IOC Report
PDFixers.exe

loading gif

Files

File Path
Type
Category
Malicious
PDFixers.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\css2[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\QJV1CLZP.htm
HTML document, ASCII text, with very long lines (10298), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\email-decode.min[1].js
HTML document, ASCII text, with very long lines (1238)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\font[1].eot
Embedded OpenType (EOT), Nunito Sans 12pt Light family
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PDFixers.exe
"C:\Users\user\Desktop\PDFixers.exe"
malicious

URLs

Name
IP
Malicious
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsZreK
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://pixel.pdfixers.com/_
unknown
https://pixel.pdfixers.com/llF
unknown
http://www.tiro.com
unknown
https://scripts.sil.org/OFLNunitoSans12pt-LightVersion
unknown
http://www.fontbureau.com/designers
unknown
https://pixel.pdfixers.com/https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/ema
unknown
http://www.goodfont.co.kr
unknown
https://scripts.sil.org/OFLNunito
unknown
https://pixel.pdfixers.com/H
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsx
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://pixel.pdfixers.com/3
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js~
unknown
https://scripts.sil.org/OFL
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsC:
unknown
https://pixel.pdfixers.com/cdn-cgi/l/email-protection
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsu
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://pixel.pdfixers.com/#
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsgvZD
unknown
https://pixel.pdfixers.com/.
unknown
https://pixel.pdfixers.com//
unknown
https://pixel.pdfixers.com
unknown
https://pixel.pdfixers.com/-
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://github.com/Fonthausen/NunitoSans)Thread-00001ad0-Id-00000000:SubsetRegularVersion
unknown
https://github.com/Fonthausen/NunitoSans)
unknown
https://pixel.pdfixers.com/
172.67.147.142
https://pixel.pdfixers.com/C:
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
172.67.147.142
https://pixel.pdfixers.comD
unknown
http://www.carterandcone.coml
unknown
https://pixel.pdfixers.com/lE
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js7
unknown
https://pixel.pdfixers.com/p
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://pixel.pdfixers.com/t
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://pixel.pdfixers.com/:#
unknown
http://www.fontbureau.com/designers8
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jss#
unknown
https://pixel.pdfixers.com/...
unknown
https://pixel.pdfixers.com/k
unknown
http://crl.v
unknown
https://pixel.pdfixers.com/h
unknown
https://pixel.pdfixers.com/...p
unknown
There are 53 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pixel.pdfixers.com
172.67.147.142

IPs

IP
Domain
Country
Malicious
172.67.147.142
pixel.pdfixers.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1862B055000
heap
page read and write
1862CED0000
trusted library allocation
page read and write
20EB7FE000
stack
page read and write
18E30BC0000
trusted library allocation
page read and write
18E35597000
trusted library allocation
page read and write
18E35917000
trusted library allocation
page read and write
18E3270F000
trusted library allocation
page read and write
1862ADE6000
heap
page read and write
18E30F20000
trusted library allocation
page read and write
1862ABA0000
heap
page execute and read and write
20E840D000
stack
page read and write
7FF4F9D22000
trusted library allocation
page readonly
18E30947000
trusted library allocation
page read and write
18E2D020000
trusted library allocation
page read and write
1862C6A8000
trusted library allocation
page read and write
18E30CF8000
trusted library allocation
page read and write
18E358CE000
trusted library allocation
page read and write
18E31C4F000
trusted library allocation
page read and write
18E355A5000
trusted library allocation
page read and write
1860FEEC000
unkown
page readonly
18E30A34000
trusted library allocation
page read and write
18E30744000
heap
page read and write
18E31D10000
trusted library allocation
page read and write
18E30F26000
trusted library allocation
page read and write
20EBBFE000
stack
page read and write
18E318B0000
trusted library allocation
page read and write
18E35565000
trusted library allocation
page read and write
18E30A28000
trusted library allocation
page read and write
7FF4F9D25000
trusted library allocation
page execute read
7FFD9BA90000
trusted library allocation
page execute and read and write
18E30F70000
trusted library allocation
page read and write
7FFD9B8FD000
trusted library allocation
page execute and read and write
18E31000000
trusted library allocation
page read and write
18E2CF38000
heap
page read and write
186107E1000
heap
page read and write
18610A23000
trusted library allocation
page read and write
1862AE33000
heap
page read and write
18E309EA000
trusted library allocation
page read and write
18E3355B000
heap
page read and write
1860FEE0000
unkown
page readonly
18E35450000
trusted library allocation
page read and write
18E30573000
heap
page read and write
1862AFD0000
heap
page read and write
1862B06F000
heap
page read and write
18610C00000
heap
page read and write
1862AE25000
heap
page read and write
18E30BF6000
trusted library allocation
page read and write
7FFD9B8ED000
trusted library allocation
page execute and read and write
18610AE0000
heap
page read and write
18E337B9000
heap
page read and write
18E37D00000
trusted library allocation
page read and write
18E31CE0000
trusted library allocation
page read and write
18E30901000
trusted library allocation
page read and write
18E37D10000
trusted library allocation
page read and write
18E30D14000
trusted library allocation
page read and write
18E3376C000
heap
page read and write
7FFD9B8E4000
trusted library allocation
page read and write
186124C1000
trusted library allocation
page read and write
18610970000
heap
page read and write
18E305CF000
heap
page read and write
18E306BB000
heap
page read and write
18E336FF000
heap
page read and write
1862ABA6000
heap
page execute and read and write
18610814000
heap
page read and write
18E31CEC000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
18E3087C000
heap
page read and write
1862C708000
trusted library allocation
page read and write
1862B05E000
heap
page read and write
18E30F66000
trusted library allocation
page read and write
18E35761000
trusted library allocation
page read and write
18E355DA000
trusted library allocation
page read and write
18E358C5000
trusted library allocation
page read and write
18E35891000
trusted library allocation
page read and write
1862ADC3000
heap
page read and write
1862B023000
heap
page read and write
18E31CA0000
trusted library allocation
page read and write
18E30960000
trusted library allocation
page read and write
1862ADDC000
heap
page read and write
18E3559C000
trusted library allocation
page read and write
1862ADB0000
heap
page read and write
18E30F2F000
trusted library allocation
page read and write
1862C66C000
trusted library allocation
page read and write
18E308F0000
trusted library allocation
page read and write
1862AB60000
heap
page read and write
7FFD9BB14000
trusted library allocation
page read and write
1862B015000
heap
page read and write
1862AD9E000
heap
page read and write
18E2CF59000
heap
page read and write
18E30A5F000
trusted library allocation
page read and write
18E30BC5000
trusted library allocation
page read and write
1862C70C000
trusted library allocation
page read and write
7FFD9B8E2000
trusted library allocation
page read and write
7FF4F9D2A000
trusted library allocation
page readonly
1862AE1B000
heap
page read and write
18E338BA000
trusted library allocation
page read and write
7FFD9BB12000
trusted library allocation
page read and write
1862ADE4000
heap
page read and write
18E3714E000
heap
page read and write
18E35929000
trusted library allocation
page read and write
18E31C82000
trusted library allocation
page read and write
1862B076000
heap
page read and write
18E306F5000
heap
page read and write
18E3389A000
trusted library allocation
page read and write
18E318C1000
trusted library allocation
page read and write
18E37162000
heap
page read and write
1861080D000
heap
page read and write
18E3712B000
heap
page read and write
7FF4F9D30000
trusted library allocation
page execute and read and write
18E30029000
heap
page read and write
1862AB80000
heap
page read and write
18E33582000
heap
page read and write
18E30FB4000
trusted library allocation
page read and write
18E325EC000
trusted library allocation
page read and write
1862C754000
trusted library allocation
page read and write
186109F0000
trusted library allocation
page read and write
18E30FFD000
trusted library allocation
page read and write
18E37E08000
heap
page read and write
18E309E8000
trusted library allocation
page read and write
18610C65000
heap
page read and write
18E31C51000
trusted library allocation
page read and write
18E2CF5F000
heap
page read and write
18E30FA2000
trusted library allocation
page read and write
18610C10000
trusted library allocation
page read and write
18E308F8000
trusted library allocation
page read and write
7FF4F9D28000
trusted library allocation
page readonly
1862C71C000
trusted library allocation
page read and write
18E37135000
heap
page read and write
20E9FFE000
stack
page read and write
18E31C10000
trusted library allocation
page read and write
1862C678000
trusted library allocation
page read and write
18E2CF51000
heap
page read and write
18E307EB000
heap
page read and write
18E30F62000
trusted library allocation
page read and write
18E335D5000
heap
page read and write
1862AE3C000
heap
page read and write
7FFD9BAA4000
trusted library allocation
page read and write
18E3091A000
trusted library allocation
page read and write
18E3092B000
trusted library allocation
page read and write
18E31B48000
trusted library allocation
page read and write
20ECBFD000
stack
page read and write
18E349D3000
trusted library allocation
page read and write
18E31027000
trusted library allocation
page read and write
1862AE47000
heap
page read and write
18E3086A000
heap
page read and write
18E37114000
heap
page read and write
18E355E3000
trusted library allocation
page read and write
18E30908000
trusted library allocation
page read and write
18E35883000
trusted library allocation
page read and write
1862C6F8000
trusted library allocation
page read and write
18E325D0000
trusted library allocation
page read and write
1862CE90000
heap
page execute and read and write
18E31B30000
trusted library allocation
page read and write
18622411000
trusted library allocation
page read and write
18E308A3000
heap
page read and write
7FF4F9D24000
trusted library allocation
page readonly
18E355AD000
trusted library allocation
page read and write
1862CEF7000
trusted library allocation
page read and write
7FFD9B99C000
trusted library allocation
page execute and read and write
18E30F3F000
trusted library allocation
page read and write
18E308C3000
heap
page read and write
18E3186F000
trusted library allocation
page read and write
18E309F3000
trusted library allocation
page read and write
18E3069D000
heap
page read and write
18E30980000
trusted library allocation
page read and write
18E31D05000
trusted library allocation
page read and write
18E31022000
trusted library allocation
page read and write
18E30F29000
trusted library allocation
page read and write
18E35608000
trusted library allocation
page read and write
18E3099A000
trusted library allocation
page read and write
1862AD98000
heap
page read and write
18E30F32000
trusted library allocation
page read and write
18E30CD3000
trusted library allocation
page read and write
20E93FE000
stack
page read and write
18E30020000
heap
page read and write
18610AC0000
heap
page read and write
18E30FA5000
trusted library allocation
page read and write
18E370D2000
heap
page read and write
18E3091F000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
18E30B40000
heap
page read and write
18E30918000
trusted library allocation
page read and write
18E35498000
trusted library allocation
page read and write
18E35633000
trusted library allocation
page read and write
18E3071A000
heap
page read and write
18E309A9000
trusted library allocation
page read and write
18E308FD000
trusted library allocation
page read and write
18E378B0000
trusted library allocation
page read and write
18E358E6000
trusted library allocation
page read and write
1862C75B000
trusted library allocation
page read and write
18E307B3000
heap
page read and write
18E35752000
trusted library allocation
page read and write
1862AE2F000
heap
page read and write
18E37DD3000
heap
page read and write
7FFD9BA00000
trusted library allocation
page execute and read and write
18E355D2000
trusted library allocation
page read and write
18E30C60000
trusted library allocation
page read and write
18E33587000
heap
page read and write
18E30FC5000
trusted library allocation
page read and write
18E3092D000
trusted library allocation
page read and write
18E3094A000
trusted library allocation
page read and write
18610A20000
trusted library allocation
page read and write
18E2CF49000
heap
page read and write
18E37DC4000
heap
page read and write
18E37E34000
heap
page read and write
18622418000
trusted library allocation
page read and write
18E3560B000
trusted library allocation
page read and write
1862C732000
trusted library allocation
page read and write
18612493000
trusted library allocation
page read and write
186107A0000
heap
page read and write
18E30502000
heap
page read and write
20E815E000
stack
page read and write
18E349D0000
trusted library allocation
page read and write
18E30B9C000
trusted library allocation
page read and write
18E308AE000
heap
page read and write
18E37E52000
heap
page read and write
1862CEEA000
trusted library allocation
page read and write
18E361B8000
trusted library allocation
page read and write
18E30922000
trusted library allocation
page read and write
18E30F2B000
trusted library allocation
page read and write
18E30BFD000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1862C668000
trusted library allocation
page read and write
18E30D1F000
trusted library allocation
page read and write
18E35922000
trusted library allocation
page read and write
1862C730000
trusted library allocation
page read and write
18E306C3000
heap
page read and write
18E30AB0000
trusted library allocation
page read and write
18E2CF4E000
heap
page read and write
18E30FB6000
trusted library allocation
page read and write
18E3370A000
heap
page read and write
18612411000
trusted library allocation
page read and write
18E309EE000
trusted library allocation
page read and write
18E30A5A000
trusted library allocation
page read and write
18E30F22000
trusted library allocation
page read and write
18E34917000
trusted library allocation
page read and write
1862B006000
heap
page read and write
7FFD9B904000
trusted library allocation
page read and write
18E338A5000
trusted library allocation
page read and write
7FFD9B996000
trusted library allocation
page read and write
1862ADA4000
heap
page read and write
1862CF14000
heap
page read and write
18E3715C000
heap
page read and write
7FFD9BB7B000
trusted library allocation
page read and write
1862C688000
trusted library allocation
page read and write
18E354B1000
trusted library allocation
page read and write
18E30C6A000
trusted library allocation
page read and write
18E318CE000
trusted library allocation
page read and write
1862AC80000
heap
page read and write
18E30FC8000
trusted library allocation
page read and write
18E358B1000
trusted library allocation
page read and write
186106F4000
unkown
page readonly
18610990000
heap
page read and write
18E33593000
heap
page read and write
1861080F000
heap
page read and write
18E30D1C000
trusted library allocation
page read and write
1862C4C0000
heap
page read and write
18E3098B000
trusted library allocation
page read and write
18E30F53000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
18E33863000
heap
page read and write
18E338AD000
trusted library allocation
page read and write
18E30C77000
trusted library allocation
page read and write
18E30828000
heap
page read and write
18E308B8000
heap
page read and write
1862CEF5000
trusted library allocation
page read and write
18E31852000
trusted library allocation
page read and write
18E306BF000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
18E30916000
trusted library allocation
page read and write
18E355B6000
trusted library allocation
page read and write
18E31CD8000
trusted library allocation
page read and write
18E31A44000
trusted library allocation
page read and write
18E337FF000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
18E2CF20000
heap
page read and write
1862AFF6000
heap
page read and write
18E31018000
trusted library allocation
page read and write
1862CF0A000
trusted library allocation
page read and write
18E308F3000
trusted library allocation
page read and write
18E301F9000
heap
page read and write
18E30B84000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
18E31CE8000
trusted library allocation
page read and write
18E31CF3000
trusted library allocation
page read and write
18E336BA000
heap
page read and write
18E355E1000
trusted library allocation
page read and write
18E31025000
trusted library allocation
page read and write
1862AE65000
heap
page read and write
18E358CA000
trusted library allocation
page read and write
1862B053000
heap
page read and write
18E358BB000
trusted library allocation
page read and write
18610C60000
heap
page read and write
18E31C6B000
trusted library allocation
page read and write
18E355F5000
trusted library allocation
page read and write
18E361CF000
trusted library allocation
page read and write
18E30FCC000
trusted library allocation
page read and write
18E31D20000
trusted library allocation
page read and write
18E355A8000
trusted library allocation
page read and write
18610A60000
heap
page read and write
1862C73B000
trusted library allocation
page read and write
1862AE7A000
heap
page read and write
20EAFFB000
stack
page read and write
18E358D8000
trusted library allocation
page read and write
18E30651000
heap
page read and write
18E2CF24000
heap
page read and write
1860FEE2000
unkown
page readonly
18E30F7A000
trusted library allocation
page read and write
18E30F45000
trusted library allocation
page read and write
18E30194000
heap
page read and write
1862AFF4000
heap
page read and write
1862C710000
trusted library allocation
page read and write
186107E3000
heap
page read and write
18E37D30000
trusted library allocation
page read and write
18E30ADE000
trusted library allocation
page read and write
1862AFEB000
heap
page read and write
18E30F81000
trusted library allocation
page read and write
1862C6D5000
trusted library allocation
page read and write
18E361C2000
trusted library allocation
page read and write
18E3389F000
trusted library allocation
page read and write
18610AE5000
heap
page read and write
18E358BF000
trusted library allocation
page read and write
18E30A80000
trusted library allocation
page read and write
20E81AE000
stack
page read and write
1862AE0F000
heap
page read and write
20EB3FB000
stack
page read and write
18E361E4000
trusted library allocation
page read and write
18E3576B000
trusted library allocation
page read and write
186106E2000
unkown
page readonly
18610AD0000
heap
page execute and read and write
1862C740000
trusted library allocation
page read and write
18E30D19000
trusted library allocation
page read and write
1862C6EC000
trusted library allocation
page read and write
18E37898000
trusted library allocation
page read and write
18E30BF0000
trusted library allocation
page read and write
18E33470000
trusted library allocation
page read and write
7FF4F9D23000
trusted library allocation
page execute read
1862ADEC000
heap
page read and write
1862C74C000
trusted library allocation
page read and write
18E30D20000
heap
page read and write
18622421000
trusted library allocation
page read and write
18E33509000
heap
page read and write
1862C0C0000
trusted library allocation
page read and write
18E31C90000
trusted library allocation
page read and write
18E309E0000
trusted library allocation
page read and write
18E358D2000
trusted library allocation
page read and write
1862C6BE000
trusted library allocation
page read and write
18E308B6000
heap
page read and write
1862B07C000
heap
page read and write
18E3589F000
trusted library allocation
page read and write
18E361D6000
trusted library allocation
page read and write
18E304F7000
heap
page read and write
18E30F9C000
trusted library allocation
page read and write
1862C69C000
trusted library allocation
page read and write
20EA3FE000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
18E30F7F000
trusted library allocation
page read and write
18E355FE000
trusted library allocation
page read and write
1862AE3F000
heap
page read and write
18E30147000
heap
page read and write
18E358E3000
trusted library allocation
page read and write
18E349DD000
trusted library allocation
page read and write
1862C6C8000
trusted library allocation
page read and write
18E361C7000
trusted library allocation
page read and write
18E309B6000
trusted library allocation
page read and write
186124ED000
trusted library allocation
page read and write
18E30F36000
trusted library allocation
page read and write
18E318B3000
trusted library allocation
page read and write
18E355EC000
trusted library allocation
page read and write
18610780000
heap
page read and write
18E3096A000
trusted library allocation
page read and write
18E306CF000
heap
page read and write
18E37D40000
heap
page read and write
18E31CF1000
trusted library allocation
page read and write
18E30B00000
trusted library allocation
page execute
18E3347F000
trusted library allocation
page read and write
1862C6FE000
trusted library allocation
page read and write
18E3355D000
heap
page read and write
18E3079E000
heap
page read and write
18E308A5000
heap
page read and write
18E3090A000
trusted library allocation
page read and write
18E30958000
trusted library allocation
page read and write
18E335F6000
heap
page read and write
18E361B0000
trusted library allocation
page read and write
18E3092F000
trusted library allocation
page read and write
186106E7000
unkown
page readonly
1862C6B9000
trusted library allocation
page read and write
1862AD87000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
18E309A0000
trusted library allocation
page read and write
18622434000
trusted library allocation
page read and write
18E31C18000
trusted library allocation
page read and write
18E31CC0000
trusted library allocation
page read and write
1862C6E0000
trusted library allocation
page read and write
18E30BE3000
trusted library allocation
page read and write
18E336FC000
heap
page read and write
7FFD9B9C6000
trusted library allocation
page execute and read and write
7FFD9B8E3000
trusted library allocation
page execute and read and write
1862C0E2000
trusted library allocation
page read and write
18E30C50000
trusted library allocation
page read and write
1862ADF2000
heap
page read and write
1862AFC0000
heap
page read and write
18E3714A000
heap
page read and write
18E31B3B000
trusted library allocation
page read and write
18E355CE000
trusted library allocation
page read and write
20ED7FC000
trusted library allocation
page read and write
18E3090F000
trusted library allocation
page read and write
1862AB85000
heap
page read and write
18E338AA000
trusted library allocation
page read and write
18E338A1000
trusted library allocation
page read and write
1862CEDD000
trusted library allocation
page read and write
18E33490000
heap
page read and write
1862C6F0000
trusted library allocation
page read and write
18E33514000
heap
page read and write
18E37E17000
heap
page read and write
7FFD9B90D000
trusted library allocation
page execute and read and write
18E30979000
trusted library allocation
page read and write
20EC7FE000
stack
page read and write
18E361BB000
trusted library allocation
page read and write
18E33893000
trusted library allocation
page read and write
1862CEFA000
trusted library allocation
page read and write
18610A10000
trusted library allocation
page read and write
18E355C0000
trusted library allocation
page read and write
186124CB000
trusted library allocation
page read and write
18622427000
trusted library allocation
page read and write
18E338B2000
trusted library allocation
page read and write
18E37172000
heap
page read and write
18E30630000
heap
page read and write
7FF4F9D21000
trusted library allocation
page execute read
1862C650000
heap
page read and write
186107AC000
heap
page read and write
18E31CC8000
trusted library allocation
page read and write
18E35925000
trusted library allocation
page read and write
186109B0000
heap
page read and write
18E355C5000
trusted library allocation
page read and write
18E30F6C000
trusted library allocation
page read and write
18E3350C000
heap
page read and write
1862B04F000
heap
page read and write
18E30FA8000
trusted library allocation
page read and write
18E33886000
heap
page read and write
18E30BEC000
trusted library allocation
page read and write
1862ADEA000
heap
page read and write
18E35919000
trusted library allocation
page read and write
18E30FDA000
trusted library allocation
page read and write
1862C680000
trusted library allocation
page read and write
18E3186A000
trusted library allocation
page read and write
18E3064A000
heap
page read and write
18E30A3D000
trusted library allocation
page read and write
18E3061C000
heap
page read and write
18E30B3E000
trusted library allocation
page read and write
18E30FB0000
trusted library allocation
page read and write
18E30FC0000
trusted library allocation
page read and write
18E30F3B000
trusted library allocation
page read and write
1862C700000
trusted library allocation
page read and write
18E358F0000
trusted library allocation
page read and write
18E349EA000
trusted library allocation
page read and write
18E30565000
heap
page read and write
18E30AEA000
trusted library allocation
page read and write
186107A6000
heap
page read and write
18E361D0000
trusted library allocation
page read and write
1862CF10000
heap
page read and write
18E30F40000
trusted library allocation
page read and write
18E308A9000
heap
page read and write
1862CEF0000
trusted library allocation
page read and write
18E2CF54000
heap
page read and write
18E31C8B000
trusted library allocation
page read and write
18E355AF000
trusted library allocation
page read and write
20ECFFE000
stack
page read and write
18E31CD1000
trusted library allocation
page read and write
18E307A0000
heap
page read and write
1862C704000
trusted library allocation
page read and write
18E30F8F000
trusted library allocation
page read and write
1862C758000
trusted library allocation
page read and write
18E306A3000
heap
page read and write
20EA7FD000
stack
page read and write
18E31D14000
trusted library allocation
page read and write
18E325E5000
trusted library allocation
page read and write
20EABFD000
stack
page read and write
1862AC22000
trusted library allocation
page read and write
18E3081C000
heap
page read and write
18E33502000
heap
page read and write
18E308AC000
heap
page read and write
18E35895000
trusted library allocation
page read and write
18E31C01000
trusted library allocation
page read and write
18E35462000
trusted library allocation
page read and write
18E2CF3D000
heap
page read and write
18610AC3000
heap
page read and write
18E301C5000
heap
page read and write
18E30689000
heap
page read and write
20EC3FE000
stack
page read and write
1862B03B000
heap
page read and write
7FFD9B8F2000
trusted library allocation
page read and write
18E30B20000
trusted library allocation
page execute
18E30FBC000
trusted library allocation
page read and write
7FF4F9D2B000
trusted library allocation
page execute read
18E35601000
trusted library allocation
page read and write
20E97FC000
stack
page read and write
18E33487000
trusted library allocation
page read and write
18E37D87000
heap
page read and write
7FFD9B93C000
trusted library allocation
page execute and read and write
1862C750000
trusted library allocation
page read and write
18E30E61000
heap
page read and write
18E306FA000
heap
page read and write
7FF4F9D29000
trusted library allocation
page execute read
20ED3FE000
stack
page read and write
18E338C1000
trusted library allocation
page read and write
18E30C8A000
trusted library allocation
page read and write
18E37090000
heap
page read and write
18E3095D000
trusted library allocation
page read and write
1862C6FC000
trusted library allocation
page read and write
18E31C2D000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
18E31849000
trusted library allocation
page read and write
20EBFFB000
stack
page read and write
18E3071C000
heap
page read and write
18E33898000
trusted library allocation
page read and write
1862CF1D000
heap
page read and write
1862AD80000
heap
page read and write
1862ADDE000
heap
page read and write
18E30990000
trusted library allocation
page read and write
18E35871000
trusted library allocation
page read and write
1862C675000
trusted library allocation
page read and write
1862C6E8000
trusted library allocation
page read and write
1862ADE2000
heap
page read and write
18E3100B000
trusted library allocation
page read and write
18E326F0000
trusted library allocation
page read and write
18E33658000
heap
page read and write
1862CEFE000
trusted library allocation
page read and write
18E3050E000
heap
page read and write
18E304D0000
heap
page read and write
There are 520 hidden memdumps, click here to show them.