7FF731938000
|
unkown
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
294630F6000
|
heap
|
page read and write
|
||
218925A6000
|
heap
|
page read and write
|
||
218906FF000
|
heap
|
page read and write
|
||
218925AA000
|
heap
|
page read and write
|
||
21895E15000
|
heap
|
page read and write
|
||
7FFDF56CC000
|
unkown
|
page read and write
|
||
809D000
|
heap
|
page read and write
|
||
2946F225000
|
trusted library allocation
|
page read and write
|
||
21894099000
|
heap
|
page read and write
|
||
7FFDF64A1000
|
unkown
|
page execute read
|
||
29463B93000
|
heap
|
page read and write
|
||
29460087000
|
heap
|
page read and write
|
||
7FFDF5968000
|
unkown
|
page read and write
|
||
7FF7E3A2D000
|
unkown
|
page readonly
|
||
29462A28000
|
heap
|
page read and write
|
||
F4335FE000
|
stack
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
7FFDF3B01000
|
unkown
|
page execute read
|
||
294627EB000
|
heap
|
page read and write
|
||
218925AC000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
2946F21E000
|
trusted library allocation
|
page read and write
|
||
218930A6000
|
heap
|
page read and write
|
||
1CC976BA000
|
heap
|
page read and write
|
||
7FFDF3839000
|
unkown
|
page read and write
|
||
29464EC4000
|
heap
|
page read and write
|
||
29464EB0000
|
heap
|
page read and write
|
||
29462580000
|
heap
|
page read and write
|
||
7A1E000
|
stack
|
page read and write
|
||
218921D9000
|
heap
|
page read and write
|
||
21892122000
|
heap
|
page read and write
|
||
F4347FE000
|
stack
|
page read and write
|
||
1EF9DFB7000
|
heap
|
page read and write
|
||
29460252000
|
heap
|
page read and write
|
||
7FF7E3A6A000
|
unkown
|
page readonly
|
||
21896791000
|
heap
|
page read and write
|
||
21896F63000
|
heap
|
page read and write
|
||
2946F2C4000
|
trusted library allocation
|
page read and write
|
||
1CC9B0E3000
|
heap
|
page read and write
|
||
7FF731928000
|
unkown
|
page readonly
|
||
21893E0D000
|
heap
|
page read and write
|
||
2945D1E8000
|
heap
|
page read and write
|
||
21892640000
|
unkown
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
F4331FE000
|
stack
|
page read and write
|
||
294629A2000
|
heap
|
page read and write
|
||
21896A5E000
|
heap
|
page read and write
|
||
2946F2D6000
|
trusted library allocation
|
page read and write
|
||
218963BF000
|
heap
|
page read and write
|
||
7FFDF56CC000
|
unkown
|
page read and write
|
||
29468478000
|
trusted library allocation
|
page read and write
|
||
1CC967A1000
|
heap
|
page read and write
|
||
29462A1E000
|
heap
|
page read and write
|
||
2945F226000
|
heap
|
page read and write
|
||
21890703000
|
heap
|
page read and write
|
||
21896C33000
|
heap
|
page read and write
|
||
21896B45000
|
heap
|
page read and write
|
||
2189642A000
|
heap
|
page read and write
|
||
294629F2000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
29462B5C000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
F433AFE000
|
stack
|
page read and write
|
||
5FE0000
|
heap
|
page read and write
|
||
7FF731928000
|
unkown
|
page readonly
|
||
29462BC2000
|
heap
|
page read and write
|
||
2945F25F000
|
heap
|
page read and write
|
||
218964A3000
|
heap
|
page read and write
|
||
7FFDF62B7000
|
unkown
|
page readonly
|
||
2945F23A000
|
heap
|
page read and write
|
||
7FFDF56CF000
|
unkown
|
page read and write
|
||
4B9F2FE000
|
stack
|
page read and write
|
||
2189259D000
|
heap
|
page read and write
|
||
21890704000
|
heap
|
page read and write
|
||
2D5E000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
2947145F000
|
heap
|
page read and write
|
||
7FF7E3A6A000
|
unkown
|
page readonly
|
||
21890708000
|
heap
|
page read and write
|
||
21896A7F000
|
heap
|
page read and write
|
||
2945D24A000
|
heap
|
page read and write
|
||
1CC9B0C0000
|
heap
|
page read and write
|
||
1CC961EB000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
21890703000
|
heap
|
page read and write
|
||
7FFDF37EB000
|
unkown
|
page read and write
|
||
21897690000
|
trusted library allocation
|
page read and write
|
||
7FFDF59B0000
|
unkown
|
page readonly
|
||
21890707000
|
heap
|
page read and write
|
||
7FFDF6EDD000
|
unkown
|
page write copy
|
||
2945F217000
|
heap
|
page read and write
|
||
21893FBB000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
2946844F000
|
trusted library allocation
|
page read and write
|
||
3712000
|
heap
|
page read and write
|
||
2946F2A6000
|
trusted library allocation
|
page read and write
|
||
29463A1B000
|
heap
|
page read and write
|
||
F433CFE000
|
stack
|
page read and write
|
||
294684C4000
|
trusted library allocation
|
page read and write
|
||
29462B15000
|
heap
|
page read and write
|
||
2946296A000
|
heap
|
page read and write
|
||
2946846A000
|
trusted library allocation
|
page read and write
|
||
7FFDF64A1000
|
unkown
|
page execute read
|
||
1CC9CE94000
|
heap
|
page read and write
|
||
2189698D000
|
heap
|
page read and write
|
||
29462A55000
|
heap
|
page read and write
|
||
218964FD000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
1CC92C3E000
|
heap
|
page read and write
|
||
7FFDF5E16000
|
unkown
|
page readonly
|
||
7FF7E3A62000
|
unkown
|
page readonly
|
||
1CC92BDB000
|
heap
|
page read and write
|
||
2946F28D000
|
trusted library allocation
|
page read and write
|
||
74C000
|
unkown
|
page readonly
|
||
7FFDF5959000
|
unkown
|
page read and write
|
||
29472B0E000
|
heap
|
page read and write
|
||
29463A24000
|
heap
|
page read and write
|
||
F432DFE000
|
stack
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
218925A6000
|
heap
|
page read and write
|
||
29468417000
|
trusted library allocation
|
page read and write
|
||
2946003F000
|
heap
|
page read and write
|
||
21892FD1000
|
heap
|
page read and write
|
||
2946F29B000
|
trusted library allocation
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
218906EF000
|
heap
|
page read and write
|
||
21896E07000
|
heap
|
page read and write
|
||
2947311B000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
7B1F000
|
stack
|
page read and write
|
||
21896A19000
|
heap
|
page read and write
|
||
1CC9F6D8000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
29463A2F000
|
heap
|
page read and write
|
||
29463478000
|
heap
|
page read and write
|
||
80AC000
|
heap
|
page read and write
|
||
2946003E000
|
heap
|
page read and write
|
||
218920F6000
|
heap
|
page read and write
|
||
294733F2000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
29472E6B000
|
heap
|
page read and write
|
||
7FFDF6F1D000
|
unkown
|
page read and write
|
||
218925A2000
|
heap
|
page read and write
|
||
7FFDF54E0000
|
unkown
|
page readonly
|
||
1CC9865D000
|
heap
|
page read and write
|
||
2189608E000
|
heap
|
page read and write
|
||
2189664D000
|
heap
|
page read and write
|
||
2189258E000
|
heap
|
page read and write
|
||
2189070F000
|
heap
|
page read and write
|
||
218920E1000
|
heap
|
page read and write
|
||
2B2000
|
unkown
|
page readonly
|
||
294684D8000
|
trusted library allocation
|
page read and write
|
||
7FFDF15AF000
|
unkown
|
page write copy
|
||
2945F228000
|
heap
|
page read and write
|
||
218906DA000
|
heap
|
page read and write
|
||
F4337FE000
|
stack
|
page read and write
|
||
2946280C000
|
heap
|
page read and write
|
||
2945F275000
|
heap
|
page read and write
|
||
21894191000
|
heap
|
page read and write
|
||
1CC9623B000
|
heap
|
page read and write
|
||
7FFDF5211000
|
unkown
|
page execute read
|
||
294729B8000
|
heap
|
page read and write
|
||
29468433000
|
trusted library allocation
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
21892578000
|
heap
|
page read and write
|
||
2946385D000
|
heap
|
page read and write
|
||
21894F95000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
29468521000
|
trusted library allocation
|
page read and write
|
||
7FFDF3846000
|
unkown
|
page readonly
|
||
36AF000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
2947336D000
|
heap
|
page read and write
|
||
21896778000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
21893950000
|
trusted library allocation
|
page read and write
|
||
2189218C000
|
heap
|
page read and write
|
||
29468501000
|
trusted library allocation
|
page read and write
|
||
218969D5000
|
heap
|
page read and write
|
||
29462B5B000
|
heap
|
page read and write
|
||
21893E8F000
|
heap
|
page read and write
|
||
7FFDF5C34000
|
unkown
|
page read and write
|
||
29462996000
|
heap
|
page read and write
|
||
2189658A000
|
heap
|
page read and write
|
||
294632B0000
|
heap
|
page read and write
|
||
7FFDF6FC0000
|
unkown
|
page readonly
|
||
7FFDF640D000
|
unkown
|
page write copy
|
||
2945F219000
|
heap
|
page read and write
|
||
7FFDF54E1000
|
unkown
|
page execute read
|
||
21896039000
|
heap
|
page read and write
|
||
29474100000
|
trusted library allocation
|
page read and write
|
||
294711F0000
|
trusted library allocation
|
page read and write
|
||
2946F2F5000
|
trusted library allocation
|
page read and write
|
||
36BD000
|
heap
|
page read and write
|
||
29462A1A000
|
heap
|
page read and write
|
||
F432EFE000
|
stack
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
1CC9B0BE000
|
heap
|
page read and write
|
||
1CC9A333000
|
heap
|
page read and write
|
||
2946848D000
|
trusted library allocation
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
21890704000
|
heap
|
page read and write
|
||
7FFDF54BB000
|
unkown
|
page read and write
|
||
1CC92C35000
|
heap
|
page read and write
|
||
7FFDF37EA000
|
unkown
|
page write copy
|
||
218969B4000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
218977D0000
|
trusted library section
|
page readonly
|
||
2945F217000
|
heap
|
page read and write
|
||
2189723B000
|
heap
|
page read and write
|
||
21896AF5000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
2946F2CF000
|
trusted library allocation
|
page read and write
|
||
2189408A000
|
heap
|
page read and write
|
||
29468513000
|
trusted library allocation
|
page read and write
|
||
F432AFE000
|
stack
|
page read and write
|
||
7FFDF56BD000
|
unkown
|
page read and write
|
||
7FFDF56F1000
|
unkown
|
page execute read
|
||
218972D0000
|
trusted library allocation
|
page read and write
|
||
2945F228000
|
heap
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
7FFDF2105000
|
unkown
|
page read and write
|
||
7FF731928000
|
unkown
|
page readonly
|
||
7FFDF54BD000
|
unkown
|
page readonly
|
||
2945D29C000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
4BA0BFE000
|
stack
|
page read and write
|
||
74A000
|
unkown
|
page read and write
|
||
294722C0000
|
heap
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
218941B1000
|
heap
|
page read and write
|
||
29463924000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
29462A91000
|
heap
|
page read and write
|
||
218925BC000
|
heap
|
page read and write
|
||
2946089D000
|
trusted library allocation
|
page read and write
|
||
29463933000
|
heap
|
page read and write
|
||
29462B39000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
371C000
|
heap
|
page read and write
|
||
2946F298000
|
trusted library allocation
|
page read and write
|
||
4B9F9FE000
|
stack
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
29462B58000
|
heap
|
page read and write
|
||
29462D90000
|
trusted library allocation
|
page read and write
|
||
21895F89000
|
heap
|
page read and write
|
||
2189643F000
|
heap
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
294684D1000
|
trusted library allocation
|
page read and write
|
||
218906EB000
|
heap
|
page read and write
|
||
29462D7D000
|
heap
|
page read and write
|
||
29472C41000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
218925BC000
|
heap
|
page read and write
|
||
21896538000
|
heap
|
page read and write
|
||
2189211C000
|
heap
|
page read and write
|
||
36D2000
|
heap
|
page read and write
|
||
21896C77000
|
heap
|
page read and write
|
||
218921A5000
|
heap
|
page read and write
|
||
294637F5000
|
heap
|
page read and write
|
||
21896AC3000
|
heap
|
page read and write
|
||
1CC96540000
|
heap
|
page read and write
|
||
2189684C000
|
heap
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2946F278000
|
trusted library allocation
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
29473054000
|
heap
|
page read and write
|
||
2945F275000
|
heap
|
page read and write
|
||
1CC9F58F000
|
heap
|
page read and write
|
||
21897470000
|
trusted library allocation
|
page read and write
|
||
1CC9F58D000
|
heap
|
page read and write
|
||
2945D253000
|
heap
|
page read and write
|
||
3664000
|
heap
|
page read and write
|
||
29462F3D000
|
heap
|
page read and write
|
||
2946852F000
|
trusted library allocation
|
page read and write
|
||
294684A8000
|
trusted library allocation
|
page read and write
|
||
4BA00FA000
|
stack
|
page read and write
|
||
29462A52000
|
heap
|
page read and write
|
||
218906FC000
|
heap
|
page read and write
|
||
218941A6000
|
heap
|
page read and write
|
||
218920F7000
|
heap
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
29464E69000
|
heap
|
page read and write
|
||
218906A1000
|
heap
|
page read and write
|
||
218925A6000
|
heap
|
page read and write
|
||
21890703000
|
heap
|
page read and write
|
||
29460258000
|
heap
|
page read and write
|
||
4BA06FD000
|
stack
|
page read and write
|
||
2946F2BD000
|
trusted library allocation
|
page read and write
|
||
1CC96579000
|
heap
|
page read and write
|
||
8066000
|
heap
|
page read and write
|
||
294628BD000
|
heap
|
page read and write
|
||
7FFDF1480000
|
unkown
|
page readonly
|
||
29464EAB000
|
heap
|
page read and write
|
||
294630CD000
|
heap
|
page read and write
|
||
218906DA000
|
heap
|
page read and write
|
||
21895E15000
|
heap
|
page read and write
|
||
29462E22000
|
heap
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
2945EE40000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
7FFDF3B8A000
|
unkown
|
page read and write
|
||
2947322E000
|
heap
|
page read and write
|
||
294722D6000
|
heap
|
page read and write
|
||
7FFDF3839000
|
unkown
|
page read and write
|
||
7FFDF5C71000
|
unkown
|
page execute read
|
||
2189259A000
|
heap
|
page read and write
|
||
2946841E000
|
trusted library allocation
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
F4338FE000
|
stack
|
page read and write
|
||
36BD000
|
heap
|
page read and write
|
||
218925A6000
|
heap
|
page read and write
|
||
2946282E000
|
heap
|
page read and write
|
||
2945FE26000
|
heap
|
page read and write
|
||
29462E65000
|
heap
|
page read and write
|
||
1CC95EAF000
|
heap
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
2945F223000
|
heap
|
page read and write
|
||
29468DBD000
|
trusted library allocation
|
page read and write
|
||
7FFDF6EEE000
|
unkown
|
page read and write
|
||
29472F42000
|
heap
|
page read and write
|
||
29468447000
|
trusted library allocation
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
218906A1000
|
heap
|
page read and write
|
||
4B9F0FE000
|
stack
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
218906EF000
|
heap
|
page read and write
|
||
370C000
|
heap
|
page read and write
|
||
2189704D000
|
heap
|
page read and write
|
||
7FFDF5B7E000
|
unkown
|
page readonly
|
||
218960EF000
|
heap
|
page read and write
|
||
2189070D000
|
heap
|
page read and write
|
||
21892109000
|
heap
|
page read and write
|
||
29463BB9000
|
heap
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
7FF73193B000
|
unkown
|
page write copy
|
||
2945D29B000
|
heap
|
page read and write
|
||
218921B9000
|
heap
|
page read and write
|
||
29468508000
|
trusted library allocation
|
page read and write
|
||
2945ECEC000
|
heap
|
page read and write
|
||
636B000
|
stack
|
page read and write
|
||
29462AD3000
|
heap
|
page read and write
|
||
2946F23E000
|
trusted library allocation
|
page read and write
|
||
218906F0000
|
heap
|
page read and write
|
||
2189303B000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
2189070F000
|
heap
|
page read and write
|
||
36D2000
|
heap
|
page read and write
|
||
2947323C000
|
heap
|
page read and write
|
||
7FFDF640F000
|
unkown
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
29462BD0000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
21896687000
|
heap
|
page read and write
|
||
29463051000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
29464EB0000
|
heap
|
page read and write
|
||
21893FB6000
|
heap
|
page read and write
|
||
218971AF000
|
heap
|
page read and write
|
||
2945D4F0000
|
trusted library allocation
|
page read and write
|
||
21896B07000
|
heap
|
page read and write
|
||
7FFDF37EB000
|
unkown
|
page read and write
|
||
21898860000
|
heap
|
page read and write
|
||
2945F264000
|
heap
|
page read and write
|
||
29463B0D000
|
heap
|
page read and write
|
||
7FF7E3A5B000
|
unkown
|
page write copy
|
||
2945F21F000
|
heap
|
page read and write
|
||
218963F8000
|
heap
|
page read and write
|
||
7FFDF2895000
|
unkown
|
page readonly
|
||
2945F219000
|
heap
|
page read and write
|
||
2189604F000
|
heap
|
page read and write
|
||
365B000
|
heap
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
29468506000
|
trusted library allocation
|
page read and write
|
||
7FF7E39A0000
|
unkown
|
page readonly
|
||
2946854D000
|
trusted library allocation
|
page read and write
|
||
2945D29B000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
218968DE000
|
heap
|
page read and write
|
||
2945F1FF000
|
heap
|
page read and write
|
||
2945F26B000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
4B9FBFD000
|
stack
|
page read and write
|
||
2945F275000
|
heap
|
page read and write
|
||
7FFDF2BB5000
|
unkown
|
page read and write
|
||
21890707000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945EE70000
|
heap
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
29473353000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2945D29B000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
29463CF7000
|
heap
|
page read and write
|
||
1CC976A6000
|
heap
|
page read and write
|
||
21896B9B000
|
heap
|
page read and write
|
||
7FF73193E000
|
unkown
|
page readonly
|
||
29463915000
|
heap
|
page read and write
|
||
294684C7000
|
trusted library allocation
|
page read and write
|
||
29462BBD000
|
heap
|
page read and write
|
||
21893340000
|
heap
|
page read and write
|
||
F4322DF000
|
stack
|
page read and write
|
||
2946F286000
|
trusted library allocation
|
page read and write
|
||
21895FF2000
|
heap
|
page read and write
|
||
F4344FE000
|
stack
|
page read and write
|
||
2946F22C000
|
trusted library allocation
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
21895DED000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
29464E99000
|
heap
|
page read and write
|
||
7FFDF2141000
|
unkown
|
page execute read
|
||
7FF731928000
|
unkown
|
page readonly
|
||
29464EC2000
|
heap
|
page read and write
|
||
29464EB0000
|
heap
|
page read and write
|
||
21890800000
|
heap
|
page read and write
|
||
29463BA4000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
29464EA0000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
218964E9000
|
heap
|
page read and write
|
||
2189070E000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
21894113000
|
heap
|
page read and write
|
||
294635F1000
|
heap
|
page read and write
|
||
2946084D000
|
trusted library allocation
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
2946301D000
|
heap
|
page read and write
|
||
39F0000
|
heap
|
page read and write
|
||
80E6000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
7FFDF6EF0000
|
unkown
|
page write copy
|
||
218906FC000
|
heap
|
page read and write
|
||
218965CC000
|
heap
|
page read and write
|
||
29468563000
|
trusted library allocation
|
page read and write
|
||
1CC9F664000
|
heap
|
page read and write
|
||
21895DF7000
|
heap
|
page read and write
|
||
218940D5000
|
heap
|
page read and write
|
||
2947345F000
|
heap
|
page read and write
|
||
21896D3F000
|
heap
|
page read and write
|
||
21896871000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
2945F260000
|
heap
|
page read and write
|
||
2945FE70000
|
heap
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
29468DB0000
|
trusted library allocation
|
page read and write
|
||
29473141000
|
heap
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
21893346000
|
heap
|
page read and write
|
||
2945F1E5000
|
heap
|
page read and write
|
||
2945D298000
|
heap
|
page read and write
|
||
294684B6000
|
trusted library allocation
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
7FFDF54BD000
|
unkown
|
page readonly
|
||
21897583000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
21892FD0000
|
heap
|
page read and write
|
||
218933E9000
|
heap
|
page read and write
|
||
29472DBE000
|
heap
|
page read and write
|
||
218920FF000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
218920F6000
|
heap
|
page read and write
|
||
1CC9B40F000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
21896DC5000
|
heap
|
page read and write
|
||
1CC99E0C000
|
heap
|
page read and write
|
||
7FFDF56C9000
|
unkown
|
page write copy
|
||
2945D28C000
|
heap
|
page read and write
|
||
218933C9000
|
heap
|
page read and write
|
||
29464EBF000
|
heap
|
page read and write
|
||
218925AA000
|
heap
|
page read and write
|
||
29472ABC000
|
heap
|
page read and write
|
||
1CC96542000
|
heap
|
page read and write
|
||
1CC96611000
|
heap
|
page read and write
|
||
370F000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
29471211000
|
heap
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
21893449000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
7FF7E39A1000
|
unkown
|
page execute read
|
||
7FFDF6EE5000
|
unkown
|
page write copy
|
||
21895DB1000
|
heap
|
page read and write
|
||
29468538000
|
trusted library allocation
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
7FF7E3A89000
|
unkown
|
page readonly
|
||
7FFDF5C70000
|
unkown
|
page readonly
|
||
2946F26F000
|
trusted library allocation
|
page read and write
|
||
7FFDF54B6000
|
unkown
|
page write copy
|
||
2946F2D5000
|
trusted library allocation
|
page read and write
|
||
7FFDF6EDD000
|
unkown
|
page write copy
|
||
218972D0000
|
trusted library allocation
|
page read and write
|
||
29468471000
|
trusted library allocation
|
page read and write
|
||
2946F241000
|
trusted library allocation
|
page read and write
|
||
29473331000
|
heap
|
page read and write
|
||
771F000
|
stack
|
page read and write
|
||
1CC9F557000
|
heap
|
page read and write
|
||
29463A20000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
2946F210000
|
trusted library allocation
|
page read and write
|
||
29462BCB000
|
heap
|
page read and write
|
||
29463D52000
|
heap
|
page read and write
|
||
2945FEA0000
|
heap
|
page read and write
|
||
21896B79000
|
heap
|
page read and write
|
||
2945D29F000
|
heap
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
2946856D000
|
trusted library allocation
|
page read and write
|
||
21896AE5000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
2946F291000
|
trusted library allocation
|
page read and write
|
||
218967A1000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
2946852B000
|
trusted library allocation
|
page read and write
|
||
294629CC000
|
heap
|
page read and write
|
||
218906FC000
|
heap
|
page read and write
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
294684CE000
|
trusted library allocation
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
29462960000
|
heap
|
page read and write
|
||
294684A0000
|
trusted library allocation
|
page read and write
|
||
2945F226000
|
heap
|
page read and write
|
||
2945ECFD000
|
heap
|
page read and write
|
||
2945F264000
|
heap
|
page read and write
|
||
2946846A000
|
trusted library allocation
|
page read and write
|
||
29464EB7000
|
heap
|
page read and write
|
||
7FF731910000
|
unkown
|
page readonly
|
||
2946309F000
|
heap
|
page read and write
|
||
2945F228000
|
heap
|
page read and write
|
||
1CC976DA000
|
heap
|
page read and write
|
||
21896676000
|
heap
|
page read and write
|
||
7FFDF20D9000
|
unkown
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
294684ED000
|
trusted library allocation
|
page read and write
|
||
7FFDF3B00000
|
unkown
|
page readonly
|
||
294639FA000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
21896B5F000
|
heap
|
page read and write
|
||
7FF731911000
|
unkown
|
page execute read
|
||
29462B99000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
21895F8A000
|
heap
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
2946850C000
|
trusted library allocation
|
page read and write
|
||
4B9FEFE000
|
stack
|
page read and write
|
||
2945F251000
|
heap
|
page read and write
|
||
2945F2C0000
|
trusted library allocation
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
29471200000
|
trusted library allocation
|
page read and write
|
||
2946F263000
|
trusted library allocation
|
page read and write
|
||
2945D29B000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page readonly
|
||
218925A0000
|
heap
|
page read and write
|
||
294684C3000
|
trusted library allocation
|
page read and write
|
||
21896928000
|
heap
|
page read and write
|
||
218906A1000
|
heap
|
page read and write
|
||
7FFDF6F5F000
|
unkown
|
page readonly
|
||
2945F227000
|
heap
|
page read and write
|
||
7FFDF6416000
|
unkown
|
page write copy
|
||
2945F255000
|
heap
|
page read and write
|
||
7FFDF5E16000
|
unkown
|
page readonly
|
||
2945ED8D000
|
heap
|
page read and write
|
||
7FFDF5665000
|
unkown
|
page readonly
|
||
218964A5000
|
heap
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
2189210C000
|
heap
|
page read and write
|
||
2189513D000
|
heap
|
page read and write
|
||
7FFDF6FC1000
|
unkown
|
page execute read
|
||
7FF7E3A62000
|
unkown
|
page readonly
|
||
29462D90000
|
trusted library allocation
|
page read and write
|
||
21896345000
|
heap
|
page read and write
|
||
21893522000
|
heap
|
page read and write
|
||
1CC92BFF000
|
heap
|
page read and write
|
||
29462A88000
|
heap
|
page read and write
|
||
21896AE5000
|
heap
|
page read and write
|
||
3475000
|
heap
|
page read and write
|
||
218963FB000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
21892182000
|
heap
|
page read and write
|
||
2945D2A5000
|
heap
|
page read and write
|
||
2945ED4D000
|
heap
|
page read and write
|
||
218969AE000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
218920E9000
|
heap
|
page read and write
|
||
29465832000
|
trusted library allocation
|
page read and write
|
||
F4330FD000
|
stack
|
page read and write
|
||
294684C0000
|
trusted library allocation
|
page read and write
|
||
7FFDF6F4F000
|
unkown
|
page read and write
|
||
7FFDF6414000
|
unkown
|
page write copy
|
||
2945F22B000
|
heap
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
21893E6F000
|
heap
|
page read and write
|
||
29473238000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
29473370000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
29464EC1000
|
heap
|
page read and write
|
||
218906DA000
|
heap
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
218906DA000
|
heap
|
page read and write
|
||
29462AD4000
|
heap
|
page read and write
|
||
4B9EEFE000
|
stack
|
page read and write
|
||
29474100000
|
trusted library allocation
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
29464EAB000
|
heap
|
page read and write
|
||
2945D264000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
29462BCF000
|
heap
|
page read and write
|
||
29EC000
|
stack
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
29464EC4000
|
heap
|
page read and write
|
||
1CC92C3E000
|
heap
|
page read and write
|
||
29468558000
|
trusted library allocation
|
page read and write
|
||
7FFDF5C47000
|
unkown
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
29468544000
|
trusted library allocation
|
page read and write
|
||
2945EE73000
|
heap
|
page read and write
|
||
29473124000
|
heap
|
page read and write
|
||
294635FC000
|
heap
|
page read and write
|
||
29468478000
|
trusted library allocation
|
page read and write
|
||
7FFDF6401000
|
unkown
|
page read and write
|
||
2945F26E000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
218972D0000
|
heap
|
page read and write
|
||
2945ECDA000
|
heap
|
page read and write
|
||
29462C9F000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
7FF731911000
|
unkown
|
page execute read
|
||
6029000
|
heap
|
page read and write
|
||
294628C6000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
2945D245000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
29473150000
|
heap
|
page read and write
|
||
21896792000
|
heap
|
page read and write
|
||
218964D1000
|
heap
|
page read and write
|
||
2945D298000
|
heap
|
page read and write
|
||
29462DFD000
|
heap
|
page read and write
|
||
2945F264000
|
heap
|
page read and write
|
||
7FFDF4F3E000
|
unkown
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
21892580000
|
heap
|
page read and write
|
||
29468410000
|
trusted library allocation
|
page read and write
|
||
2945F22B000
|
heap
|
page read and write
|
||
2189259F000
|
heap
|
page read and write
|
||
218964EE000
|
heap
|
page read and write
|
||
21893EB0000
|
heap
|
page read and write
|
||
29463B17000
|
heap
|
page read and write
|
||
21893164000
|
heap
|
page read and write
|
||
2189668B000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
7FFDF0E34000
|
unkown
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
21895E15000
|
heap
|
page read and write
|
||
7FFDF6415000
|
unkown
|
page read and write
|
||
2945F217000
|
heap
|
page read and write
|
||
2945FF95000
|
heap
|
page read and write
|
||
294628C6000
|
heap
|
page read and write
|
||
218959C0000
|
heap
|
page read and write
|
||
29474100000
|
trusted library allocation
|
page read and write
|
||
21892599000
|
heap
|
page read and write
|
||
29472DE0000
|
heap
|
page read and write
|
||
2945F255000
|
heap
|
page read and write
|
||
2945D2AD000
|
heap
|
page read and write
|
||
29464E7F000
|
heap
|
page read and write
|
||
2945D2A2000
|
heap
|
page read and write
|
||
29464E99000
|
heap
|
page read and write
|
||
21896EC5000
|
heap
|
page read and write
|
||
294684E6000
|
trusted library allocation
|
page read and write
|
||
2946853D000
|
trusted library allocation
|
page read and write
|
||
2946F25A000
|
trusted library allocation
|
page read and write
|
||
1CC92C48000
|
heap
|
page read and write
|
||
29464EB8000
|
heap
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
2945F225000
|
heap
|
page read and write
|
||
7FFDF598C000
|
unkown
|
page read and write
|
||
218972BB000
|
heap
|
page read and write
|
||
809E000
|
heap
|
page read and write
|
||
2189722A000
|
heap
|
page read and write
|
||
7FFDF54BB000
|
unkown
|
page read and write
|
||
294712D7000
|
heap
|
page read and write
|
||
2945F219000
|
heap
|
page read and write
|
||
2945F21F000
|
heap
|
page read and write
|
||
21893D8B000
|
heap
|
page read and write
|
||
2946087D000
|
trusted library allocation
|
page read and write
|
||
7FFDF6EDC000
|
unkown
|
page read and write
|
||
7FFDF5B7E000
|
unkown
|
page readonly
|
||
29463452000
|
heap
|
page read and write
|
||
218939C4000
|
heap
|
page read and write
|
||
7FFDF6412000
|
unkown
|
page read and write
|
||
601E000
|
stack
|
page read and write
|
||
29464EB5000
|
heap
|
page read and write
|
||
2945FC90000
|
heap
|
page read and write
|
||
29465F40000
|
trusted library section
|
page read and write
|
||
7FFDF1492000
|
unkown
|
page readonly
|
||
21892583000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
29462B17000
|
heap
|
page read and write
|
||
218925A0000
|
heap
|
page read and write
|
||
21895FE4000
|
heap
|
page read and write
|
||
1CC96AFA000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
2945ED02000
|
heap
|
page read and write
|
||
7FFDF4FBC000
|
unkown
|
page read and write
|
||
294722F3000
|
heap
|
page read and write
|
||
21896B3C000
|
heap
|
page read and write
|
||
2946F2C8000
|
trusted library allocation
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
7FFDF5E0A000
|
unkown
|
page write copy
|
||
21896558000
|
heap
|
page read and write
|
||
2945D2B4000
|
heap
|
page read and write
|
||
218921AD000
|
heap
|
page read and write
|
||
29462D90000
|
heap
|
page read and write
|
||
29472977000
|
heap
|
page read and write
|
||
1CC9B472000
|
heap
|
page read and write
|
||
3664000
|
heap
|
page read and write
|
||
29468566000
|
trusted library allocation
|
page read and write
|
||
36B8000
|
heap
|
page read and write
|
||
80A7000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
7FFDF20D5000
|
unkown
|
page write copy
|
||
2945D3D0000
|
heap
|
page read and write
|
||
1CC99E0E000
|
heap
|
page read and write
|
||
2945ECC1000
|
heap
|
page read and write
|
||
7FFDF210A000
|
unkown
|
page readonly
|
||
21896074000
|
heap
|
page read and write
|
||
218964C0000
|
heap
|
page read and write
|
||
7CAD000
|
stack
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
21896B0B000
|
heap
|
page read and write
|
||
7FFDF0D30000
|
unkown
|
page readonly
|
||
218925BC000
|
heap
|
page read and write
|
||
294722E3000
|
heap
|
page read and write
|
||
21896758000
|
heap
|
page read and write
|
||
21895CAB000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
21892583000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
29464EB8000
|
heap
|
page read and write
|
||
294746B0000
|
trusted library allocation
|
page read and write
|
||
2946F276000
|
trusted library allocation
|
page read and write
|
||
21895F47000
|
heap
|
page read and write
|
||
1CC9B40B000
|
heap
|
page read and write
|
||
21893D09000
|
heap
|
page read and write
|
||
21892580000
|
heap
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
7FFDF3B5C000
|
unkown
|
page readonly
|
||
29464ED1000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2945F2C0000
|
trusted library allocation
|
page read and write
|
||
2945F22C000
|
heap
|
page read and write
|
||
2189373A000
|
heap
|
page read and write
|
||
7FF7E39A1000
|
unkown
|
page execute read
|
||
4BA09FE000
|
stack
|
page read and write
|
||
29468DD0000
|
trusted library allocation
|
page read and write
|
||
29472A7B000
|
heap
|
page read and write
|
||
2945D29B000
|
heap
|
page read and write
|
||
1CC9B0E8000
|
heap
|
page read and write
|
||
218934F4000
|
heap
|
page read and write
|
||
7FFDF0E33000
|
unkown
|
page write copy
|
||
7FFDF5E0A000
|
unkown
|
page write copy
|
||
29468463000
|
trusted library allocation
|
page read and write
|
||
CB0C0FE000
|
stack
|
page read and write
|
||
294732FE000
|
heap
|
page read and write
|
||
7FFDF5E13000
|
unkown
|
page write copy
|
||
2945D2B4000
|
heap
|
page read and write
|
||
7FF7E3A89000
|
unkown
|
page readonly
|
||
21892FD1000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
29462BA0000
|
heap
|
page read and write
|
||
218925AA000
|
heap
|
page read and write
|
||
2945ECC9000
|
heap
|
page read and write
|
||
21890630000
|
heap
|
page read and write
|
||
29463312000
|
heap
|
page read and write
|
||
7FFDF6EE4000
|
unkown
|
page read and write
|
||
7FFDF5C70000
|
unkown
|
page readonly
|
||
29464EC2000
|
heap
|
page read and write
|
||
2945D288000
|
heap
|
page read and write
|
||
21892FD1000
|
heap
|
page read and write
|
||
809E000
|
heap
|
page read and write
|
||
21893ADB000
|
heap
|
page read and write
|
||
7F40000
|
heap
|
page read and write
|
||
F433FFE000
|
stack
|
page read and write
|
||
29464EB0000
|
heap
|
page read and write
|
||
F433DFE000
|
stack
|
page read and write
|
||
1EF9E300000
|
heap
|
page read and write
|
||
1CC976CE000
|
heap
|
page read and write
|
||
29463574000
|
heap
|
page read and write
|
||
29472D98000
|
heap
|
page read and write
|
||
29463AF6000
|
heap
|
page read and write
|
||
2945F22A000
|
heap
|
page read and write
|
||
29462785000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page readonly
|
||
21896300000
|
trusted library allocation
|
page read and write
|
||
2945D2A2000
|
heap
|
page read and write
|
||
365B000
|
heap
|
page read and write
|
||
218925AC000
|
heap
|
page read and write
|
||
7FFDF5901000
|
unkown
|
page readonly
|
||
2945F228000
|
heap
|
page read and write
|
||
218933F9000
|
heap
|
page read and write
|
||
1CC976EF000
|
heap
|
page read and write
|
||
7FFDF4F01000
|
unkown
|
page execute read
|
||
7FFDF640D000
|
unkown
|
page write copy
|
||
2945F222000
|
heap
|
page read and write
|
||
7FF7E3A5B000
|
unkown
|
page read and write
|
||
2945F227000
|
heap
|
page read and write
|
||
1CC9BD3A000
|
heap
|
page read and write
|
||
2945FFAB000
|
heap
|
page read and write
|
||
29468441000
|
trusted library allocation
|
page read and write
|
||
29462FD3000
|
heap
|
page read and write
|
||
1CC961DB000
|
heap
|
page read and write
|
||
29462AD4000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
21895D88000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2189259A000
|
heap
|
page read and write
|
||
29462E63000
|
heap
|
page read and write
|
||
7FFDF5C38000
|
unkown
|
page write copy
|
||
74A000
|
unkown
|
page write copy
|
||
2945D2A2000
|
heap
|
page read and write
|
||
7FFDF5C37000
|
unkown
|
page read and write
|
||
1CC956C1000
|
heap
|
page read and write
|
||
2945D2D2000
|
heap
|
page read and write
|
||
2946302F000
|
heap
|
page read and write
|
||
218925AA000
|
heap
|
page read and write
|
||
7FFDF6EDF000
|
unkown
|
page read and write
|
||
7FFDF5210000
|
unkown
|
page readonly
|
||
8061000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
29460870000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2945D28C000
|
heap
|
page read and write
|
||
2945F24B000
|
heap
|
page read and write
|
||
2946F26A000
|
trusted library allocation
|
page read and write
|
||
1CC976A4000
|
heap
|
page read and write
|
||
294684B5000
|
trusted library allocation
|
page read and write
|
||
294684B6000
|
trusted library allocation
|
page read and write
|
||
7FFDF3663000
|
unkown
|
page readonly
|
||
2189259A000
|
heap
|
page read and write
|
||
7FFDF6443000
|
unkown
|
page read and write
|
||
218965AE000
|
heap
|
page read and write
|
||
294684A7000
|
trusted library allocation
|
page read and write
|
||
29463357000
|
heap
|
page read and write
|
||
2945F249000
|
heap
|
page read and write
|
||
2189070D000
|
heap
|
page read and write
|
||
7FF731910000
|
unkown
|
page readonly
|
||
4B9F5FC000
|
stack
|
page read and write
|
||
2945D29C000
|
heap
|
page read and write
|
||
2945D24E000
|
heap
|
page read and write
|
||
7FFDF6F36000
|
unkown
|
page read and write
|
||
21890880000
|
heap
|
page read and write
|
||
7FFDF595A000
|
unkown
|
page write copy
|
||
F4341F6000
|
stack
|
page read and write
|
||
294684A8000
|
trusted library allocation
|
page read and write
|
||
21890703000
|
heap
|
page read and write
|
||
21895D21000
|
heap
|
page read and write
|
||
21890610000
|
heap
|
page read and write
|
||
2189658D000
|
heap
|
page read and write
|
||
4BA02FE000
|
stack
|
page read and write
|
||
29472A19000
|
heap
|
page read and write
|
||
294732D3000
|
heap
|
page read and write
|
||
2946F233000
|
trusted library allocation
|
page read and write
|
||
218968A3000
|
heap
|
page read and write
|
||
7FFDF596B000
|
unkown
|
page read and write
|
||
294722E5000
|
heap
|
page read and write
|
||
29460840000
|
trusted library allocation
|
page read and write
|
||
2946284A000
|
heap
|
page read and write
|
||
F432FFC000
|
stack
|
page read and write
|
||
218934AB000
|
heap
|
page read and write
|
||
2945F222000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
21893E91000
|
heap
|
page read and write
|
||
21895DC8000
|
heap
|
page read and write
|
||
29472F9E000
|
heap
|
page read and write
|
||
218950C2000
|
heap
|
page read and write
|
||
2945FF53000
|
heap
|
page read and write
|
||
29464E9D000
|
heap
|
page read and write
|
||
2189070A000
|
heap
|
page read and write
|
||
218925B5000
|
heap
|
page read and write
|
There are 2324 hidden memdumps, click here to show them.