IOC Report
PDFixers.zip

loading gif

Files

File Path
Type
Category
Malicious
PDFixers.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5IQBCSP1\css2[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\96LGQ1XY\email-decode.min[1].js
HTML document, ASCII text, with very long lines (1238)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\SQ5EF6KQ.htm
HTML document, ASCII text, with very long lines (10298), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NB937L4Q\font[1].eot
Embedded OpenType (EOT), Nunito Sans 12pt Light family
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-settings.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Desktop\SumatraPDF.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 16 12:47:34 2024, mtime=Tue Apr 16 12:47:34 2024, atime=Wed Oct 25 05:17:54 2023, length=16065496, window=hide
dropped
Chrome Cache Entry: 100
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 101
PNG image data, 1040 x 1037, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 102
PNG image data, 1040 x 1037, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (1361), with no line terminators
downloaded
Chrome Cache Entry: 75
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 76
JPEG image data, progressive, precision 8, 400x400, components 3
dropped
Chrome Cache Entry: 77
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 78
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 79
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 80
JPEG image data, progressive, precision 8, 400x400, components 3
dropped
Chrome Cache Entry: 81
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 82
PNG image data, 400 x 400, 8-bit/color RGBA, interlaced
downloaded
Chrome Cache Entry: 83
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 84
JPEG image data, progressive, precision 8, 400x400, components 3
downloaded
Chrome Cache Entry: 85
PNG image data, 400 x 400, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 86
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 87
JPEG image data, progressive, precision 8, 400x400, components 3
downloaded
Chrome Cache Entry: 88
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 89
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 90
HTML document, Unicode text, UTF-8 text, with very long lines (506), with CRLF line terminators
downloaded
Chrome Cache Entry: 91
PNG image data, 53 x 80, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 92
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 93
JPEG image data, progressive, precision 8, 400x400, components 3
downloaded
Chrome Cache Entry: 94
PNG image data, 400 x 400, 8-bit/color RGBA, interlaced
dropped
Chrome Cache Entry: 95
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 96
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 97
PNG image data, 400 x 400, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 98
JPEG image data, progressive, precision 8, 400x400, components 3
dropped
Chrome Cache Entry: 99
PNG image data, 53 x 80, 8-bit/color RGB, non-interlaced
dropped
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\user\AppData\Local\Temp\Temp1_PDFixers.zip\PDFixers.exe
"C:\Users\user\AppData\Local\Temp\Temp1_PDFixers.zip\PDFixers.exe"
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
"C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.sumatrapdfreader.org/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1940,i,11865487458500093638,9147501348541840663,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://www.sumatrapdfreader.org/favicon.ico
138.201.51.123
https://www.sumatrapdfreader.org/settings/settings3-5-1.html8.33
unknown
https://twitter.com/kjk
unknown
https://unavatar.io/twitter/@EnercoConseils
104.21.75.206
https://www.sumatrapdfreader.org/e.lllo
unknown
https://www.sumatrapdfreader.org/manualArialwebsiteArial
unknown
https://github.com/sumatrapdfreader/sumatrapdf/discussions/2316
unknown
http://www.fontbureau.com/designers
unknown
https://pixel.pdfixers.com/G
unknown
https://pixel.pdfixers.com/https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/ema
unknown
https://scripts.sil.org/OFLNunito
unknown
http://docs.oasis-open.org/ns/office/1.2/meta/odf#StylesFile
unknown
https://stackoverflow.com/a/64554893
unknown
http://www.sajatypeworks.com
unknown
https://pixel.pdfixers.com/2
unknown
https://pixel.pdfixers.com/ll7
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.gribuser.ru/xml/fictionbook/2.0
unknown
https://pixel.pdfixers.com/7
unknown
https://scripts.sil.org/OFL
unknown
https://pixel.pdfixers.com/;
unknown
https://www.sumatrapdfreader.org/dl/prerel/PRE_RELEASE_VER/SumatraPDF-prerel
unknown
https://github.com/Fonthausen/NunitoSans)Thread-000019dc-Id-00000000:SubsetRegularVersion
unknown
https://pixel.pdfixers.com/9
unknown
https://developer.mozilla.org/en-US/docs/Web/CSS/scrollbar-gutter
unknown
https://www.sumatrapdfreader.org/update-check-rel.txtnotifUpdateCheckInProgress
unknown
https://pixel.pdfixers.com/?
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://www.sumatrapdfreader.org/docs/Keyboard-shortcutssumatrapdfrestrict.inihttps://www.sumatrapdf
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.sumatrapdfreader.org/docs/Version-history.html
unknown
http://www.daisy.org/z3986/2005/ncx/
unknown
https://pixel.pdfixers.com
unknown
https://pixel.pdfixers.com/-
unknown
http://www.idpf.org/2007/opfapplication/xhtml
unknown
http://grsmto.github.io/simplebar/
unknown
https://news.ycombinator.com/item?id=3327197
unknown
https://www.redditmedia.com/r/software/comments/j215uw/i_just_realized_that_windows_doesnt_have_a/g7
unknown
https://unavatar.io/twitter/@CRTejaswi
104.21.75.206
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://github.com/Fonthausen/NunitoSans)nu
unknown
https://github.com/sumatrapdfreader/sumatrapdf/commit/646d1feddcc80b3b51072c5b27a1446487904175)
unknown
http://docs.oasis-open.org/ns/office/1.2/meta/pkg#Document
unknown
https://www.sumatrapdfreader.org/download-free-pdf-viewer-------------
unknown
https://www.sumatrapdfreader.org/settings/settings3-5-1.html
unknown
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORShttps://github.com/sumatrapdfreade
unknown
https://www.sumatrapdfreader.org/update-check-rel.txt
unknown
http://www.carterandcone.coml
unknown
https://twitter.com/ronaldnzimora/status/1259107209172131843
unknown
https://unavatar.io/twitter/@r0x12ul
104.21.75.206
https://www.redditmedia.com/r/Piracy/comments/u1m23x/good_windows_cbz_reader_other_than_cdisplayex/i
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
https://www.sumatrapdfreader.org/img/homepage-small.png
138.201.51.123
https://www.redditmedia.com/r/ProgrammerHumor/comments/rgz0nk/i_dont_think_that_goes_in_the_console/
unknown
https://sumatra-website.onrender.com/update-check-rel.txtInstaller64LatestInstaller32InstallerArm64P
unknown
https://www.sumatrapdfreader.org/img/dialog-langs-small.png
138.201.51.123
https://files2.sumatrapdfreader.org/software/sumatrapdf/sumatralatest.js
104.26.9.244
https://news.ycombinator.com/item?id=576145
unknown
https://stackoverflow.com/questions/13054797/how-to-prevent-a-webkit-scrollbar-from-pushing-over-the
unknown
https://www.sumatrapdfreader.org/docs/Corrupted-installation
unknown
https://www.sumatrapdfreader.org/docs/Submit-crash-report.html
unknown
https://www.sumatrapdfreader.org/img/format-pdf-small.png
138.201.51.123
https://pixel.pdfixers.com/...
unknown
https://scripts.sil.org/OFLV
unknown
https://www.sumatrapdfreader.org/manual1
unknown
https://www.sumatrapdfreader.org/URLUpdateInfohttps://www.sumatrapdfreader.org/docs/Version-history.
unknown
https://www.sumatrapdfreader.org/sumatra.css
138.201.51.123
https://www.deepl.com/translator#-/$
unknown
https://pixel.pdfixers.com/...p
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js%
unknown
https://www.sumatrapdfreader.org/download-free-pdf-viewer
unknown
http://www.idpf.org/2007/opf
unknown
http://www.fontbureau.com/designersG
unknown
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORS6
unknown
https://pixel.pdfixers.com/ger
unknown
https://twitter.com/r0x12ul/status/1444901425234911234
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://ocsp.sectigo.com0
unknown
http://www.fontbureau.com/designers?
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
unknown
https://www.sumatrapdfreader.org/img/format-epub-small.png
138.201.51.123
https://news.ycombinator.com/item?id=37988872
unknown
http://www.tiro.com
unknown
http://docs.oasis-open.org/ns/office/1.2/meta/odf#ContentFile
unknown
http://www.goodfont.co.kr
unknown
https://blog.kowalczyk.info
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://www.tweetic.io/create
unknown
https://csshint.com/css-box-shadow-examples/
unknown
http://www.typography.netD
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORS
unknown
https://www.sumatrapdfreader.org/docs/Contribute-translation
unknown
http://fontfabrik.com
unknown
https://www.sumatrapdfreader.org/dl/rel/SumatraPDF-3.5.2
unknown
https://www.sumatrapdfreader.org0
unknown
https://www.sumatrapdfreader.org/
138.201.51.123
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pixel.pdfixers.com
172.67.147.142
unavatar.io
104.21.75.206
www.sumatrapdfreader.org
138.201.51.123
files2.sumatrapdfreader.org
104.26.9.244
www.google.com
64.233.177.104

IPs

IP
Domain
Country
Malicious
104.21.75.206
unavatar.io
United States
192.168.2.17
unknown
unknown
172.67.181.251
unknown
United States
104.26.9.244
files2.sumatrapdfreader.org
United States
64.233.177.104
www.google.com
United States
138.201.51.123
www.sumatrapdfreader.org
Germany
239.255.255.250
unknown
Reserved
172.67.147.142
pixel.pdfixers.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SumatraPDFUninstall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SumatraPDFUninstall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\GPU
AdapterInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d5ad0dfbb57c2e\b258eb92
@{microsoft.windows.photos_2019.19071.12548.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.windows.photos/files/assets/photoslogoextensions.png}
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByDirection
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CIDOpen\Modules\GlobalSettings\ProperTreeModuleInner
ProperTreeModuleInner
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A1D75C2000
heap
page read and write
2A8EC2D8000
heap
page read and write
2B0F4FA5000
heap
page read and write
2A8D1490000
unkown
page readonly
2B0EE5DA000
trusted library allocation
page read and write
1A1D900F000
heap
page read and write
1A1D965E000
heap
page read and write
1A1D9040000
heap
page read and write
7FF9CC35D000
trusted library allocation
page execute and read and write
1A1D7635000
heap
page read and write
7FF9CC450000
trusted library allocation
page execute and read and write
1A1D966B000
heap
page read and write
2B0F340C000
trusted library allocation
page read and write
1A1D7560000
heap
page read and write
1A1D9559000
heap
page read and write
1A1D75CA000
heap
page read and write
2B0F1F2E000
heap
page read and write
2A8EC248000
trusted library allocation
page read and write
1A1D7630000
heap
page read and write
1A1D908F000
heap
page read and write
1A1D9000000
heap
page read and write
1A1D967E000
heap
page read and write
2B0F33B7000
trusted library allocation
page read and write
2A8D39C0000
heap
page read and write
1A1DBB41000
heap
page read and write
D69200D000
stack
page read and write
2B0F22B4000
trusted library allocation
page read and write
2B0F2589000
trusted library allocation
page read and write
1A1D9040000
heap
page read and write
1A1D9504000
heap
page read and write
1A1D9535000
heap
page read and write
2B0F3210000
trusted library allocation
page read and write
2B0F2630000
trusted library allocation
page read and write
2B0F3392000
trusted library allocation
page read and write
1A1D901F000
heap
page read and write
1A1D75F5000
heap
page read and write
1A1D9491000
heap
page read and write
1A1D7606000
heap
page read and write
1A1D8FE5000
heap
page read and write
2B0EE628000
trusted library allocation
page read and write
7FF9CC416000
trusted library allocation
page execute and read and write
1A1D7619000
heap
page read and write
2A8D1DF0000
trusted library allocation
page read and write
2B0F2EAE000
trusted library allocation
page read and write
2B0F23BF000
heap
page read and write
1A1D75D9000
heap
page read and write
1A1D9529000
heap
page read and write
2B0F3D36000
trusted library allocation
page read and write
1A1D9476000
heap
page read and write
1A1D8FEF000
heap
page read and write
2A8D3780000
trusted library allocation
page read and write
1A1D7648000
heap
page read and write
1A1D9092000
heap
page read and write
1A1D75E7000
heap
page read and write
1A1D9081000
heap
page read and write
2A8EC2C1000
heap
page read and write
7FF9CC5CB000
trusted library allocation
page read and write
1A1D764D000
heap
page read and write
1A1D9665000
heap
page read and write
2B0F5451000
trusted library allocation
page read and write
1A1D9550000
heap
page read and write
2B0F260C000
trusted library allocation
page read and write
1A1D75AD000
heap
page read and write
2A8D1E2C000
heap
page read and write
2B0F3E70000
trusted library allocation
page read and write
1A1D9070000
heap
page read and write
1A1D7619000
heap
page read and write
1A1D90A5000
heap
page read and write
2B0F4DF6000
heap
page read and write
1A1D94B8000
heap
page read and write
2B0F1D4E000
heap
page read and write
1A1D763A000
heap
page read and write
1A1D763A000
heap
page read and write
1A1D901D000
heap
page read and write
1A1DCF90000
heap
page read and write
1A1D763C000
heap
page read and write
2B0F26C7000
trusted library allocation
page read and write
7FF9CC630000
trusted library allocation
page execute and read and write
1F065F8000
stack
page read and write
1A1D908F000
heap
page read and write
1A1D7612000
heap
page read and write
2B0FA110000
trusted library allocation
page read and write
1F062FE000
stack
page read and write
1A1D761D000
heap
page read and write
2B0F3429000
trusted library allocation
page read and write
2B0F4F06000
heap
page read and write
1A1D764C000
heap
page read and write
1A1D90B0000
heap
page read and write
1A1D7625000
heap
page read and write
7FF9CC342000
trusted library allocation
page read and write
2B0F322F000
trusted library allocation
page read and write
2B0EE585000
trusted library allocation
page read and write
2B0F301A000
trusted library allocation
page read and write
1A1D904A000
heap
page read and write
2B0F5612000
trusted library allocation
page read and write
D691CFE000
stack
page read and write
1A1D75F5000
heap
page read and write
1A1D955E000
heap
page read and write
2B0F4CEC000
heap
page read and write
2A8EE440000
heap
page read and write
7FF774171000
unkown
page readonly
1A1D9092000
heap
page read and write
1A1DBB3E000
heap
page read and write
2B0F2575000
trusted library allocation
page read and write
1A1D95AF000
heap
page read and write
1A1D94B8000
heap
page read and write
2B0F1F41000
trusted library allocation
page read and write
1A1D8FF6000
heap
page read and write
2A8D1E0C000
heap
page read and write
2B0F7EBD000
heap
page read and write
2A8EC320000
heap
page read and write
2B0F25FC000
trusted library allocation
page read and write
1A1D763C000
heap
page read and write
1A1D90AD000
heap
page read and write
1A1D958D000
heap
page read and write
2B0F33C1000
trusted library allocation
page read and write
1A1D9085000
heap
page read and write
2B0EE6C5000
trusted library allocation
page read and write
1A1D94AA000
heap
page read and write
1A1D90A2000
heap
page read and write
1A1D7624000
heap
page read and write
2B0F5435000
trusted library allocation
page read and write
1A1D952C000
heap
page read and write
1A1D9040000
heap
page read and write
1A1D900E000
heap
page read and write
1A1D95CD000
heap
page read and write
1A1D764D000
heap
page read and write
D6973FE000
stack
page read and write
2A8D149C000
unkown
page readonly
1A1D9543000
heap
page read and write
2B0F4CEE000
heap
page read and write
2B0F260A000
trusted library allocation
page read and write
2B0F2F34000
trusted library allocation
page read and write
1A1D9565000
heap
page read and write
2B0F65C3000
trusted library allocation
page read and write
2B0F3478000
trusted library allocation
page read and write
2B0F6596000
trusted library allocation
page read and write
EA29BFC000
stack
page read and write
1A1D958E000
heap
page read and write
23BAA290000
heap
page read and write
1A1D75C5000
heap
page read and write
2A8EC58A000
heap
page read and write
2B0F339A000
trusted library allocation
page read and write
1A1D7619000
heap
page read and write
1A1D906D000
heap
page read and write
1F067F8000
stack
page read and write
1A1D900F000
heap
page read and write
2B0FA150000
trusted library allocation
page read and write
2B0F3424000
trusted library allocation
page read and write
1A1D7616000
heap
page read and write
1A1D90AE000
heap
page read and write
1A1D90B9000
heap
page read and write
1A1DF685000
heap
page read and write
D691D4E000
stack
page read and write
1A1D8FEF000
heap
page read and write
2A8EC396000
heap
page read and write
1A1D7658000
heap
page read and write
1A1D90B7000
heap
page read and write
1A1D8FFF000
heap
page read and write
2B0F34A0000
trusted library allocation
page read and write
2A8EE471000
heap
page read and write
1A1D901D000
heap
page read and write
1A1D9499000
heap
page read and write
1A1D901C000
heap
page read and write
1A1D9036000
heap
page read and write
1A1D9079000
heap
page read and write
2A8D1E6F000
heap
page read and write
1A1D901B000
heap
page read and write
2B0EE5C0000
trusted library allocation
page read and write
7FF9CC333000
trusted library allocation
page execute and read and write
1A1D764A000
heap
page read and write
1A1D9029000
heap
page read and write
1A1D780D000
heap
page read and write
2B0EE722000
trusted library allocation
page read and write
2B0EE750000
trusted library allocation
page read and write
1A1D90B9000
heap
page read and write
1A1D8FF6000
heap
page read and write
1A1D7652000
heap
page read and write
1A1D7628000
heap
page read and write
2B0F3444000
trusted library allocation
page read and write
2B0EE5F2000
trusted library allocation
page read and write
2B0FA34E000
heap
page read and write
1A1D9586000
heap
page read and write
1A1D7644000
heap
page read and write
D693BFE000
stack
page read and write
7FF9CC5FD000
trusted library allocation
page read and write
1A1D75EF000
heap
page read and write
1A1D9034000
heap
page read and write
1A1D7632000
heap
page read and write
1A1D955E000
heap
page read and write
2A8D1E40000
heap
page read and write
1A1D95B3000
heap
page read and write
1A1D9621000
heap
page read and write
2B0F3BA4000
trusted library allocation
page read and write
1A1D9667000
heap
page read and write
1A1D75EB000
heap
page read and write
2B0EE5FF000
trusted library allocation
page read and write
2B0F7EB3000
heap
page read and write
1A1D90A5000
heap
page read and write
1A1D9080000
heap
page read and write
1A1D901B000
heap
page read and write
EA29EFF000
stack
page read and write
7FF7748A5000
unkown
page read and write
1A1D9080000
heap
page read and write
2B0F2EA7000
trusted library allocation
page read and write
2B0EE720000
trusted library allocation
page read and write
1A1D75FB000
heap
page read and write
1A1D7633000
heap
page read and write
2B0F1F98000
trusted library allocation
page read and write
1A1D955E000
heap
page read and write
1A1D9080000
heap
page read and write
1A1DB310000
trusted library allocation
page read and write
2A8EE01C000
heap
page read and write
1A1D9081000
heap
page read and write
2B0F1C60000
heap
page read and write
1A1D9039000
heap
page read and write
2B0F65A3000
trusted library allocation
page read and write
1A1D905A000
heap
page read and write
2A8EC31C000
heap
page read and write
1A1D7650000
heap
page read and write
2B0F1FDC000
trusted library allocation
page read and write
1A1D95D9000
heap
page read and write
1A1D907A000
heap
page read and write
1A1D95BC000
heap
page read and write
7FF9CC562000
trusted library allocation
page read and write
1A1D903C000
heap
page read and write
1A1D9620000
heap
page read and write
1A1D90AE000
heap
page read and write
2B0F264A000
trusted library allocation
page read and write
2B0FA2BD000
heap
page read and write
2B0F3498000
trusted library allocation
page read and write
EA29F7E000
stack
page read and write
1A1D9081000
heap
page read and write
1A1D902A000
heap
page read and write
1A1D9045000
heap
page read and write
1A1D966B000
heap
page read and write
2B0F1D46000
heap
page read and write
1A1D7630000
heap
page read and write
7FF9CC3EC000
trusted library allocation
page execute and read and write
2B0FA125000
trusted library allocation
page read and write
1A1D9031000
heap
page read and write
2B0EE61D000
trusted library allocation
page read and write
2B0F773D000
trusted library allocation
page read and write
1A1D964D000
heap
page read and write
1A1D75EA000
heap
page read and write
1A1D904A000
heap
page read and write
2B0F65B7000
trusted library allocation
page read and write
2A8EC32C000
heap
page read and write
1A1D95B0000
heap
page read and write
1A1D908E000
heap
page read and write
2B0F25D6000
trusted library allocation
page read and write
7FF4F1CB8000
trusted library allocation
page readonly
2A8EC38B000
heap
page read and write
2B0EE618000
trusted library allocation
page read and write
1A1D8FED000
heap
page read and write
2B0F31E3000
trusted library allocation
page read and write
1A1D7614000
heap
page read and write
1A1D760E000
heap
page read and write
1A1D966D000
heap
page read and write
2B0F200F000
trusted library allocation
page read and write
2B0F7DF6000
heap
page read and write
1A1D9639000
heap
page read and write
1A1D907E000
heap
page read and write
1A1D762F000
heap
page read and write
1A1D906A000
heap
page read and write
1A1D762B000
heap
page read and write
1A1D90B8000
heap
page read and write
1A1D95DC000
heap
page read and write
1A1D95B3000
heap
page read and write
1A1D960F000
heap
page read and write
1A1D90A5000
heap
page read and write
2B0EE5E8000
trusted library allocation
page read and write
2A8EC1A0000
heap
page read and write
1A1D9036000
heap
page read and write
1A1D901B000
heap
page read and write
1A1D7648000
heap
page read and write
1A1D95B0000
heap
page read and write
1A1D906A000
heap
page read and write
1A1D763A000
heap
page read and write
2B0F65D0000
trusted library allocation
page read and write
1A1D903B000
heap
page read and write
7FF9CC34D000
trusted library allocation
page execute and read and write
1A1D9559000
heap
page read and write
1A1D764D000
heap
page read and write
1A1D7603000
heap
page read and write
1A1D962F000
heap
page read and write
7FF4F1CB4000
trusted library allocation
page readonly
1A1D9070000
heap
page read and write
2A8EC2C5000
heap
page read and write
2A8D37D0000
heap
page read and write
2B0F3C9F000
trusted library allocation
page read and write
2A8EDAC1000
heap
page read and write
2A8EC240000
trusted library allocation
page read and write
1A1D955E000
heap
page read and write
2A8EC57E000
heap
page read and write
2B0F33F8000
trusted library allocation
page read and write
2B0F25B5000
trusted library allocation
page read and write
2B0F33F0000
trusted library allocation
page read and write
D6957FE000
stack
page read and write
1A1D9567000
heap
page read and write
1A1D75BD000
heap
page read and write
2A8D1CA4000
unkown
page readonly
1A1D95B6000
heap
page read and write
D6953FB000
stack
page read and write
1A1D765D000
heap
page read and write
1A1D7650000
heap
page read and write
7FF4F1CB5000
trusted library allocation
page execute read
1A1D90C4000
heap
page read and write
1A1D7656000
heap
page read and write
1A1D75B9000
heap
page read and write
1A1D75D4000
heap
page read and write
1A1D7605000
heap
page read and write
2B0F1C8C000
heap
page read and write
1A1D9430000
trusted library section
page readonly
1A1D9593000
heap
page read and write
1A1DBB3B000
heap
page read and write
1A1D762B000
heap
page read and write
2A8EE458000
heap
page read and write
2B0EE6F8000
trusted library allocation
page read and write
2B0EE674000
trusted library allocation
page read and write
1A1D903D000
heap
page read and write
2B0F22B0000
trusted library allocation
page read and write
1A1D7658000
heap
page read and write
2B0F30F0000
trusted library allocation
page read and write
2A8EC394000
heap
page read and write
2B0F200A000
trusted library allocation
page read and write
1A1D907C000
heap
page read and write
2B0F4E88000
heap
page read and write
1A1D908F000
heap
page read and write
2B0F2607000
trusted library allocation
page read and write
1A1D90AE000
heap
page read and write
1A1D9040000
heap
page read and write
1A1D8FF6000
heap
page read and write
2B0EE700000
trusted library allocation
page read and write
2B0F65DA000
trusted library allocation
page read and write
1A1D9582000
heap
page read and write
2A8EC517000
heap
page read and write
1A1DBB22000
heap
page read and write
1A1D764F000
heap
page read and write
1A1DBB37000
heap
page read and write
2A8D39F1000
trusted library allocation
page read and write
2B0EE670000
trusted library allocation
page read and write
1A1D9036000
heap
page read and write
1A1D9014000
heap
page read and write
1A1D75F8000
heap
page read and write
1A1D9610000
heap
page read and write
2B0F2134000
trusted library allocation
page read and write
2B0EE638000
trusted library allocation
page read and write
1A1D9250000
unkown
page read and write
1A1D8FDE000
heap
page read and write
2B0F1CD6000
heap
page read and write
2B0F2350000
heap
page read and write
1A1D7645000
heap
page read and write
1A1D9080000
heap
page read and write
2A8EE55B000
trusted library allocation
page read and write
2B0EE738000
trusted library allocation
page read and write
2B0F33AB000
trusted library allocation
page read and write
1A1D90B7000
heap
page read and write
1A1D75DF000
heap
page read and write
1A1DF64F000
heap
page read and write
1A1D9638000
heap
page read and write
2A8E3A07000
trusted library allocation
page read and write
1A1D9036000
heap
page read and write
2A8EC2DC000
heap
page read and write
1A1D9038000
heap
page read and write
2B0F336D000
trusted library allocation
page read and write
2A8EC398000
heap
page read and write
2A8EE476000
heap
page read and write
2B0F1D0B000
heap
page read and write
2B0F5439000
trusted library allocation
page read and write
1A1D94B8000
heap
page read and write
2B0EE665000
trusted library allocation
page read and write
2B0F65EF000
trusted library allocation
page read and write
1A1D8FE7000
heap
page read and write
7FF773FED000
unkown
page readonly
1A1D7633000
heap
page read and write
1A1D903E000
heap
page read and write
2B0F7E7A000
heap
page read and write
1A1D9548000
heap
page read and write
2B0F2622000
trusted library allocation
page read and write
2B0F25D0000
trusted library allocation
page read and write
1A1D9567000
heap
page read and write
2B0F2306000
trusted library allocation
page read and write
2B0F1D9D000
heap
page read and write
1A1D90AE000
heap
page read and write
2B0F4C45000
heap
page read and write
2A8D1E00000
heap
page read and write
1A1D7652000
heap
page read and write
1A1D90B8000
heap
page read and write
2A8D3890000
heap
page read and write
1A1D9526000
heap
page read and write
1A1D9031000
heap
page read and write
2B0F1C92000
heap
page read and write
2B0F5C15000
trusted library allocation
page read and write
1A1D761B000
heap
page read and write
1A1D900F000
heap
page read and write
2B0F25E2000
trusted library allocation
page read and write
2B0F25E6000
trusted library allocation
page read and write
1A1D907E000
heap
page read and write
2B0EE5FB000
trusted library allocation
page read and write
1A1D9615000
heap
page read and write
1A1D7647000
heap
page read and write
2B0F2641000
trusted library allocation
page read and write
1F061FF000
stack
page read and write
2B0F25F0000
trusted library allocation
page read and write
1A1D9098000
heap
page read and write
1A1D7633000
heap
page read and write
1F06EFB000
stack
page read and write
7FF77488F000
unkown
page read and write
2B0F323E000
trusted library allocation
page read and write
1A1D9678000
heap
page read and write
1A1D95A4000
heap
page read and write
2A8EE46C000
heap
page read and write
7FF774886000
unkown
page read and write
2B0F3420000
trusted library allocation
page read and write
1A1D764A000
heap
page read and write
1A1D901D000
heap
page read and write
D693FFF000
stack
page read and write
1A1D966B000
heap
page read and write
2B0FA380000
heap
page read and write
2B0EE72B000
trusted library allocation
page read and write
2B0F31C0000
trusted library allocation
page read and write
1A1D9095000
heap
page read and write
1A1D9057000
heap
page read and write
1A1D8FEA000
heap
page read and write
1A1D963F000
heap
page read and write
1A1D8FC0000
heap
page read and write
2B0F533F000
trusted library allocation
page read and write
1A1D9073000
heap
page read and write
2B0F1D42000
heap
page read and write
2B0F7AB0000
trusted library allocation
page read and write
1A1D95EA000
heap
page read and write
1A1D9029000
heap
page read and write
2A8EC3A5000
heap
page read and write
1A1D958B000
heap
page read and write
D6963FE000
stack
page read and write
1A1D760C000
heap
page read and write
7FF9CC5D0000
trusted library allocation
page read and write
2B0F7E92000
heap
page read and write
1A1D9021000
heap
page read and write
1A1DBB4F000
heap
page read and write
2B0F1F50000
trusted library allocation
page read and write
1A1D8FD0000
heap
page read and write
1A1D966E000
heap
page read and write
1A1D77C0000
heap
page read and write
2B0EE6F0000
trusted library allocation
page read and write
2B0F1C6E000
heap
page read and write
1A1D8FEA000
heap
page read and write
2B0F7E7E000
heap
page read and write
1A1D9036000
heap
page read and write
2B0F5472000
trusted library allocation
page read and write
2B0F208E000
trusted library allocation
page read and write
1A1D7648000
heap
page read and write
2A8EC34E000
heap
page read and write
2A8E3A14000
trusted library allocation
page read and write
2A8EC4F0000
heap
page read and write
1A1D9487000
heap
page read and write
2B0F4CCD000
heap
page read and write
1A1D763C000
heap
page read and write
1A1D7619000
heap
page read and write
1A1D7633000
heap
page read and write
1A1D9553000
heap
page read and write
1A1D8FEA000
heap
page read and write
2A8D1C97000
unkown
page readonly
1A1D9562000
heap
page read and write
2B0F3204000
trusted library allocation
page read and write
7FF9CC334000
trusted library allocation
page read and write
1A1D90B7000
heap
page read and write
2B0F6590000
trusted library allocation
page read and write
1A1D761B000
heap
page read and write
2A8EDF3F000
heap
page read and write
1A1D7805000
heap
page read and write
1A1D900E000
heap
page read and write
1A1D9029000
heap
page read and write
1A1D904A000
heap
page read and write
1A1D8FF9000
heap
page read and write
1A1DF69F000
heap
page read and write
1A1D9626000
heap
page read and write
1A1D9635000
heap
page read and write
2B0F7710000
trusted library allocation
page read and write
1A1D8FC1000
heap
page read and write
1A1D954C000
heap
page read and write
1A1D900E000
heap
page read and write
2B0F25DD000
trusted library allocation
page read and write
1A1D967A000
heap
page read and write
2A8EDE36000
heap
page read and write
1A1D7750000
heap
page read and write
2B0F22F0000
trusted library allocation
page read and write
1A1D761C000
heap
page read and write
1A1D9678000
heap
page read and write
1A1D903E000
heap
page read and write
1A1D9092000
heap
page read and write
2A8D3830000
heap
page read and write
1A1D7670000
heap
page read and write
23BAA390000
heap
page read and write
2A8EC2D4000
heap
page read and write
2B0F31E6000
trusted library allocation
page read and write
2B0F262A000
trusted library allocation
page read and write
2B0FA309000
heap
page read and write
2A8EC390000
heap
page read and write
1A1D7625000
heap
page read and write
1A1D9044000
heap
page read and write
1A1D7652000
heap
page read and write
1A1D9040000
heap
page read and write
2B0EE607000
trusted library allocation
page read and write
2A8EC35F000
heap
page read and write
1A1DBB3C000
heap
page read and write
2B0F2260000
trusted library allocation
page read and write
2A8EC2A6000
heap
page execute and read and write
1A1D90A2000
heap
page read and write
1F063FE000
stack
page read and write
1F060FE000
stack
page read and write
D6947FD000
stack
page read and write
1A1D900E000
heap
page read and write
2B0EE580000
trusted library allocation
page read and write
2B0EE680000
trusted library allocation
page read and write
1A1D764A000
heap
page read and write
1A1D908F000
heap
page read and write
2A8EC573000
heap
page read and write
2B0F20E0000
trusted library allocation
page read and write
7FF9CC332000
trusted library allocation
page read and write
2B0F25D3000
trusted library allocation
page read and write
2B0F258C000
trusted library allocation
page read and write
2B0EE70C000
trusted library allocation
page read and write
2A8EC374000
heap
page read and write
2B0F1F65000
trusted library allocation
page read and write
1A1D760A000
heap
page read and write
7FF4F1CB9000
trusted library allocation
page execute read
2B0EE5D1000
trusted library allocation
page read and write
2B0F7718000
trusted library allocation
page read and write
1A1D90A3000
heap
page read and write
2B0F25EB000
trusted library allocation
page read and write
1A1D75F2000
heap
page read and write
2B0F65E8000
trusted library allocation
page read and write
1A1D8FFF000
heap
page read and write
1A1D9034000
heap
page read and write
2B0EE5C8000
trusted library allocation
page read and write
1A1D7619000
heap
page read and write
1A1D9080000
heap
page read and write
1A1D7800000
heap
page read and write
2B0F1BEA000
heap
page read and write
1A1D9099000
heap
page read and write
1A1D75F8000
heap
page read and write
2A8EC348000
heap
page read and write
2A8EC54A000
heap
page read and write
2B0EE6AE000
trusted library allocation
page read and write
1A1D907C000
heap
page read and write
2B0EE73E000
trusted library allocation
page read and write
2A8EC56E000
heap
page read and write
1A1D7626000
heap
page read and write
1A1D95DC000
heap
page read and write
2B0F7745000
trusted library allocation
page read and write
1A1D75C0000
heap
page read and write
2B0F25AD000
trusted library allocation
page read and write
2B0F4194000
trusted library allocation
page read and write
EA29E7E000
stack
page read and write
2B0F34A6000
trusted library allocation
page read and write
2B0FA3C3000
heap
page read and write
1A1D90AE000
heap
page read and write
D694FFB000
stack
page read and write
2B0F321F000
trusted library allocation
page read and write
1A1D7648000
heap
page read and write
1A1D902C000
heap
page read and write
2B0F1F9E000
trusted library allocation
page read and write
7FF9CC330000
trusted library allocation
page read and write
1A1D7656000
heap
page read and write
2B0F7D72000
heap
page read and write
2B0F2030000
trusted library allocation
page execute
1A1D900F000
heap
page read and write
1A1D907A000
heap
page read and write
2B0F25F5000
trusted library allocation
page read and write
1A1D965E000
heap
page read and write
1A1D9651000
heap
page read and write
2A8EC575000
heap
page read and write
1A1D965E000
heap
page read and write
2B0F1F4D000
trusted library allocation
page read and write
1A1D7630000
heap
page read and write
1A1D7652000
heap
page read and write
2B0F412F000
trusted library allocation
page read and write
2B0F3303000
trusted library allocation
page read and write
1A1DF6A3000
heap
page read and write
1A1D75E6000
heap
page read and write
2B0EE59A000
trusted library allocation
page read and write
1A1D95A4000
heap
page read and write
1A1D7630000
heap
page read and write
1A1D7628000
heap
page read and write
1A1D7602000
heap
page read and write
2A8ED6D2000
trusted library allocation
page read and write
2B0F33AF000
trusted library allocation
page read and write
2B0EE640000
heap
page read and write
7FF9CC38C000
trusted library allocation
page execute and read and write
1A1D7626000
heap
page read and write
D6933FE000
stack
page read and write
2B0F659A000
trusted library allocation
page read and write
1A1D95D9000
heap
page read and write
2A8EC366000
heap
page read and write
1A1D761D000
heap
page read and write
1F05EFE000
stack
page read and write
1A1D903A000
heap
page read and write
1A1D909F000
heap
page read and write
2B0F34BB000
trusted library allocation
page read and write
1A1D967B000
heap
page read and write
2B0F4E39000
heap
page read and write
1A1D907A000
heap
page read and write
2B0F3010000
trusted library allocation
page read and write
1A1D7619000
heap
page read and write
1A1D95C8000
heap
page read and write
2B0F1CAA000
heap
page read and write
2B0F5440000
trusted library allocation
page read and write
1A1DCFBA000
heap
page read and write
D691C5E000
stack
page read and write
1A1D763D000
heap
page read and write
2B0F33BC000
trusted library allocation
page read and write
2B0F3408000
trusted library allocation
page read and write
2B0EE5EA000
trusted library allocation
page read and write
2B0F2120000
trusted library allocation
page read and write
1A1D955E000
heap
page read and write
2B0F2653000
trusted library allocation
page read and write
1A1D909D000
heap
page read and write
2B0F3281000
trusted library allocation
page read and write
2B0F2F41000
trusted library allocation
page read and write
1A1D9470000
heap
page read and write
2B0F25C2000
trusted library allocation
page read and write
2B0EE668000
trusted library allocation
page read and write
1A1D8FFE000
heap
page read and write
1A1D7658000
heap
page read and write
1A1D7651000
heap
page read and write
2A8D1D70000
heap
page read and write
2B0F7ECB000
heap
page read and write
1A1D765A000
heap
page read and write
1A1D95A9000
heap
page read and write
2B0F4C32000
heap
page read and write
2A8EC2E8000
heap
page read and write
1A1D95EA000
heap
page read and write
1A1DF60E000
heap
page read and write
2A8EC2A0000
heap
page execute and read and write
1A1D962A000
heap
page read and write
2B0EE6F4000
trusted library allocation
page read and write
7FF774893000
unkown
page read and write
1A1D901D000
heap
page read and write
23BAA398000
heap
page read and write
1A1D9585000
heap
page read and write
2A8EE00E000
heap
page read and write
2B0EE6D8000
trusted library allocation
page read and write
1A1D7605000
heap
page read and write
1A1D7628000
heap
page read and write
2A8EC3A0000
heap
page read and write
2A8EE574000
heap
page read and write
1A1D8FEA000
heap
page read and write
1A1D90C0000
heap
page read and write
1A1D9087000
heap
page read and write
D6967FE000
stack
page read and write
1A1D75B4000
heap
page read and write
2B0F1F90000
trusted library allocation
page read and write
1A1D761B000
heap
page read and write
2A8D3790000
trusted library allocation
page read and write
1F064FE000
stack
page read and write
1A1D760A000
heap
page read and write
1A1D9634000
heap
page read and write
1A1D9587000
heap
page read and write
2B0F65B2000
trusted library allocation
page read and write
2B0EE68F000
trusted library allocation
page read and write
1A1D94B8000
heap
page read and write
2B0F3306000
trusted library allocation
page read and write
23BAA490000
heap
page read and write
1A1D7639000
heap
page read and write
1A1D7658000
heap
page read and write
1A1DBB42000
heap
page read and write
1A1D95B8000
heap
page read and write
1A1D7621000
heap
page read and write
1A1D9097000
heap
page read and write
1A1D955E000
heap
page read and write
2B0F4A78000
trusted library allocation
page read and write
1A1D9078000
heap
page read and write
1A1D907C000
heap
page read and write
1A1D908A000
heap
page read and write
1A1D8FFE000
heap
page read and write
1A1D907E000
heap
page read and write
1A1D8FF0000
heap
page read and write
1A1D903A000
heap
page read and write
1A1D90B1000
heap
page read and write
1A1D8FFF000
heap
page read and write
2B0F22D0000
heap
page read and write
1A1D957C000
heap
page read and write
1A1DF658000
heap
page read and write
1A1D90B7000
heap
page read and write
1A1D90AE000
heap
page read and write
1A1DBB54000
heap
page read and write
2B0F31D8000
trusted library allocation
page read and write
1A1D904A000
heap
page read and write
2B0F31E1000
trusted library allocation
page read and write
1A1D75DF000
heap
page read and write
2B0F3395000
trusted library allocation
page read and write
1A1D955A000
heap
page read and write
1A1D9094000
heap
page read and write
1A1D903C000
heap
page read and write
1A1D8FEA000
heap
page read and write
2B0EE6EC000
trusted library allocation
page read and write
2A8EC380000
heap
page read and write
1A1D8FF9000
heap
page read and write
1A1D7640000
heap
page read and write
1A1D9096000
heap
page read and write
23BAA520000
heap
page read and write
1A1D90A2000
heap
page read and write
2A8EDAB0000
heap
page read and write
1A1D9675000
heap
page read and write
1A1D95DE000
heap
page read and write
1A1D7639000
heap
page read and write
1A1D955C000
heap
page read and write
2B0F633F000
trusted library allocation
page read and write
1A1D901C000
heap
page read and write
2B0F26BA000
trusted library allocation
page read and write
1A1DF636000
heap
page read and write
1A1D95B6000
heap
page read and write
1A1D90B8000
heap
page read and write
2A8EC32F000
heap
page read and write
1F066FA000
stack
page read and write
1A1D761B000
heap
page read and write
1A1D9027000
heap
page read and write
2B0F771F000
trusted library allocation
page read and write
7FF9CC3F0000
trusted library allocation
page execute and read and write
2A8EDF69000
heap
page read and write
1A1D901D000
heap
page read and write
2A8EE570000
heap
page read and write
1A1D9EB0000
heap
page read and write
2B0EE5D8000
trusted library allocation
page read and write
1A1D961B000
heap
page read and write
1A1D8FE9000
heap
page read and write
1A1D7635000
heap
page read and write
2A8EC6A0000
heap
page read and write
2A8EC312000
heap
page read and write
2B0F771B000
trusted library allocation
page read and write
1A1D9070000
heap
page read and write
23BAA615000
heap
page read and write
2B0F3350000
trusted library allocation
page read and write
2B0F774F000
trusted library allocation
page read and write
2B0F1C4A000
heap
page read and write
1A1D959F000
heap
page read and write
2A8D3840000
trusted library allocation
page read and write
1A1D8FFE000
heap
page read and write
1A1D966D000
heap
page read and write
1A1D908F000
heap
page read and write
1A1D761D000
heap
page read and write
1A1D75CF000
heap
page read and write
2B0F1B45000
heap
page read and write
2B0F559F000
trusted library allocation
page read and write
1A1D75FC000
heap
page read and write
1A1D901C000
heap
page read and write
2B0F65DD000
trusted library allocation
page read and write
1A1D9072000
heap
page read and write
2B0EE73C000
trusted library allocation
page read and write
1A1D963F000
heap
page read and write
2B0F4F23000
heap
page read and write
1A1D965F000
heap
page read and write
1A1D9040000
heap
page read and write
2B0F2582000
trusted library allocation
page read and write
2B0F3027000
trusted library allocation
page read and write
1A1D961B000
heap
page read and write
2B0F4C4C000
heap
page read and write
1A1D9070000
heap
page read and write
1A1D9070000
heap
page read and write
2A8D1E06000
heap
page read and write
2B0F2ECC000
trusted library allocation
page read and write
2B0F4E46000
heap
page read and write
2B0F1FA3000
trusted library allocation
page read and write
2B0F5255000
trusted library allocation
page read and write
1A1D909B000
heap
page read and write
1A1D762E000
heap
page read and write
1A1D7643000
heap
page read and write
7FF9CC35B000
trusted library allocation
page execute and read and write
2B0EE5DF000
trusted library allocation
page read and write
1A1D90A8000
heap
page read and write
1A1DBB55000
heap
page read and write
2A8EE540000
trusted library allocation
page read and write
2B0F5410000
trusted library allocation
page read and write
2B0F335C000
trusted library allocation
page read and write
2B0EE5EF000
trusted library allocation
page read and write
1A1D8FEE000
heap
page read and write
2B0EE620000
trusted library allocation
page read and write
1A1DF620000
heap
page read and write
1A1D95B6000
heap
page read and write
7FF9CC4E0000
trusted library allocation
page execute and read and write
1A1D8FC1000
heap
page read and write
1A1D908D000
heap
page read and write
1A1DBB55000
heap
page read and write
2B0F1FE4000
trusted library allocation
page read and write
7FF4F1CC0000
trusted library allocation
page execute and read and write
1A1D75CF000
heap
page read and write
1A1D9039000
heap
page read and write
2B0EE740000
trusted library allocation
page read and write
2B0F4D59000
heap
page read and write
2A8EE45E000
heap
page read and write
1A1D8FEF000
heap
page read and write
1A1D763B000
heap
page read and write
1A1D903D000
heap
page read and write
2B0EE6DC000
trusted library allocation
page read and write
2B0F22A7000
trusted library allocation
page read and write
1A1D75F1000
heap
page read and write
2B0F5448000
trusted library allocation
page read and write
1A1D909F000
heap
page read and write
2B0F3CB0000
trusted library allocation
page read and write
2B0F33A3000
trusted library allocation
page read and write
2A8EE54D000
trusted library allocation
page read and write
2B0F1EFC000
heap
page read and write
1A1D7643000
heap
page read and write
1A1D909F000
heap
page read and write
1A1D906A000
heap
page read and write
1F06AF8000
stack
page read and write
2B0EE730000
trusted library allocation
page read and write
1A1D8FF7000
heap
page read and write
1A1DF614000
heap
page read and write
2B0F2613000
trusted library allocation
page read and write
1A1D909F000
heap
page read and write
1A1D956A000
heap
page read and write
7FF9CC354000
trusted library allocation
page read and write
1F06FFB000
stack
page read and write
1A1D8FF1000
heap
page read and write
1A1D9626000
heap
page read and write
1A1DBB52000
heap
page read and write
7FF9CC610000
trusted library allocation
page read and write
7FF773FED000
unkown
page readonly
2A8EC522000
heap
page read and write
2B0F1E7C000
heap
page read and write
2A8EC326000
heap
page read and write
2B0EE658000
trusted library allocation
page read and write
1A1D9554000
heap
page read and write
2B0FA342000
heap
page read and write
2B0F4C42000
heap
page read and write
1A1D905A000
heap
page read and write
2B0FA3A4000
heap
page read and write
1A1DF5E0000
heap
page read and write
2B0F7AC7000
trusted library allocation
page read and write
2B0F1CCF000
heap
page read and write
7FF774173000
unkown
page readonly
2A8EC324000
heap
page read and write
1A1D8FDE000
heap
page read and write
1A1D765D000
heap
page read and write
1A1D75E7000
heap
page read and write
1A1D765A000
heap
page read and write
2B0F1B30000
heap
page read and write
1A1D8FF6000
heap
page read and write
1F06DF9000
stack
page read and write
2A8EC2DA000
heap
page read and write
D695BFE000
stack
page read and write
2B0F7E38000
heap
page read and write
2A8EC322000
heap
page read and write
1A1D9552000
heap
page read and write
1A1D9073000
heap
page read and write
2B0EE744000
trusted library allocation
page read and write
2B0F543B000
trusted library allocation
page read and write
1A1D75DF000
heap
page read and write
2B0F4D62000
heap
page read and write
1A1D90BA000
heap
page read and write
1A1DD820000
trusted library section
page read and write
2B0F1B40000
heap
page read and write
1A1D9647000
heap
page read and write
1A1D75D3000
heap
page read and write
2B0F65C9000
trusted library allocation
page read and write
2A8EC328000
heap
page read and write
1A1D955A000
heap
page read and write
1A1D9036000
heap
page read and write
2B0F2070000
trusted library allocation
page execute
1A1D764A000
heap
page read and write
2B0EE5CD000
trusted library allocation
page read and write
1A1D90B7000
heap
page read and write
D695FFB000
stack
page read and write
1A1D956A000
heap
page read and write
7FF9CC340000
trusted library allocation
page read and write
2B0F6EF0000
trusted library allocation
page read and write
1A1D902C000
heap
page read and write
2A8D39E0000
heap
page execute and read and write
1A1D90A8000
heap
page read and write
7FF9CC3E6000
trusted library allocation
page read and write
2A8EC500000
heap
page read and write
1A1D9040000
heap
page read and write
2B0F1E2D000
heap
page read and write
2B0F2F4E000
trusted library allocation
page read and write
2A8EC6A5000
heap
page read and write
1A1D7640000
heap
page read and write
1A1D9562000
heap
page read and write
1A1D906A000
heap
page read and write
1A1D9029000
heap
page read and write
1A1D9541000
heap
page read and write
2B0F5EF3000
trusted library allocation
page read and write
1A1D954F000
heap
page read and write
2B0F3B90000
trusted library allocation
page read and write
2B0F33A6000
trusted library allocation
page read and write
2B0EE587000
trusted library allocation
page read and write
2B0F22F9000
trusted library allocation
page read and write
1A1D7628000
heap
page read and write
1A1D7659000
heap
page read and write
1A1D8FCE000
heap
page read and write
2B0F2239000
trusted library allocation
page read and write
1A1D8FFF000
heap
page read and write
1A1D908D000
heap
page read and write
1A1D967C000
heap
page read and write
2B0F3430000
trusted library allocation
page read and write
2B0F1D9F000
heap
page read and write
2B0F2EC7000
trusted library allocation
page read and write
2B0F633B000
trusted library allocation
page read and write
1A1D7648000
heap
page read and write
1A1D909F000
heap
page read and write
2B0F659D000
trusted library allocation
page read and write
2B0F7E8A000
heap
page read and write
2B0F46A6000
trusted library allocation
page read and write
1A1D9480000
heap
page read and write
2B0FA130000
trusted library allocation
page read and write
1A1D75B0000
heap
page read and write
2A8EC593000
heap
page read and write
2B0F3460000
trusted library allocation
page read and write
1A1D962B000
heap
page read and write
1A1D90BE000
heap
page read and write
2B0F4BD0000
heap
page read and write
1F05FFE000
stack
page read and write
1A1D960F000
heap
page read and write
7FF77417E000
unkown
page readonly
2B0F25E4000
trusted library allocation
page read and write
2B0F3470000
trusted library allocation
page read and write
2B0F23B8000
heap
page read and write
1F05DFE000
stack
page read and write
2B0F3AF4000
trusted library allocation
page read and write
1A1D8FFE000
heap
page read and write
1A1DBB42000
heap
page read and write
1A1D9057000
heap
page read and write
2A8D3833000
heap
page read and write
1A1DBB50000
heap
page read and write
2B0EE678000
trusted library allocation
page read and write
2B0EE6E0000
trusted library allocation
page read and write
1A1DF616000
heap
page read and write
1A1D9094000
heap
page read and write
1A1D8FE0000
heap
page read and write
7FF4F1CA0000
trusted library allocation
page readonly
1A1D7647000
heap
page read and write
2B0F3BAB000
trusted library allocation
page read and write
1A1D7626000
heap
page read and write
D694BFD000
stack
page read and write
1A1D9026000
heap
page read and write
1A1D764D000
heap
page read and write
1A1D7630000
heap
page read and write
1A1D9043000
heap
page read and write
1A1D75FF000
heap
page read and write
2A8EE070000
heap
page execute and read and write
1A1D9230000
heap
page read and write
2B0F7EC6000
heap
page read and write
2B0EE5FD000
trusted library allocation
page read and write
2B0F343C000
trusted library allocation
page read and write
1A1DBB3A000
heap
page read and write
2B0F3100000
trusted library allocation
page read and write
1A1D7624000
heap
page read and write
1A1D7647000
heap
page read and write
1A1D904A000
heap
page read and write
2B0FA34A000
heap
page read and write
2B0F772E000
trusted library allocation
page read and write
7FF9CC350000
trusted library allocation
page read and write
2A8E3A01000
trusted library allocation
page read and write
1A1D94AA000
heap
page read and write
1A1D7615000
heap
page read and write
1A1D90B7000
heap
page read and write
1A1D90A0000
heap
page read and write
1A1D761E000
heap
page read and write
1A1D7628000
heap
page read and write
1A1D761D000
heap
page read and write
1A1D9012000
heap
page read and write
2B0F660C000
trusted library allocation
page read and write
D6937FD000
stack
page read and write
2B0F1C48000
heap
page read and write
2B0EE6FC000
trusted library allocation
page read and write
2B0F54F5000
trusted library allocation
page read and write
1A1D94FA000
heap
page read and write
1A1D9036000
heap
page read and write
1A1D9043000
heap
page read and write
2A8EE57D000
heap
page read and write
2B0F21A4000
trusted library allocation
page read and write
1A1D9260000
heap
page read and write
1F05CF2000
stack
page read and write
1A1D7619000
heap
page read and write
2B0F339E000
trusted library allocation
page read and write
2B0F48A4000
trusted library allocation
page read and write
2B0F2561000
trusted library allocation
page read and write
1A1D7633000
heap
page read and write
1A1D764A000
heap
page read and write
7FF774899000
unkown
page read and write
1A1D95EC000
heap
page read and write
2A8D1E78000
heap
page read and write
2B0EE6E8000
trusted library allocation
page read and write
2B0F4CAE000
heap
page read and write
2B0F1F58000
trusted library allocation
page read and write
2B0FA260000
trusted library allocation
page read and write
1A1D95EA000
heap
page read and write
1A1D94AB000
heap
page read and write
2B0F206E000
trusted library allocation
page read and write
1A1D95CA000
heap
page read and write
1A1D9585000
heap
page read and write
2A8EE444000
heap
page read and write
1A1D9036000
heap
page read and write
1A1D761C000
heap
page read and write
2A8EE02C000
heap
page read and write
1A1D90A3000
heap
page read and write
2A8EC392000
heap
page read and write
1A1D950F000
heap
page read and write
1A1DBB53000
heap
page read and write
2A8ED6B0000
trusted library allocation
page read and write
1A1D90A5000
heap
page read and write
2B0F7DB4000
heap
page read and write
1A1D959D000
heap
page read and write
2A8EDE30000
heap
page read and write
2B0F1EAE000
heap
page read and write
2B0F26B0000
trusted library allocation
page read and write
1A1D906A000
heap
page read and write
1A1D7770000
heap
page read and write
2A8EE549000
trusted library allocation
page read and write
1A1D9600000
heap
page read and write
1A1D90BA000
heap
page read and write
2A8D1D65000
heap
page read and write
1A1D7622000
heap
page read and write
1A1D762B000
heap
page read and write
2A8D1D80000
heap
page read and write
1A1D901D000
heap
page read and write
2B0F322C000
trusted library allocation
page read and write
1A1D8FE0000
heap
page read and write
2B0F5445000
trusted library allocation
page read and write
1A1D8FFF000
heap
page read and write
1A1D764D000
heap
page read and write
1A1D9039000
heap
page read and write
1A1D7624000
heap
page read and write
1A1D9555000
heap
page read and write
2B0F23C5000
heap
page read and write
2B0F2F30000
trusted library allocation
page read and write
1A1D90B0000
heap
page read and write
1A1D9092000
heap
page read and write
1A1D955E000
heap
page read and write
1A1D8FF6000
heap
page read and write
2B0F44C5000
trusted library allocation
page read and write
2A8EE543000
trusted library allocation
page read and write
2B0F1CA1000
heap
page read and write
1A1D90A5000
heap
page read and write
2B0F7D30000
heap
page read and write
1A1D9649000
heap
page read and write
2B0F336B000
trusted library allocation
page read and write
2B0F1D74000
heap
page read and write
1A1D75E3000
heap
page read and write
1A1D7624000
heap
page read and write
1A1D909A000
heap
page read and write
2A8EE468000
heap
page read and write
1A1D9013000
heap
page read and write
1A1D900D000
heap
page read and write
1A1D906C000
heap
page read and write
1F069F8000
stack
page read and write
1A1D9675000
heap
page read and write
1A1D760F000
heap
page read and write
1A1D903E000
heap
page read and write
2B0F5160000
trusted library allocation
page read and write
2B0F1DE9000
heap
page read and write
7FF9CC4D0000
trusted library allocation
page read and write
2B0F25CF000
trusted library allocation
page read and write
2A8D3793000
trusted library allocation
page read and write
1A1D75C5000
heap
page read and write
1A1D7639000
heap
page read and write
1A1D95CC000
heap
page read and write
1A1DCFB5000
heap
page read and write
2B0F25B0000
trusted library allocation
page read and write
1A1DBB55000
heap
page read and write
1F06BF8000
stack
page read and write
2B0EE58A000
trusted library allocation
page read and write
2B0F3CBD000
trusted library allocation
page read and write
1A1D904A000
heap
page read and write
1A1D948E000
heap
page read and write
1A1D7639000
heap
page read and write
1A1D7636000
heap
page read and write
2B0F31D0000
trusted library allocation
page read and write
2B0F5479000
trusted library allocation
page read and write
1A1D90BD000
heap
page read and write
1A1D75B5000
heap
page read and write
7FF773A50000
unkown
page readonly
1A1D90A8000
heap
page read and write
1A1D75EB000
heap
page read and write
1A1D8FEF000
heap
page read and write
1A1D7652000
heap
page read and write
1A1D955C000
heap
page read and write
23BAA370000
heap
page read and write
1A1D9562000
heap
page read and write
1A1D907A000
heap
page read and write
2B0F25E0000
trusted library allocation
page read and write
2A8EC314000
heap
page read and write
1A1D90A1000
heap
page read and write
1A1D95BC000
heap
page read and write
1A1D903E000
heap
page read and write
1A1D8FE5000
heap
page read and write
1A1D8FF9000
heap
page read and write
1A1DCF70000
heap
page read and write
2B0F310D000
trusted library allocation
page read and write
7FF773A51000
unkown
page execute read
2B0F585C000
trusted library allocation
page read and write
1A1D7650000
heap
page read and write
1A1D761B000
heap
page read and write
1A1D955E000
heap
page read and write
2A8EE461000
heap
page read and write
2A8EC2B0000
heap
page read and write
1A1D75B0000
heap
page read and write
1A1D7647000
heap
page read and write
2B0EE698000
trusted library allocation
page read and write
1A1D90B2000
heap
page read and write
1A1D959F000
heap
page read and write
2A8D1492000
unkown
page readonly
1A1D901B000
heap
page read and write
1A1D761A000
heap
page read and write
2B0F3468000
trusted library allocation
page read and write
1A1D7640000
heap
page read and write
1A1D902C000
heap
page read and write
1A1D9046000
heap
page read and write
1A1D950C000
heap
page read and write
1A1D90B7000
heap
page read and write
D696BFD000
stack
page read and write
1A1DBB4A000
heap
page read and write
1A1D906D000
heap
page read and write
1A1D9034000
heap
page read and write
1A1D75BB000
heap
page read and write
1A1DF620000
heap
page read and write
23BAA610000
heap
page read and write
1A1D905A000
heap
page read and write
2B0F1F9A000
trusted library allocation
page read and write
1A1D7656000
heap
page read and write
2B0FA3AE000
heap
page read and write
1A1D960F000
heap
page read and write
1A1D902A000
heap
page read and write
7FF7748FF000
unkown
page readonly
1A1DBB10000
heap
page read and write
1A1D8FEF000
heap
page read and write
2A8D1D40000
heap
page read and write
1A1D955C000
heap
page read and write
1A1D9667000
heap
page read and write
D6943FE000
stack
page read and write
2B0FA250000
trusted library allocation
page read and write
1A1D7648000
heap
page read and write
1A1D903E000
heap
page read and write
2A8EC55B000
heap
page read and write
1A1D9663000
heap
page read and write
1A1D95C4000
heap
page read and write
2B0EE687000
trusted library allocation
page read and write
2A8D3A73000
trusted library allocation
page read and write
2B0F7730000
trusted library allocation
page read and write
1F070FF000
stack
page read and write
1A1D90A2000
heap
page read and write
1A1DBB37000
heap
page read and write
1A1D7619000
heap
page read and write
7FF9CC4F4000
trusted library allocation
page read and write
2B0F1D1F000
heap
page read and write
1A1D762B000
heap
page read and write
1A1D906D000
heap
page read and write
2B0F262F000
trusted library allocation
page read and write
2B0F261C000
trusted library allocation
page read and write
7FF9CC600000
trusted library allocation
page read and write
1A1D9039000
heap
page read and write
1A1DBB55000
heap
page read and write
2B0F2610000
trusted library allocation
page read and write
7FF4F1CBB000
trusted library allocation
page execute read
1A1D9641000
heap
page read and write
2B0F4DB2000
heap
page read and write
1A1D909A000
heap
page read and write
1A1D9010000
heap
page read and write
2A8EE479000
heap
page read and write
1A1D764D000
heap
page read and write
2B0F4E3D000
heap
page read and write
7FF9CC33D000
trusted library allocation
page execute and read and write
2A8D1D75000
heap
page read and write
2A8E39F8000
trusted library allocation
page read and write
1A1D761B000
heap
page read and write
2B0F65BB000
trusted library allocation
page read and write
2B0F209C000
trusted library allocation
page read and write
1A1D9617000
heap
page read and write
1A1D95A5000
heap
page read and write
2B0FA33E000
heap
page read and write
2B0F6333000
trusted library allocation
page read and write
2B0EE60A000
trusted library allocation
page read and write
2B0EE684000
trusted library allocation
page read and write
1A1D764E000
heap
page read and write
1A1D9069000
heap
page read and write
D691CAF000
stack
page read and write
1A1D9085000
heap
page read and write
2A8D1D60000
heap
page read and write
1A1D9013000
heap
page read and write
1A1D95EF000
heap
page read and write
7FF4F1CB1000
trusted library allocation
page execute read
2A8EDF61000
heap
page read and write
1A1D95C6000
heap
page read and write
D6977FC000
trusted library allocation
page read and write
1F068FB000
stack
page read and write
2B0EE74B000
trusted library allocation
page read and write
1A1D75B7000
heap
page read and write
1A1D9086000
heap
page read and write
1A1D90B1000
heap
page read and write
2A8EE558000
trusted library allocation
page read and write
7FF4F1CA1000
trusted library allocation
page execute read
2B0FA230000
trusted library allocation
page read and write
1F06CFB000
stack
page read and write
1A1D9619000
heap
page read and write
1A1D9564000
heap
page read and write
1A1D8FE5000
heap
page read and write
1A1D7621000
heap
page read and write
1A1DBB53000
heap
page read and write
7FF9CC620000
trusted library allocation
page read and write
2B0F541F000
trusted library allocation
page read and write
2A8D1DA0000
heap
page read and write
1A1D9040000
heap
page read and write
1A1D9029000
heap
page read and write
2A8EDAC3000
heap
page read and write
1A1D905A000
heap
page read and write
7FF4F1CBA000
trusted library allocation
page readonly
1A1D962F000
heap
page read and write
7FF774267000
unkown
page write copy
1A1DD142000
trusted library allocation
page read and write
1A1D7622000
heap
page read and write
1A1D9012000
heap
page read and write
2B0EE6B8000
trusted library allocation
page read and write
2B0F2616000
trusted library allocation
page read and write
2B0F1EB9000
heap
page read and write
2B0F1D3E000
heap
page read and write
1A1D9563000
heap
page read and write
1A1D9039000
heap
page read and write
1A1D9643000
heap
page read and write
2B0F3EB6000
trusted library allocation
page read and write
D696FFE000
stack
page read and write
1A1D901D000
heap
page read and write
2B0F1B76000
heap
page read and write
1A1D90B7000
heap
page read and write
1A1D95CD000
heap
page read and write
2B0EE58E000
trusted library allocation
page read and write
2A8EC385000
heap
page read and write
2B0F6345000
trusted library allocation
page read and write
2A8D1D30000
heap
page read and write
1A1D9616000
heap
page read and write
1A1D9074000
heap
page read and write
1A1D75B8000
heap
page read and write
2B0EE6A9000
trusted library allocation
page read and write
7FF9CC564000
trusted library allocation
page read and write
1A1D7593000
heap
page read and write
7FF9CC5F0000
trusted library allocation
page read and write
1A1D95B0000
heap
page read and write
1A1D9014000
heap
page read and write
1A1D90A5000
heap
page read and write
1A1D9481000
heap
page read and write
1A1D8FE0000
heap
page read and write
2B0F3484000
trusted library allocation
page read and write
1A1D75BB000
heap
page read and write
1A1D9017000
heap
page read and write
1A1D9031000
heap
page read and write
2B0F3242000
trusted library allocation
page read and write
2A8D1E42000
heap
page read and write
2B0F65E2000
trusted library allocation
page read and write
2A8E39F1000
trusted library allocation
page read and write
2B0F4D6E000
heap
page read and write
1A1D761C000
heap
page read and write
2B0FA36C000
heap
page read and write
1A1D7567000
heap
page read and write
2B0EE68C000
trusted library allocation
page read and write
1A1D8FEA000
heap
page read and write
1A1D9076000
heap
page read and write
1A1D75B5000
heap
page read and write
7FF774870000
unkown
page read and write
7FF9CC3E0000
trusted library allocation
page read and write
7FF9CC5E0000
trusted library allocation
page read and write
1A1D904A000
heap
page read and write
2B0FA270000
heap
page read and write
1A1D7631000
heap
page read and write
1A1DBB3E000
heap
page read and write
1A1DF62F000
heap
page read and write
1A1D907A000
heap
page read and write
1A1D955C000
heap
page read and write
1A1D75E7000
heap
page read and write
2A8EC370000
heap
page read and write
1A1D904F000
heap
page read and write
1A1D9610000
heap
page read and write
2A8EDFC9000
heap
page read and write
2B0F65AA000
trusted library allocation
page read and write
2B0EE6D0000
trusted library allocation
page read and write
2A8D1C92000
unkown
page readonly
2B0F25FF000
trusted library allocation
page read and write
1A1D9022000
heap
page read and write
2B0EE5C3000
trusted library allocation
page read and write
1A1D9520000
heap
page read and write
1A1D9532000
heap
page read and write
1A1D9087000
heap
page read and write
2B0F1D23000
heap
page read and write
2A8EC2F9000
heap
page read and write
2B0F233E000
trusted library allocation
page read and write
1A1D965E000
heap
page read and write
1A1D9078000
heap
page read and write
2A8D3AA1000
trusted library allocation
page read and write
1A1D9092000
heap
page read and write
1A1D9670000
heap
page read and write
1A1D9096000
heap
page read and write
1A1DF615000
heap
page read and write
1A1D907A000
heap
page read and write
1A1DF5F6000
heap
page read and write
1A1DF658000
heap
page read and write
There are 1285 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.sumatrapdfreader.org/free-pdf-reader