Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PDFixers.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5IQBCSP1\css2[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\96LGQ1XY\email-decode.min[1].js
|
HTML document, ASCII text, with very long lines (1238)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\SQ5EF6KQ.htm
|
HTML document, ASCII text, with very long lines (10298), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NB937L4Q\font[1].eot
|
Embedded OpenType (EOT), Nunito Sans 12pt Light family
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 12:48:49 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-settings.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Desktop\SumatraPDF.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 16 12:47:34
2024, mtime=Tue Apr 16 12:47:34 2024, atime=Wed Oct 25 05:17:54 2023, length=16065496, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 101
|
PNG image data, 1040 x 1037, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 102
|
PNG image data, 1040 x 1037, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 103
|
ASCII text, with very long lines (1361), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 75
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 76
|
JPEG image data, progressive, precision 8, 400x400, components 3
|
dropped
|
||
Chrome Cache Entry: 77
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 78
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 79
|
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
Chrome Cache Entry: 80
|
JPEG image data, progressive, precision 8, 400x400, components 3
|
dropped
|
||
Chrome Cache Entry: 81
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 82
|
PNG image data, 400 x 400, 8-bit/color RGBA, interlaced
|
downloaded
|
||
Chrome Cache Entry: 83
|
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
|
downloaded
|
||
Chrome Cache Entry: 84
|
JPEG image data, progressive, precision 8, 400x400, components 3
|
downloaded
|
||
Chrome Cache Entry: 85
|
PNG image data, 400 x 400, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 86
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 87
|
JPEG image data, progressive, precision 8, 400x400, components 3
|
downloaded
|
||
Chrome Cache Entry: 88
|
ASCII text, with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 89
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 90
|
HTML document, Unicode text, UTF-8 text, with very long lines (506), with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 91
|
PNG image data, 53 x 80, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 92
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 93
|
JPEG image data, progressive, precision 8, 400x400, components 3
|
downloaded
|
||
Chrome Cache Entry: 94
|
PNG image data, 400 x 400, 8-bit/color RGBA, interlaced
|
dropped
|
||
Chrome Cache Entry: 95
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 96
|
PNG image data, 80 x 80, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 97
|
PNG image data, 400 x 400, 8-bit colormap, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 98
|
JPEG image data, progressive, precision 8, 400x400, components 3
|
dropped
|
||
Chrome Cache Entry: 99
|
PNG image data, 53 x 80, 8-bit/color RGB, non-interlaced
|
dropped
|
There are 34 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
||
C:\Users\user\AppData\Local\Temp\Temp1_PDFixers.zip\PDFixers.exe
|
"C:\Users\user\AppData\Local\Temp\Temp1_PDFixers.zip\PDFixers.exe"
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
|
"C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.sumatrapdfreader.org/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1940,i,11865487458500093638,9147501348541840663,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.sumatrapdfreader.org/favicon.ico
|
138.201.51.123
|
||
https://www.sumatrapdfreader.org/settings/settings3-5-1.html8.33
|
unknown
|
||
https://twitter.com/kjk
|
unknown
|
||
https://unavatar.io/twitter/@EnercoConseils
|
104.21.75.206
|
||
https://www.sumatrapdfreader.org/e.lllo
|
unknown
|
||
https://www.sumatrapdfreader.org/manualArialwebsiteArial
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/discussions/2316
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://pixel.pdfixers.com/G
|
unknown
|
||
https://pixel.pdfixers.com/https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/ema
|
unknown
|
||
https://scripts.sil.org/OFLNunito
|
unknown
|
||
http://docs.oasis-open.org/ns/office/1.2/meta/odf#StylesFile
|
unknown
|
||
https://stackoverflow.com/a/64554893
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
https://pixel.pdfixers.com/2
|
unknown
|
||
https://pixel.pdfixers.com/ll7
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.gribuser.ru/xml/fictionbook/2.0
|
unknown
|
||
https://pixel.pdfixers.com/7
|
unknown
|
||
https://scripts.sil.org/OFL
|
unknown
|
||
https://pixel.pdfixers.com/;
|
unknown
|
||
https://www.sumatrapdfreader.org/dl/prerel/PRE_RELEASE_VER/SumatraPDF-prerel
|
unknown
|
||
https://github.com/Fonthausen/NunitoSans)Thread-000019dc-Id-00000000:SubsetRegularVersion
|
unknown
|
||
https://pixel.pdfixers.com/9
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/CSS/scrollbar-gutter
|
unknown
|
||
https://www.sumatrapdfreader.org/update-check-rel.txtnotifUpdateCheckInProgress
|
unknown
|
||
https://pixel.pdfixers.com/?
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Keyboard-shortcutssumatrapdfrestrict.inihttps://www.sumatrapdf
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Version-history.html
|
unknown
|
||
http://www.daisy.org/z3986/2005/ncx/
|
unknown
|
||
https://pixel.pdfixers.com
|
unknown
|
||
https://pixel.pdfixers.com/-
|
unknown
|
||
http://www.idpf.org/2007/opfapplication/xhtml
|
unknown
|
||
http://grsmto.github.io/simplebar/
|
unknown
|
||
https://news.ycombinator.com/item?id=3327197
|
unknown
|
||
https://www.redditmedia.com/r/software/comments/j215uw/i_just_realized_that_windows_doesnt_have_a/g7
|
unknown
|
||
https://unavatar.io/twitter/@CRTejaswi
|
104.21.75.206
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
https://github.com/Fonthausen/NunitoSans)nu
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/commit/646d1feddcc80b3b51072c5b27a1446487904175)
|
unknown
|
||
http://docs.oasis-open.org/ns/office/1.2/meta/pkg#Document
|
unknown
|
||
https://www.sumatrapdfreader.org/download-free-pdf-viewer-------------
|
unknown
|
||
https://www.sumatrapdfreader.org/settings/settings3-5-1.html
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORShttps://github.com/sumatrapdfreade
|
unknown
|
||
https://www.sumatrapdfreader.org/update-check-rel.txt
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
https://twitter.com/ronaldnzimora/status/1259107209172131843
|
unknown
|
||
https://unavatar.io/twitter/@r0x12ul
|
104.21.75.206
|
||
https://www.redditmedia.com/r/Piracy/comments/u1m23x/good_windows_cbz_reader_other_than_cdisplayex/i
|
unknown
|
||
http://www.fontbureau.com/designers/frere-jones.html
|
unknown
|
||
https://www.sumatrapdfreader.org/img/homepage-small.png
|
138.201.51.123
|
||
https://www.redditmedia.com/r/ProgrammerHumor/comments/rgz0nk/i_dont_think_that_goes_in_the_console/
|
unknown
|
||
https://sumatra-website.onrender.com/update-check-rel.txtInstaller64LatestInstaller32InstallerArm64P
|
unknown
|
||
https://www.sumatrapdfreader.org/img/dialog-langs-small.png
|
138.201.51.123
|
||
https://files2.sumatrapdfreader.org/software/sumatrapdf/sumatralatest.js
|
104.26.9.244
|
||
https://news.ycombinator.com/item?id=576145
|
unknown
|
||
https://stackoverflow.com/questions/13054797/how-to-prevent-a-webkit-scrollbar-from-pushing-over-the
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Corrupted-installation
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Submit-crash-report.html
|
unknown
|
||
https://www.sumatrapdfreader.org/img/format-pdf-small.png
|
138.201.51.123
|
||
https://pixel.pdfixers.com/...
|
unknown
|
||
https://scripts.sil.org/OFLV
|
unknown
|
||
https://www.sumatrapdfreader.org/manual1
|
unknown
|
||
https://www.sumatrapdfreader.org/URLUpdateInfohttps://www.sumatrapdfreader.org/docs/Version-history.
|
unknown
|
||
https://www.sumatrapdfreader.org/sumatra.css
|
138.201.51.123
|
||
https://www.deepl.com/translator#-/$
|
unknown
|
||
https://pixel.pdfixers.com/...p
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js%
|
unknown
|
||
https://www.sumatrapdfreader.org/download-free-pdf-viewer
|
unknown
|
||
http://www.idpf.org/2007/opf
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORS6
|
unknown
|
||
https://pixel.pdfixers.com/ger
|
unknown
|
||
https://twitter.com/r0x12ul/status/1444901425234911234
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
|
unknown
|
||
https://www.sumatrapdfreader.org/img/format-epub-small.png
|
138.201.51.123
|
||
https://news.ycombinator.com/item?id=37988872
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://docs.oasis-open.org/ns/office/1.2/meta/odf#ContentFile
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://blog.kowalczyk.info
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
https://www.tweetic.io/create
|
unknown
|
||
https://csshint.com/css-box-shadow-examples/
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORS
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Contribute-translation
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
https://www.sumatrapdfreader.org/dl/rel/SumatraPDF-3.5.2
|
unknown
|
||
https://www.sumatrapdfreader.org0
|
unknown
|
||
https://www.sumatrapdfreader.org/
|
138.201.51.123
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pixel.pdfixers.com
|
172.67.147.142
|
||
unavatar.io
|
104.21.75.206
|
||
www.sumatrapdfreader.org
|
138.201.51.123
|
||
files2.sumatrapdfreader.org
|
104.26.9.244
|
||
www.google.com
|
64.233.177.104
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.75.206
|
unavatar.io
|
United States
|
||
192.168.2.17
|
unknown
|
unknown
|
||
172.67.181.251
|
unknown
|
United States
|
||
104.26.9.244
|
files2.sumatrapdfreader.org
|
United States
|
||
64.233.177.104
|
www.google.com
|
United States
|
||
138.201.51.123
|
www.sumatrapdfreader.org
|
Germany
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.67.147.142
|
pixel.pdfixers.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SumatraPDFUninstall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SumatraPDFUninstall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\GPU
|
AdapterInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
|
1
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
|
NodeSlot
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell
|
SniffedFolderType
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d5ad0dfbb57c2e\b258eb92
|
@{microsoft.windows.photos_2019.19071.12548.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.windows.photos/files/assets/photoslogoextensions.png}
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
|
MRUListEx
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
|
MRUListEx
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
Mode
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
LogicalViewMode
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
FFlags
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
IconSize
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
Sort
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
ColInfo
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
GroupView
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
GroupByKey:FMTID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
GroupByKey:PID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
GroupByDirection
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CIDOpen\Modules\GlobalSettings\ProperTreeModuleInner
|
ProperTreeModuleInner
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
|
NodeSlots
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
FFlags
|
There are 22 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A1D75C2000
|
heap
|
page read and write
|
||
2A8EC2D8000
|
heap
|
page read and write
|
||
2B0F4FA5000
|
heap
|
page read and write
|
||
2A8D1490000
|
unkown
|
page readonly
|
||
2B0EE5DA000
|
trusted library allocation
|
page read and write
|
||
1A1D900F000
|
heap
|
page read and write
|
||
1A1D965E000
|
heap
|
page read and write
|
||
1A1D9040000
|
heap
|
page read and write
|
||
7FF9CC35D000
|
trusted library allocation
|
page execute and read and write
|
||
1A1D7635000
|
heap
|
page read and write
|
||
7FF9CC450000
|
trusted library allocation
|
page execute and read and write
|
||
1A1D966B000
|
heap
|
page read and write
|
||
2B0F340C000
|
trusted library allocation
|
page read and write
|
||
1A1D7560000
|
heap
|
page read and write
|
||
1A1D9559000
|
heap
|
page read and write
|
||
1A1D75CA000
|
heap
|
page read and write
|
||
2B0F1F2E000
|
heap
|
page read and write
|
||
2A8EC248000
|
trusted library allocation
|
page read and write
|
||
1A1D7630000
|
heap
|
page read and write
|
||
1A1D908F000
|
heap
|
page read and write
|
||
1A1D9000000
|
heap
|
page read and write
|
||
1A1D967E000
|
heap
|
page read and write
|
||
2B0F33B7000
|
trusted library allocation
|
page read and write
|
||
2A8D39C0000
|
heap
|
page read and write
|
||
1A1DBB41000
|
heap
|
page read and write
|
||
D69200D000
|
stack
|
page read and write
|
||
2B0F22B4000
|
trusted library allocation
|
page read and write
|
||
2B0F2589000
|
trusted library allocation
|
page read and write
|
||
1A1D9040000
|
heap
|
page read and write
|
||
1A1D9504000
|
heap
|
page read and write
|
||
1A1D9535000
|
heap
|
page read and write
|
||
2B0F3210000
|
trusted library allocation
|
page read and write
|
||
2B0F2630000
|
trusted library allocation
|
page read and write
|
||
2B0F3392000
|
trusted library allocation
|
page read and write
|
||
1A1D901F000
|
heap
|
page read and write
|
||
1A1D75F5000
|
heap
|
page read and write
|
||
1A1D9491000
|
heap
|
page read and write
|
||
1A1D7606000
|
heap
|
page read and write
|
||
1A1D8FE5000
|
heap
|
page read and write
|
||
2B0EE628000
|
trusted library allocation
|
page read and write
|
||
7FF9CC416000
|
trusted library allocation
|
page execute and read and write
|
||
1A1D7619000
|
heap
|
page read and write
|
||
2A8D1DF0000
|
trusted library allocation
|
page read and write
|
||
2B0F2EAE000
|
trusted library allocation
|
page read and write
|
||
2B0F23BF000
|
heap
|
page read and write
|
||
1A1D75D9000
|
heap
|
page read and write
|
||
1A1D9529000
|
heap
|
page read and write
|
||
2B0F3D36000
|
trusted library allocation
|
page read and write
|
||
1A1D9476000
|
heap
|
page read and write
|
||
1A1D8FEF000
|
heap
|
page read and write
|
||
2A8D3780000
|
trusted library allocation
|
page read and write
|
||
1A1D7648000
|
heap
|
page read and write
|
||
1A1D9092000
|
heap
|
page read and write
|
||
1A1D75E7000
|
heap
|
page read and write
|
||
1A1D9081000
|
heap
|
page read and write
|
||
2A8EC2C1000
|
heap
|
page read and write
|
||
7FF9CC5CB000
|
trusted library allocation
|
page read and write
|
||
1A1D764D000
|
heap
|
page read and write
|
||
1A1D9665000
|
heap
|
page read and write
|
||
2B0F5451000
|
trusted library allocation
|
page read and write
|
||
1A1D9550000
|
heap
|
page read and write
|
||
2B0F260C000
|
trusted library allocation
|
page read and write
|
||
1A1D75AD000
|
heap
|
page read and write
|
||
2A8D1E2C000
|
heap
|
page read and write
|
||
2B0F3E70000
|
trusted library allocation
|
page read and write
|
||
1A1D9070000
|
heap
|
page read and write
|
||
1A1D7619000
|
heap
|
page read and write
|
||
1A1D90A5000
|
heap
|
page read and write
|
||
2B0F4DF6000
|
heap
|
page read and write
|
||
1A1D94B8000
|
heap
|
page read and write
|
||
2B0F1D4E000
|
heap
|
page read and write
|
||
1A1D763A000
|
heap
|
page read and write
|
||
1A1D763A000
|
heap
|
page read and write
|
||
1A1D901D000
|
heap
|
page read and write
|
||
1A1DCF90000
|
heap
|
page read and write
|
||
1A1D763C000
|
heap
|
page read and write
|
||
2B0F26C7000
|
trusted library allocation
|
page read and write
|
||
7FF9CC630000
|
trusted library allocation
|
page execute and read and write
|
||
1F065F8000
|
stack
|
page read and write
|
||
1A1D908F000
|
heap
|
page read and write
|
||
1A1D7612000
|
heap
|
page read and write
|
||
2B0FA110000
|
trusted library allocation
|
page read and write
|
||
1F062FE000
|
stack
|
page read and write
|
||
1A1D761D000
|
heap
|
page read and write
|
||
2B0F3429000
|
trusted library allocation
|
page read and write
|
||
2B0F4F06000
|
heap
|
page read and write
|
||
1A1D764C000
|
heap
|
page read and write
|
||
1A1D90B0000
|
heap
|
page read and write
|
||
1A1D7625000
|
heap
|
page read and write
|
||
7FF9CC342000
|
trusted library allocation
|
page read and write
|
||
2B0F322F000
|
trusted library allocation
|
page read and write
|
||
2B0EE585000
|
trusted library allocation
|
page read and write
|
||
2B0F301A000
|
trusted library allocation
|
page read and write
|
||
1A1D904A000
|
heap
|
page read and write
|
||
2B0F5612000
|
trusted library allocation
|
page read and write
|
||
D691CFE000
|
stack
|
page read and write
|
||
1A1D75F5000
|
heap
|
page read and write
|
||
1A1D955E000
|
heap
|
page read and write
|
||
2B0F4CEC000
|
heap
|
page read and write
|
||
2A8EE440000
|
heap
|
page read and write
|
||
7FF774171000
|
unkown
|
page readonly
|
||
1A1D9092000
|
heap
|
page read and write
|
||
1A1DBB3E000
|
heap
|
page read and write
|
||
2B0F2575000
|
trusted library allocation
|
page read and write
|
||
1A1D95AF000
|
heap
|
page read and write
|
||
1A1D94B8000
|
heap
|
page read and write
|
||
2B0F1F41000
|
trusted library allocation
|
page read and write
|
||
1A1D8FF6000
|
heap
|
page read and write
|
||
2A8D1E0C000
|
heap
|
page read and write
|
||
2B0F7EBD000
|
heap
|
page read and write
|
||
2A8EC320000
|
heap
|
page read and write
|
||
2B0F25FC000
|
trusted library allocation
|
page read and write
|
||
1A1D763C000
|
heap
|
page read and write
|
||
1A1D90AD000
|
heap
|
page read and write
|
||
1A1D958D000
|
heap
|
page read and write
|
||
2B0F33C1000
|
trusted library allocation
|
page read and write
|
||
1A1D9085000
|
heap
|
page read and write
|
||
2B0EE6C5000
|
trusted library allocation
|
page read and write
|
||
1A1D94AA000
|
heap
|
page read and write
|
||
1A1D90A2000
|
heap
|
page read and write
|
||
1A1D7624000
|
heap
|
page read and write
|
||
2B0F5435000
|
trusted library allocation
|
page read and write
|
||
1A1D952C000
|
heap
|
page read and write
|
||
1A1D9040000
|
heap
|
page read and write
|
||
1A1D900E000
|
heap
|
page read and write
|
||
1A1D95CD000
|
heap
|
page read and write
|
||
1A1D764D000
|
heap
|
page read and write
|
||
D6973FE000
|
stack
|
page read and write
|
||
2A8D149C000
|
unkown
|
page readonly
|
||
1A1D9543000
|
heap
|
page read and write
|
||
2B0F4CEE000
|
heap
|
page read and write
|
||
2B0F260A000
|
trusted library allocation
|
page read and write
|
||
2B0F2F34000
|
trusted library allocation
|
page read and write
|
||
1A1D9565000
|
heap
|
page read and write
|
||
2B0F65C3000
|
trusted library allocation
|
page read and write
|
||
2B0F3478000
|
trusted library allocation
|
page read and write
|
||
2B0F6596000
|
trusted library allocation
|
page read and write
|
||
EA29BFC000
|
stack
|
page read and write
|
||
1A1D958E000
|
heap
|
page read and write
|
||
23BAA290000
|
heap
|
page read and write
|
||
1A1D75C5000
|
heap
|
page read and write
|
||
2A8EC58A000
|
heap
|
page read and write
|
||
2B0F339A000
|
trusted library allocation
|
page read and write
|
||
1A1D7619000
|
heap
|
page read and write
|
||
1A1D906D000
|
heap
|
page read and write
|
||
1F067F8000
|
stack
|
page read and write
|
||
1A1D900F000
|
heap
|
page read and write
|
||
2B0FA150000
|
trusted library allocation
|
page read and write
|
||
2B0F3424000
|
trusted library allocation
|
page read and write
|
||
1A1D7616000
|
heap
|
page read and write
|
||
1A1D90AE000
|
heap
|
page read and write
|
||
1A1D90B9000
|
heap
|
page read and write
|
||
1A1DF685000
|
heap
|
page read and write
|
||
D691D4E000
|
stack
|
page read and write
|
||
1A1D8FEF000
|
heap
|
page read and write
|
||
2A8EC396000
|
heap
|
page read and write
|
||
1A1D7658000
|
heap
|
page read and write
|
||
1A1D90B7000
|
heap
|
page read and write
|
||
1A1D8FFF000
|
heap
|
page read and write
|
||
2B0F34A0000
|
trusted library allocation
|
page read and write
|
||
2A8EE471000
|
heap
|
page read and write
|
||
1A1D901D000
|
heap
|
page read and write
|
||
1A1D9499000
|
heap
|
page read and write
|
||
1A1D901C000
|
heap
|
page read and write
|
||
1A1D9036000
|
heap
|
page read and write
|
||
1A1D9079000
|
heap
|
page read and write
|
||
2A8D1E6F000
|
heap
|
page read and write
|
||
1A1D901B000
|
heap
|
page read and write
|
||
2B0EE5C0000
|
trusted library allocation
|
page read and write
|
||
7FF9CC333000
|
trusted library allocation
|
page execute and read and write
|
||
1A1D764A000
|
heap
|
page read and write
|
||
1A1D9029000
|
heap
|
page read and write
|
||
1A1D780D000
|
heap
|
page read and write
|
||
2B0EE722000
|
trusted library allocation
|
page read and write
|
||
2B0EE750000
|
trusted library allocation
|
page read and write
|
||
1A1D90B9000
|
heap
|
page read and write
|
||
1A1D8FF6000
|
heap
|
page read and write
|
||
1A1D7652000
|
heap
|
page read and write
|
||
1A1D7628000
|
heap
|
page read and write
|
||
2B0F3444000
|
trusted library allocation
|
page read and write
|
||
2B0EE5F2000
|
trusted library allocation
|
page read and write
|
||
2B0FA34E000
|
heap
|
page read and write
|
||
1A1D9586000
|
heap
|
page read and write
|
||
1A1D7644000
|
heap
|
page read and write
|
||
D693BFE000
|
stack
|
page read and write
|
||
7FF9CC5FD000
|
trusted library allocation
|
page read and write
|
||
1A1D75EF000
|
heap
|
page read and write
|
||
1A1D9034000
|
heap
|
page read and write
|
||
1A1D7632000
|
heap
|
page read and write
|
||
1A1D955E000
|
heap
|
page read and write
|
||
2A8D1E40000
|
heap
|
page read and write
|
||
1A1D95B3000
|
heap
|
page read and write
|
||
1A1D9621000
|
heap
|
page read and write
|
||
2B0F3BA4000
|
trusted library allocation
|
page read and write
|
||
1A1D9667000
|
heap
|
page read and write
|
||
1A1D75EB000
|
heap
|
page read and write
|
||
2B0EE5FF000
|
trusted library allocation
|
page read and write
|
||
2B0F7EB3000
|
heap
|
page read and write
|
||
1A1D90A5000
|
heap
|
page read and write
|
||
1A1D9080000
|
heap
|
page read and write
|
||
1A1D901B000
|
heap
|
page read and write
|
||
EA29EFF000
|
stack
|
page read and write
|
||
7FF7748A5000
|
unkown
|
page read and write
|
||
1A1D9080000
|
heap
|
page read and write
|
||
2B0F2EA7000
|
trusted library allocation
|
page read and write
|
||
2B0EE720000
|
trusted library allocation
|
page read and write
|
||
1A1D75FB000
|
heap
|
page read and write
|
||
1A1D7633000
|
heap
|
page read and write
|
||
2B0F1F98000
|
trusted library allocation
|
page read and write
|
||
1A1D955E000
|
heap
|
page read and write
|
||
1A1D9080000
|
heap
|
page read and write
|
||
1A1DB310000
|
trusted library allocation
|
page read and write
|
||
2A8EE01C000
|
heap
|
page read and write
|
||
1A1D9081000
|
heap
|
page read and write
|
||
2B0F1C60000
|
heap
|
page read and write
|
||
1A1D9039000
|
heap
|
page read and write
|
||
2B0F65A3000
|
trusted library allocation
|
page read and write
|
||
1A1D905A000
|
heap
|
page read and write
|
||
2A8EC31C000
|
heap
|
page read and write
|
||
1A1D7650000
|
heap
|
page read and write
|
||
2B0F1FDC000
|
trusted library allocation
|
page read and write
|
||
1A1D95D9000
|
heap
|
page read and write
|
||
1A1D907A000
|
heap
|
page read and write
|
||
1A1D95BC000
|
heap
|
page read and write
|
||
7FF9CC562000
|
trusted library allocation
|
page read and write
|
||
1A1D903C000
|
heap
|
page read and write
|
||
1A1D9620000
|
heap
|
page read and write
|
||
1A1D90AE000
|
heap
|
page read and write
|
||
2B0F264A000
|
trusted library allocation
|
page read and write
|
||
2B0FA2BD000
|
heap
|
page read and write
|
||
2B0F3498000
|
trusted library allocation
|
page read and write
|
||
EA29F7E000
|
stack
|
page read and write
|
||
1A1D9081000
|
heap
|
page read and write
|
||
1A1D902A000
|
heap
|
page read and write
|
||
1A1D9045000
|
heap
|
page read and write
|
||
1A1D966B000
|
heap
|
page read and write
|
||
2B0F1D46000
|
heap
|
page read and write
|
||
1A1D7630000
|
heap
|
page read and write
|
||
7FF9CC3EC000
|
trusted library allocation
|
page execute and read and write
|
||
2B0FA125000
|
trusted library allocation
|
page read and write
|
||
1A1D9031000
|
heap
|
page read and write
|
||
2B0EE61D000
|
trusted library allocation
|
page read and write
|
||
2B0F773D000
|
trusted library allocation
|
page read and write
|
||
1A1D964D000
|
heap
|
page read and write
|
||
1A1D75EA000
|
heap
|
page read and write
|
||
1A1D904A000
|
heap
|
page read and write
|
||
2B0F65B7000
|
trusted library allocation
|
page read and write
|
||
2A8EC32C000
|
heap
|
page read and write
|
||
1A1D95B0000
|
heap
|
page read and write
|
||
1A1D908E000
|
heap
|
page read and write
|
||
2B0F25D6000
|
trusted library allocation
|
page read and write
|
||
7FF4F1CB8000
|
trusted library allocation
|
page readonly
|
||
2A8EC38B000
|
heap
|
page read and write
|
||
2B0EE618000
|
trusted library allocation
|
page read and write
|
||
1A1D8FED000
|
heap
|
page read and write
|
||
2B0F31E3000
|
trusted library allocation
|
page read and write
|
||
1A1D7614000
|
heap
|
page read and write
|
||
1A1D760E000
|
heap
|
page read and write
|
||
1A1D966D000
|
heap
|
page read and write
|
||
2B0F200F000
|
trusted library allocation
|
page read and write
|
||
2B0F7DF6000
|
heap
|
page read and write
|
||
1A1D9639000
|
heap
|
page read and write
|
||
1A1D907E000
|
heap
|
page read and write
|
||
1A1D762F000
|
heap
|
page read and write
|
||
1A1D906A000
|
heap
|
page read and write
|
||
1A1D762B000
|
heap
|
page read and write
|
||
1A1D90B8000
|
heap
|
page read and write
|
||
1A1D95DC000
|
heap
|
page read and write
|
||
1A1D95B3000
|
heap
|
page read and write
|
||
1A1D960F000
|
heap
|
page read and write
|
||
1A1D90A5000
|
heap
|
page read and write
|
||
2B0EE5E8000
|
trusted library allocation
|
page read and write
|
||
2A8EC1A0000
|
heap
|
page read and write
|
||
1A1D9036000
|
heap
|
page read and write
|
||
1A1D901B000
|
heap
|
page read and write
|
||
1A1D7648000
|
heap
|
page read and write
|
||
1A1D95B0000
|
heap
|
page read and write
|
||
1A1D906A000
|
heap
|
page read and write
|
||
1A1D763A000
|
heap
|
page read and write
|
||
2B0F65D0000
|
trusted library allocation
|
page read and write
|
||
1A1D903B000
|
heap
|
page read and write
|
||
7FF9CC34D000
|
trusted library allocation
|
page execute and read and write
|
||
1A1D9559000
|
heap
|
page read and write
|
||
1A1D764D000
|
heap
|
page read and write
|
||
1A1D7603000
|
heap
|
page read and write
|
||
1A1D962F000
|
heap
|
page read and write
|
||
7FF4F1CB4000
|
trusted library allocation
|
page readonly
|
||
1A1D9070000
|
heap
|
page read and write
|
||
2A8EC2C5000
|
heap
|
page read and write
|
||
2A8D37D0000
|
heap
|
page read and write
|
||
2B0F3C9F000
|
trusted library allocation
|
page read and write
|
||
2A8EDAC1000
|
heap
|
page read and write
|
||
2A8EC240000
|
trusted library allocation
|
page read and write
|
||
1A1D955E000
|
heap
|
page read and write
|
||
2A8EC57E000
|
heap
|
page read and write
|
||
2B0F33F8000
|
trusted library allocation
|
page read and write
|
||
2B0F25B5000
|
trusted library allocation
|
page read and write
|
||
2B0F33F0000
|
trusted library allocation
|
page read and write
|
||
D6957FE000
|
stack
|
page read and write
|
||
1A1D9567000
|
heap
|
page read and write
|
||
1A1D75BD000
|
heap
|
page read and write
|
||
2A8D1CA4000
|
unkown
|
page readonly
|
||
1A1D95B6000
|
heap
|
page read and write
|
||
D6953FB000
|
stack
|
page read and write
|
||
1A1D765D000
|
heap
|
page read and write
|
||
1A1D7650000
|
heap
|
page read and write
|
||
7FF4F1CB5000
|
trusted library allocation
|
page execute read
|
||
1A1D90C4000
|
heap
|
page read and write
|
||
1A1D7656000
|
heap
|
page read and write
|
||
1A1D75B9000
|
heap
|
page read and write
|
||
1A1D75D4000
|
heap
|
page read and write
|
||
1A1D7605000
|
heap
|
page read and write
|
||
2B0F1C8C000
|
heap
|
page read and write
|
||
1A1D9430000
|
trusted library section
|
page readonly
|
||
1A1D9593000
|
heap
|
page read and write
|
||
1A1DBB3B000
|
heap
|
page read and write
|
||
1A1D762B000
|
heap
|
page read and write
|
||
2A8EE458000
|
heap
|
page read and write
|
||
2B0EE6F8000
|
trusted library allocation
|
page read and write
|
||
2B0EE674000
|
trusted library allocation
|
page read and write
|
||
1A1D903D000
|
heap
|
page read and write
|
||
2B0F22B0000
|
trusted library allocation
|
page read and write
|
||
1A1D7658000
|
heap
|
page read and write
|
||
2B0F30F0000
|
trusted library allocation
|
page read and write
|
||
2A8EC394000
|
heap
|
page read and write
|
||
2B0F200A000
|
trusted library allocation
|
page read and write
|
||
1A1D907C000
|
heap
|
page read and write
|
||
2B0F4E88000
|
heap
|
page read and write
|
||
1A1D908F000
|
heap
|
page read and write
|
||
2B0F2607000
|
trusted library allocation
|
page read and write
|
||
1A1D90AE000
|
heap
|
page read and write
|
||
1A1D9040000
|
heap
|
page read and write
|
||
1A1D8FF6000
|
heap
|
page read and write
|
||
2B0EE700000
|
trusted library allocation
|
page read and write
|
||
2B0F65DA000
|
trusted library allocation
|
page read and write
|
||
1A1D9582000
|
heap
|
page read and write
|
||
2A8EC517000
|
heap
|
page read and write
|
||
1A1DBB22000
|
heap
|
page read and write
|
||
1A1D764F000
|
heap
|
page read and write
|
||
1A1DBB37000
|
heap
|
page read and write
|
||
2A8D39F1000
|
trusted library allocation
|
page read and write
|
||
2B0EE670000
|
trusted library allocation
|
page read and write
|
||
1A1D9036000
|
heap
|
page read and write
|
||
1A1D9014000
|
heap
|
page read and write
|
||
1A1D75F8000
|
heap
|
page read and write
|
||
1A1D9610000
|
heap
|
page read and write
|
||
2B0F2134000
|
trusted library allocation
|
page read and write
|
||
2B0EE638000
|
trusted library allocation
|
page read and write
|
||
1A1D9250000
|
unkown
|
page read and write
|
||
1A1D8FDE000
|
heap
|
page read and write
|
||
2B0F1CD6000
|
heap
|
page read and write
|
||
2B0F2350000
|
heap
|
page read and write
|
||
1A1D7645000
|
heap
|
page read and write
|
||
1A1D9080000
|
heap
|
page read and write
|
||
2A8EE55B000
|
trusted library allocation
|
page read and write
|
||
2B0EE738000
|
trusted library allocation
|
page read and write
|
||
2B0F33AB000
|
trusted library allocation
|
page read and write
|
||
1A1D90B7000
|
heap
|
page read and write
|
||
1A1D75DF000
|
heap
|
page read and write
|
||
1A1DF64F000
|
heap
|
page read and write
|
||
1A1D9638000
|
heap
|
page read and write
|
||
2A8E3A07000
|
trusted library allocation
|
page read and write
|
||
1A1D9036000
|
heap
|
page read and write
|
||
2A8EC2DC000
|
heap
|
page read and write
|
||
1A1D9038000
|
heap
|
page read and write
|
||
2B0F336D000
|
trusted library allocation
|
page read and write
|
||
2A8EC398000
|
heap
|
page read and write
|
||
2A8EE476000
|
heap
|
page read and write
|
||
2B0F1D0B000
|
heap
|
page read and write
|
||
2B0F5439000
|
trusted library allocation
|
page read and write
|
||
1A1D94B8000
|
heap
|
page read and write
|
||
2B0EE665000
|
trusted library allocation
|
page read and write
|
||
2B0F65EF000
|
trusted library allocation
|
page read and write
|
||
1A1D8FE7000
|
heap
|
page read and write
|
||
7FF773FED000
|
unkown
|
page readonly
|
||
1A1D7633000
|
heap
|
page read and write
|
||
1A1D903E000
|
heap
|
page read and write
|
||
2B0F7E7A000
|
heap
|
page read and write
|
||
1A1D9548000
|
heap
|
page read and write
|
||
2B0F2622000
|
trusted library allocation
|
page read and write
|
||
2B0F25D0000
|
trusted library allocation
|
page read and write
|
||
1A1D9567000
|
heap
|
page read and write
|
||
2B0F2306000
|
trusted library allocation
|
page read and write
|
||
2B0F1D9D000
|
heap
|
page read and write
|
||
1A1D90AE000
|
heap
|
page read and write
|
||
2B0F4C45000
|
heap
|
page read and write
|
||
2A8D1E00000
|
heap
|
page read and write
|
||
1A1D7652000
|
heap
|
page read and write
|
||
1A1D90B8000
|
heap
|
page read and write
|
||
2A8D3890000
|
heap
|
page read and write
|
||
1A1D9526000
|
heap
|
page read and write
|
||
1A1D9031000
|
heap
|
page read and write
|
||
2B0F1C92000
|
heap
|
page read and write
|
||
2B0F5C15000
|
trusted library allocation
|
page read and write
|
||
1A1D761B000
|
heap
|
page read and write
|
||
1A1D900F000
|
heap
|
page read and write
|
||
2B0F25E2000
|
trusted library allocation
|
page read and write
|
||
2B0F25E6000
|
trusted library allocation
|
page read and write
|
||
1A1D907E000
|
heap
|
page read and write
|
||
2B0EE5FB000
|
trusted library allocation
|
page read and write
|
||
1A1D9615000
|
heap
|
page read and write
|
||
1A1D7647000
|
heap
|
page read and write
|
||
2B0F2641000
|
trusted library allocation
|
page read and write
|
||
1F061FF000
|
stack
|
page read and write
|
||
2B0F25F0000
|
trusted library allocation
|
page read and write
|
||
1A1D9098000
|
heap
|
page read and write
|
||
1A1D7633000
|
heap
|
page read and write
|
||
1F06EFB000
|
stack
|
page read and write
|
||
7FF77488F000
|
unkown
|
page read and write
|
||
2B0F323E000
|
trusted library allocation
|
page read and write
|
||
1A1D9678000
|
heap
|
page read and write
|
||
1A1D95A4000
|
heap
|
page read and write
|
||
2A8EE46C000
|
heap
|
page read and write
|
||
7FF774886000
|
unkown
|
page read and write
|
||
2B0F3420000
|
trusted library allocation
|
page read and write
|
||
1A1D764A000
|
heap
|
page read and write
|
||
1A1D901D000
|
heap
|
page read and write
|
||
D693FFF000
|
stack
|
page read and write
|
||
1A1D966B000
|
heap
|
page read and write
|
||
2B0FA380000
|
heap
|
page read and write
|
||
2B0EE72B000
|
trusted library allocation
|
page read and write
|
||
2B0F31C0000
|
trusted library allocation
|
page read and write
|
||
1A1D9095000
|
heap
|
page read and write
|
||
1A1D9057000
|
heap
|
page read and write
|
||
1A1D8FEA000
|
heap
|
page read and write
|
||
1A1D963F000
|
heap
|
page read and write
|
||
1A1D8FC0000
|
heap
|
page read and write
|
||
2B0F533F000
|
trusted library allocation
|
page read and write
|
||
1A1D9073000
|
heap
|
page read and write
|
||
2B0F1D42000
|
heap
|
page read and write
|
||
2B0F7AB0000
|
trusted library allocation
|
page read and write
|
||
1A1D95EA000
|
heap
|
page read and write
|
||
1A1D9029000
|
heap
|
page read and write
|
||
2A8EC3A5000
|
heap
|
page read and write
|
||
1A1D958B000
|
heap
|
page read and write
|
||
D6963FE000
|
stack
|
page read and write
|
||
1A1D760C000
|
heap
|
page read and write
|
||
7FF9CC5D0000
|
trusted library allocation
|
page read and write
|
||
2B0F7E92000
|
heap
|
page read and write
|
||
1A1D9021000
|
heap
|
page read and write
|
||
1A1DBB4F000
|
heap
|
page read and write
|
||
2B0F1F50000
|
trusted library allocation
|
page read and write
|
||
1A1D8FD0000
|
heap
|
page read and write
|
||
1A1D966E000
|
heap
|
page read and write
|
||
1A1D77C0000
|
heap
|
page read and write
|
||
2B0EE6F0000
|
trusted library allocation
|
page read and write
|
||
2B0F1C6E000
|
heap
|
page read and write
|
||
1A1D8FEA000
|
heap
|
page read and write
|
||
2B0F7E7E000
|
heap
|
page read and write
|
||
1A1D9036000
|
heap
|
page read and write
|
||
2B0F5472000
|
trusted library allocation
|
page read and write
|
||
2B0F208E000
|
trusted library allocation
|
page read and write
|
||
1A1D7648000
|
heap
|
page read and write
|
||
2A8EC34E000
|
heap
|
page read and write
|
||
2A8E3A14000
|
trusted library allocation
|
page read and write
|
||
2A8EC4F0000
|
heap
|
page read and write
|
||
1A1D9487000
|
heap
|
page read and write
|
||
2B0F4CCD000
|
heap
|
page read and write
|
||
1A1D763C000
|
heap
|
page read and write
|
||
1A1D7619000
|
heap
|
page read and write
|
||
1A1D7633000
|
heap
|
page read and write
|
||
1A1D9553000
|
heap
|
page read and write
|
||
1A1D8FEA000
|
heap
|
page read and write
|
||
2A8D1C97000
|
unkown
|
page readonly
|
||
1A1D9562000
|
heap
|
page read and write
|
||
2B0F3204000
|
trusted library allocation
|
page read and write
|
||
7FF9CC334000
|
trusted library allocation
|
page read and write
|
||
1A1D90B7000
|
heap
|
page read and write
|
||
2B0F6590000
|
trusted library allocation
|
page read and write
|
||
1A1D761B000
|
heap
|
page read and write
|
||
2A8EDF3F000
|
heap
|
page read and write
|
||
1A1D7805000
|
heap
|
page read and write
|
||
1A1D900E000
|
heap
|
page read and write
|
||
1A1D9029000
|
heap
|
page read and write
|
||
1A1D904A000
|
heap
|
page read and write
|
||
1A1D8FF9000
|
heap
|
page read and write
|
||
1A1DF69F000
|
heap
|
page read and write
|
||
1A1D9626000
|
heap
|
page read and write
|
||
1A1D9635000
|
heap
|
page read and write
|
||
2B0F7710000
|
trusted library allocation
|
page read and write
|
||
1A1D8FC1000
|
heap
|
page read and write
|
||
1A1D954C000
|
heap
|
page read and write
|
||
1A1D900E000
|
heap
|
page read and write
|
||
2B0F25DD000
|
trusted library allocation
|
page read and write
|
||
1A1D967A000
|
heap
|
page read and write
|
||
2A8EDE36000
|
heap
|
page read and write
|
||
1A1D7750000
|
heap
|
page read and write
|
||
2B0F22F0000
|
trusted library allocation
|
page read and write
|
||
1A1D761C000
|
heap
|
page read and write
|
||
1A1D9678000
|
heap
|
page read and write
|
||
1A1D903E000
|
heap
|
page read and write
|
||
1A1D9092000
|
heap
|
page read and write
|
||
2A8D3830000
|
heap
|
page read and write
|
||
1A1D7670000
|
heap
|
page read and write
|
||
23BAA390000
|
heap
|
page read and write
|
||
2A8EC2D4000
|
heap
|
page read and write
|
||
2B0F31E6000
|
trusted library allocation
|
page read and write
|
||
2B0F262A000
|
trusted library allocation
|
page read and write
|
||
2B0FA309000
|
heap
|
page read and write
|
||
2A8EC390000
|
heap
|
page read and write
|
||
1A1D7625000
|
heap
|
page read and write
|
||
1A1D9044000
|
heap
|
page read and write
|
||
1A1D7652000
|
heap
|
page read and write
|
||
1A1D9040000
|
heap
|
page read and write
|
||
2B0EE607000
|
trusted library allocation
|
page read and write
|
||
2A8EC35F000
|
heap
|
page read and write
|
||
1A1DBB3C000
|
heap
|
page read and write
|
||
2B0F2260000
|
trusted library allocation
|
page read and write
|
||
2A8EC2A6000
|
heap
|
page execute and read and write
|
||
1A1D90A2000
|
heap
|
page read and write
|
||
1F063FE000
|
stack
|
page read and write
|
||
1F060FE000
|
stack
|
page read and write
|
||
D6947FD000
|
stack
|
page read and write
|
||
1A1D900E000
|
heap
|
page read and write
|
||
2B0EE580000
|
trusted library allocation
|
page read and write
|
||
2B0EE680000
|
trusted library allocation
|
page read and write
|
||
1A1D764A000
|
heap
|
page read and write
|
||
1A1D908F000
|
heap
|
page read and write
|
||
2A8EC573000
|
heap
|
page read and write
|
||
2B0F20E0000
|
trusted library allocation
|
page read and write
|
||
7FF9CC332000
|
trusted library allocation
|
page read and write
|
||
2B0F25D3000
|
trusted library allocation
|
page read and write
|
||
2B0F258C000
|
trusted library allocation
|
page read and write
|
||
2B0EE70C000
|
trusted library allocation
|
page read and write
|
||
2A8EC374000
|
heap
|
page read and write
|
||
2B0F1F65000
|
trusted library allocation
|
page read and write
|
||
1A1D760A000
|
heap
|
page read and write
|
||
7FF4F1CB9000
|
trusted library allocation
|
page execute read
|
||
2B0EE5D1000
|
trusted library allocation
|
page read and write
|
||
2B0F7718000
|
trusted library allocation
|
page read and write
|
||
1A1D90A3000
|
heap
|
page read and write
|
||
2B0F25EB000
|
trusted library allocation
|
page read and write
|
||
1A1D75F2000
|
heap
|
page read and write
|
||
2B0F65E8000
|
trusted library allocation
|
page read and write
|
||
1A1D8FFF000
|
heap
|
page read and write
|
||
1A1D9034000
|
heap
|
page read and write
|
||
2B0EE5C8000
|
trusted library allocation
|
page read and write
|
||
1A1D7619000
|
heap
|
page read and write
|
||
1A1D9080000
|
heap
|
page read and write
|
||
1A1D7800000
|
heap
|
page read and write
|
||
2B0F1BEA000
|
heap
|
page read and write
|
||
1A1D9099000
|
heap
|
page read and write
|
||
1A1D75F8000
|
heap
|
page read and write
|
||
2A8EC348000
|
heap
|
page read and write
|
||
2A8EC54A000
|
heap
|
page read and write
|
||
2B0EE6AE000
|
trusted library allocation
|
page read and write
|
||
1A1D907C000
|
heap
|
page read and write
|
||
2B0EE73E000
|
trusted library allocation
|
page read and write
|
||
2A8EC56E000
|
heap
|
page read and write
|
||
1A1D7626000
|
heap
|
page read and write
|
||
1A1D95DC000
|
heap
|
page read and write
|
||
2B0F7745000
|
trusted library allocation
|
page read and write
|
||
1A1D75C0000
|
heap
|
page read and write
|
||
2B0F25AD000
|
trusted library allocation
|
page read and write
|
||
2B0F4194000
|
trusted library allocation
|
page read and write
|
||
EA29E7E000
|
stack
|
page read and write
|
||
2B0F34A6000
|
trusted library allocation
|
page read and write
|
||
2B0FA3C3000
|
heap
|
page read and write
|
||
1A1D90AE000
|
heap
|
page read and write
|
||
D694FFB000
|
stack
|
page read and write
|
||
2B0F321F000
|
trusted library allocation
|
page read and write
|
||
1A1D7648000
|
heap
|
page read and write
|
||
1A1D902C000
|
heap
|
page read and write
|
||
2B0F1F9E000
|
trusted library allocation
|
page read and write
|
||
7FF9CC330000
|
trusted library allocation
|
page read and write
|
||
1A1D7656000
|
heap
|
page read and write
|
||
2B0F7D72000
|
heap
|
page read and write
|
||
2B0F2030000
|
trusted library allocation
|
page execute
|
||
1A1D900F000
|
heap
|
page read and write
|
||
1A1D907A000
|
heap
|
page read and write
|
||
2B0F25F5000
|
trusted library allocation
|
page read and write
|
||
1A1D965E000
|
heap
|
page read and write
|
||
1A1D9651000
|
heap
|
page read and write
|
||
2A8EC575000
|
heap
|
page read and write
|
||
1A1D965E000
|
heap
|
page read and write
|
||
2B0F1F4D000
|
trusted library allocation
|
page read and write
|
||
1A1D7630000
|
heap
|
page read and write
|
||
1A1D7652000
|
heap
|
page read and write
|
||
2B0F412F000
|
trusted library allocation
|
page read and write
|
||
2B0F3303000
|
trusted library allocation
|
page read and write
|
||
1A1DF6A3000
|
heap
|
page read and write
|
||
1A1D75E6000
|
heap
|
page read and write
|
||
2B0EE59A000
|
trusted library allocation
|
page read and write
|
||
1A1D95A4000
|
heap
|
page read and write
|
||
1A1D7630000
|
heap
|
page read and write
|
||
1A1D7628000
|
heap
|
page read and write
|
||
1A1D7602000
|
heap
|
page read and write
|
||
2A8ED6D2000
|
trusted library allocation
|
page read and write
|
||
2B0F33AF000
|
trusted library allocation
|
page read and write
|
||
2B0EE640000
|
heap
|
page read and write
|
||
7FF9CC38C000
|
trusted library allocation
|
page execute and read and write
|
||
1A1D7626000
|
heap
|
page read and write
|
||
D6933FE000
|
stack
|
page read and write
|
||
2B0F659A000
|
trusted library allocation
|
page read and write
|
||
1A1D95D9000
|
heap
|
page read and write
|
||
2A8EC366000
|
heap
|
page read and write
|
||
1A1D761D000
|
heap
|
page read and write
|
||
1F05EFE000
|
stack
|
page read and write
|
||
1A1D903A000
|
heap
|
page read and write
|
||
1A1D909F000
|
heap
|
page read and write
|
||
2B0F34BB000
|
trusted library allocation
|
page read and write
|
||
1A1D967B000
|
heap
|
page read and write
|
||
2B0F4E39000
|
heap
|
page read and write
|
||
1A1D907A000
|
heap
|
page read and write
|
||
2B0F3010000
|
trusted library allocation
|
page read and write
|
||
1A1D7619000
|
heap
|
page read and write
|
||
1A1D95C8000
|
heap
|
page read and write
|
||
2B0F1CAA000
|
heap
|
page read and write
|
||
2B0F5440000
|
trusted library allocation
|
page read and write
|
||
1A1DCFBA000
|
heap
|
page read and write
|
||
D691C5E000
|
stack
|
page read and write
|
||
1A1D763D000
|
heap
|
page read and write
|
||
2B0F33BC000
|
trusted library allocation
|
page read and write
|
||
2B0F3408000
|
trusted library allocation
|
page read and write
|
||
2B0EE5EA000
|
trusted library allocation
|
page read and write
|
||
2B0F2120000
|
trusted library allocation
|
page read and write
|
||
1A1D955E000
|
heap
|
page read and write
|
||
2B0F2653000
|
trusted library allocation
|
page read and write
|
||
1A1D909D000
|
heap
|
page read and write
|
||
2B0F3281000
|
trusted library allocation
|
page read and write
|
||
2B0F2F41000
|
trusted library allocation
|
page read and write
|
||
1A1D9470000
|
heap
|
page read and write
|
||
2B0F25C2000
|
trusted library allocation
|
page read and write
|
||
2B0EE668000
|
trusted library allocation
|
page read and write
|
||
1A1D8FFE000
|
heap
|
page read and write
|
||
1A1D7658000
|
heap
|
page read and write
|
||
1A1D7651000
|
heap
|
page read and write
|
||
2A8D1D70000
|
heap
|
page read and write
|
||
2B0F7ECB000
|
heap
|
page read and write
|
||
1A1D765A000
|
heap
|
page read and write
|
||
1A1D95A9000
|
heap
|
page read and write
|
||
2B0F4C32000
|
heap
|
page read and write
|
||
2A8EC2E8000
|
heap
|
page read and write
|
||
1A1D95EA000
|
heap
|
page read and write
|
||
1A1DF60E000
|
heap
|
page read and write
|
||
2A8EC2A0000
|
heap
|
page execute and read and write
|
||
1A1D962A000
|
heap
|
page read and write
|
||
2B0EE6F4000
|
trusted library allocation
|
page read and write
|
||
7FF774893000
|
unkown
|
page read and write
|
||
1A1D901D000
|
heap
|
page read and write
|
||
23BAA398000
|
heap
|
page read and write
|
||
1A1D9585000
|
heap
|
page read and write
|
||
2A8EE00E000
|
heap
|
page read and write
|
||
2B0EE6D8000
|
trusted library allocation
|
page read and write
|
||
1A1D7605000
|
heap
|
page read and write
|
||
1A1D7628000
|
heap
|
page read and write
|
||
2A8EC3A0000
|
heap
|
page read and write
|
||
2A8EE574000
|
heap
|
page read and write
|
||
1A1D8FEA000
|
heap
|
page read and write
|
||
1A1D90C0000
|
heap
|
page read and write
|
||
1A1D9087000
|
heap
|
page read and write
|
||
D6967FE000
|
stack
|
page read and write
|
||
1A1D75B4000
|
heap
|
page read and write
|
||
2B0F1F90000
|
trusted library allocation
|
page read and write
|
||
1A1D761B000
|
heap
|
page read and write
|
||
2A8D3790000
|
trusted library allocation
|
page read and write
|
||
1F064FE000
|
stack
|
page read and write
|
||
1A1D760A000
|
heap
|
page read and write
|
||
1A1D9634000
|
heap
|
page read and write
|
||
1A1D9587000
|
heap
|
page read and write
|
||
2B0F65B2000
|
trusted library allocation
|
page read and write
|
||
2B0EE68F000
|
trusted library allocation
|
page read and write
|
||
1A1D94B8000
|
heap
|
page read and write
|
||
2B0F3306000
|
trusted library allocation
|
page read and write
|
||
23BAA490000
|
heap
|
page read and write
|
||
1A1D7639000
|
heap
|
page read and write
|
||
1A1D7658000
|
heap
|
page read and write
|
||
1A1DBB42000
|
heap
|
page read and write
|
||
1A1D95B8000
|
heap
|
page read and write
|
||
1A1D7621000
|
heap
|
page read and write
|
||
1A1D9097000
|
heap
|
page read and write
|
||
1A1D955E000
|
heap
|
page read and write
|
||
2B0F4A78000
|
trusted library allocation
|
page read and write
|
||
1A1D9078000
|
heap
|
page read and write
|
||
1A1D907C000
|
heap
|
page read and write
|
||
1A1D908A000
|
heap
|
page read and write
|
||
1A1D8FFE000
|
heap
|
page read and write
|
||
1A1D907E000
|
heap
|
page read and write
|
||
1A1D8FF0000
|
heap
|
page read and write
|
||
1A1D903A000
|
heap
|
page read and write
|
||
1A1D90B1000
|
heap
|
page read and write
|
||
1A1D8FFF000
|
heap
|
page read and write
|
||
2B0F22D0000
|
heap
|
page read and write
|
||
1A1D957C000
|
heap
|
page read and write
|
||
1A1DF658000
|
heap
|
page read and write
|
||
1A1D90B7000
|
heap
|
page read and write
|
||
1A1D90AE000
|
heap
|
page read and write
|
||
1A1DBB54000
|
heap
|
page read and write
|
||
2B0F31D8000
|
trusted library allocation
|
page read and write
|
||
1A1D904A000
|
heap
|
page read and write
|
||
2B0F31E1000
|
trusted library allocation
|
page read and write
|
||
1A1D75DF000
|
heap
|
page read and write
|
||
2B0F3395000
|
trusted library allocation
|
page read and write
|
||
1A1D955A000
|
heap
|
page read and write
|
||
1A1D9094000
|
heap
|
page read and write
|
||
1A1D903C000
|
heap
|
page read and write
|
||
1A1D8FEA000
|
heap
|
page read and write
|
||
2B0EE6EC000
|
trusted library allocation
|
page read and write
|
||
2A8EC380000
|
heap
|
page read and write
|
||
1A1D8FF9000
|
heap
|
page read and write
|
||
1A1D7640000
|
heap
|
page read and write
|
||
1A1D9096000
|
heap
|
page read and write
|
||
23BAA520000
|
heap
|
page read and write
|
||
1A1D90A2000
|
heap
|
page read and write
|
||
2A8EDAB0000
|
heap
|
page read and write
|
||
1A1D9675000
|
heap
|
page read and write
|
||
1A1D95DE000
|
heap
|
page read and write
|
||
1A1D7639000
|
heap
|
page read and write
|
||
1A1D955C000
|
heap
|
page read and write
|
||
2B0F633F000
|
trusted library allocation
|
page read and write
|
||
1A1D901C000
|
heap
|
page read and write
|
||
2B0F26BA000
|
trusted library allocation
|
page read and write
|
||
1A1DF636000
|
heap
|
page read and write
|
||
1A1D95B6000
|
heap
|
page read and write
|
||
1A1D90B8000
|
heap
|
page read and write
|
||
2A8EC32F000
|
heap
|
page read and write
|
||
1F066FA000
|
stack
|
page read and write
|
||
1A1D761B000
|
heap
|
page read and write
|
||
1A1D9027000
|
heap
|
page read and write
|
||
2B0F771F000
|
trusted library allocation
|
page read and write
|
||
7FF9CC3F0000
|
trusted library allocation
|
page execute and read and write
|
||
2A8EDF69000
|
heap
|
page read and write
|
||
1A1D901D000
|
heap
|
page read and write
|
||
2A8EE570000
|
heap
|
page read and write
|
||
1A1D9EB0000
|
heap
|
page read and write
|
||
2B0EE5D8000
|
trusted library allocation
|
page read and write
|
||
1A1D961B000
|
heap
|
page read and write
|
||
1A1D8FE9000
|
heap
|
page read and write
|
||
1A1D7635000
|
heap
|
page read and write
|
||
2A8EC6A0000
|
heap
|
page read and write
|
||
2A8EC312000
|
heap
|
page read and write
|
||
2B0F771B000
|
trusted library allocation
|
page read and write
|
||
1A1D9070000
|
heap
|
page read and write
|
||
23BAA615000
|
heap
|
page read and write
|
||
2B0F3350000
|
trusted library allocation
|
page read and write
|
||
2B0F774F000
|
trusted library allocation
|
page read and write
|
||
2B0F1C4A000
|
heap
|
page read and write
|
||
1A1D959F000
|
heap
|
page read and write
|
||
2A8D3840000
|
trusted library allocation
|
page read and write
|
||
1A1D8FFE000
|
heap
|
page read and write
|
||
1A1D966D000
|
heap
|
page read and write
|
||
1A1D908F000
|
heap
|
page read and write
|
||
1A1D761D000
|
heap
|
page read and write
|
||
1A1D75CF000
|
heap
|
page read and write
|
||
2B0F1B45000
|
heap
|
page read and write
|
||
2B0F559F000
|
trusted library allocation
|
page read and write
|
||
1A1D75FC000
|
heap
|
page read and write
|
||
1A1D901C000
|
heap
|
page read and write
|
||
2B0F65DD000
|
trusted library allocation
|
page read and write
|
||
1A1D9072000
|
heap
|
page read and write
|
||
2B0EE73C000
|
trusted library allocation
|
page read and write
|
||
1A1D963F000
|
heap
|
page read and write
|
||
2B0F4F23000
|
heap
|
page read and write
|
||
1A1D965F000
|
heap
|
page read and write
|
||
1A1D9040000
|
heap
|
page read and write
|
||
2B0F2582000
|
trusted library allocation
|
page read and write
|
||
2B0F3027000
|
trusted library allocation
|
page read and write
|
||
1A1D961B000
|
heap
|
page read and write
|
||
2B0F4C4C000
|
heap
|
page read and write
|
||
1A1D9070000
|
heap
|
page read and write
|
||
1A1D9070000
|
heap
|
page read and write
|
||
2A8D1E06000
|
heap
|
page read and write
|
||
2B0F2ECC000
|
trusted library allocation
|
page read and write
|
||
2B0F4E46000
|
heap
|
page read and write
|
||
2B0F1FA3000
|
trusted library allocation
|
page read and write
|
||
2B0F5255000
|
trusted library allocation
|
page read and write
|
||
1A1D909B000
|
heap
|
page read and write
|
||
1A1D762E000
|
heap
|
page read and write
|
||
1A1D7643000
|
heap
|
page read and write
|
||
7FF9CC35B000
|
trusted library allocation
|
page execute and read and write
|
||
2B0EE5DF000
|
trusted library allocation
|
page read and write
|
||
1A1D90A8000
|
heap
|
page read and write
|
||
1A1DBB55000
|
heap
|
page read and write
|
||
2A8EE540000
|
trusted library allocation
|
page read and write
|
||
2B0F5410000
|
trusted library allocation
|
page read and write
|
||
2B0F335C000
|
trusted library allocation
|
page read and write
|
||
2B0EE5EF000
|
trusted library allocation
|
page read and write
|
||
1A1D8FEE000
|
heap
|
page read and write
|
||
2B0EE620000
|
trusted library allocation
|
page read and write
|
||
1A1DF620000
|
heap
|
page read and write
|
||
1A1D95B6000
|
heap
|
page read and write
|
||
7FF9CC4E0000
|
trusted library allocation
|
page execute and read and write
|
||
1A1D8FC1000
|
heap
|
page read and write
|
||
1A1D908D000
|
heap
|
page read and write
|
||
1A1DBB55000
|
heap
|
page read and write
|
||
2B0F1FE4000
|
trusted library allocation
|
page read and write
|
||
7FF4F1CC0000
|
trusted library allocation
|
page execute and read and write
|
||
1A1D75CF000
|
heap
|
page read and write
|
||
1A1D9039000
|
heap
|
page read and write
|
||
2B0EE740000
|
trusted library allocation
|
page read and write
|
||
2B0F4D59000
|
heap
|
page read and write
|
||
2A8EE45E000
|
heap
|
page read and write
|
||
1A1D8FEF000
|
heap
|
page read and write
|
||
1A1D763B000
|
heap
|
page read and write
|
||
1A1D903D000
|
heap
|
page read and write
|
||
2B0EE6DC000
|
trusted library allocation
|
page read and write
|
||
2B0F22A7000
|
trusted library allocation
|
page read and write
|
||
1A1D75F1000
|
heap
|
page read and write
|
||
2B0F5448000
|
trusted library allocation
|
page read and write
|
||
1A1D909F000
|
heap
|
page read and write
|
||
2B0F3CB0000
|
trusted library allocation
|
page read and write
|
||
2B0F33A3000
|
trusted library allocation
|
page read and write
|
||
2A8EE54D000
|
trusted library allocation
|
page read and write
|
||
2B0F1EFC000
|
heap
|
page read and write
|
||
1A1D7643000
|
heap
|
page read and write
|
||
1A1D909F000
|
heap
|
page read and write
|
||
1A1D906A000
|
heap
|
page read and write
|
||
1F06AF8000
|
stack
|
page read and write
|
||
2B0EE730000
|
trusted library allocation
|
page read and write
|
||
1A1D8FF7000
|
heap
|
page read and write
|
||
1A1DF614000
|
heap
|
page read and write
|
||
2B0F2613000
|
trusted library allocation
|
page read and write
|
||
1A1D909F000
|
heap
|
page read and write
|
||
1A1D956A000
|
heap
|
page read and write
|
||
7FF9CC354000
|
trusted library allocation
|
page read and write
|
||
1F06FFB000
|
stack
|
page read and write
|
||
1A1D8FF1000
|
heap
|
page read and write
|
||
1A1D9626000
|
heap
|
page read and write
|
||
1A1DBB52000
|
heap
|
page read and write
|
||
7FF9CC610000
|
trusted library allocation
|
page read and write
|
||
7FF773FED000
|
unkown
|
page readonly
|
||
2A8EC522000
|
heap
|
page read and write
|
||
2B0F1E7C000
|
heap
|
page read and write
|
||
2A8EC326000
|
heap
|
page read and write
|
||
2B0EE658000
|
trusted library allocation
|
page read and write
|
||
1A1D9554000
|
heap
|
page read and write
|
||
2B0FA342000
|
heap
|
page read and write
|
||
2B0F4C42000
|
heap
|
page read and write
|
||
1A1D905A000
|
heap
|
page read and write
|
||
2B0FA3A4000
|
heap
|
page read and write
|
||
1A1DF5E0000
|
heap
|
page read and write
|
||
2B0F7AC7000
|
trusted library allocation
|
page read and write
|
||
2B0F1CCF000
|
heap
|
page read and write
|
||
7FF774173000
|
unkown
|
page readonly
|
||
2A8EC324000
|
heap
|
page read and write
|
||
1A1D8FDE000
|
heap
|
page read and write
|
||
1A1D765D000
|
heap
|
page read and write
|
||
1A1D75E7000
|
heap
|
page read and write
|
||
1A1D765A000
|
heap
|
page read and write
|
||
2B0F1B30000
|
heap
|
page read and write
|
||
1A1D8FF6000
|
heap
|
page read and write
|
||
1F06DF9000
|
stack
|
page read and write
|
||
2A8EC2DA000
|
heap
|
page read and write
|
||
D695BFE000
|
stack
|
page read and write
|
||
2B0F7E38000
|
heap
|
page read and write
|
||
2A8EC322000
|
heap
|
page read and write
|
||
1A1D9552000
|
heap
|
page read and write
|
||
1A1D9073000
|
heap
|
page read and write
|
||
2B0EE744000
|
trusted library allocation
|
page read and write
|
||
2B0F543B000
|
trusted library allocation
|
page read and write
|
||
1A1D75DF000
|
heap
|
page read and write
|
||
2B0F4D62000
|
heap
|
page read and write
|
||
1A1D90BA000
|
heap
|
page read and write
|
||
1A1DD820000
|
trusted library section
|
page read and write
|
||
2B0F1B40000
|
heap
|
page read and write
|
||
1A1D9647000
|
heap
|
page read and write
|
||
1A1D75D3000
|
heap
|
page read and write
|
||
2B0F65C9000
|
trusted library allocation
|
page read and write
|
||
2A8EC328000
|
heap
|
page read and write
|
||
1A1D955A000
|
heap
|
page read and write
|
||
1A1D9036000
|
heap
|
page read and write
|
||
2B0F2070000
|
trusted library allocation
|
page execute
|
||
1A1D764A000
|
heap
|
page read and write
|
||
2B0EE5CD000
|
trusted library allocation
|
page read and write
|
||
1A1D90B7000
|
heap
|
page read and write
|
||
D695FFB000
|
stack
|
page read and write
|
||
1A1D956A000
|
heap
|
page read and write
|
||
7FF9CC340000
|
trusted library allocation
|
page read and write
|
||
2B0F6EF0000
|
trusted library allocation
|
page read and write
|
||
1A1D902C000
|
heap
|
page read and write
|
||
2A8D39E0000
|
heap
|
page execute and read and write
|
||
1A1D90A8000
|
heap
|
page read and write
|
||
7FF9CC3E6000
|
trusted library allocation
|
page read and write
|
||
2A8EC500000
|
heap
|
page read and write
|
||
1A1D9040000
|
heap
|
page read and write
|
||
2B0F1E2D000
|
heap
|
page read and write
|
||
2B0F2F4E000
|
trusted library allocation
|
page read and write
|
||
2A8EC6A5000
|
heap
|
page read and write
|
||
1A1D7640000
|
heap
|
page read and write
|
||
1A1D9562000
|
heap
|
page read and write
|
||
1A1D906A000
|
heap
|
page read and write
|
||
1A1D9029000
|
heap
|
page read and write
|
||
1A1D9541000
|
heap
|
page read and write
|
||
2B0F5EF3000
|
trusted library allocation
|
page read and write
|
||
1A1D954F000
|
heap
|
page read and write
|
||
2B0F3B90000
|
trusted library allocation
|
page read and write
|
||
2B0F33A6000
|
trusted library allocation
|
page read and write
|
||
2B0EE587000
|
trusted library allocation
|
page read and write
|
||
2B0F22F9000
|
trusted library allocation
|
page read and write
|
||
1A1D7628000
|
heap
|
page read and write
|
||
1A1D7659000
|
heap
|
page read and write
|
||
1A1D8FCE000
|
heap
|
page read and write
|
||
2B0F2239000
|
trusted library allocation
|
page read and write
|
||
1A1D8FFF000
|
heap
|
page read and write
|
||
1A1D908D000
|
heap
|
page read and write
|
||
1A1D967C000
|
heap
|
page read and write
|
||
2B0F3430000
|
trusted library allocation
|
page read and write
|
||
2B0F1D9F000
|
heap
|
page read and write
|
||
2B0F2EC7000
|
trusted library allocation
|
page read and write
|
||
2B0F633B000
|
trusted library allocation
|
page read and write
|
||
1A1D7648000
|
heap
|
page read and write
|
||
1A1D909F000
|
heap
|
page read and write
|
||
2B0F659D000
|
trusted library allocation
|
page read and write
|
||
2B0F7E8A000
|
heap
|
page read and write
|
||
2B0F46A6000
|
trusted library allocation
|
page read and write
|
||
1A1D9480000
|
heap
|
page read and write
|
||
2B0FA130000
|
trusted library allocation
|
page read and write
|
||
1A1D75B0000
|
heap
|
page read and write
|
||
2A8EC593000
|
heap
|
page read and write
|
||
2B0F3460000
|
trusted library allocation
|
page read and write
|
||
1A1D962B000
|
heap
|
page read and write
|
||
1A1D90BE000
|
heap
|
page read and write
|
||
2B0F4BD0000
|
heap
|
page read and write
|
||
1F05FFE000
|
stack
|
page read and write
|
||
1A1D960F000
|
heap
|
page read and write
|
||
7FF77417E000
|
unkown
|
page readonly
|
||
2B0F25E4000
|
trusted library allocation
|
page read and write
|
||
2B0F3470000
|
trusted library allocation
|
page read and write
|
||
2B0F23B8000
|
heap
|
page read and write
|
||
1F05DFE000
|
stack
|
page read and write
|
||
2B0F3AF4000
|
trusted library allocation
|
page read and write
|
||
1A1D8FFE000
|
heap
|
page read and write
|
||
1A1DBB42000
|
heap
|
page read and write
|
||
1A1D9057000
|
heap
|
page read and write
|
||
2A8D3833000
|
heap
|
page read and write
|
||
1A1DBB50000
|
heap
|
page read and write
|
||
2B0EE678000
|
trusted library allocation
|
page read and write
|
||
2B0EE6E0000
|
trusted library allocation
|
page read and write
|
||
1A1DF616000
|
heap
|
page read and write
|
||
1A1D9094000
|
heap
|
page read and write
|
||
1A1D8FE0000
|
heap
|
page read and write
|
||
7FF4F1CA0000
|
trusted library allocation
|
page readonly
|
||
1A1D7647000
|
heap
|
page read and write
|
||
2B0F3BAB000
|
trusted library allocation
|
page read and write
|
||
1A1D7626000
|
heap
|
page read and write
|
||
D694BFD000
|
stack
|
page read and write
|
||
1A1D9026000
|
heap
|
page read and write
|
||
1A1D764D000
|
heap
|
page read and write
|
||
1A1D7630000
|
heap
|
page read and write
|
||
1A1D9043000
|
heap
|
page read and write
|
||
1A1D75FF000
|
heap
|
page read and write
|
||
2A8EE070000
|
heap
|
page execute and read and write
|
||
1A1D9230000
|
heap
|
page read and write
|
||
2B0F7EC6000
|
heap
|
page read and write
|
||
2B0EE5FD000
|
trusted library allocation
|
page read and write
|
||
2B0F343C000
|
trusted library allocation
|
page read and write
|
||
1A1DBB3A000
|
heap
|
page read and write
|
||
2B0F3100000
|
trusted library allocation
|
page read and write
|
||
1A1D7624000
|
heap
|
page read and write
|
||
1A1D7647000
|
heap
|
page read and write
|
||
1A1D904A000
|
heap
|
page read and write
|
||
2B0FA34A000
|
heap
|
page read and write
|
||
2B0F772E000
|
trusted library allocation
|
page read and write
|
||
7FF9CC350000
|
trusted library allocation
|
page read and write
|
||
2A8E3A01000
|
trusted library allocation
|
page read and write
|
||
1A1D94AA000
|
heap
|
page read and write
|
||
1A1D7615000
|
heap
|
page read and write
|
||
1A1D90B7000
|
heap
|
page read and write
|
||
1A1D90A0000
|
heap
|
page read and write
|
||
1A1D761E000
|
heap
|
page read and write
|
||
1A1D7628000
|
heap
|
page read and write
|
||
1A1D761D000
|
heap
|
page read and write
|
||
1A1D9012000
|
heap
|
page read and write
|
||
2B0F660C000
|
trusted library allocation
|
page read and write
|
||
D6937FD000
|
stack
|
page read and write
|
||
2B0F1C48000
|
heap
|
page read and write
|
||
2B0EE6FC000
|
trusted library allocation
|
page read and write
|
||
2B0F54F5000
|
trusted library allocation
|
page read and write
|
||
1A1D94FA000
|
heap
|
page read and write
|
||
1A1D9036000
|
heap
|
page read and write
|
||
1A1D9043000
|
heap
|
page read and write
|
||
2A8EE57D000
|
heap
|
page read and write
|
||
2B0F21A4000
|
trusted library allocation
|
page read and write
|
||
1A1D9260000
|
heap
|
page read and write
|
||
1F05CF2000
|
stack
|
page read and write
|
||
1A1D7619000
|
heap
|
page read and write
|
||
2B0F339E000
|
trusted library allocation
|
page read and write
|
||
2B0F48A4000
|
trusted library allocation
|
page read and write
|
||
2B0F2561000
|
trusted library allocation
|
page read and write
|
||
1A1D7633000
|
heap
|
page read and write
|
||
1A1D764A000
|
heap
|
page read and write
|
||
7FF774899000
|
unkown
|
page read and write
|
||
1A1D95EC000
|
heap
|
page read and write
|
||
2A8D1E78000
|
heap
|
page read and write
|
||
2B0EE6E8000
|
trusted library allocation
|
page read and write
|
||
2B0F4CAE000
|
heap
|
page read and write
|
||
2B0F1F58000
|
trusted library allocation
|
page read and write
|
||
2B0FA260000
|
trusted library allocation
|
page read and write
|
||
1A1D95EA000
|
heap
|
page read and write
|
||
1A1D94AB000
|
heap
|
page read and write
|
||
2B0F206E000
|
trusted library allocation
|
page read and write
|
||
1A1D95CA000
|
heap
|
page read and write
|
||
1A1D9585000
|
heap
|
page read and write
|
||
2A8EE444000
|
heap
|
page read and write
|
||
1A1D9036000
|
heap
|
page read and write
|
||
1A1D761C000
|
heap
|
page read and write
|
||
2A8EE02C000
|
heap
|
page read and write
|
||
1A1D90A3000
|
heap
|
page read and write
|
||
2A8EC392000
|
heap
|
page read and write
|
||
1A1D950F000
|
heap
|
page read and write
|
||
1A1DBB53000
|
heap
|
page read and write
|
||
2A8ED6B0000
|
trusted library allocation
|
page read and write
|
||
1A1D90A5000
|
heap
|
page read and write
|
||
2B0F7DB4000
|
heap
|
page read and write
|
||
1A1D959D000
|
heap
|
page read and write
|
||
2A8EDE30000
|
heap
|
page read and write
|
||
2B0F1EAE000
|
heap
|
page read and write
|
||
2B0F26B0000
|
trusted library allocation
|
page read and write
|
||
1A1D906A000
|
heap
|
page read and write
|
||
1A1D7770000
|
heap
|
page read and write
|
||
2A8EE549000
|
trusted library allocation
|
page read and write
|
||
1A1D9600000
|
heap
|
page read and write
|
||
1A1D90BA000
|
heap
|
page read and write
|
||
2A8D1D65000
|
heap
|
page read and write
|
||
1A1D7622000
|
heap
|
page read and write
|
||
1A1D762B000
|
heap
|
page read and write
|
||
2A8D1D80000
|
heap
|
page read and write
|
||
1A1D901D000
|
heap
|
page read and write
|
||
2B0F322C000
|
trusted library allocation
|
page read and write
|
||
1A1D8FE0000
|
heap
|
page read and write
|
||
2B0F5445000
|
trusted library allocation
|
page read and write
|
||
1A1D8FFF000
|
heap
|
page read and write
|
||
1A1D764D000
|
heap
|
page read and write
|
||
1A1D9039000
|
heap
|
page read and write
|
||
1A1D7624000
|
heap
|
page read and write
|
||
1A1D9555000
|
heap
|
page read and write
|
||
2B0F23C5000
|
heap
|
page read and write
|
||
2B0F2F30000
|
trusted library allocation
|
page read and write
|
||
1A1D90B0000
|
heap
|
page read and write
|
||
1A1D9092000
|
heap
|
page read and write
|
||
1A1D955E000
|
heap
|
page read and write
|
||
1A1D8FF6000
|
heap
|
page read and write
|
||
2B0F44C5000
|
trusted library allocation
|
page read and write
|
||
2A8EE543000
|
trusted library allocation
|
page read and write
|
||
2B0F1CA1000
|
heap
|
page read and write
|
||
1A1D90A5000
|
heap
|
page read and write
|
||
2B0F7D30000
|
heap
|
page read and write
|
||
1A1D9649000
|
heap
|
page read and write
|
||
2B0F336B000
|
trusted library allocation
|
page read and write
|
||
2B0F1D74000
|
heap
|
page read and write
|
||
1A1D75E3000
|
heap
|
page read and write
|
||
1A1D7624000
|
heap
|
page read and write
|
||
1A1D909A000
|
heap
|
page read and write
|
||
2A8EE468000
|
heap
|
page read and write
|
||
1A1D9013000
|
heap
|
page read and write
|
||
1A1D900D000
|
heap
|
page read and write
|
||
1A1D906C000
|
heap
|
page read and write
|
||
1F069F8000
|
stack
|
page read and write
|
||
1A1D9675000
|
heap
|
page read and write
|
||
1A1D760F000
|
heap
|
page read and write
|
||
1A1D903E000
|
heap
|
page read and write
|
||
2B0F5160000
|
trusted library allocation
|
page read and write
|
||
2B0F1DE9000
|
heap
|
page read and write
|
||
7FF9CC4D0000
|
trusted library allocation
|
page read and write
|
||
2B0F25CF000
|
trusted library allocation
|
page read and write
|
||
2A8D3793000
|
trusted library allocation
|
page read and write
|
||
1A1D75C5000
|
heap
|
page read and write
|
||
1A1D7639000
|
heap
|
page read and write
|
||
1A1D95CC000
|
heap
|
page read and write
|
||
1A1DCFB5000
|
heap
|
page read and write
|
||
2B0F25B0000
|
trusted library allocation
|
page read and write
|
||
1A1DBB55000
|
heap
|
page read and write
|
||
1F06BF8000
|
stack
|
page read and write
|
||
2B0EE58A000
|
trusted library allocation
|
page read and write
|
||
2B0F3CBD000
|
trusted library allocation
|
page read and write
|
||
1A1D904A000
|
heap
|
page read and write
|
||
1A1D948E000
|
heap
|
page read and write
|
||
1A1D7639000
|
heap
|
page read and write
|
||
1A1D7636000
|
heap
|
page read and write
|
||
2B0F31D0000
|
trusted library allocation
|
page read and write
|
||
2B0F5479000
|
trusted library allocation
|
page read and write
|
||
1A1D90BD000
|
heap
|
page read and write
|
||
1A1D75B5000
|
heap
|
page read and write
|
||
7FF773A50000
|
unkown
|
page readonly
|
||
1A1D90A8000
|
heap
|
page read and write
|
||
1A1D75EB000
|
heap
|
page read and write
|
||
1A1D8FEF000
|
heap
|
page read and write
|
||
1A1D7652000
|
heap
|
page read and write
|
||
1A1D955C000
|
heap
|
page read and write
|
||
23BAA370000
|
heap
|
page read and write
|
||
1A1D9562000
|
heap
|
page read and write
|
||
1A1D907A000
|
heap
|
page read and write
|
||
2B0F25E0000
|
trusted library allocation
|
page read and write
|
||
2A8EC314000
|
heap
|
page read and write
|
||
1A1D90A1000
|
heap
|
page read and write
|
||
1A1D95BC000
|
heap
|
page read and write
|
||
1A1D903E000
|
heap
|
page read and write
|
||
1A1D8FE5000
|
heap
|
page read and write
|
||
1A1D8FF9000
|
heap
|
page read and write
|
||
1A1DCF70000
|
heap
|
page read and write
|
||
2B0F310D000
|
trusted library allocation
|
page read and write
|
||
7FF773A51000
|
unkown
|
page execute read
|
||
2B0F585C000
|
trusted library allocation
|
page read and write
|
||
1A1D7650000
|
heap
|
page read and write
|
||
1A1D761B000
|
heap
|
page read and write
|
||
1A1D955E000
|
heap
|
page read and write
|
||
2A8EE461000
|
heap
|
page read and write
|
||
2A8EC2B0000
|
heap
|
page read and write
|
||
1A1D75B0000
|
heap
|
page read and write
|
||
1A1D7647000
|
heap
|
page read and write
|
||
2B0EE698000
|
trusted library allocation
|
page read and write
|
||
1A1D90B2000
|
heap
|
page read and write
|
||
1A1D959F000
|
heap
|
page read and write
|
||
2A8D1492000
|
unkown
|
page readonly
|
||
1A1D901B000
|
heap
|
page read and write
|
||
1A1D761A000
|
heap
|
page read and write
|
||
2B0F3468000
|
trusted library allocation
|
page read and write
|
||
1A1D7640000
|
heap
|
page read and write
|
||
1A1D902C000
|
heap
|
page read and write
|
||
1A1D9046000
|
heap
|
page read and write
|
||
1A1D950C000
|
heap
|
page read and write
|
||
1A1D90B7000
|
heap
|
page read and write
|
||
D696BFD000
|
stack
|
page read and write
|
||
1A1DBB4A000
|
heap
|
page read and write
|
||
1A1D906D000
|
heap
|
page read and write
|
||
1A1D9034000
|
heap
|
page read and write
|
||
1A1D75BB000
|
heap
|
page read and write
|
||
1A1DF620000
|
heap
|
page read and write
|
||
23BAA610000
|
heap
|
page read and write
|
||
1A1D905A000
|
heap
|
page read and write
|
||
2B0F1F9A000
|
trusted library allocation
|
page read and write
|
||
1A1D7656000
|
heap
|
page read and write
|
||
2B0FA3AE000
|
heap
|
page read and write
|
||
1A1D960F000
|
heap
|
page read and write
|
||
1A1D902A000
|
heap
|
page read and write
|
||
7FF7748FF000
|
unkown
|
page readonly
|
||
1A1DBB10000
|
heap
|
page read and write
|
||
1A1D8FEF000
|
heap
|
page read and write
|
||
2A8D1D40000
|
heap
|
page read and write
|
||
1A1D955C000
|
heap
|
page read and write
|
||
1A1D9667000
|
heap
|
page read and write
|
||
D6943FE000
|
stack
|
page read and write
|
||
2B0FA250000
|
trusted library allocation
|
page read and write
|
||
1A1D7648000
|
heap
|
page read and write
|
||
1A1D903E000
|
heap
|
page read and write
|
||
2A8EC55B000
|
heap
|
page read and write
|
||
1A1D9663000
|
heap
|
page read and write
|
||
1A1D95C4000
|
heap
|
page read and write
|
||
2B0EE687000
|
trusted library allocation
|
page read and write
|
||
2A8D3A73000
|
trusted library allocation
|
page read and write
|
||
2B0F7730000
|
trusted library allocation
|
page read and write
|
||
1F070FF000
|
stack
|
page read and write
|
||
1A1D90A2000
|
heap
|
page read and write
|
||
1A1DBB37000
|
heap
|
page read and write
|
||
1A1D7619000
|
heap
|
page read and write
|
||
7FF9CC4F4000
|
trusted library allocation
|
page read and write
|
||
2B0F1D1F000
|
heap
|
page read and write
|
||
1A1D762B000
|
heap
|
page read and write
|
||
1A1D906D000
|
heap
|
page read and write
|
||
2B0F262F000
|
trusted library allocation
|
page read and write
|
||
2B0F261C000
|
trusted library allocation
|
page read and write
|
||
7FF9CC600000
|
trusted library allocation
|
page read and write
|
||
1A1D9039000
|
heap
|
page read and write
|
||
1A1DBB55000
|
heap
|
page read and write
|
||
2B0F2610000
|
trusted library allocation
|
page read and write
|
||
7FF4F1CBB000
|
trusted library allocation
|
page execute read
|
||
1A1D9641000
|
heap
|
page read and write
|
||
2B0F4DB2000
|
heap
|
page read and write
|
||
1A1D909A000
|
heap
|
page read and write
|
||
1A1D9010000
|
heap
|
page read and write
|
||
2A8EE479000
|
heap
|
page read and write
|
||
1A1D764D000
|
heap
|
page read and write
|
||
2B0F4E3D000
|
heap
|
page read and write
|
||
7FF9CC33D000
|
trusted library allocation
|
page execute and read and write
|
||
2A8D1D75000
|
heap
|
page read and write
|
||
2A8E39F8000
|
trusted library allocation
|
page read and write
|
||
1A1D761B000
|
heap
|
page read and write
|
||
2B0F65BB000
|
trusted library allocation
|
page read and write
|
||
2B0F209C000
|
trusted library allocation
|
page read and write
|
||
1A1D9617000
|
heap
|
page read and write
|
||
1A1D95A5000
|
heap
|
page read and write
|
||
2B0FA33E000
|
heap
|
page read and write
|
||
2B0F6333000
|
trusted library allocation
|
page read and write
|
||
2B0EE60A000
|
trusted library allocation
|
page read and write
|
||
2B0EE684000
|
trusted library allocation
|
page read and write
|
||
1A1D764E000
|
heap
|
page read and write
|
||
1A1D9069000
|
heap
|
page read and write
|
||
D691CAF000
|
stack
|
page read and write
|
||
1A1D9085000
|
heap
|
page read and write
|
||
2A8D1D60000
|
heap
|
page read and write
|
||
1A1D9013000
|
heap
|
page read and write
|
||
1A1D95EF000
|
heap
|
page read and write
|
||
7FF4F1CB1000
|
trusted library allocation
|
page execute read
|
||
2A8EDF61000
|
heap
|
page read and write
|
||
1A1D95C6000
|
heap
|
page read and write
|
||
D6977FC000
|
trusted library allocation
|
page read and write
|
||
1F068FB000
|
stack
|
page read and write
|
||
2B0EE74B000
|
trusted library allocation
|
page read and write
|
||
1A1D75B7000
|
heap
|
page read and write
|
||
1A1D9086000
|
heap
|
page read and write
|
||
1A1D90B1000
|
heap
|
page read and write
|
||
2A8EE558000
|
trusted library allocation
|
page read and write
|
||
7FF4F1CA1000
|
trusted library allocation
|
page execute read
|
||
2B0FA230000
|
trusted library allocation
|
page read and write
|
||
1F06CFB000
|
stack
|
page read and write
|
||
1A1D9619000
|
heap
|
page read and write
|
||
1A1D9564000
|
heap
|
page read and write
|
||
1A1D8FE5000
|
heap
|
page read and write
|
||
1A1D7621000
|
heap
|
page read and write
|
||
1A1DBB53000
|
heap
|
page read and write
|
||
7FF9CC620000
|
trusted library allocation
|
page read and write
|
||
2B0F541F000
|
trusted library allocation
|
page read and write
|
||
2A8D1DA0000
|
heap
|
page read and write
|
||
1A1D9040000
|
heap
|
page read and write
|
||
1A1D9029000
|
heap
|
page read and write
|
||
2A8EDAC3000
|
heap
|
page read and write
|
||
1A1D905A000
|
heap
|
page read and write
|
||
7FF4F1CBA000
|
trusted library allocation
|
page readonly
|
||
1A1D962F000
|
heap
|
page read and write
|
||
7FF774267000
|
unkown
|
page write copy
|
||
1A1DD142000
|
trusted library allocation
|
page read and write
|
||
1A1D7622000
|
heap
|
page read and write
|
||
1A1D9012000
|
heap
|
page read and write
|
||
2B0EE6B8000
|
trusted library allocation
|
page read and write
|
||
2B0F2616000
|
trusted library allocation
|
page read and write
|
||
2B0F1EB9000
|
heap
|
page read and write
|
||
2B0F1D3E000
|
heap
|
page read and write
|
||
1A1D9563000
|
heap
|
page read and write
|
||
1A1D9039000
|
heap
|
page read and write
|
||
1A1D9643000
|
heap
|
page read and write
|
||
2B0F3EB6000
|
trusted library allocation
|
page read and write
|
||
D696FFE000
|
stack
|
page read and write
|
||
1A1D901D000
|
heap
|
page read and write
|
||
2B0F1B76000
|
heap
|
page read and write
|
||
1A1D90B7000
|
heap
|
page read and write
|
||
1A1D95CD000
|
heap
|
page read and write
|
||
2B0EE58E000
|
trusted library allocation
|
page read and write
|
||
2A8EC385000
|
heap
|
page read and write
|
||
2B0F6345000
|
trusted library allocation
|
page read and write
|
||
2A8D1D30000
|
heap
|
page read and write
|
||
1A1D9616000
|
heap
|
page read and write
|
||
1A1D9074000
|
heap
|
page read and write
|
||
1A1D75B8000
|
heap
|
page read and write
|
||
2B0EE6A9000
|
trusted library allocation
|
page read and write
|
||
7FF9CC564000
|
trusted library allocation
|
page read and write
|
||
1A1D7593000
|
heap
|
page read and write
|
||
7FF9CC5F0000
|
trusted library allocation
|
page read and write
|
||
1A1D95B0000
|
heap
|
page read and write
|
||
1A1D9014000
|
heap
|
page read and write
|
||
1A1D90A5000
|
heap
|
page read and write
|
||
1A1D9481000
|
heap
|
page read and write
|
||
1A1D8FE0000
|
heap
|
page read and write
|
||
2B0F3484000
|
trusted library allocation
|
page read and write
|
||
1A1D75BB000
|
heap
|
page read and write
|
||
1A1D9017000
|
heap
|
page read and write
|
||
1A1D9031000
|
heap
|
page read and write
|
||
2B0F3242000
|
trusted library allocation
|
page read and write
|
||
2A8D1E42000
|
heap
|
page read and write
|
||
2B0F65E2000
|
trusted library allocation
|
page read and write
|
||
2A8E39F1000
|
trusted library allocation
|
page read and write
|
||
2B0F4D6E000
|
heap
|
page read and write
|
||
1A1D761C000
|
heap
|
page read and write
|
||
2B0FA36C000
|
heap
|
page read and write
|
||
1A1D7567000
|
heap
|
page read and write
|
||
2B0EE68C000
|
trusted library allocation
|
page read and write
|
||
1A1D8FEA000
|
heap
|
page read and write
|
||
1A1D9076000
|
heap
|
page read and write
|
||
1A1D75B5000
|
heap
|
page read and write
|
||
7FF774870000
|
unkown
|
page read and write
|
||
7FF9CC3E0000
|
trusted library allocation
|
page read and write
|
||
7FF9CC5E0000
|
trusted library allocation
|
page read and write
|
||
1A1D904A000
|
heap
|
page read and write
|
||
2B0FA270000
|
heap
|
page read and write
|
||
1A1D7631000
|
heap
|
page read and write
|
||
1A1DBB3E000
|
heap
|
page read and write
|
||
1A1DF62F000
|
heap
|
page read and write
|
||
1A1D907A000
|
heap
|
page read and write
|
||
1A1D955C000
|
heap
|
page read and write
|
||
1A1D75E7000
|
heap
|
page read and write
|
||
2A8EC370000
|
heap
|
page read and write
|
||
1A1D904F000
|
heap
|
page read and write
|
||
1A1D9610000
|
heap
|
page read and write
|
||
2A8EDFC9000
|
heap
|
page read and write
|
||
2B0F65AA000
|
trusted library allocation
|
page read and write
|
||
2B0EE6D0000
|
trusted library allocation
|
page read and write
|
||
2A8D1C92000
|
unkown
|
page readonly
|
||
2B0F25FF000
|
trusted library allocation
|
page read and write
|
||
1A1D9022000
|
heap
|
page read and write
|
||
2B0EE5C3000
|
trusted library allocation
|
page read and write
|
||
1A1D9520000
|
heap
|
page read and write
|
||
1A1D9532000
|
heap
|
page read and write
|
||
1A1D9087000
|
heap
|
page read and write
|
||
2B0F1D23000
|
heap
|
page read and write
|
||
2A8EC2F9000
|
heap
|
page read and write
|
||
2B0F233E000
|
trusted library allocation
|
page read and write
|
||
1A1D965E000
|
heap
|
page read and write
|
||
1A1D9078000
|
heap
|
page read and write
|
||
2A8D3AA1000
|
trusted library allocation
|
page read and write
|
||
1A1D9092000
|
heap
|
page read and write
|
||
1A1D9670000
|
heap
|
page read and write
|
||
1A1D9096000
|
heap
|
page read and write
|
||
1A1DF615000
|
heap
|
page read and write
|
||
1A1D907A000
|
heap
|
page read and write
|
||
1A1DF5F6000
|
heap
|
page read and write
|
||
1A1DF658000
|
heap
|
page read and write
|
There are 1285 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://www.sumatrapdfreader.org/free-pdf-reader
|