Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PDFixers.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\css2[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\QJV1CLZP.htm
|
HTML document, ASCII text, with very long lines (10298), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\email-decode.min[1].js
|
HTML document, ASCII text, with very long lines (1238)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\font[1].eot
|
Embedded OpenType (EOT), Nunito Sans 12pt Light family
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PDFixers.exe
|
"C:\Users\user\Desktop\PDFixers.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsZreK
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://pixel.pdfixers.com/_
|
unknown
|
||
https://pixel.pdfixers.com/llF
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
https://scripts.sil.org/OFLNunitoSans12pt-LightVersion
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://pixel.pdfixers.com/https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/ema
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://scripts.sil.org/OFLNunito
|
unknown
|
||
https://pixel.pdfixers.com/H
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsx
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
https://pixel.pdfixers.com/3
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js~
|
unknown
|
||
https://scripts.sil.org/OFL
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsC:
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/l/email-protection
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsu
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
https://pixel.pdfixers.com/#
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsgvZD
|
unknown
|
||
https://pixel.pdfixers.com/.
|
unknown
|
||
https://pixel.pdfixers.com//
|
unknown
|
||
https://pixel.pdfixers.com
|
unknown
|
||
https://pixel.pdfixers.com/-
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
https://github.com/Fonthausen/NunitoSans)Thread-00001ad0-Id-00000000:SubsetRegularVersion
|
unknown
|
||
https://github.com/Fonthausen/NunitoSans)
|
unknown
|
||
https://pixel.pdfixers.com/
|
172.67.147.142
|
||
https://pixel.pdfixers.com/C:
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
|
172.67.147.142
|
||
https://pixel.pdfixers.comD
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
https://pixel.pdfixers.com/lE
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js7
|
unknown
|
||
https://pixel.pdfixers.com/p
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
https://pixel.pdfixers.com/t
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
https://pixel.pdfixers.com/:#
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jss#
|
unknown
|
||
https://pixel.pdfixers.com/...
|
unknown
|
||
https://pixel.pdfixers.com/k
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://pixel.pdfixers.com/h
|
unknown
|
||
https://pixel.pdfixers.com/...p
|
unknown
|
There are 53 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pixel.pdfixers.com
|
172.67.147.142
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.147.142
|
pixel.pdfixers.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1862B055000
|
heap
|
page read and write
|
||
1862CED0000
|
trusted library allocation
|
page read and write
|
||
20EB7FE000
|
stack
|
page read and write
|
||
18E30BC0000
|
trusted library allocation
|
page read and write
|
||
18E35597000
|
trusted library allocation
|
page read and write
|
||
18E35917000
|
trusted library allocation
|
page read and write
|
||
18E3270F000
|
trusted library allocation
|
page read and write
|
||
1862ADE6000
|
heap
|
page read and write
|
||
18E30F20000
|
trusted library allocation
|
page read and write
|
||
1862ABA0000
|
heap
|
page execute and read and write
|
||
20E840D000
|
stack
|
page read and write
|
||
7FF4F9D22000
|
trusted library allocation
|
page readonly
|
||
18E30947000
|
trusted library allocation
|
page read and write
|
||
18E2D020000
|
trusted library allocation
|
page read and write
|
||
1862C6A8000
|
trusted library allocation
|
page read and write
|
||
18E30CF8000
|
trusted library allocation
|
page read and write
|
||
18E358CE000
|
trusted library allocation
|
page read and write
|
||
18E31C4F000
|
trusted library allocation
|
page read and write
|
||
18E355A5000
|
trusted library allocation
|
page read and write
|
||
1860FEEC000
|
unkown
|
page readonly
|
||
18E30A34000
|
trusted library allocation
|
page read and write
|
||
18E30744000
|
heap
|
page read and write
|
||
18E31D10000
|
trusted library allocation
|
page read and write
|
||
18E30F26000
|
trusted library allocation
|
page read and write
|
||
20EBBFE000
|
stack
|
page read and write
|
||
18E318B0000
|
trusted library allocation
|
page read and write
|
||
18E35565000
|
trusted library allocation
|
page read and write
|
||
18E30A28000
|
trusted library allocation
|
page read and write
|
||
7FF4F9D25000
|
trusted library allocation
|
page execute read
|
||
7FFD9BA90000
|
trusted library allocation
|
page execute and read and write
|
||
18E30F70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
18E31000000
|
trusted library allocation
|
page read and write
|
||
18E2CF38000
|
heap
|
page read and write
|
||
186107E1000
|
heap
|
page read and write
|
||
18610A23000
|
trusted library allocation
|
page read and write
|
||
1862AE33000
|
heap
|
page read and write
|
||
18E309EA000
|
trusted library allocation
|
page read and write
|
||
18E3355B000
|
heap
|
page read and write
|
||
1860FEE0000
|
unkown
|
page readonly
|
||
18E35450000
|
trusted library allocation
|
page read and write
|
||
18E30573000
|
heap
|
page read and write
|
||
1862AFD0000
|
heap
|
page read and write
|
||
1862B06F000
|
heap
|
page read and write
|
||
18610C00000
|
heap
|
page read and write
|
||
1862AE25000
|
heap
|
page read and write
|
||
18E30BF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8ED000
|
trusted library allocation
|
page execute and read and write
|
||
18610AE0000
|
heap
|
page read and write
|
||
18E337B9000
|
heap
|
page read and write
|
||
18E37D00000
|
trusted library allocation
|
page read and write
|
||
18E31CE0000
|
trusted library allocation
|
page read and write
|
||
18E30901000
|
trusted library allocation
|
page read and write
|
||
18E37D10000
|
trusted library allocation
|
page read and write
|
||
18E30D14000
|
trusted library allocation
|
page read and write
|
||
18E3376C000
|
heap
|
page read and write
|
||
7FFD9B8E4000
|
trusted library allocation
|
page read and write
|
||
186124C1000
|
trusted library allocation
|
page read and write
|
||
18610970000
|
heap
|
page read and write
|
||
18E305CF000
|
heap
|
page read and write
|
||
18E306BB000
|
heap
|
page read and write
|
||
18E336FF000
|
heap
|
page read and write
|
||
1862ABA6000
|
heap
|
page execute and read and write
|
||
18610814000
|
heap
|
page read and write
|
||
18E31CEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
18E3087C000
|
heap
|
page read and write
|
||
1862C708000
|
trusted library allocation
|
page read and write
|
||
1862B05E000
|
heap
|
page read and write
|
||
18E30F66000
|
trusted library allocation
|
page read and write
|
||
18E35761000
|
trusted library allocation
|
page read and write
|
||
18E355DA000
|
trusted library allocation
|
page read and write
|
||
18E358C5000
|
trusted library allocation
|
page read and write
|
||
18E35891000
|
trusted library allocation
|
page read and write
|
||
1862ADC3000
|
heap
|
page read and write
|
||
1862B023000
|
heap
|
page read and write
|
||
18E31CA0000
|
trusted library allocation
|
page read and write
|
||
18E30960000
|
trusted library allocation
|
page read and write
|
||
1862ADDC000
|
heap
|
page read and write
|
||
18E3559C000
|
trusted library allocation
|
page read and write
|
||
1862ADB0000
|
heap
|
page read and write
|
||
18E30F2F000
|
trusted library allocation
|
page read and write
|
||
1862C66C000
|
trusted library allocation
|
page read and write
|
||
18E308F0000
|
trusted library allocation
|
page read and write
|
||
1862AB60000
|
heap
|
page read and write
|
||
7FFD9BB14000
|
trusted library allocation
|
page read and write
|
||
1862B015000
|
heap
|
page read and write
|
||
1862AD9E000
|
heap
|
page read and write
|
||
18E2CF59000
|
heap
|
page read and write
|
||
18E30A5F000
|
trusted library allocation
|
page read and write
|
||
18E30BC5000
|
trusted library allocation
|
page read and write
|
||
1862C70C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E2000
|
trusted library allocation
|
page read and write
|
||
7FF4F9D2A000
|
trusted library allocation
|
page readonly
|
||
1862AE1B000
|
heap
|
page read and write
|
||
18E338BA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB12000
|
trusted library allocation
|
page read and write
|
||
1862ADE4000
|
heap
|
page read and write
|
||
18E3714E000
|
heap
|
page read and write
|
||
18E35929000
|
trusted library allocation
|
page read and write
|
||
18E31C82000
|
trusted library allocation
|
page read and write
|
||
1862B076000
|
heap
|
page read and write
|
||
18E306F5000
|
heap
|
page read and write
|
||
18E3389A000
|
trusted library allocation
|
page read and write
|
||
18E318C1000
|
trusted library allocation
|
page read and write
|
||
18E37162000
|
heap
|
page read and write
|
||
1861080D000
|
heap
|
page read and write
|
||
18E3712B000
|
heap
|
page read and write
|
||
7FF4F9D30000
|
trusted library allocation
|
page execute and read and write
|
||
18E30029000
|
heap
|
page read and write
|
||
1862AB80000
|
heap
|
page read and write
|
||
18E33582000
|
heap
|
page read and write
|
||
18E30FB4000
|
trusted library allocation
|
page read and write
|
||
18E325EC000
|
trusted library allocation
|
page read and write
|
||
1862C754000
|
trusted library allocation
|
page read and write
|
||
186109F0000
|
trusted library allocation
|
page read and write
|
||
18E30FFD000
|
trusted library allocation
|
page read and write
|
||
18E37E08000
|
heap
|
page read and write
|
||
18E309E8000
|
trusted library allocation
|
page read and write
|
||
18610C65000
|
heap
|
page read and write
|
||
18E31C51000
|
trusted library allocation
|
page read and write
|
||
18E2CF5F000
|
heap
|
page read and write
|
||
18E30FA2000
|
trusted library allocation
|
page read and write
|
||
18610C10000
|
trusted library allocation
|
page read and write
|
||
18E308F8000
|
trusted library allocation
|
page read and write
|
||
7FF4F9D28000
|
trusted library allocation
|
page readonly
|
||
1862C71C000
|
trusted library allocation
|
page read and write
|
||
18E37135000
|
heap
|
page read and write
|
||
20E9FFE000
|
stack
|
page read and write
|
||
18E31C10000
|
trusted library allocation
|
page read and write
|
||
1862C678000
|
trusted library allocation
|
page read and write
|
||
18E2CF51000
|
heap
|
page read and write
|
||
18E307EB000
|
heap
|
page read and write
|
||
18E30F62000
|
trusted library allocation
|
page read and write
|
||
18E335D5000
|
heap
|
page read and write
|
||
1862AE3C000
|
heap
|
page read and write
|
||
7FFD9BAA4000
|
trusted library allocation
|
page read and write
|
||
18E3091A000
|
trusted library allocation
|
page read and write
|
||
18E3092B000
|
trusted library allocation
|
page read and write
|
||
18E31B48000
|
trusted library allocation
|
page read and write
|
||
20ECBFD000
|
stack
|
page read and write
|
||
18E349D3000
|
trusted library allocation
|
page read and write
|
||
18E31027000
|
trusted library allocation
|
page read and write
|
||
1862AE47000
|
heap
|
page read and write
|
||
18E3086A000
|
heap
|
page read and write
|
||
18E37114000
|
heap
|
page read and write
|
||
18E355E3000
|
trusted library allocation
|
page read and write
|
||
18E30908000
|
trusted library allocation
|
page read and write
|
||
18E35883000
|
trusted library allocation
|
page read and write
|
||
1862C6F8000
|
trusted library allocation
|
page read and write
|
||
18E325D0000
|
trusted library allocation
|
page read and write
|
||
1862CE90000
|
heap
|
page execute and read and write
|
||
18E31B30000
|
trusted library allocation
|
page read and write
|
||
18622411000
|
trusted library allocation
|
page read and write
|
||
18E308A3000
|
heap
|
page read and write
|
||
7FF4F9D24000
|
trusted library allocation
|
page readonly
|
||
18E355AD000
|
trusted library allocation
|
page read and write
|
||
1862CEF7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page execute and read and write
|
||
18E30F3F000
|
trusted library allocation
|
page read and write
|
||
18E308C3000
|
heap
|
page read and write
|
||
18E3186F000
|
trusted library allocation
|
page read and write
|
||
18E309F3000
|
trusted library allocation
|
page read and write
|
||
18E3069D000
|
heap
|
page read and write
|
||
18E30980000
|
trusted library allocation
|
page read and write
|
||
18E31D05000
|
trusted library allocation
|
page read and write
|
||
18E31022000
|
trusted library allocation
|
page read and write
|
||
18E30F29000
|
trusted library allocation
|
page read and write
|
||
18E35608000
|
trusted library allocation
|
page read and write
|
||
18E3099A000
|
trusted library allocation
|
page read and write
|
||
1862AD98000
|
heap
|
page read and write
|
||
18E30F32000
|
trusted library allocation
|
page read and write
|
||
18E30CD3000
|
trusted library allocation
|
page read and write
|
||
20E93FE000
|
stack
|
page read and write
|
||
18E30020000
|
heap
|
page read and write
|
||
18610AC0000
|
heap
|
page read and write
|
||
18E30FA5000
|
trusted library allocation
|
page read and write
|
||
18E370D2000
|
heap
|
page read and write
|
||
18E3091F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
18E30B40000
|
heap
|
page read and write
|
||
18E30918000
|
trusted library allocation
|
page read and write
|
||
18E35498000
|
trusted library allocation
|
page read and write
|
||
18E35633000
|
trusted library allocation
|
page read and write
|
||
18E3071A000
|
heap
|
page read and write
|
||
18E309A9000
|
trusted library allocation
|
page read and write
|
||
18E308FD000
|
trusted library allocation
|
page read and write
|
||
18E378B0000
|
trusted library allocation
|
page read and write
|
||
18E358E6000
|
trusted library allocation
|
page read and write
|
||
1862C75B000
|
trusted library allocation
|
page read and write
|
||
18E307B3000
|
heap
|
page read and write
|
||
18E35752000
|
trusted library allocation
|
page read and write
|
||
1862AE2F000
|
heap
|
page read and write
|
||
18E37DD3000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page execute and read and write
|
||
18E355D2000
|
trusted library allocation
|
page read and write
|
||
18E30C60000
|
trusted library allocation
|
page read and write
|
||
18E33587000
|
heap
|
page read and write
|
||
18E30FC5000
|
trusted library allocation
|
page read and write
|
||
18E3092D000
|
trusted library allocation
|
page read and write
|
||
18E3094A000
|
trusted library allocation
|
page read and write
|
||
18610A20000
|
trusted library allocation
|
page read and write
|
||
18E2CF49000
|
heap
|
page read and write
|
||
18E37DC4000
|
heap
|
page read and write
|
||
18E37E34000
|
heap
|
page read and write
|
||
18622418000
|
trusted library allocation
|
page read and write
|
||
18E3560B000
|
trusted library allocation
|
page read and write
|
||
1862C732000
|
trusted library allocation
|
page read and write
|
||
18612493000
|
trusted library allocation
|
page read and write
|
||
186107A0000
|
heap
|
page read and write
|
||
18E30502000
|
heap
|
page read and write
|
||
20E815E000
|
stack
|
page read and write
|
||
18E349D0000
|
trusted library allocation
|
page read and write
|
||
18E30B9C000
|
trusted library allocation
|
page read and write
|
||
18E308AE000
|
heap
|
page read and write
|
||
18E37E52000
|
heap
|
page read and write
|
||
1862CEEA000
|
trusted library allocation
|
page read and write
|
||
18E361B8000
|
trusted library allocation
|
page read and write
|
||
18E30922000
|
trusted library allocation
|
page read and write
|
||
18E30F2B000
|
trusted library allocation
|
page read and write
|
||
18E30BFD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1862C668000
|
trusted library allocation
|
page read and write
|
||
18E30D1F000
|
trusted library allocation
|
page read and write
|
||
18E35922000
|
trusted library allocation
|
page read and write
|
||
1862C730000
|
trusted library allocation
|
page read and write
|
||
18E306C3000
|
heap
|
page read and write
|
||
18E30AB0000
|
trusted library allocation
|
page read and write
|
||
18E2CF4E000
|
heap
|
page read and write
|
||
18E30FB6000
|
trusted library allocation
|
page read and write
|
||
18E3370A000
|
heap
|
page read and write
|
||
18612411000
|
trusted library allocation
|
page read and write
|
||
18E309EE000
|
trusted library allocation
|
page read and write
|
||
18E30A5A000
|
trusted library allocation
|
page read and write
|
||
18E30F22000
|
trusted library allocation
|
page read and write
|
||
18E34917000
|
trusted library allocation
|
page read and write
|
||
1862B006000
|
heap
|
page read and write
|
||
7FFD9B904000
|
trusted library allocation
|
page read and write
|
||
18E338A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B996000
|
trusted library allocation
|
page read and write
|
||
1862ADA4000
|
heap
|
page read and write
|
||
1862CF14000
|
heap
|
page read and write
|
||
18E3715C000
|
heap
|
page read and write
|
||
7FFD9BB7B000
|
trusted library allocation
|
page read and write
|
||
1862C688000
|
trusted library allocation
|
page read and write
|
||
18E354B1000
|
trusted library allocation
|
page read and write
|
||
18E30C6A000
|
trusted library allocation
|
page read and write
|
||
18E318CE000
|
trusted library allocation
|
page read and write
|
||
1862AC80000
|
heap
|
page read and write
|
||
18E30FC8000
|
trusted library allocation
|
page read and write
|
||
18E358B1000
|
trusted library allocation
|
page read and write
|
||
186106F4000
|
unkown
|
page readonly
|
||
18610990000
|
heap
|
page read and write
|
||
18E33593000
|
heap
|
page read and write
|
||
1861080F000
|
heap
|
page read and write
|
||
18E30D1C000
|
trusted library allocation
|
page read and write
|
||
1862C4C0000
|
heap
|
page read and write
|
||
18E3098B000
|
trusted library allocation
|
page read and write
|
||
18E30F53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
18E33863000
|
heap
|
page read and write
|
||
18E338AD000
|
trusted library allocation
|
page read and write
|
||
18E30C77000
|
trusted library allocation
|
page read and write
|
||
18E30828000
|
heap
|
page read and write
|
||
18E308B8000
|
heap
|
page read and write
|
||
1862CEF5000
|
trusted library allocation
|
page read and write
|
||
18E31852000
|
trusted library allocation
|
page read and write
|
||
18E306BF000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
18E30916000
|
trusted library allocation
|
page read and write
|
||
18E355B6000
|
trusted library allocation
|
page read and write
|
||
18E31CD8000
|
trusted library allocation
|
page read and write
|
||
18E31A44000
|
trusted library allocation
|
page read and write
|
||
18E337FF000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page execute and read and write
|
||
18E2CF20000
|
heap
|
page read and write
|
||
1862AFF6000
|
heap
|
page read and write
|
||
18E31018000
|
trusted library allocation
|
page read and write
|
||
1862CF0A000
|
trusted library allocation
|
page read and write
|
||
18E308F3000
|
trusted library allocation
|
page read and write
|
||
18E301F9000
|
heap
|
page read and write
|
||
18E30B84000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
18E31CE8000
|
trusted library allocation
|
page read and write
|
||
18E31CF3000
|
trusted library allocation
|
page read and write
|
||
18E336BA000
|
heap
|
page read and write
|
||
18E355E1000
|
trusted library allocation
|
page read and write
|
||
18E31025000
|
trusted library allocation
|
page read and write
|
||
1862AE65000
|
heap
|
page read and write
|
||
18E358CA000
|
trusted library allocation
|
page read and write
|
||
1862B053000
|
heap
|
page read and write
|
||
18E358BB000
|
trusted library allocation
|
page read and write
|
||
18610C60000
|
heap
|
page read and write
|
||
18E31C6B000
|
trusted library allocation
|
page read and write
|
||
18E355F5000
|
trusted library allocation
|
page read and write
|
||
18E361CF000
|
trusted library allocation
|
page read and write
|
||
18E30FCC000
|
trusted library allocation
|
page read and write
|
||
18E31D20000
|
trusted library allocation
|
page read and write
|
||
18E355A8000
|
trusted library allocation
|
page read and write
|
||
18610A60000
|
heap
|
page read and write
|
||
1862C73B000
|
trusted library allocation
|
page read and write
|
||
1862AE7A000
|
heap
|
page read and write
|
||
20EAFFB000
|
stack
|
page read and write
|
||
18E358D8000
|
trusted library allocation
|
page read and write
|
||
18E30651000
|
heap
|
page read and write
|
||
18E2CF24000
|
heap
|
page read and write
|
||
1860FEE2000
|
unkown
|
page readonly
|
||
18E30F7A000
|
trusted library allocation
|
page read and write
|
||
18E30F45000
|
trusted library allocation
|
page read and write
|
||
18E30194000
|
heap
|
page read and write
|
||
1862AFF4000
|
heap
|
page read and write
|
||
1862C710000
|
trusted library allocation
|
page read and write
|
||
186107E3000
|
heap
|
page read and write
|
||
18E37D30000
|
trusted library allocation
|
page read and write
|
||
18E30ADE000
|
trusted library allocation
|
page read and write
|
||
1862AFEB000
|
heap
|
page read and write
|
||
18E30F81000
|
trusted library allocation
|
page read and write
|
||
1862C6D5000
|
trusted library allocation
|
page read and write
|
||
18E361C2000
|
trusted library allocation
|
page read and write
|
||
18E3389F000
|
trusted library allocation
|
page read and write
|
||
18610AE5000
|
heap
|
page read and write
|
||
18E358BF000
|
trusted library allocation
|
page read and write
|
||
18E30A80000
|
trusted library allocation
|
page read and write
|
||
20E81AE000
|
stack
|
page read and write
|
||
1862AE0F000
|
heap
|
page read and write
|
||
20EB3FB000
|
stack
|
page read and write
|
||
18E361E4000
|
trusted library allocation
|
page read and write
|
||
18E3576B000
|
trusted library allocation
|
page read and write
|
||
186106E2000
|
unkown
|
page readonly
|
||
18610AD0000
|
heap
|
page execute and read and write
|
||
1862C740000
|
trusted library allocation
|
page read and write
|
||
18E30D19000
|
trusted library allocation
|
page read and write
|
||
1862C6EC000
|
trusted library allocation
|
page read and write
|
||
18E37898000
|
trusted library allocation
|
page read and write
|
||
18E30BF0000
|
trusted library allocation
|
page read and write
|
||
18E33470000
|
trusted library allocation
|
page read and write
|
||
7FF4F9D23000
|
trusted library allocation
|
page execute read
|
||
1862ADEC000
|
heap
|
page read and write
|
||
1862C74C000
|
trusted library allocation
|
page read and write
|
||
18E30D20000
|
heap
|
page read and write
|
||
18622421000
|
trusted library allocation
|
page read and write
|
||
18E33509000
|
heap
|
page read and write
|
||
1862C0C0000
|
trusted library allocation
|
page read and write
|
||
18E31C90000
|
trusted library allocation
|
page read and write
|
||
18E309E0000
|
trusted library allocation
|
page read and write
|
||
18E358D2000
|
trusted library allocation
|
page read and write
|
||
1862C6BE000
|
trusted library allocation
|
page read and write
|
||
18E308B6000
|
heap
|
page read and write
|
||
1862B07C000
|
heap
|
page read and write
|
||
18E3589F000
|
trusted library allocation
|
page read and write
|
||
18E361D6000
|
trusted library allocation
|
page read and write
|
||
18E304F7000
|
heap
|
page read and write
|
||
18E30F9C000
|
trusted library allocation
|
page read and write
|
||
1862C69C000
|
trusted library allocation
|
page read and write
|
||
20EA3FE000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
18E30F7F000
|
trusted library allocation
|
page read and write
|
||
18E355FE000
|
trusted library allocation
|
page read and write
|
||
1862AE3F000
|
heap
|
page read and write
|
||
18E30147000
|
heap
|
page read and write
|
||
18E358E3000
|
trusted library allocation
|
page read and write
|
||
18E349DD000
|
trusted library allocation
|
page read and write
|
||
1862C6C8000
|
trusted library allocation
|
page read and write
|
||
18E361C7000
|
trusted library allocation
|
page read and write
|
||
18E309B6000
|
trusted library allocation
|
page read and write
|
||
186124ED000
|
trusted library allocation
|
page read and write
|
||
18E30F36000
|
trusted library allocation
|
page read and write
|
||
18E318B3000
|
trusted library allocation
|
page read and write
|
||
18E355EC000
|
trusted library allocation
|
page read and write
|
||
18610780000
|
heap
|
page read and write
|
||
18E3096A000
|
trusted library allocation
|
page read and write
|
||
18E306CF000
|
heap
|
page read and write
|
||
18E37D40000
|
heap
|
page read and write
|
||
18E31CF1000
|
trusted library allocation
|
page read and write
|
||
18E30B00000
|
trusted library allocation
|
page execute
|
||
18E3347F000
|
trusted library allocation
|
page read and write
|
||
1862C6FE000
|
trusted library allocation
|
page read and write
|
||
18E3355D000
|
heap
|
page read and write
|
||
18E3079E000
|
heap
|
page read and write
|
||
18E308A5000
|
heap
|
page read and write
|
||
18E3090A000
|
trusted library allocation
|
page read and write
|
||
18E30958000
|
trusted library allocation
|
page read and write
|
||
18E335F6000
|
heap
|
page read and write
|
||
18E361B0000
|
trusted library allocation
|
page read and write
|
||
18E3092F000
|
trusted library allocation
|
page read and write
|
||
186106E7000
|
unkown
|
page readonly
|
||
1862C6B9000
|
trusted library allocation
|
page read and write
|
||
1862AD87000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
18E309A0000
|
trusted library allocation
|
page read and write
|
||
18622434000
|
trusted library allocation
|
page read and write
|
||
18E31C18000
|
trusted library allocation
|
page read and write
|
||
18E31CC0000
|
trusted library allocation
|
page read and write
|
||
1862C6E0000
|
trusted library allocation
|
page read and write
|
||
18E30BE3000
|
trusted library allocation
|
page read and write
|
||
18E336FC000
|
heap
|
page read and write
|
||
7FFD9B9C6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8E3000
|
trusted library allocation
|
page execute and read and write
|
||
1862C0E2000
|
trusted library allocation
|
page read and write
|
||
18E30C50000
|
trusted library allocation
|
page read and write
|
||
1862ADF2000
|
heap
|
page read and write
|
||
1862AFC0000
|
heap
|
page read and write
|
||
18E3714A000
|
heap
|
page read and write
|
||
18E31B3B000
|
trusted library allocation
|
page read and write
|
||
18E355CE000
|
trusted library allocation
|
page read and write
|
||
20ED7FC000
|
trusted library allocation
|
page read and write
|
||
18E3090F000
|
trusted library allocation
|
page read and write
|
||
1862AB85000
|
heap
|
page read and write
|
||
18E338AA000
|
trusted library allocation
|
page read and write
|
||
18E338A1000
|
trusted library allocation
|
page read and write
|
||
1862CEDD000
|
trusted library allocation
|
page read and write
|
||
18E33490000
|
heap
|
page read and write
|
||
1862C6F0000
|
trusted library allocation
|
page read and write
|
||
18E33514000
|
heap
|
page read and write
|
||
18E37E17000
|
heap
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
18E30979000
|
trusted library allocation
|
page read and write
|
||
20EC7FE000
|
stack
|
page read and write
|
||
18E361BB000
|
trusted library allocation
|
page read and write
|
||
18E33893000
|
trusted library allocation
|
page read and write
|
||
1862CEFA000
|
trusted library allocation
|
page read and write
|
||
18610A10000
|
trusted library allocation
|
page read and write
|
||
18E355C0000
|
trusted library allocation
|
page read and write
|
||
186124CB000
|
trusted library allocation
|
page read and write
|
||
18622427000
|
trusted library allocation
|
page read and write
|
||
18E338B2000
|
trusted library allocation
|
page read and write
|
||
18E37172000
|
heap
|
page read and write
|
||
18E30630000
|
heap
|
page read and write
|
||
7FF4F9D21000
|
trusted library allocation
|
page execute read
|
||
1862C650000
|
heap
|
page read and write
|
||
186107AC000
|
heap
|
page read and write
|
||
18E31CC8000
|
trusted library allocation
|
page read and write
|
||
18E35925000
|
trusted library allocation
|
page read and write
|
||
186109B0000
|
heap
|
page read and write
|
||
18E355C5000
|
trusted library allocation
|
page read and write
|
||
18E30F6C000
|
trusted library allocation
|
page read and write
|
||
18E3350C000
|
heap
|
page read and write
|
||
1862B04F000
|
heap
|
page read and write
|
||
18E30FA8000
|
trusted library allocation
|
page read and write
|
||
18E33886000
|
heap
|
page read and write
|
||
18E30BEC000
|
trusted library allocation
|
page read and write
|
||
1862ADEA000
|
heap
|
page read and write
|
||
18E35919000
|
trusted library allocation
|
page read and write
|
||
18E30FDA000
|
trusted library allocation
|
page read and write
|
||
1862C680000
|
trusted library allocation
|
page read and write
|
||
18E3186A000
|
trusted library allocation
|
page read and write
|
||
18E3064A000
|
heap
|
page read and write
|
||
18E30A3D000
|
trusted library allocation
|
page read and write
|
||
18E3061C000
|
heap
|
page read and write
|
||
18E30B3E000
|
trusted library allocation
|
page read and write
|
||
18E30FB0000
|
trusted library allocation
|
page read and write
|
||
18E30FC0000
|
trusted library allocation
|
page read and write
|
||
18E30F3B000
|
trusted library allocation
|
page read and write
|
||
1862C700000
|
trusted library allocation
|
page read and write
|
||
18E358F0000
|
trusted library allocation
|
page read and write
|
||
18E349EA000
|
trusted library allocation
|
page read and write
|
||
18E30565000
|
heap
|
page read and write
|
||
18E30AEA000
|
trusted library allocation
|
page read and write
|
||
186107A6000
|
heap
|
page read and write
|
||
18E361D0000
|
trusted library allocation
|
page read and write
|
||
1862CF10000
|
heap
|
page read and write
|
||
18E30F40000
|
trusted library allocation
|
page read and write
|
||
18E308A9000
|
heap
|
page read and write
|
||
1862CEF0000
|
trusted library allocation
|
page read and write
|
||
18E2CF54000
|
heap
|
page read and write
|
||
18E31C8B000
|
trusted library allocation
|
page read and write
|
||
18E355AF000
|
trusted library allocation
|
page read and write
|
||
20ECFFE000
|
stack
|
page read and write
|
||
18E31CD1000
|
trusted library allocation
|
page read and write
|
||
18E307A0000
|
heap
|
page read and write
|
||
1862C704000
|
trusted library allocation
|
page read and write
|
||
18E30F8F000
|
trusted library allocation
|
page read and write
|
||
1862C758000
|
trusted library allocation
|
page read and write
|
||
18E306A3000
|
heap
|
page read and write
|
||
20EA7FD000
|
stack
|
page read and write
|
||
18E31D14000
|
trusted library allocation
|
page read and write
|
||
18E325E5000
|
trusted library allocation
|
page read and write
|
||
20EABFD000
|
stack
|
page read and write
|
||
1862AC22000
|
trusted library allocation
|
page read and write
|
||
18E3081C000
|
heap
|
page read and write
|
||
18E33502000
|
heap
|
page read and write
|
||
18E308AC000
|
heap
|
page read and write
|
||
18E35895000
|
trusted library allocation
|
page read and write
|
||
18E31C01000
|
trusted library allocation
|
page read and write
|
||
18E35462000
|
trusted library allocation
|
page read and write
|
||
18E2CF3D000
|
heap
|
page read and write
|
||
18610AC3000
|
heap
|
page read and write
|
||
18E301C5000
|
heap
|
page read and write
|
||
18E30689000
|
heap
|
page read and write
|
||
20EC3FE000
|
stack
|
page read and write
|
||
1862B03B000
|
heap
|
page read and write
|
||
7FFD9B8F2000
|
trusted library allocation
|
page read and write
|
||
18E30B20000
|
trusted library allocation
|
page execute
|
||
18E30FBC000
|
trusted library allocation
|
page read and write
|
||
7FF4F9D2B000
|
trusted library allocation
|
page execute read
|
||
18E35601000
|
trusted library allocation
|
page read and write
|
||
20E97FC000
|
stack
|
page read and write
|
||
18E33487000
|
trusted library allocation
|
page read and write
|
||
18E37D87000
|
heap
|
page read and write
|
||
7FFD9B93C000
|
trusted library allocation
|
page execute and read and write
|
||
1862C750000
|
trusted library allocation
|
page read and write
|
||
18E30E61000
|
heap
|
page read and write
|
||
18E306FA000
|
heap
|
page read and write
|
||
7FF4F9D29000
|
trusted library allocation
|
page execute read
|
||
20ED3FE000
|
stack
|
page read and write
|
||
18E338C1000
|
trusted library allocation
|
page read and write
|
||
18E30C8A000
|
trusted library allocation
|
page read and write
|
||
18E37090000
|
heap
|
page read and write
|
||
18E3095D000
|
trusted library allocation
|
page read and write
|
||
1862C6FC000
|
trusted library allocation
|
page read and write
|
||
18E31C2D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
18E31849000
|
trusted library allocation
|
page read and write
|
||
20EBFFB000
|
stack
|
page read and write
|
||
18E3071C000
|
heap
|
page read and write
|
||
18E33898000
|
trusted library allocation
|
page read and write
|
||
1862CF1D000
|
heap
|
page read and write
|
||
1862AD80000
|
heap
|
page read and write
|
||
1862ADDE000
|
heap
|
page read and write
|
||
18E30990000
|
trusted library allocation
|
page read and write
|
||
18E35871000
|
trusted library allocation
|
page read and write
|
||
1862C675000
|
trusted library allocation
|
page read and write
|
||
1862C6E8000
|
trusted library allocation
|
page read and write
|
||
1862ADE2000
|
heap
|
page read and write
|
||
18E3100B000
|
trusted library allocation
|
page read and write
|
||
18E326F0000
|
trusted library allocation
|
page read and write
|
||
18E33658000
|
heap
|
page read and write
|
||
1862CEFE000
|
trusted library allocation
|
page read and write
|
||
18E3050E000
|
heap
|
page read and write
|
||
18E304D0000
|
heap
|
page read and write
|
There are 520 hidden memdumps, click here to show them.