IOC Report
PDFixers.exe

loading gif

Files

File Path
Type
Category
Malicious
PDFixers.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5IQBCSP1\css2[1].css
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\96LGQ1XY\email-decode.min[1].js
HTML document, ASCII text, with very long lines (1238)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\LZ9DK265.htm
HTML document, ASCII text, with very long lines (10298), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\Q33AJR2N.htm
HTML document, ASCII text, with very long lines (10298), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NB937L4Q\font[1].eot
Embedded OpenType (EOT), Nunito Sans 12pt Light family
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-settings.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Desktop\SumatraPDF.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Apr 25 16:39:42 2024, mtime=Thu Apr 25 16:39:42 2024, atime=Wed Oct 25 05:17:54 2023, length=16065496, window=hide
dropped
Chrome Cache Entry: 117
ASCII text, with very long lines (1746)
downloaded
Chrome Cache Entry: 118
ASCII text, with very long lines (772)
downloaded
Chrome Cache Entry: 119
ASCII text
downloaded
Chrome Cache Entry: 120
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 121
ASCII text, with very long lines (3572), with no line terminators
downloaded
Chrome Cache Entry: 122
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 123
ASCII text, with very long lines (2124)
downloaded
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PDFixers.exe
"C:\Users\user\Desktop\PDFixers.exe"
malicious
C:\Users\user\Desktop\PDFixers.exe
"C:\Users\user\Desktop\PDFixers.exe"
malicious
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
"C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe"
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
"C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe"
C:\Windows\System32\notepad.exe
notepad.exe "C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-settings.txt"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1992,i,2968757234271921919,11434174678257635975,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://www.sumatrapdfreader.org/settings/settings3-5-1.html8.33
unknown
http://www.broofa.com
unknown
https://www.sumatrapdfreader.org/manualArialwebsiteArial
unknown
https://github.com/sumatrapdfreader/sumatrapdf/discussions/2316
unknown
https://scripts.sil.org/OFLNunitoSans12pt-LightVersion
unknown
http://www.fontbureau.com/designers
unknown
https://scripts.sil.org/OFLNunito
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://docs.oasis-open.org/ns/office/1.2/meta/odf#StylesFile
unknown
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.gribuser.ru/xml/fictionbook/2.0
unknown
https://github.com/Fonthausen/NunitoSans))
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-s
unknown
https://pixel.pdfixers.com/5
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js.J
unknown
https://scripts.sil.org/OFL
unknown
https://pixel.pdfixers.com/&T
unknown
https://www.sumatrapdfreader.org/dl/prerel/PRE_RELEASE_VER/SumatraPDF-prerel
unknown
https://www.sumatrapdfreader.org/update-check-rel.txtnotifUpdateCheckInProgress
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://www.sumatrapdfreader.org/docs/Keyboard-shortcutssumatrapdfrestrict.inihttps://www.sumatrapdf
unknown
https://pixel.pdfixers.com/#
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.15.104
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
https://www.sumatrapdfreader.org/dl/rel/SumatraPDF-3.5.2-64.pdb.lzsa%
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.sumatrapdfreader.org/docs/Version-history.html
unknown
https://pixel.pdfixers.com/(
unknown
http://www.daisy.org/z3986/2005/ncx/
unknown
https://pixel.pdfixers.com
unknown
https://pixel.pdfixers.com/-
unknown
http://www.idpf.org/2007/opfapplication/xhtml
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsQ
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsG
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://github.com/sumatrapdfreader/sumatrapdf/commit/646d1feddcc80b3b51072c5b27a1446487904175)
unknown
http://docs.oasis-open.org/ns/office/1.2/meta/pkg#Document
unknown
https://www.sumatrapdfreader.org/download-free-pdf-viewer-------------
unknown
https://www.sumatrapdfreader.org/settings/settings3-5-1.html
unknown
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORShttps://github.com/sumatrapdfreade
unknown
https://pixel.pdfixers.com/6R
unknown
https://www.sumatrapdfreader.org/update-check-rel.txt
unknown
http://www.carterandcone.coml
unknown
https://plus.google.com
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
https://pixel.pdfixers.com/#q_
unknown
https://pixel.pdfixers.com/fR
unknown
https://sumatra-website.onrender.com/update-check-rel.txtInstaller64LatestInstaller32InstallerArm64P
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
142.250.105.113
https://www.sumatrapdfreader.org/docs/Corrupted-installation
unknown
https://www.sumatrapdfreader.org/docs/Submit-crash-report.html
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js.
unknown
https://pixel.pdfixers.com/...
unknown
https://www.sumatrapdfreader.org/URLUpdateInfohttps://www.sumatrapdfreader.org/docs/Version-history.
unknown
https://www.sumatrapdfreader.org/settings/settings3-5-1.htmlH
unknown
https://www.deepl.com/translator#-/$
unknown
https://clients6.google.com
unknown
https://pixel.pdfixers.com/...p
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js%
unknown
https://www.sumatrapdfreader.org/download-free-pdf-viewer
unknown
http://www.idpf.org/2007/opf
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://ocsp.sectigo.com0
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-sail-decode.min.jsnC:
unknown
http://www.fontbureau.com/designers?
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
unknown
http://www.tiro.com
unknown
http://docs.oasis-open.org/ns/office/1.2/meta/odf#ContentFile
unknown
http://www.goodfont.co.kr
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://www.typography.netD
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORS
unknown
https://www.sumatrapdfreader.org/docs/Contribute-translation
unknown
http://fontfabrik.com
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsJj
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsy
unknown
https://www.sumatrapdfreader.org/dl/rel/SumatraPDF-3.5.2
unknown
https://www.sumatrapdfreader.org0
unknown
https://www.sumatrapdfreader.org/
unknown
https://csp.withgoogle.com/csp/lcreport/
unknown
https://github.com/Fonthausen/NunitoSans)Thread-0000162c-Id-00000000:SubsetRegularVersion
unknown
https://pixel.pdfixers.com/vRZ
unknown
https://pixel.pdfixers.com/cdn-cgi/l/email-protection
unknown
https://www.sumatrapdfreader.org/dl/rel/SumatraPDF-3.5.2-64.pdb.lzsaM.$
unknown
https://www.sumatrapdfreader.org/docs/Keyboard-shortcuts
unknown
https://://https://translate.google.com/?op=translate&sl=auto&tl=$
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsjs
unknown
https://apis.google.com
unknown
http://www.sakkal.com
unknown
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsa
unknown
https://domains.google.com/suggest/flow
unknown
https://pixel.pdfixers.com/cdn-cgi/l/email-protectionO~
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pixel.pdfixers.com
172.67.147.142
plus.l.google.com
142.250.105.113
www.google.com
142.251.15.104
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.17
unknown
unknown
142.250.105.113
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
172.67.147.142
pixel.pdfixers.com
United States
142.251.15.104
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SumatraPDFUninstall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SumatraPDFUninstall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d5ad0dfbb57c2e\b258eb92
@{microsoft.windows.photos_2019.19071.12548.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.windows.photos/files/assets/photoslogoextensions.png}
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByDirection
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
2
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\2
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\Shell
SniffedFolderType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CIDOpen\Modules\GlobalSettings\ProperTreeModuleInner
ProperTreeModuleInner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByDirection
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosY
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosDX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosDY
There are 48 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
261E4E09000
heap
page read and write
1E53495F000
heap
page read and write
1E1D8A12000
heap
page read and write
2A342E7D000
trusted library allocation
page read and write
261DF5FF000
heap
page read and write
261DF4B2000
heap
page read and write
261DF6A6000
heap
page read and write
2A3277D5000
heap
page read and write
1E1E04F6000
heap
page read and write
261DF4F9000
heap
page read and write
261DDA58000
heap
page read and write
261DDA6F000
heap
page read and write
261DF5EE000
heap
page read and write
261DF4C1000
heap
page read and write
1E1D9A30000
heap
page read and write
2AB472BB000
heap
page read and write
1D9BB520000
heap
page read and write
1E5349E0000
heap
page read and write
E16BFFE000
stack
page read and write
1E534A60000
heap
page read and write
261DF60F000
heap
page read and write
261E4E2C000
heap
page read and write
261DF611000
heap
page read and write
2AB438C0000
trusted library allocation
page read and write
7FF9CB5A0000
trusted library allocation
page read and write
261DF51E000
heap
page read and write
1E53495E000
heap
page read and write
261DF70A000
heap
page read and write
2A327430000
heap
page read and write
2AB49D5E000
heap
page read and write
261DDA75000
heap
page read and write
261DF5E7000
heap
page read and write
261DDA3E000
heap
page read and write
261DF4E8000
heap
page read and write
1E5349E5000
heap
page read and write
7FF9CB470000
trusted library allocation
page read and write
1D9B9B0E000
heap
page read and write
261DDA7F000
heap
page read and write
261DF622000
heap
page read and write
2A32928B000
trusted library allocation
page read and write
261DDA55000
heap
page read and write
1E534750000
heap
page read and write
261DF66C000
heap
page read and write
1D9B9AD0000
heap
page read and write
261DF6D0000
heap
page read and write
2AB47560000
heap
page read and write
1E532DEF000
heap
page read and write
261E33C2000
trusted library allocation
page read and write
261DF5E9000
heap
page read and write
261DDA4A000
heap
page read and write
ADC05FE000
stack
page read and write
1E1DB178000
trusted library allocation
page read and write
2AB483C8000
trusted library allocation
page read and write
2AB4E234000
heap
page read and write
1E1E219A000
heap
page read and write
1E534A02000
heap
page read and write
261DF6B9000
heap
page read and write
261DDA61000
heap
page read and write
261DF447000
heap
page read and write
261E1DAA000
heap
page read and write
1E532DA6000
heap
page read and write
261DF6FC000
heap
page read and write
261DF594000
heap
page read and write
7FF9CD450000
trusted library allocation
page read and write
261E1D8C000
heap
page read and write
261DDAAC000
heap
page read and write
261DF5BB000
heap
page read and write
261DF4DE000
heap
page read and write
22F32E68000
heap
page read and write
2AB43930000
trusted library allocation
page read and write
261DF598000
heap
page read and write
22F347C5000
heap
page read and write
2AB48438000
trusted library allocation
page read and write
2A32746A000
heap
page read and write
261DDA55000
heap
page read and write
ADC09FE000
stack
page read and write
261DF5B9000
heap
page read and write
261DF70E000
heap
page read and write
261DF65A000
heap
page read and write
1E534940000
heap
page read and write
261DDA7F000
heap
page read and write
261DF62F000
heap
page read and write
2A3419A0000
trusted library allocation
page read and write
2A329217000
trusted library allocation
page read and write
1E1D9939000
heap
page read and write
E16D7FD000
stack
page read and write
7FF9CB386000
trusted library allocation
page read and write
ADC1DFD000
stack
page read and write
2AB48460000
trusted library allocation
page read and write
1D9D5C30000
trusted library allocation
page read and write
261DDA5E000
heap
page read and write
1D9CB631000
trusted library allocation
page read and write
7FF9CB2ED000
trusted library allocation
page execute and read and write
2A342F3E000
trusted library allocation
page read and write
1E1DA130000
heap
page read and write
261DD9C4000
heap
page read and write
261DDA72000
heap
page read and write
261DF66F000
heap
page read and write
261DF566000
heap
page read and write
2A327499000
heap
page read and write
261DF4B9000
heap
page read and write
261DDA58000
heap
page read and write
1E1D9981000
heap
page read and write
261DF4BD000
heap
page read and write
2A3273C0000
heap
page read and write
2AB49BA4000
heap
page read and write
261DF4F2000
heap
page read and write
261DF4CD000
heap
page read and write
261DF488000
heap
page read and write
2AB47015000
heap
page read and write
261DDA6C000
heap
page read and write
261DF4C4000
heap
page read and write
2AB438D1000
trusted library allocation
page read and write
7FF4C9B10000
trusted library allocation
page execute and read and write
2A341C72000
heap
page read and write
261E1DA9000
heap
page read and write
261DF470000
heap
page read and write
261E1D9A000
heap
page read and write
261E1DEE000
heap
page read and write
1E534930000
heap
page read and write
1E534BDE000
heap
page read and write
1E5349ED000
heap
page read and write
261DF444000
heap
page read and write
261DF4CA000
heap
page read and write
2AB49A6A000
heap
page read and write
261DF2D0000
heap
page read and write
261DF4E0000
heap
page read and write
261DD91D000
heap
page read and write
261DF42E000
heap
page read and write
E16C3FE000
stack
page read and write
1E5349CA000
heap
page read and write
2A341C0F000
heap
page read and write
1E534BDC000
heap
page read and write
261DDA99000
heap
page read and write
261DF572000
heap
page read and write
1E534920000
heap
page read and write
261DD910000
heap
page read and write
261DF5A0000
heap
page read and write
1E1DCE4D000
heap
page read and write
7FF9CD18D000
trusted library allocation
page execute and read and write
1E1D9A29000
heap
page read and write
1E1DCAD2000
heap
page read and write
2AB4841C000
trusted library allocation
page read and write
1E534A17000
heap
page read and write
261DF5EC000
heap
page read and write
2AB437B0000
heap
page execute and read and write
2AB47226000
heap
page read and write
D13D9F8000
stack
page read and write
1D9D403B000
heap
page read and write
261DF4AA000
heap
page read and write
261DD9FF000
heap
page read and write
1E1D97F4000
heap
page read and write
261DF536000
heap
page read and write
1E5349BA000
heap
page read and write
7FF9CD300000
trusted library allocation
page read and write
22F32ED1000
heap
page read and write
2AB46BC2000
heap
page read and write
261DF598000
heap
page read and write
1E1D8960000
heap
page read and write
261DDA98000
heap
page read and write
261DF4E6000
heap
page read and write
261DF45F000
heap
page read and write
261DF54C000
heap
page read and write
261E1D8C000
heap
page read and write
2AB47AA6000
trusted library allocation
page read and write
261DF425000
heap
page read and write
1D9D42CD000
heap
page read and write
2AB472B3000
heap
page read and write
261DF50B000
heap
page read and write
261DF66A000
heap
page read and write
261DDA89000
heap
page read and write
261DF5EC000
heap
page read and write
261DF6B1000
heap
page read and write
22F32ED3000
heap
page read and write
261E1DFD000
heap
page read and write
1E1D8A07000
heap
page read and write
261DF5CA000
heap
page read and write
261DF49F000
heap
page read and write
2A341BEB000
heap
page read and write
261DDA38000
heap
page read and write
261DF47A000
heap
page read and write
261E1DA4000
heap
page read and write
261DF5D3000
heap
page read and write
7FF771700000
unkown
page readonly
1E5352DB000
heap
page read and write
261DF3D0000
unkown
page read and write
1E1D99A5000
heap
page read and write
D13DDF8000
stack
page read and write
1E5349A1000
heap
page read and write
D13D7FA000
stack
page read and write
261DDA7F000
heap
page read and write
261E1DA3000
heap
page read and write
261DF642000
heap
page read and write
1E53499C000
heap
page read and write
7FF9CD216000
trusted library allocation
page read and write
1E532CA0000
heap
page read and write
2AB4F673000
heap
page read and write
261DF69F000
heap
page read and write
261E1DFA000
heap
page read and write
261DDA36000
heap
page read and write
261DF578000
heap
page read and write
261DF4D7000
heap
page read and write
1E1E21C8000
heap
page read and write
2A3419E6000
heap
page execute and read and write
261E4E37000
heap
page read and write
1E1D99A7000
heap
page read and write
261E1D9F000
heap
page read and write
7FF9CB2D4000
trusted library allocation
page read and write
261DF679000
heap
page read and write
261DF6F8000
heap
page read and write
261DF6FC000
heap
page read and write
261DF523000
heap
page read and write
261E4E36000
heap
page read and write
E16C7FD000
stack
page read and write
261E1DA2000
heap
page read and write
1E1D9BB0000
trusted library allocation
page read and write
1E532E21000
heap
page read and write
261E31F0000
heap
page read and write
2A327497000
heap
page read and write
2A3278E0000
heap
page read and write
7FF772520000
unkown
page read and write
261DDA7C000
heap
page read and write
1E1D9929000
heap
page read and write
1E1E20C8000
heap
page read and write
2AB4F654000
heap
page read and write
1E1E2214000
heap
page read and write
261DF6C9000
heap
page read and write
261DF5C5000
heap
page read and write
261DF4BD000
heap
page read and write
1D9D5330000
heap
page read and write
261DF4AB000
heap
page read and write
261E1D8E000
heap
page read and write
261E1DA8000
heap
page read and write
261DF5CA000
heap
page read and write
261DF5E0000
heap
page read and write
261E4EB8000
heap
page read and write
2AB4714B000
heap
page read and write
261DF5F7000
heap
page read and write
261DDA77000
heap
page read and write
D13E0FE000
stack
page read and write
1E1D99D9000
heap
page read and write
2AB46BBD000
heap
page read and write
7FF9CB390000
trusted library allocation
page execute and read and write
261DF5EC000
heap
page read and write
261DF6B9000
heap
page read and write
261DF6AC000
heap
page read and write
1E53496D000
heap
page read and write
261DF62A000
heap
page read and write
1E534956000
heap
page read and write
261DF5F6000
heap
page read and write
1E1E0410000
heap
page read and write
261DF49E000
heap
page read and write
261DDA99000
heap
page read and write
E16EFFB000
stack
page read and write
261DF4D1000
heap
page read and write
261DF55D000
heap
page read and write
261DDA62000
heap
page read and write
2AB43820000
heap
page read and write
1E532D69000
heap
page read and write
ADC56EE000
stack
page read and write
261DF4E2000
heap
page read and write
261DDA5A000
heap
page read and write
261DF66F000
heap
page read and write
261DF310000
heap
page read and write
BC932FE000
stack
page read and write
7FF9CD410000
trusted library allocation
page read and write
2A341926000
heap
page read and write
261DF6E4000
heap
page read and write
261DD9B0000
heap
page read and write
261DF4CA000
heap
page read and write
261DDAA7000
heap
page read and write
1E1D9AF7000
heap
page read and write
261E1D7E000
heap
page read and write
2AB4718E000
heap
page read and write
261E1DFE000
heap
page read and write
1E534A30000
trusted library section
page readonly
261E1D92000
heap
page read and write
2A342E70000
trusted library allocation
page read and write
1E1E050C000
heap
page read and write
1D9D4230000
heap
page read and write
1E1D9A18000
heap
page read and write
261E4E98000
heap
page read and write
22F32EBC000
heap
page read and write
261DF618000
heap
page read and write
261DF5FE000
heap
page read and write
261DF4AA000
heap
page read and write
261DF575000
heap
page read and write
261DF611000
heap
page read and write
1E1D9C6A000
trusted library allocation
page read and write
22F34873000
heap
page read and write
1E1E0553000
heap
page read and write
261DF6BB000
heap
page read and write
261E1E07000
heap
page read and write
261DF529000
heap
page read and write
2A34303A000
trusted library allocation
page read and write
2AB47163000
heap
page read and write
261DF4DB000
heap
page read and write
1E1D99D5000
heap
page read and write
261DF5EE000
heap
page read and write
1E5349DA000
heap
page read and write
261DF45D000
heap
page read and write
261E1D9D000
heap
page read and write
261DDA6A000
heap
page read and write
1D9D3EB8000
trusted library allocation
page read and write
2AB475D3000
heap
page read and write
2A341B90000
heap
page read and write
1E1DCA80000
heap
page read and write
2AB470F1000
heap
page read and write
ADC3EEE000
stack
page read and write
7FF9CB2E2000
trusted library allocation
page read and write
E170FFE000
stack
page read and write
2AB4716C000
heap
page read and write
D13DEFE000
stack
page read and write
7FF771E23000
unkown
page readonly
261E4EB7000
heap
page read and write
2A327910000
heap
page read and write
261DDA8D000
heap
page read and write
2AB47277000
heap
page read and write
2AB438B0000
trusted library allocation
page read and write
7FF9CB570000
trusted library allocation
page read and write
261DF5F2000
heap
page read and write
1E1E20C5000
heap
page read and write
261DF4F0000
heap
page read and write
1E1E2225000
heap
page read and write
261E1DFD000
heap
page read and write
1D9BB5F0000
heap
page execute and read and write
FAE32FE000
stack
page read and write
1D9D5BE8000
trusted library allocation
page read and write
261DDA6A000
heap
page read and write
261DF4F9000
heap
page read and write
2AB4719C000
heap
page read and write
261DF4E8000
heap
page read and write
261DDA67000
heap
page read and write
2A3277B0000
trusted library allocation
page read and write
261DF53C000
heap
page read and write
E16FBFD000
stack
page read and write
261DF448000
heap
page read and write
261DF6DD000
heap
page read and write
1E5349A7000
heap
page read and write
7FF9CB2D2000
trusted library allocation
page read and write
261DF6E9000
heap
page read and write
1E1DBC4B000
trusted library allocation
page read and write
2AB470CC000
heap
page read and write
22F32E6A000
heap
page read and write
7FF9CD220000
trusted library allocation
page execute and read and write
261DF6B9000
heap
page read and write
2AB46BC8000
heap
page read and write
2AB49AE4000
heap
page read and write
7FF9CB38C000
trusted library allocation
page execute and read and write
1E1D97A2000
heap
page read and write
2AB4E24F000
heap
page read and write
2A3291C0000
heap
page execute and read and write
2A342E8D000
trusted library allocation
page read and write
7FF9CD430000
trusted library allocation
page read and write
261DDA8D000
heap
page read and write
2A342D81000
heap
page read and write
261DF6C2000
heap
page read and write
1D9B9AA5000
heap
page read and write
1E532E25000
heap
page read and write
261E1DF8000
heap
page read and write
1E1D99F5000
heap
page read and write
261DDA4B000
heap
page read and write
261E4E21000
heap
page read and write
261DF5F2000
heap
page read and write
261DF5F1000
heap
page read and write
2A342FCA000
trusted library allocation
page read and write
261DF48D000
heap
page read and write
261DF57C000
heap
page read and write
7FF9CD3FB000
trusted library allocation
page read and write
2AB47037000
heap
page read and write
261DF5EA000
heap
page read and write
261DF57F000
heap
page read and write
7FF9CB480000
trusted library allocation
page execute and read and write
1D9D40B4000
heap
page read and write
1E1E20A0000
heap
page read and write
261DF4F1000
heap
page read and write
1E1D9AAA000
heap
page read and write
261DDA58000
heap
page read and write
2AB49E18000
heap
page read and write
261DF69F000
heap
page read and write
1D9D5C41000
trusted library allocation
page read and write
1D9B9AA0000
heap
page read and write
1D9B9BCD000
heap
page read and write
1E534826000
heap
page read and write
7FF9CB2F0000
trusted library allocation
page read and write
7FF772549000
unkown
page read and write
1E5349CA000
heap
page read and write
261DF510000
heap
page read and write
E1707FC000
stack
page read and write
1E1D5F80000
trusted library allocation
page read and write
261DF5CC000
heap
page read and write
1D9D404E000
heap
page read and write
261DF5EC000
heap
page read and write
261DF5A3000
heap
page read and write
1E1E20B1000
heap
page read and write
22F347F0000
heap
page read and write
261E1560000
trusted library allocation
page read and write
261DDA53000
heap
page read and write
2A3418A7000
heap
page read and write
261E4E3F000
heap
page read and write
2AB476B5000
heap
page read and write
1D9B91EC000
unkown
page readonly
261DF632000
heap
page read and write
1E532E55000
heap
page read and write
261DF507000
heap
page read and write
2A329240000
trusted library allocation
page read and write
22F32EC8000
heap
page read and write
2AB47114000
heap
page read and write
2AB492A0000
trusted library allocation
page read and write
7FF772543000
unkown
page read and write
1E532E53000
heap
page read and write
261E1D7A000
heap
page read and write
1E1D97D9000
heap
page read and write
1D9D3E25000
heap
page read and write
1E1D9740000
heap
page read and write
7FF9CB380000
trusted library allocation
page read and write
261E1DFB000
heap
page read and write
261DF5B7000
heap
page read and write
2AB483A8000
trusted library allocation
page read and write
2A32744B000
heap
page read and write
1D9D4288000
heap
page read and write
1E5349CC000
heap
page read and write
261E1D82000
heap
page read and write
261DF4BA000
heap
page read and write
1E534972000
heap
page read and write
261DF4BD000
heap
page read and write
1D9D40D6000
heap
page read and write
2AB4712C000
heap
page read and write
261DF4C0000
heap
page read and write
261DDAA2000
heap
page read and write
261DDA55000
heap
page read and write
22F32EED000
heap
page read and write
261DF4D7000
heap
page read and write
261E2140000
trusted library section
page readonly
261DF497000
heap
page read and write
261DF49D000
heap
page read and write
2A341895000
heap
page read and write
1E532DB1000
heap
page read and write
1D9D5C74000
trusted library allocation
page read and write
2A32752E000
heap
page read and write
2AB470A8000
heap
page read and write
D13D8F8000
stack
page read and write
261DF5EE000
heap
page read and write
2A3418D8000
heap
page read and write
E16CBFF000
stack
page read and write
261DF410000
heap
page read and write
261DF508000
heap
page read and write
261DF5BF000
heap
page read and write
1E1D9B9D000
trusted library allocation
page read and write
7FF9CB590000
trusted library allocation
page read and write
1E534BDE000
heap
page read and write
261DF5D6000
heap
page read and write
1E53497C000
heap
page read and write
261DDA93000
heap
page read and write
1D9B91E2000
unkown
page readonly
261DF6F1000
heap
page read and write
261DD9E3000
heap
page read and write
1E1D99FE000
heap
page read and write
261DDA79000
heap
page read and write
2AB43848000
trusted library allocation
page read and write
261DDA56000
heap
page read and write
261DF5A0000
heap
page read and write
261E1D8E000
heap
page read and write
261DF508000
heap
page read and write
1E534A20000
unkown
page read and write
2AB493C1000
trusted library allocation
page read and write
261DDA93000
heap
page read and write
261DDAAD000
heap
page read and write
261DF6CC000
heap
page read and write
261DDA89000
heap
page read and write
261E1D9B000
heap
page read and write
261DF419000
heap
page read and write
261DDA55000
heap
page read and write
7FF9CB5B0000
trusted library allocation
page read and write
261E3235000
heap
page read and write
261DF45D000
heap
page read and write
1E1D899F000
heap
page read and write
7FF9CD160000
trusted library allocation
page read and write
261DF63C000
heap
page read and write
261DF507000
heap
page read and write
1E1D97A8000
heap
page read and write
261DF430000
heap
page read and write
261DF4CA000
heap
page read and write
1E1DB1AB000
trusted library allocation
page read and write
261DF670000
heap
page read and write
22F32E94000
heap
page read and write
1E1D9B1B000
heap
page read and write
1D9B99E2000
unkown
page readonly
261DF4C0000
heap
page read and write
261DF594000
heap
page read and write
261DF631000
heap
page read and write
1E532E50000
heap
page read and write
261DDA5F000
heap
page read and write
261DF61F000
heap
page read and write
261DF521000
heap
page read and write
261E1D9D000
heap
page read and write
7FF7725AF000
unkown
page readonly
1D9D5D10000
heap
page read and write
261DF4B3000
heap
page read and write
261DDA9E000
heap
page read and write
D13D6FE000
stack
page read and write
1D9B9BCB000
heap
page read and write
7FF9CD162000
trusted library allocation
page read and write
261E4E0A000
heap
page read and write
261DF45F000
heap
page read and write
1E1D986B000
heap
page read and write
1E534A00000
heap
page read and write
E1703FC000
stack
page read and write
261E1DF8000
heap
page read and write
1D9D5BC8000
trusted library allocation
page read and write
1E5349F2000
heap
page read and write
261DF2D6000
heap
page read and write
2AB476B1000
heap
page read and write
261DF6E8000
heap
page read and write
2AB47A86000
trusted library allocation
page read and write
261DF568000
heap
page read and write
261DDA67000
heap
page read and write
261DF4F1000
heap
page read and write
1E5349EC000
heap
page read and write
261DF682000
heap
page read and write
2A342D70000
heap
page read and write
261DDA5C000
heap
page read and write
261E1E03000
heap
page read and write
1D9B9B10000
heap
page read and write
261DDA97000
heap
page read and write
261DF6DB000
heap
page read and write
261DF43E000
heap
page read and write
1E5349DA000
heap
page read and write
261DDA9D000
heap
page read and write
261DDA9D000
heap
page read and write
261DF50B000
heap
page read and write
1E532D9B000
heap
page read and write
261E1D87000
heap
page read and write
E16ADDE000
stack
page read and write
261E1DA0000
heap
page read and write
1E532D92000
heap
page read and write
ADC19FE000
stack
page read and write
261DDA9D000
heap
page read and write
1E534950000
heap
page read and write
261DF4CD000
heap
page read and write
261DDA72000
heap
page read and write
1E1E0452000
heap
page read and write
261E4EC8000
heap
page read and write
7FF772544000
unkown
page read and write
1E534B0E000
heap
page read and write
261DDA40000
heap
page read and write
261E4E28000
heap
page read and write
1E5348F0000
heap
page read and write
261DDA53000
heap
page read and write
261DDA4A000
heap
page read and write
261DF59A000
heap
page read and write
2AB4721E000
heap
page read and write
261DF4A4000
heap
page read and write
1D9BB600000
heap
page read and write
261DF46C000
heap
page read and write
1E534AD0000
heap
page read and write
261DF66C000
heap
page read and write
1E1E051F000
heap
page read and write
261E1E13000
heap
page read and write
261DF314000
heap
page read and write
1D9D4246000
heap
page read and write
261DF61C000
heap
page read and write
22F32E98000
heap
page read and write
261DF43D000
heap
page read and write
D13DFFB000
stack
page read and write
261DDA8D000
heap
page read and write
261DF436000
heap
page read and write
7FF772520000
unkown
page read and write
1E532E23000
heap
page read and write
2AB49DB2000
heap
page read and write
261DF4EA000
heap
page read and write
1E1DCE79000
heap
page read and write
D13DCF6000
stack
page read and write
1E53497A000
heap
page read and write
1E1E2254000
heap
page read and write
261DF5F2000
heap
page read and write
261DF58B000
heap
page read and write
261E1DE9000
heap
page read and write
2A34197C000
heap
page read and write
1E1D8A23000
heap
page read and write
261DF6EC000
heap
page read and write
2AB49E10000
heap
page read and write
261DF3E0000
heap
page read and write
1E53495C000
heap
page read and write
2A3418AB000
heap
page read and write
261DF573000
heap
page read and write
22F32EDA000
heap
page read and write
261E1D9A000
heap
page read and write
1E1E21DC000
heap
page read and write
261DF70E000
heap
page read and write
261DF4A6000
heap
page read and write
ADBF60D000
stack
page read and write
261DF5EF000
heap
page read and write
261E4E06000
heap
page read and write
261DF692000
heap
page read and write
E16BBFE000
stack
page read and write
1E53499C000
heap
page read and write
1E1D9835000
heap
page read and write
1E1E20C0000
heap
page read and write
1E1D9B93000
trusted library allocation
page read and write
261DF5E1000
heap
page read and write
2AB4F644000
heap
page read and write
2AB473BB000
heap
page read and write
1E1D98D1000
heap
page read and write
2AB4391D000
trusted library allocation
page read and write
261DF550000
heap
page read and write
261DDA89000
heap
page read and write
7FF9CD420000
trusted library allocation
page read and write
261E323A000
heap
page read and write
1E534BDC000
heap
page read and write
2AB4E1CC000
heap
page read and write
261DF671000
heap
page read and write
2A3279B5000
heap
page read and write
261E4EA0000
heap
page read and write
22F347CC000
heap
page read and write
261DF4D1000
heap
page read and write
261DF5FD000
heap
page read and write
2AB47075000
heap
page read and write
261DF5F3000
heap
page read and write
1E53495C000
heap
page read and write
1D9D5BD5000
trusted library allocation
page read and write
D13CEF2000
stack
page read and write
1E53495F000
heap
page read and write
1E534B00000
heap
page read and write
261DDA90000
heap
page read and write
261DF70A000
heap
page read and write
2AB4F75C000
heap
page read and write
FAE337F000
stack
page read and write
2AB46BE2000
heap
page read and write
261DF48D000
heap
page read and write
7FF9CD440000
trusted library allocation
page read and write
1E1D99E1000
heap
page read and write
261DF48C000
heap
page read and write
261DF5EE000
heap
page read and write
261DF4DE000
heap
page read and write
261DDAAA000
heap
page read and write
261E1D8B000
heap
page read and write
261DF62F000
heap
page read and write
1E1D8A8F000
heap
page read and write
2A34196E000
heap
page read and write
261DF5EE000
heap
page read and write
2A3391D8000
trusted library allocation
page read and write
261DD9FC000
heap
page read and write
22F34870000
heap
page read and write
1E5349F0000
heap
page read and write
1E5349E0000
heap
page read and write
261E4EB4000
heap
page read and write
261DF4E2000
heap
page read and write
2AB49A20000
heap
page read and write
1E1D9B3A000
heap
page read and write
7FF9CD16D000
trusted library allocation
page execute and read and write
7FF771C9D000
unkown
page readonly
1E5349DA000
heap
page read and write
261DF480000
heap
page read and write
2A341BA0000
heap
page read and write
261E4F02000
heap
page read and write
261DF4EA000
heap
page read and write
261DF54C000
heap
page read and write
2A341D60000
heap
page read and write
261DDA47000
heap
page read and write
2A341933000
heap
page read and write
261DF4AA000
heap
page read and write
7FF9CB2DD000
trusted library allocation
page execute and read and write
1E1D8AB0000
heap
page read and write
261DDA62000
heap
page read and write
261DF420000
heap
page read and write
2AB46B88000
heap
page read and write
261DDA6F000
heap
page read and write
1E1E2209000
heap
page read and write
261DDAA6000
heap
page read and write
1E5349B3000
heap
page read and write
1E1D9BB5000
trusted library allocation
page read and write
261DF4C8000
heap
page read and write
261DDA51000
heap
page read and write
261DF673000
heap
page read and write
1E1DCC10000
heap
page read and write
2AB43859000
trusted library allocation
page read and write
1E5349B0000
heap
page read and write
261DF507000
heap
page read and write
22F32E94000
heap
page read and write
1E534940000
heap
page read and write
261DD800000
heap
page read and write
1D9D408E000
heap
page read and write
261DF6A4000
heap
page read and write
261DDA5D000
heap
page read and write
261E1D98000
heap
page read and write
261DF4CA000
heap
page read and write
7FF9CD21C000
trusted library allocation
page execute and read and write
1E53499B000
heap
page read and write
261E4E1D000
heap
page read and write
261DF62D000
heap
page read and write
261DF501000
heap
page read and write
7FF771F17000
unkown
page write copy
261E4E1C000
heap
page read and write
2A341BD8000
heap
page read and write
261DF635000
heap
page read and write
261DF69F000
heap
page read and write
261DF4E0000
heap
page read and write
261DF4CA000
heap
page read and write
22F32ED4000
heap
page read and write
1D9B9B03000
heap
page read and write
7FF9CD280000
trusted library allocation
page execute and read and write
2A342E73000
trusted library allocation
page read and write
FAE2F2E000
stack
page read and write
261DDA7A000
heap
page read and write
261DF465000
heap
page read and write
261DF5FF000
heap
page read and write
261DDA8F000
heap
page read and write
261DF6DD000
heap
page read and write
261DDA58000
heap
page read and write
261DDAA2000
heap
page read and write
22F32E91000
heap
page read and write
261E1D8A000
heap
page read and write
261E4E2D000
heap
page read and write
261DF5B5000
heap
page read and write
2AB4727C000
heap
page read and write
261DDA92000
heap
page read and write
261DF598000
heap
page read and write
2A329253000
trusted library allocation
page read and write
261DDA2C000
heap
page read and write
2A3277D0000
heap
page read and write
2AB4712E000
heap
page read and write
22F36FC0000
heap
page read and write
1D9B99E7000
unkown
page readonly
261E4E12000
heap
page read and write
261DF452000
heap
page read and write
261DDA55000
heap
page read and write
261DF539000
heap
page read and write
E171FFF000
stack
page read and write
2A34303F000
trusted library allocation
page read and write
261DF70C000
heap
page read and write
1E5349AC000
heap
page read and write
22F32E9D000
heap
page read and write
2A3273E0000
heap
page read and write
22F32D20000
heap
page read and write
1E1D9B50000
heap
page execute and read and write
261DF63B000
heap
page read and write
2AB48345000
trusted library allocation
page read and write
1E5349E9000
heap
page read and write
261DF5F2000
heap
page read and write
261DDA94000
heap
page read and write
261DF5A7000
heap
page read and write
261DF636000
heap
page read and write
2A3292A6000
trusted library allocation
page read and write
261DF646000
heap
page read and write
261DD8E0000
heap
page read and write
261DF5D8000
heap
page read and write
1E53498C000
heap
page read and write
2AB46B8C000
heap
page read and write
261DF5CD000
heap
page read and write
2AB491A9000
trusted library allocation
page read and write
1E1DCD18000
heap
page read and write
1E534969000
heap
page read and write
261DF6C5000
heap
page read and write
1D9BB6B3000
trusted library allocation
page read and write
1E1D9AAF000
heap
page read and write
1E5349F2000
heap
page read and write
1D9B9CC0000
heap
page read and write
2AB43898000
trusted library allocation
page read and write
2AB47A97000
trusted library allocation
page read and write
261DDA6F000
heap
page read and write
261DF624000
heap
page read and write
261E1D9A000
heap
page read and write
1E53496F000
heap
page read and write
261E4E03000
heap
page read and write
261E1D9D000
heap
page read and write
261DF544000
heap
page read and write
1E532E5E000
heap
page read and write
261DF41E000
heap
page read and write
261DD9D4000
heap
page read and write
7FF77253F000
unkown
page read and write
2AB47A89000
trusted library allocation
page read and write
261DF59A000
heap
page read and write
1E5330DD000
heap
page read and write
261DF444000
heap
page read and write
1E5352D5000
heap
page read and write
2AB47258000
heap
page read and write
2A341BB5000
heap
page read and write
1E1D99D7000
heap
page read and write
1E1DCD48000
heap
page read and write
1E534754000
heap
page read and write
261E4DF4000
heap
page read and write
1E5330D0000
heap
page read and write
261DF589000
heap
page read and write
2AB4E186000
heap
page read and write
1E5349A9000
heap
page read and write
261E1DFF000
heap
page read and write
1E5372A2000
heap
page read and write
1E532E41000
heap
page read and write
1E5349F2000
heap
page read and write
261DF615000
heap
page read and write
2AB46B10000
heap
page read and write
1E1D99C9000
heap
page read and write
7FF771701000
unkown
page execute read
261DDA55000
heap
page read and write
261DF5C8000
heap
page read and write
261E1D9D000
heap
page read and write
1D9D5452000
trusted library allocation
page read and write
261DDA5C000
heap
page read and write
261E1DAC000
heap
page read and write
261DF4C8000
heap
page read and write
1E1D9880000
heap
page read and write
22F32EEA000
heap
page read and write
BC933FE000
stack
page read and write
2AB49C5A000
heap
page read and write
261DF4F1000
heap
page read and write
ADC11FE000
stack
page read and write
261E4E07000
heap
page read and write
261DF4CA000
heap
page read and write
261DF447000
heap
page read and write
261DF633000
heap
page read and write
261DDA68000
heap
page read and write
2AB470BE000
heap
page read and write
E16CFFE000
stack
page read and write
1E532DEF000
heap
page read and write
261DF507000
heap
page read and write
261DDA64000
heap
page read and write
1E5349B8000
heap
page read and write
261DDA94000
heap
page read and write
261DF4AA000
heap
page read and write
261DF511000
heap
page read and write
2AB47066000
heap
page read and write
D13DAFB000
stack
page read and write
1D9D5BFC000
trusted library allocation
page read and write
2AB483B5000
trusted library allocation
page read and write
1D9D3E20000
heap
page read and write
2A32745E000
heap
page read and write
1E1E053A000
heap
page read and write
2A32746D000
heap
page read and write
2AB4DCD2000
trusted library allocation
page read and write
261DDAA2000
heap
page read and write
BC934FF000
stack
page read and write
261DF5FF000
heap
page read and write
261DF4BA000
heap
page read and write
261DF673000
heap
page read and write
ADBFDFE000
stack
page read and write
1E1E052E000
heap
page read and write
1D9D3EB0000
trusted library allocation
page read and write
1E1DA0A0000
heap
page read and write
261DF701000
heap
page read and write
2A341890000
heap
page read and write
22F32EAA000
heap
page read and write
22F32E40000
heap
page read and write
1E1E0557000
heap
page read and write
261DF462000
heap
page read and write
7FF9CB32C000
trusted library allocation
page execute and read and write
1E1E20AA000
heap
page read and write
1E1DCDCA000
heap
page read and write
261DF696000
heap
page read and write
1E1D9D3F000
trusted library allocation
page read and write
261DF554000
heap
page read and write
261DDA55000
heap
page read and write
261DF4F4000
heap
page read and write
261DF692000
heap
page read and write
1D9D4019000
heap
page read and write
2AB46C6D000
heap
page read and write
FAE33FE000
stack
page read and write
1E1D9A37000
heap
page read and write
1D9BB6EB000
trusted library allocation
page read and write
261DF4E6000
heap
page read and write
2A32924C000
trusted library allocation
page read and write
2AB46B7C000
heap
page read and write
261DF5B7000
heap
page read and write
1D9B9B3D000
heap
page read and write
2A3291D1000
trusted library allocation
page read and write
1E5349B8000
heap
page read and write
7FF772549000
unkown
page read and write
261DDAA6000
heap
page read and write
2AB46C75000
heap
page read and write
261DDA49000
heap
page read and write
7FF9CD172000
trusted library allocation
page read and write
261DF456000
heap
page read and write
261DF50B000
heap
page read and write
1D9D4240000
heap
page read and write
1E532D60000
heap
page read and write
261DF5EE000
heap
page read and write
1E53497C000
heap
page read and write
261DDA53000
heap
page read and write
261DF5D6000
heap
page read and write
261DF607000
heap
page read and write
1D9CB638000
trusted library allocation
page read and write
D13D3FE000
stack
page read and write
261DF6E3000
heap
page read and write
22F32ED8000
heap
page read and write
1D9D4003000
heap
page read and write
2A3418CC000
heap
page read and write
ADC46EF000
stack
page read and write
1D9B9AB0000
heap
page read and write
261DF41C000
heap
page read and write
1E5349EE000
heap
page read and write
E170BFE000
stack
page read and write
2AB46CD2000
heap
page read and write
1E1E04B4000
heap
page read and write
2AB49E1E000
heap
page read and write
261DF4B8000
heap
page read and write
1D9B99F4000
unkown
page readonly
261DF49D000
heap
page read and write
261E1DF8000
heap
page read and write
1E1E20B5000
heap
page read and write
1E53497C000
heap
page read and write
2A327390000
heap
page read and write
2AB47105000
heap
page read and write
261E4E4A000
heap
page read and write
1E1D9A26000
heap
page read and write
261DF4BC000
heap
page read and write
2AB48408000
trusted library allocation
page read and write
FAE327E000
stack
page read and write
1E1DB1A0000
trusted library allocation
page read and write
261DDA55000
heap
page read and write
1E532D94000
heap
page read and write
261DF6AA000
heap
page read and write
261DF670000
heap
page read and write
1E1D97BA000
heap
page read and write
2AB4E144000
heap
page read and write
261DDA25000
heap
page read and write
1E5349EE000
heap
page read and write
1E1DCDDB000
heap
page read and write
1E1D9870000
heap
page read and write
261DDAA2000
heap
page read and write
1E534970000
heap
page read and write
2A329285000
trusted library allocation
page read and write
261DF56E000
heap
page read and write
261DF640000
heap
page read and write
1E53492E000
heap
page read and write
261E1E00000
heap
page read and write
E16F7FE000
stack
page read and write
BC937FF000
stack
page read and write
1E1DEEA4000
trusted library allocation
page read and write
261DDA53000
heap
page read and write
2AB4720D000
heap
page read and write
261DF5DC000
heap
page read and write
2AB470F6000
heap
page read and write
2A3418B8000
heap
page read and write
261DF44E000
heap
page read and write
2AB43855000
trusted library allocation
page read and write
1E534976000
heap
page read and write
1E1DB1D8000
trusted library allocation
page read and write
261E4E41000
heap
page read and write
261E4EC4000
heap
page read and write
1E532E41000
heap
page read and write
1D9BB4D0000
trusted library allocation
page read and write
261DDA67000
heap
page read and write
1D9D5343000
heap
page read and write
261DDA5C000
heap
page read and write
261DF6ED000
heap
page read and write
1D9D4275000
heap
page read and write
261E1E03000
heap
page read and write
261E4E9B000
heap
page read and write
261DDA9B000
heap
page read and write
261DF465000
heap
page read and write
261DF48B000
heap
page read and write
1E1D9851000
heap
page read and write
1D9D402F000
heap
page read and write
1E1DB1EC000
trusted library allocation
page read and write
261DF5EF000
heap
page read and write
261DDA75000
heap
page read and write
261DD915000
heap
page read and write
1D9BB620000
heap
page execute and read and write
ADC52EB000
stack
page read and write
261DF5C5000
heap
page read and write
261DF622000
heap
page read and write
2A342F4A000
trusted library allocation
page read and write
261E4DFB000
heap
page read and write
261DF627000
heap
page read and write
2AB46B95000
heap
page read and write
2AB483A0000
trusted library allocation
page read and write
261E4EAD000
heap
page read and write
1D9D424C000
heap
page read and write
261DDA25000
heap
page read and write
261E1E13000
heap
page read and write
1E537290000
heap
page read and write
2A341D64000
heap
page read and write
261DDA6F000
heap
page read and write
7FF772536000
unkown
page read and write
7FF772555000
unkown
page read and write
261DF450000
heap
page read and write
261DDA68000
heap
page read and write
261DDA77000
heap
page read and write
261DF52F000
heap
page read and write
261E1DEF000
heap
page read and write
261E1D90000
heap
page read and write
2A341900000
heap
page read and write
1E534A11000
heap
page read and write
261DF694000
heap
page read and write
D13D0FD000
stack
page read and write
FAE2EA8000
stack
page read and write
261DF5EC000
heap
page read and write
261DDA4C000
heap
page read and write
1E1E20BA000
heap
page read and write
1E5349C9000
heap
page read and write
261DF636000
heap
page read and write
261DF5D4000
heap
page read and write
1E534A12000
heap
page read and write
1D9D4054000
heap
page read and write
261DF507000
heap
page read and write
2A3391D1000
trusted library allocation
page read and write
261DF66A000
heap
page read and write
261DF5A7000
heap
page read and write
2AB47215000
heap
page read and write
261DF4B5000
heap
page read and write
261DF5A9000
heap
page read and write
1E1E054E000
heap
page read and write
261DDA4A000
heap
page read and write
261DDAA6000
heap
page read and write
1D9D3FF0000
heap
page read and write
1E1DB199000
trusted library allocation
page read and write
261E1D9F000
heap
page read and write
1E5349A7000
heap
page read and write
1E1DEEB7000
trusted library allocation
page read and write
1E1D8B27000
heap
page read and write
1E53493E000
heap
page read and write
261DF4C0000
heap
page read and write
261E4AF0000
heap
page read and write
261DF4E8000
heap
page read and write
E16B7FE000
stack
page read and write
2AB49CBC000
heap
page read and write
261E4F02000
heap
page read and write
261DF558000
heap
page read and write
261DF485000
heap
page read and write
261DDA77000
heap
page read and write
261E4DF9000
heap
page read and write
261DDA4F000
heap
page read and write
7FF9CD170000
trusted library allocation
page read and write
1D9D3FFE000
heap
page read and write
261DF692000
heap
page read and write
7FF9CD210000
trusted library allocation
page read and write
261DF58B000
heap
page read and write
1D9D42B4000
heap
page read and write
261E1DA5000
heap
page read and write
261DF6A0000
heap
page read and write
261DF4BA000
heap
page read and write
7FF772538000
unkown
page read and write
1E1E20D0000
heap
page read and write
1D9D40E3000
heap
page read and write
261E4E15000
heap
page read and write
E1713FE000
stack
page read and write
1E1DA129000
heap
page read and write
261DF6BC000
heap
page read and write
1E5349CA000
heap
page read and write
2AB4F743000
heap
page read and write
261DF5A0000
heap
page read and write
261DF414000
heap
page read and write
261DF4B8000
heap
page read and write
2AB4F64D000
heap
page read and write
1D9BB4B0000
trusted library allocation
page read and write
2AB4716E000
heap
page read and write
1E53499D000
heap
page read and write
1E534976000
heap
page read and write
1E532E21000
heap
page read and write
1E1DB1B1000
trusted library allocation
page read and write
2AB46D0E000
heap
page read and write
2AB46FC0000
heap
page read and write
261DF4BD000
heap
page read and write
261E4E19000
heap
page read and write
1E1D978A000
heap
page read and write
1D9D3EE0000
heap
page read and write
1D9D42A1000
heap
page read and write
1E1D9D54000
trusted library allocation
page read and write
261DF629000
heap
page read and write
261DF5A3000
heap
page read and write
261DDA4A000
heap
page read and write
261DF62F000
heap
page read and write
261E1DA8000
heap
page read and write
1E5349B1000
heap
page read and write
1D9D42BD000
heap
page read and write
261DDA9F000
heap
page read and write
2AB47359000
heap
page read and write
261DF494000
heap
page read and write
261DF5E3000
heap
page read and write
261DDA9D000
heap
page read and write
261DF5B4000
heap
page read and write
1D9B9B43000
heap
page read and write
261DF53C000
heap
page read and write
261DDA6A000
heap
page read and write
261DF6AA000
heap
page read and write
1D9D5430000
trusted library allocation
page read and write
1E5349BA000
heap
page read and write
22F32E60000
heap
page read and write
1E1D9C5E000
trusted library allocation
page read and write
1E1D9953000
heap
page read and write
1D9B9A80000
heap
page read and write
1E1E057A000
heap
page read and write
1E1DCE39000
heap
page read and write
261DDAA0000
heap
page read and write
1E534A17000
heap
page read and write
2AB47197000
heap
page read and write
1E534820000
heap
page read and write
1D9B9BBA000
heap
page read and write
1E1D9957000
heap
page read and write
D13DBFA000
stack
page read and write
1D9D5C19000
trusted library allocation
page read and write
1E1E21E0000
heap
page read and write
2AB47005000
heap
page read and write
1E1D8969000
heap
page read and write
261DF48D000
heap
page read and write
261DF5D8000
heap
page read and write
22F32ECF000
heap
page read and write
261DF501000
heap
page read and write
261DF48C000
heap
page read and write
261E4E0F000
heap
page read and write
2AB46C24000
heap
page read and write
261DDA77000
heap
page read and write
261DF413000
heap
page read and write
1D9B9AD6000
heap
page read and write
2AB476E2000
heap
page read and write
2AB4BF20000
trusted library allocation
page read and write
1D9D3EF3000
heap
page read and write
261DDA61000
heap
page read and write
1E1DA122000
heap
page read and write
1E1DA12C000
heap
page read and write
1E532C90000
heap
page read and write
2A342E90000
trusted library allocation
page read and write
261E4E24000
heap
page read and write
261DF586000
heap
page read and write
1D9D5C51000
trusted library allocation
page read and write
2AB4710B000
heap
page read and write
7FF9CD460000
trusted library allocation
page execute and read and write
2AB47021000
heap
page read and write
261DF44F000
heap
page read and write
22F32E00000
heap
page read and write
261E1E04000
heap
page read and write
1E53498A000
heap
page read and write
261E4E19000
heap
page read and write
261DDA7F000
heap
page read and write
7FF772536000
unkown
page read and write
261DF47C000
heap
page read and write
1E534955000
heap
page read and write
7FF9CB2FB000
trusted library allocation
page execute and read and write
1E1D9B90000
trusted library allocation
page read and write
1E1D99CF000
heap
page read and write
1E1D984D000
heap
page read and write
7FF9CD394000
trusted library allocation
page read and write
1E1E223B000
heap
page read and write
ADC15FF000
stack
page read and write
261E1DE8000
heap
page read and write
1D9D409D000
heap
page read and write
261DF63E000
heap
page read and write
261DDA53000
heap
page read and write
261DF4FE000
heap
page read and write
1D9CB654000
trusted library allocation
page read and write
2A343014000
trusted library allocation
page read and write
1D9D5C05000
trusted library allocation
page read and write
1D9D42B9000
heap
page read and write
2AB4F640000
heap
page read and write
2AB47AB4000
trusted library allocation
page read and write
ADC3A9E000
stack
page read and write
261DF692000
heap
page read and write
7FF9CB2F4000
trusted library allocation
page read and write
261DDA75000
heap
page read and write
261DF489000
heap
page read and write
261DF6DF000
heap
page read and write
2A341989000
heap
page read and write
261DF529000
heap
page read and write
1E53497C000
heap
page read and write
261DF464000
heap
page read and write
261DDA8D000
heap
page read and write
2A32924F000
trusted library allocation
page read and write
1E532CC0000
heap
page read and write
261DDA6F000
heap
page read and write
261DF47C000
heap
page read and write
ADC42ED000
stack
page read and write
22F32EB8000
heap
page read and write
2A342EAC000
trusted library allocation
page read and write
D13D1FE000
stack
page read and write
261E1DFD000
heap
page read and write
1D9B9CE5000
heap
page read and write
261E1DA5000
heap
page read and write
261DF6CB000
heap
page read and write
1E1DCE7E000
heap
page read and write
261DDA58000
heap
page read and write
1D9D42C3000
heap
page read and write
261DF6FC000
heap
page read and write
2AB471F0000
heap
page read and write
261E1D72000
heap
page read and write
1E1D9ABC000
heap
page read and write
261DF4E2000
heap
page read and write
E16F3FE000
stack
page read and write
261DF682000
heap
page read and write
1E1D995B000
heap
page read and write
261DF44F000
heap
page read and write
1E1DB210000
trusted library allocation
page read and write
1E1D8ACD000
heap
page read and write
1E5349E2000
heap
page read and write
261DDA90000
heap
page read and write
261DF5EC000
heap
page read and write
2A342E95000
trusted library allocation
page read and write
1D9D3EF0000
heap
page read and write
261DD920000
heap
page read and write
1E532E1D000
heap
page read and write
1E532E5A000
heap
page read and write
1E534958000
heap
page read and write
261DF4BB000
heap
page read and write
1D9B9CE0000
heap
page read and write
261DF686000
heap
page read and write
1E1D8B5E000
heap
page read and write
261E1DF8000
heap
page read and write
261DDA93000
heap
page read and write
261E1D60000
heap
page read and write
1E1D9B36000
heap
page read and write
2A3419E0000
heap
page execute and read and write
261E1DF8000
heap
page read and write
1D9D4072000
heap
page read and write
2A341A43000
heap
page read and write
2AB4E102000
heap
page read and write
261DF62E000
heap
page read and write
261DDA4A000
heap
page read and write
261DF4BA000
heap
page read and write
261DF5CC000
heap
page read and write
BC935FE000
stack
page read and write
1E5330D5000
heap
page read and write
22F347C0000
heap
page read and write
2A329281000
trusted library allocation
page read and write
2AB47298000
heap
page read and write
261E1E13000
heap
page read and write
261E1DF0000
heap
page read and write
2AB47136000
heap
page read and write
261DF5EC000
heap
page read and write
1E5349AE000
heap
page read and write
261E4F30000
heap
page read and write
1E1DB208000
trusted library allocation
page read and write
261E1DB0000
heap
page read and write
1D9D42BB000
heap
page read and write
261E4DFC000
heap
page read and write
7FF9CD246000
trusted library allocation
page execute and read and write
1E532E58000
heap
page read and write
2AB483D8000
trusted library allocation
page read and write
261DF607000
heap
page read and write
261DF5EE000
heap
page read and write
1E1D9B23000
heap
page read and write
1D9BB631000
trusted library allocation
page read and write
2AB483F8000
trusted library allocation
page read and write
BC931FE000
stack
page read and write
261E1DA2000
heap
page read and write
1E53496F000
heap
page read and write
1E1D97AE000
heap
page read and write
261E1DFD000
heap
page read and write
261DF531000
heap
page read and write
261DDAAE000
heap
page read and write
261DF62E000
heap
page read and write
261E1D8E000
heap
page read and write
261DDA72000
heap
page read and write
E16D3FE000
stack
page read and write
1E536A90000
trusted library allocation
page read and write
261DF6C0000
heap
page read and write
261DDA96000
heap
page read and write
1D9CB647000
trusted library allocation
page read and write
7FF9CD1BC000
trusted library allocation
page execute and read and write
1E532D83000
heap
page read and write
261DF5EC000
heap
page read and write
1E1DB171000
trusted library allocation
page read and write
261DF448000
heap
page read and write
261DF4E2000
heap
page read and write
1E1E00AC000
trusted library allocation
page read and write
ADC369B000
stack
page read and write
261DF46C000
heap
page read and write
261DF4F4000
heap
page read and write
261DF5A8000
heap
page read and write
261DF5DE000
heap
page read and write
261DDA55000
heap
page read and write
1D9D400F000
heap
page read and write
1E534955000
heap
page read and write
261DF5EE000
heap
page read and write
2AB472A1000
heap
page read and write
261DDA65000
heap
page read and write
1E1D979B000
heap
page read and write
261DF480000
heap
page read and write
261DF5EC000
heap
page read and write
2A327970000
trusted library allocation
page read and write
2AB4E246000
heap
page read and write
261DDA86000
heap
page read and write
1E1D9A0E000
heap
page read and write
1D9D405C000
heap
page read and write
261DF5AD000
heap
page read and write
E16B00D000
stack
page read and write
261DDA8D000
heap
page read and write
1E1E00B4000
trusted library allocation
page read and write
261DF4EF000
heap
page read and write
1E1D98A0000
heap
page read and write
261DFCE0000
heap
page read and write
1E5349DA000
heap
page read and write
261DF46C000
heap
page read and write
1E534954000
heap
page read and write
2AB472CF000
heap
page read and write
261DF5AB000
heap
page read and write
261E4E08000
heap
page read and write
261DDAAA000
heap
page read and write
D13D2FF000
stack
page read and write
261DF50D000
heap
page read and write
1D9D426F000
heap
page read and write
261DF5F3000
heap
page read and write
1E5349EF000
heap
page read and write
261DF70A000
heap
page read and write
261DDA7A000
heap
page read and write
1D9D40AB000
heap
page read and write
261DF5C8000
heap
page read and write
261DF4F1000
heap
page read and write
2A3273A0000
heap
page read and write
1E53497A000
heap
page read and write
1E1E055E000
heap
page read and write
7FF9CD392000
trusted library allocation
page read and write
2A341BF2000
heap
page read and write
1E1DCE1E000
heap
page read and write
7FF9CD400000
trusted library allocation
page read and write
261DDA80000
heap
page read and write
2A34198E000
heap
page read and write
1E532E5A000
heap
page read and write
261DF6D2000
heap
page read and write
261DF60A000
heap
page read and write
ADC21FD000
stack
page read and write
261DF518000
heap
page read and write
1D9D3FF7000
heap
page read and write
1D9D5BD9000
trusted library allocation
page read and write
1D9D40DE000
heap
page read and write
261DF4A1000
heap
page read and write
1E5349DA000
heap
page read and write
261DDA6B000
heap
page read and write
2A3418EC000
heap
page read and write
1E534A17000
heap
page read and write
261DDAA7000
heap
page read and write
7FF9CB2E0000
trusted library allocation
page read and write
ADC3AEE000
stack
page read and write
1E1DC0BE000
trusted library allocation
page read and write
1E53496F000
heap
page read and write
1D9BB6E1000
trusted library allocation
page read and write
2AB43850000
trusted library allocation
page read and write
1E532E26000
heap
page read and write
1E1D9989000
heap
page read and write
261DF458000
heap
page read and write
7FF9CB3B6000
trusted library allocation
page execute and read and write
261DF6A6000
heap
page read and write
261DDA62000
heap
page read and write
1D9D4013000
heap
page read and write
261DF694000
heap
page read and write
2A3279B0000
heap
page read and write
1E5349DA000
heap
page read and write
261DF5C2000
heap
page read and write
7FF771C9D000
unkown
page readonly
261DF4D4000
heap
page read and write
261E1D73000
heap
page read and write
BC938FF000
stack
page read and write
261DDA53000
heap
page read and write
1E1DCCB6000
heap
page read and write
261DDAA7000
heap
page read and write
1E1E2237000
heap
page read and write
261DF4E8000
heap
page read and write
7FF772555000
unkown
page read and write
261DF666000
heap
page read and write
261DF69F000
heap
page read and write
1E534A39000
trusted library section
page readonly
261E1DA3000
heap
page read and write
261DF5DA000
heap
page read and write
2AB43838000
trusted library allocation
page read and write
2A327790000
trusted library allocation
page read and write
22F32EB4000
heap
page read and write
261DDA68000
heap
page read and write
2AB47A91000
trusted library allocation
page read and write
261E1DFD000
heap
page read and write
261DF53A000
heap
page read and write
2AB472C3000
heap
page read and write
1D9BB590000
trusted library allocation
page read and write
7FF9CB56B000
trusted library allocation
page read and write
261DF5AB000
heap
page read and write
261DDAA6000
heap
page read and write
261E4DF0000
heap
page read and write
261DF5EA000
heap
page read and write
1E1DAF2A000
trusted library allocation
page read and write
1D9BB5F6000
heap
page execute and read and write
261DF671000
heap
page read and write
1E53496F000
heap
page read and write
7FF9CD42D000
trusted library allocation
page read and write
7FF771E21000
unkown
page readonly
1E1DCE2D000
heap
page read and write
261DF589000
heap
page read and write
261DF5BF000
heap
page read and write
1E1D8AAA000
heap
page read and write
261DF4CA000
heap
page read and write
1D9BB550000
heap
page read and write
1E1D98C5000
heap
page read and write
261DF4C4000
heap
page read and write
1E534A17000
heap
page read and write
261E1D97000
heap
page read and write
1E1D97EE000
heap
page read and write
BC936FE000
stack
page read and write
22F367C0000
trusted library allocation
page read and write
261DDA48000
heap
page read and write
261DF5E5000
heap
page read and write
1E5349CA000
heap
page read and write
261DDA36000
heap
page read and write
2AB49BE6000
heap
page read and write
261DDA8D000
heap
page read and write
261DF5EC000
heap
page read and write
1D9B91E0000
unkown
page readonly
1E1D9D3A000
trusted library allocation
page read and write
261DDA55000
heap
page read and write
2AB47348000
heap
page read and write
ADC01FE000
stack
page read and write
261DF458000
heap
page read and write
2A341C02000
heap
page read and write
261DF5BB000
heap
page read and write
261DF507000
heap
page read and write
2AB46C80000
heap
page read and write
1E532E28000
heap
page read and write
1D9B9CA0000
heap
page read and write
7FF9CB2FD000
trusted library allocation
page execute and read and write
1E1D9A08000
heap
page read and write
261DF48B000
heap
page read and write
7FF9CD310000
trusted library allocation
page execute and read and write
261DF5B3000
heap
page read and write
261DF4BA000
heap
page read and write
1E1DCC52000
heap
page read and write
261DF514000
heap
page read and write
2AB4E0B0000
heap
page read and write
261DF5B4000
heap
page read and write
261DF5EE000
heap
page read and write
261DF6A9000
heap
page read and write
261E1DA3000
heap
page read and write
261DF5C5000
heap
page read and write
261DF473000
heap
page read and write
261DF47E000
heap
page read and write
1E5349B3000
heap
page read and write
261DF631000
heap
page read and write
1E1D9BC5000
trusted library allocation
page read and write
261E4E15000
heap
page read and write
261DF4DF000
heap
page read and write
1E1E20AD000
heap
page read and write
2AB470D2000
heap
page read and write
261DDAA0000
heap
page read and write
1E1DB188000
trusted library allocation
page read and write
22F32EC2000
heap
page read and write
2AB4F679000
heap
page read and write
1E1D9CEA000
trusted library allocation
page read and write
1E5349CD000
heap
page read and write
261DF51D000
heap
page read and write
261DF51D000
heap
page read and write
2AB4726C000
heap
page read and write
261E1DEE000
heap
page read and write
BC930F7000
stack
page read and write
261DF5EA000
heap
page read and write
7FF9CB3F0000
trusted library allocation
page execute and read and write
2AB47056000
heap
page read and write
261E4E06000
heap
page read and write
2AB49080000
trusted library allocation
page read and write
261DF4E0000
heap
page read and write
1E1D9AB7000
heap
page read and write
261DF48C000
heap
page read and write
261DF6C5000
heap
page read and write
1E1E21AB000
heap
page read and write
1E1DC0B5000
trusted library allocation
page read and write
1E1DCB0C000
heap
page read and write
1E5349DB000
heap
page read and write
1E1D9801000
heap
page read and write
261E1DF2000
heap
page read and write
1E1D8A37000
heap
page read and write
261DDA62000
heap
page read and write
261DDA58000
heap
page read and write
261DDA6C000
heap
page read and write
1E5349E2000
heap
page read and write
261E4E36000
heap
page read and write
1E5349AE000
heap
page read and write
2A329180000
heap
page read and write
1E5348D0000
heap
page read and write
E16DBFD000
stack
page read and write
2AB43879000
trusted library allocation
page read and write
1E534970000
heap
page read and write
1E5352B0000
heap
page read and write
261DDA68000
heap
page read and write
1E1D9885000
heap
page read and write
261DDA91000
heap
page read and write
1E532E53000
heap
page read and write
7FF771E2E000
unkown
page readonly
FAE2FAE000
stack
page read and write
261DD960000
heap
page read and write
2AB43885000
trusted library allocation
page read and write
261E4E12000
heap
page read and write
261DDA7E000
heap
page read and write
261DF6C0000
heap
page read and write
1D9D4064000
heap
page read and write
1E5349A7000
heap
page read and write
7FF9CB580000
trusted library allocation
page read and write
1E1D89E5000
heap
page read and write
7FF9CB2D3000
trusted library allocation
page execute and read and write
1E53497C000
heap
page read and write
7FF9CD17D000
trusted library allocation
page execute and read and write
1E53498C000
heap
page read and write
261DF440000
heap
page read and write
1E5349DD000
heap
page read and write
261DF604000
heap
page read and write
2A329296000
trusted library allocation
page read and write
7FF9CD164000
trusted library allocation
page read and write
7FF9CD184000
trusted library allocation
page read and write
261DDA91000
heap
page read and write
2AB4F756000
heap
page read and write
1E532DB8000
heap
page read and write
261DF627000
heap
page read and write
1E532E25000
heap
page read and write
261DF54C000
heap
page read and write
261DF6B3000
heap
page read and write
261E1DE9000
heap
page read and write
1D9D4042000
heap
page read and write
261DF441000
heap
page read and write
261DDA59000
heap
page read and write
1E534A12000
heap
page read and write
1E53496A000
heap
page read and write
7FF9CD324000
trusted library allocation
page read and write
261E1DE9000
heap
page read and write
261DF69B000
heap
page read and write
261E3210000
heap
page read and write
2AB43924000
trusted library allocation
page read and write
1E534959000
heap
page read and write
1E1D9BAD000
trusted library allocation
page read and write
261DDA58000
heap
page read and write
2AB46B4A000
heap
page read and write
261E4EC1000
heap
page read and write
1E1D993E000
heap
page read and write
1D9B9B12000
heap
page read and write
261DF66F000
heap
page read and write
D13D4FE000
stack
page read and write
261DF430000
heap
page read and write
261DDA62000
heap
page read and write
1E53494E000
heap
page read and write
261E1DA9000
heap
page read and write
261DF604000
heap
page read and write
261DF4ED000
heap
page read and write
261DF4F4000
heap
page read and write
D13CFFE000
stack
page read and write
1E534976000
heap
page read and write
261DF636000
heap
page read and write
261DF56E000
heap
page read and write
261E1DA3000
heap
page read and write
261E3223000
heap
page read and write
1E1D9BCC000
trusted library allocation
page read and write
1D9CB641000
trusted library allocation
page read and write
2A341A40000
heap
page read and write
2AB46C08000
heap
page read and write
261DDA5A000
heap
page read and write
22F32EA5000
heap
page read and write
261DF445000
heap
page read and write
261DDA53000
heap
page read and write
7FF40F120000
trusted library allocation
page execute and read and write
1E1DEFD8000
trusted library allocation
page read and write
2AB47129000
heap
page read and write
1E53497A000
heap
page read and write
1E1D9947000
heap
page read and write
7FF9CD163000
trusted library allocation
page execute and read and write
1E53497D000
heap
page read and write
261DDAA6000
heap
page read and write
1E1DEC00000
trusted library allocation
page read and write
261E1D87000
heap
page read and write
7FF9CD180000
trusted library allocation
page read and write
261DF5DF000
heap
page read and write
261DDA99000
heap
page read and write
261DF5FF000
heap
page read and write
1E5349CD000
heap
page read and write
1E1DA201000
heap
page read and write
1E5349F1000
heap
page read and write
261DDA92000
heap
page read and write
ADC0DFD000
stack
page read and write
1E1DCE16000
heap
page read and write
1E53497C000
heap
page read and write
261DF5EE000
heap
page read and write
261E1D94000
heap
page read and write
261DDA62000
heap
page read and write
261DDAA2000
heap
page read and write
261DF6C9000
heap
page read and write
22F32EDE000
heap
page read and write
1E534A02000
heap
page read and write
2A3391FC000
trusted library allocation
page read and write
2A341C57000
heap
page read and write
261DF465000
heap
page read and write
261DF46B000
heap
page read and write
1D9D5BB8000
trusted library allocation
page read and write
261E1DFD000
heap
page read and write
2A341990000
heap
page read and write
261DF4EF000
heap
page read and write
1E53499F000
heap
page read and write
261E4EC8000
heap
page read and write
1E534950000
heap
page read and write
261DF596000
heap
page read and write
1E1DB1C4000
trusted library allocation
page read and write
261DF47C000
heap
page read and write
7FF9CD18B000
trusted library allocation
page execute and read and write
261DDA9E000
heap
page read and write
1E534976000
heap
page read and write
2A341981000
heap
page read and write
2AB49DC6000
heap
page read and write
261DDAA8000
heap
page read and write
22F347D0000
trusted library allocation
page read and write
261DF4EF000
heap
page read and write
E16FFFE000
stack
page read and write
261DDA61000
heap
page read and write
261E1DB0000
heap
page read and write
2A3391E1000
trusted library allocation
page read and write
261DF70A000
heap
page read and write
There are 1583 hidden memdumps, click here to show them.