IOC Report
cfe.pdf

loading gif

Files

File Path
Type
Category
Malicious
cfe.pdf
PDF document, version 1.5 (zip deflate encoded)
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\0e6bc036-b13a-48de-a8f8-e2c1a0fd2dfd.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF52b576.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\b057c45d-c10e-4309-9102-2dfe4dbd3f9c.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db
SQLite 3.x database, last written using SQLite version 3040000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-shm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\Adobe\CoreSync\EntitySync\80307f885d209ff3421f3adf000d6b1e.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\Eureka\AcroCoreSync\CreativeCloud\CoreSync\EntitySync-2024-04-19.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 8, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Acrobat\RFL\LocalMapping\RFLDB230-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-240419170542Z-626.bmp
PC bitmap, Windows 3.x format, 123 x -152 x 32, cbSize 74838, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer
SQLite 3.x database, last written using SQLite version 3040000, file counter 1, database pages 23, cookie 0x11, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\Reader\Synchronizer\metadata\Synchronizer-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6336
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 28, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 28
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSI230b5.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A97qw2z8_126o9c5_4w0.tmp
PDF document, version 1.6, 0 pages
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-04-19 19-05-40-871.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\01411f4f-35d9-4754-88e8-7e2df95783c0.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\125a61a5-9311-4c66-83cd-7c0a2e6c7e27.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\3b3c5b4d-7157-465a-abde-561172faa16f.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\535b7662-f55a-4e23-ae19-f3f8f3a5352b.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\c6ff3461-6fcd-46d9-a990-27c959f3cc2e.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobData
ASCII text
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobSettings
ASCII text
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\addressbook.acrodata
ISO-8859 text, with very long lines (3486), with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\TMDocs.sav
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\TMGrpPrm.sav
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 16:05:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 16:05:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 16:05:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 16:05:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 16:05:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 333
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 334
PNG image data, 370 x 110, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 335
PNG image data, 370 x 110, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 336
PNG image data, 158 x 46, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 337
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 338
Web Open Font Format (Version 2), TrueType, length 23040, version 1.0
downloaded
Chrome Cache Entry: 339
ASCII text, with very long lines (4270), with CRLF line terminators
downloaded
Chrome Cache Entry: 340
Web Open Font Format (Version 2), TrueType, length 48236, version 1.0
downloaded
Chrome Cache Entry: 341
ASCII text, with very long lines (2363)
downloaded
Chrome Cache Entry: 342
PNG image data, 1663 x 201, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 343
PNG image data, 260 x 124, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 344
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
downloaded
Chrome Cache Entry: 345
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 346
PNG image data, 158 x 46, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 347
PNG image data, 4 x 20, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 348
PNG image data, 4 x 20, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 349
Unicode text, UTF-8 (with BOM) text, with very long lines (1607), with CRLF line terminators
downloaded
Chrome Cache Entry: 350
ASCII text, with very long lines (56398), with no line terminators
downloaded
Chrome Cache Entry: 351
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 474x277, components 3
downloaded
Chrome Cache Entry: 352
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 353
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 354
Web Open Font Format (Version 2), TrueType, length 48208, version 1.0
downloaded
Chrome Cache Entry: 355
ASCII text, with very long lines (5533), with CRLF line terminators
downloaded
Chrome Cache Entry: 356
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 357
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 358
ASCII text, with very long lines (1572)
downloaded
Chrome Cache Entry: 359
PNG image data, 188 x 100, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 360
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 361
PNG image data, 114 x 40, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 362
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=319, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=422], baseline, precision 8, 422x319, components 3
downloaded
Chrome Cache Entry: 363
PNG image data, 158 x 46, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 364
ASCII text, with very long lines (640), with CRLF line terminators
downloaded
Chrome Cache Entry: 365
PNG image data, 157 x 46, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 366
ASCII text
downloaded
Chrome Cache Entry: 367
PNG image data, 158 x 46, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 368
PNG image data, 370 x 110, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 369
PNG image data, 1663 x 201, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 370
PNG image data, 188 x 100, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 371
Unicode text, UTF-8 (with BOM) text, with very long lines (6281), with CRLF line terminators
downloaded
Chrome Cache Entry: 372
ASCII text, with very long lines (449), with CRLF line terminators
downloaded
Chrome Cache Entry: 373
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
downloaded
Chrome Cache Entry: 374
PNG image data, 188 x 100, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 375
Unicode text, UTF-8 (with BOM) text, with very long lines (1864), with CRLF line terminators
downloaded
Chrome Cache Entry: 376
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 377
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
Chrome Cache Entry: 378
HTML document, ASCII text, with very long lines (1716), with CRLF line terminators
downloaded
Chrome Cache Entry: 379
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 380
PNG image data, 158 x 46, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 381
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 382
PNG image data, 370 x 110, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 383
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 474x277, components 3
dropped
Chrome Cache Entry: 384
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 385
Unicode text, UTF-8 (with BOM) text, with very long lines (30125), with CRLF line terminators
downloaded
Chrome Cache Entry: 386
PNG image data, 188 x 100, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 387
PNG image data, 370 x 110, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 388
PNG image data, 370 x 110, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 389
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 390
ASCII text, with very long lines (1619), with CRLF line terminators
downloaded
Chrome Cache Entry: 391
PNG image data, 4 x 20, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 392
ASCII text, with very long lines (19512)
downloaded
Chrome Cache Entry: 393
PNG image data, 114 x 40, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 394
ASCII text, with very long lines (65450), with CRLF line terminators
downloaded
Chrome Cache Entry: 395
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 396
ASCII text, with very long lines (35247), with CRLF line terminators
downloaded
Chrome Cache Entry: 397
ASCII text
downloaded
Chrome Cache Entry: 398
PNG image data, 157 x 46, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 399
ASCII text, with very long lines (544), with CRLF line terminators
downloaded
Chrome Cache Entry: 400
PNG image data, 188 x 100, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 401
Web Open Font Format, TrueType, length 543120, version 1.0
downloaded
Chrome Cache Entry: 402
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 403
PNG image data, 157 x 46, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 404
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 405
ASCII text, with very long lines (44174), with CRLF line terminators
downloaded
Chrome Cache Entry: 406
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 407
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 408
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
downloaded
Chrome Cache Entry: 409
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 410
PNG image data, 114 x 40, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 411
ASCII text, with very long lines (65329), with CRLF line terminators
downloaded
Chrome Cache Entry: 412
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 413
ASCII text, with very long lines (65259), with CRLF line terminators
downloaded
Chrome Cache Entry: 414
ASCII text, with very long lines (44317), with CRLF line terminators
downloaded
Chrome Cache Entry: 415
ASCII text, with very long lines (19512)
downloaded
Chrome Cache Entry: 416
ASCII text, with very long lines (37921), with CRLF line terminators
downloaded
Chrome Cache Entry: 417
ASCII text, with very long lines (17696)
downloaded
Chrome Cache Entry: 418
ASCII text, with very long lines (491), with CRLF line terminators
downloaded
Chrome Cache Entry: 419
ASCII text, with very long lines (1222), with no line terminators
downloaded
Chrome Cache Entry: 420
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 421
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 422
Unicode text, UTF-8 (with BOM) text, with very long lines (65289), with CRLF line terminators
downloaded
Chrome Cache Entry: 423
PNG image data, 1663 x 201, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 424
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 425
ASCII text, with very long lines (449), with CRLF line terminators
downloaded
Chrome Cache Entry: 426
ASCII text, with very long lines (570)
downloaded
Chrome Cache Entry: 427
Unicode text, UTF-8 text, with very long lines (23122), with CRLF line terminators
downloaded
Chrome Cache Entry: 428
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 429
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 430
HTML document, Unicode text, UTF-8 text, with very long lines (6817), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 431
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 432
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 433
PNG image data, 158 x 46, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 434
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 435
PNG image data, 260 x 124, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 436
ASCII text, with very long lines (39257), with CRLF line terminators
downloaded
Chrome Cache Entry: 437
PNG image data, 157 x 46, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 438
PNG image data, 1663 x 201, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 439
Web Open Font Format, TrueType, length 543120, version 1.0
downloaded
Chrome Cache Entry: 440
HTML document, Unicode text, UTF-8 text, with very long lines (446), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 441
PNG image data, 158 x 46, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 442
PNG image data, 370 x 110, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 443
PNG image data, 1280 x 266, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 444
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
downloaded
Chrome Cache Entry: 445
ASCII text, with very long lines (570)
downloaded
Chrome Cache Entry: 446
ASCII text, with very long lines (14900), with CRLF line terminators
downloaded
Chrome Cache Entry: 447
PNG image data, 1280 x 266, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 448
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 474x277, components 3
downloaded
Chrome Cache Entry: 449
ASCII text, with very long lines (22924), with CRLF line terminators
downloaded
Chrome Cache Entry: 450
ASCII text, with very long lines (6488), with CRLF line terminators
downloaded
Chrome Cache Entry: 451
ASCII text, with very long lines (7023), with CRLF line terminators
downloaded
Chrome Cache Entry: 452
PNG image data, 260 x 124, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 453
ASCII text
downloaded
Chrome Cache Entry: 454
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=319, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=422], baseline, precision 8, 422x319, components 3
dropped
Chrome Cache Entry: 455
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 456
ASCII text, with very long lines (491), with CRLF line terminators
downloaded
Chrome Cache Entry: 457
ASCII text, with very long lines (5217), with CRLF line terminators
downloaded
Chrome Cache Entry: 458
ASCII text, with very long lines (554)
downloaded
Chrome Cache Entry: 459
PNG image data, 188 x 100, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 460
HTML document, ASCII text, with very long lines (5358), with CRLF line terminators
downloaded
Chrome Cache Entry: 461
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 462
PNG image data, 158 x 46, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 463
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 464
PNG image data, 370 x 110, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 465
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 466
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
dropped
Chrome Cache Entry: 467
ASCII text, with very long lines (5955)
downloaded
Chrome Cache Entry: 468
PNG image data, 4 x 20, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 469
ASCII text
downloaded
Chrome Cache Entry: 470
ASCII text, with very long lines (554)
downloaded
Chrome Cache Entry: 471
PNG image data, 260 x 124, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 472
PNG image data, 114 x 40, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 473
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 474x277, components 3
dropped
Chrome Cache Entry: 474
ASCII text, with very long lines (12478), with CRLF line terminators
downloaded
Chrome Cache Entry: 475
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 150x150, components 3
downloaded
There are 202 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\cfe.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=6548
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=6788
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=6836
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=2068
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=5868
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c
C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe" -c --type=collab-renderer --proc=1468
C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\RDCNotificationClient\FullTrustNotifier.exe" GetChannelUri
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2256 --field-trial-handle=1552,i,18275696280309620062,7559789885298821235,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://app.cfe.mx/Aplicaciones/CCFE/Actualizate/actualizate.aspx?Qr=QRMNS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://app.cfe.mx/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1996,i,301792546836870307,18013821345576096488,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 --field-trial-handle=2432,i,4629129982367612958,15584890058314916864,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://robert-fleischmann.de)
unknown
https://app.cfe.mx/cdn/2019/assets/images/pnt.png
45.60.151.51
https://stats.g.doubleclick.net/g/collect
unknown
https://www.cfe.mx/hogar/infcliente/pages/costoreconexion.aspx
unknown
https://www.cfe.mx/cdn/2019/Imagenes/Menu/menu.jpg
45.60.151.51
https://developers.google.com/recaptcha/docs/faq#localhost_support
unknown
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.bootstrap.js
45.60.151.51
https://cdn.cfe.mx/2019/assets/js/plugins.js
45.60.151.51
https://www.cfe.mx/ah/Paginas/default.aspx
unknown
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.swiper.js
45.60.151.51
http://daverupert.com
unknown
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.color.js
45.60.151.51
https://www.cfe.mx/hogar/actualizate/pages/default.aspx
unknown
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.sticky-sidebar.js
45.60.151.51
https://github.com/plentz/jquery-maskmoney
unknown
https://www.cfe.mx/cdn/2019/assets/images/logo.png
45.60.151.51
https://cdn.cfe.mx/2019/assets/js/jquery.js
45.60.151.51
https://cdn.cfe.mx/2019/assets/images/world-map.png
45.60.151.51
https://github.com/jquery/jquery-color
unknown
about:blank
https://cdn.cfe.mx/2019/Imagenes/Menu/servicios_hogar.jpg
45.60.151.51
https://www.google.com/recaptcha/api2/bframe?hl=en&v=rz4DvU-cY2JYCwHSTck0_qm-&k=6Lecr_gZAAAAAGOim0B7pXfRwwcNSkd7OnRMhmn8
https://cdn.cfe.mx/2019/assets/css/swiper.css
45.60.151.51
http://jqueryui.com/themeroller/?ffDefault=Verdana%2CArial%2Csans-serif&fwDefault=normal&fsDefault=1
unknown
https://www.cfe.mx/cdn/jquery/3.5.1/jquery-3.5.1.min.js
45.60.151.51
https://dribbble.com/account/applications/new
unknown
https://www.cfe.mx/cdn/2019/assets/images/logo@2x.png
45.60.151.51
http://www.opensource.org/licenses/mit-license.php
unknown
https://www.cfe.mx/estructura/Pages/default.aspx
unknown
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://android.notify.windows.com/iOSx
unknown
https://www.cfe.mx/hogar/tarifas/pages/esquema-tarifario-vigente.aspx
unknown
https://app.cfe.mx/Aplicaciones/Otros/Buscador
45.60.151.51
https://play.google.com/store/apps/details?id=mx.com.cfe.cfecontigo&hl=es_MX
unknown
https://app.cfe.mx/Aplicaciones/Otros/Buscador/default.css
45.60.151.51
https://support.google.com/recaptcha/#6175971
unknown
https://www.cfe.mx/hogar/centroatencion/pages/consulta.aspx
unknown
https://www.cfe.mx/hogar/infcliente/pages/default.aspx
unknown
https://www.instagram.com/cfe_nacional/
unknown
https://appgallery.huawei.com/#/app/C104017977
unknown
https://wns.windows.com/
unknown
https://android.notify.windows.com/iOSf
unknown
https://cdn.cfe.mx/2019/assets/css/responsive.css
45.60.151.51
https://www.cfe.mx/cdn/2019/assets/images/gplay.png
45.60.151.51
https://support.google.com/recaptcha
unknown
https://www.google.com/js/bg/rIjZlM8ZNfOeVQTojtt5OPuY9YnE0CAT82tG0V-YUX0.js
172.253.124.106
https://www.google.com/cse/cse.js?cx=010660822816477542700:cv_p85xlu4y
64.233.185.99
https://www.cfe.mx/cdn/2019/assets/css/fonts/font-icons.woff
45.60.151.51
http://benalman.com/projects/jquery-hashchange-plugin/
unknown
https://www.cfe.mx/suministrobasico
unknown
http://www.idangero.us/swiper/
unknown
https://www.cfe.mx/nuestraempresa/Pages/mision.aspx
unknown
https://www.cfe.mx/cdn/2019/Imagenes/Menu/servicios_agricola.jpg
45.60.151.51
https://developers.google.com/recaptcha/docs/faq#my-computer-or-network-may-be-sending-automated-que
unknown
http://inicio.ifai.org.mx/SitePages/ifai.aspx
unknown
https://www.cfe.mx/cdn/2019/Imagenes/Menu/foto_clientes.jpg
45.60.151.51
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.superfish.js
45.60.151.51
http://www.opensource.org/licenses/mit-license.php)
unknown
https://cdn.cfe.mx/2019/assets/images/gplay.png
45.60.151.51
https://www.google.com/sorry/index?continue=https://cse.google.com/cse/cse.js%3Fcx%3D010660822816477542700:cv_p85xlu4y&q=EgRRtTk0GO3IirEGIjAPWsbcWREQIfUEKTiyBjqYGJH6f8x_5QM6KO9C7tOPhe3ESw7l9SXiVYBnvfxI2e0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
64.233.185.99
https://www.cfe.mx/hogar/tarifas/pages/modifica-tarifas.aspx
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://stats.g.doubleclick.net/g/collect?v=2&
unknown
https://cdn.cfe.mx/2019/assets/images/cot.png
45.60.151.51
https://github.com/js-cookie/js-cookie
unknown
https://appgallery5.huawei.com/#/app/C101693327
unknown
https://www.cfe.mx/Filiales
unknown
https://cdn.cfe.mx/2019/assets/css/bootstrap.css
45.60.151.51
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.toastr.js
45.60.151.51
https://app.cfe.mx/Aplicaciones/CCFE/Actualizate/WebResource.axd?d=x3di-63xdyzHecJJ2xfzA5eOGjd7j7hhtcaoVsj4bfLQ4W3sB5SgwYttaw78n1vukZS9WurJzyfsWTBz3Jtb6v7Hxjs1&t=637814437746327080
45.60.151.51
https://www.cfe.mx/cdn/2019/assets/images/favico.png
45.60.151.51
https://app.cfe.mx/_Incapsula_Resource?SWKMTFSR=1&e=0.9352659225359723
45.60.151.51
https://www.cfe.mx/Generacion
unknown
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.fitvids.js
45.60.151.51
https://www.cfe.mx/hogar/nuevocontrato/pages/dondecontratar.aspx
unknown
http://sam.zoy.org/wtfpl/
unknown
https://cdn.cfe.mx/2019/assets/images/headers/Header
unknown
https://github.com/bas2k/jquery.appear/
unknown
https://www.cfe.mx/nuestraempresa/Pages/vision.aspx
unknown
https://www.cfe.mx/concursoscontratos/Pages/default.aspx
unknown
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.appear.js
45.60.151.51
https://www.cfe.mx/transparencia_etica/Pages/default.aspx
unknown
https://www.cfe.mx/Industria
unknown
https://cse.google.com/cse/cse.js?cx=010660822816477542700:cv_p85xlu4y
74.125.136.102
https://www.cfe.mx/hogar/tarifas/pages/acervo-historico-tarifario.aspx
unknown
https://stats.g.doubleclick.net/g/collect?v=2&tid=G-HHX5QY23J4&cid=1781228907.1713546348&gtm=45je44h0v888298854za200&aip=1&dma=0&gcd=13l3l3l3l1&npa=0
64.233.177.157
https://www.cfe.mx/desarrollo_social/Pages/default.aspx
unknown
https://www.cfe.mx/dir_comunicacion/Pages/default.aspx
unknown
https://cloud.google.com/contact
unknown
https://www.cfe.mx/cdn/2019/assets/images/logo
unknown
http://daneden.me/animate
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppx
unknown
https://app.cfe.mx/Aplicaciones/OTROS/Boletines/Prensa
unknown
https://www.google.com/recaptcha/api.js
64.233.185.99
https://home.inai.org.mx/
unknown
https://www.cfe.mx/cdn/2019/assets/js/plugins/jquery.tabs.js
45.60.151.51
https://www.cfe.mx/cdn/2019/assets/js/jquery.SharePointFormSubmit.js
45.60.151.51
https://www.cfe.mx/cdn/2019/assets/css/responsive.css
45.60.151.51
https://www.cfe.mx/cdn/2019/Imagenes/Menu/menu_comunic.jpg
45.60.151.51
http://consultapublicamx.inai.org.mx:8080/vut-web/?idSujetoObigadoParametro=77&idEntidadParametr
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
x5o9arz.ng.impervadns.net
45.60.151.51
code.jquery.com
151.101.66.137
cse.google.com
74.125.136.102
www.google.com
172.253.124.104
td.doubleclick.net
64.233.176.157
analytics.google.com
74.125.136.101
e85dinu.ng.impervadns.net
45.60.151.51
zy3wnvi.ng.impervadns.net
45.60.151.51
stats.g.doubleclick.net
64.233.177.157
cdn.cfe.mx
unknown
app.cfe.mx
unknown
www.cfe.mx
unknown
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.16
unknown
unknown
172.253.124.106
unknown
United States
172.253.124.104
www.google.com
United States
64.233.177.157
stats.g.doubleclick.net
United States
151.101.66.137
code.jquery.com
United States
74.125.136.101
analytics.google.com
United States
64.233.176.157
td.doubleclick.net
United States
74.125.136.102
cse.google.com
United States
45.60.151.51
x5o9arz.ng.impervadns.net
United States
23.54.200.159
unknown
United States
239.255.255.250
unknown
Reserved
64.233.185.99
unknown
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\Privileged
syncFolderSetupDone
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\WebSocketNotifInfra
bisWSExpEnabled
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Synchronizer\DC\Acrobat.com
tUniqueIdForEureka
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29FE000
stack
page read and write
1F095B70000
heap
page read and write
1F095BA1000
heap
page read and write
1F095D74000
heap
page read and write
1F093E5B000
heap
page read and write
1F095D97000
heap
page read and write
2664D292000
heap
page read and write
2B6D000
stack
page read and write
1F093E6F000
heap
page read and write
1FA72473000
heap
page read and write
1F095D55000
heap
page read and write
662D6FF000
stack
page read and write
1F095BCE000
heap
page read and write
1F093E5F000
heap
page read and write
1F093E0E000
heap
page read and write
2525000
heap
page read and write
1F095B22000
heap
page read and write
1FA723FB000
heap
page read and write
1F093DF2000
heap
page read and write
1F095D82000
heap
page read and write
1F093E5B000
heap
page read and write
1F095D74000
heap
page read and write
1F093E6F000
heap
page read and write
19AE77FA000
heap
page read and write
1F093E4A000
heap
page read and write
2664D1C0000
heap
page read and write
2664D2C3000
heap
page read and write
1F095D74000
heap
page read and write
1C52C355000
heap
page read and write
1FA725B5000
heap
page read and write
1F095B99000
heap
page read and write
1F933E16000
heap
page read and write
1F095BEC000
heap
page read and write
1C6C2CB0000
heap
page read and write
1F095DA7000
heap
page read and write
1F095D57000
heap
page read and write
B3BBAF6000
stack
page read and write
1F093E6A000
heap
page read and write
1C6C0FC0000
heap
page read and write
1F095D57000
heap
page read and write
1F933E83000
heap
page read and write
1F093E74000
heap
page read and write
2892FB40000
heap
page read and write
1F093E4A000
heap
page read and write
1F095D57000
heap
page read and write
1F933E27000
heap
page read and write
1F095D52000
heap
page read and write
1F095BA1000
heap
page read and write
1C52C389000
heap
page read and write
1C6C0F7E000
heap
page read and write
1F095BEC000
heap
page read and write
1F095D5F000
heap
page read and write
260D1194000
heap
page read and write
1F095DA7000
heap
page read and write
2664D190000
heap
page read and write
98E2FE000
stack
page read and write
1F095D58000
heap
page read and write
1F093E5C000
heap
page read and write
1FA724A5000
heap
page read and write
1F093E9D000
heap
page read and write
6042FFE000
stack
page read and write
1BDC1E2B000
heap
page read and write
260D1142000
heap
page read and write
1C6C0F9C000
heap
page read and write
260D115F000
heap
page read and write
1F093E54000
heap
page read and write
1F095BA1000
heap
page read and write
1F095BCE000
heap
page read and write
1F093E0E000
heap
page read and write
2892DDD8000
heap
page read and write
1C52C337000
heap
page read and write
1BDC1E4F000
heap
page read and write
2892DDAB000
heap
page read and write
2A9CF3C000
stack
page read and write
1DB0C8F9000
heap
page read and write
1F095B80000
heap
page read and write
1F093E75000
heap
page read and write
1F095BEC000
heap
page read and write
1F095D5F000
heap
page read and write
1F095DA7000
heap
page read and write
1F095D93000
heap
page read and write
1F095D4C000
heap
page read and write
1F095D57000
heap
page read and write
1F933E5F000
heap
page read and write
1F093E5F000
heap
page read and write
1C6C0FAB000
heap
page read and write
1F093E5B000
heap
page read and write
1C6C0F73000
heap
page read and write
98E7FD000
stack
page read and write
1C6C0FC3000
heap
page read and write
1F095D5C000
heap
page read and write
19AE77EB000
heap
page read and write
1F093E6F000
heap
page read and write
1F933E59000
heap
page read and write
1DB0C8AD000
heap
page read and write
1F093E5F000
heap
page read and write
1F095D5C000
heap
page read and write
1F095BEC000
heap
page read and write
1C52C36C000
heap
page read and write
1F093DF2000
heap
page read and write
1F095D74000
heap
page read and write
1F095BE8000
heap
page read and write
1F093FD0000
heap
page read and write
1F093E6A000
heap
page read and write
1F095DAB000
heap
page read and write
2892DDA9000
heap
page read and write
1F095D93000
heap
page read and write
1F095D91000
heap
page read and write
2892DDC5000
heap
page read and write
1F095D82000
heap
page read and write
1F095D97000
heap
page read and write
1F095DA7000
heap
page read and write
1F095D82000
heap
page read and write
1C6C0FA0000
heap
page read and write
2A9E6FF000
stack
page read and write
1F095B75000
heap
page read and write
1F095D78000
heap
page read and write
2892DBB0000
heap
page read and write
2892DCB0000
heap
page read and write
19AE783F000
heap
page read and write
1DB0C887000
heap
page read and write
1F093DF3000
heap
page read and write
2664D281000
heap
page read and write
1F095BEC000
heap
page read and write
1F095D74000
heap
page read and write
ADE000
stack
page read and write
1F093E5F000
heap
page read and write
662D2FF000
stack
page read and write
2892DDDA000
heap
page read and write
1F093E9D000
heap
page read and write
1F095B0F000
heap
page read and write
1F093E56000
heap
page read and write
1BDC1E72000
heap
page read and write
1F095D82000
heap
page read and write
2664D27D000
heap
page read and write
260D11B9000
heap
page read and write
260D11C0000
heap
page read and write
1DB0C87D000
heap
page read and write
1F095DA7000
heap
page read and write
A6D5CFF000
stack
page read and write
1FA7243C000
heap
page read and write
1C6C0F61000
heap
page read and write
1F095D57000
heap
page read and write
1F093E75000
heap
page read and write
1F933E54000
heap
page read and write
1F093E5F000
heap
page read and write
1DB0C887000
heap
page read and write
1DB0C89B000
heap
page read and write
1DB0C8A0000
heap
page read and write
1F093E54000
heap
page read and write
1F095D58000
heap
page read and write
1BDC1D70000
heap
page read and write
1F095BEC000
heap
page read and write
1F095D74000
heap
page read and write
1F933E3C000
heap
page read and write
1F095D74000
heap
page read and write
98C6DFE000
stack
page read and write
1C6C0F81000
heap
page read and write
1F095D74000
heap
page read and write
1F093E5F000
heap
page read and write
1C6C0FBB000
heap
page read and write
1F095D57000
heap
page read and write
1C52C341000
heap
page read and write
1BDC1E84000
heap
page read and write
1F095D82000
heap
page read and write
1F095D74000
heap
page read and write
1F093DF2000
heap
page read and write
1F095BCE000
heap
page read and write
1BDC1E26000
heap
page read and write
1FA72330000
heap
page read and write
1C52C35F000
heap
page read and write
1BDC1E63000
heap
page read and write
1F095D58000
heap
page read and write
98E0FE000
stack
page read and write
1F095B74000
heap
page read and write
1F095BEC000
heap
page read and write
1C52C327000
heap
page read and write
1C52C325000
heap
page read and write
1F095D74000
heap
page read and write
1F095B54000
heap
page read and write
1F095D82000
heap
page read and write
1C52C34F000
heap
page read and write
260D1176000
heap
page read and write
2892DDA5000
heap
page read and write
2892DDE2000
heap
page read and write
1F094005000
heap
page read and write
1F095D5F000
heap
page read and write
1F095B5D000
heap
page read and write
1F093E6F000
heap
page read and write
1F095B0F000
heap
page read and write
1C6C0F91000
heap
page read and write
19AE77F3000
heap
page read and write
2BAD000
stack
page read and write
B3BB5FF000
stack
page read and write
1FA72453000
heap
page read and write
260D115C000
heap
page read and write
1F093E5B000
heap
page read and write
1F095B78000
heap
page read and write
260D1174000
heap
page read and write
1F095BE8000
heap
page read and write
1C52C32D000
heap
page read and write
1F095D57000
heap
page read and write
1F095D4A000
heap
page read and write
28A6DEA0000
heap
page read and write
7B5000
heap
page read and write
1F093E6A000
heap
page read and write
1F253FF000
stack
page read and write
1F095D82000
heap
page read and write
1F093C40000
heap
page read and write
1F095D93000
heap
page read and write
6042EFE000
stack
page read and write
1DB0C87E000
heap
page read and write
1F095D82000
heap
page read and write
2892DDC3000
heap
page read and write
1F095D74000
heap
page read and write
1C52C655000
heap
page read and write
B6D06FF000
stack
page read and write
1F095BEC000
heap
page read and write
1BDC1E08000
heap
page read and write
1F095D50000
heap
page read and write
1F095D58000
heap
page read and write
2892DD90000
heap
page read and write
1F095D81000
heap
page read and write
334FCF9000
stack
page read and write
1DB0C87B000
heap
page read and write
1F095D50000
heap
page read and write
1BDC1E61000
heap
page read and write
1F095D74000
heap
page read and write
98E4FE000
stack
page read and write
1F095BE8000
heap
page read and write
19AE77F5000
heap
page read and write
1F093E75000
heap
page read and write
1C6C0F77000
heap
page read and write
1BDC1F80000
heap
page read and write
1F095D4A000
heap
page read and write
1DB0C88E000
heap
page read and write
1FA7249E000
heap
page read and write
1F095D5F000
heap
page read and write
1F093E75000
heap
page read and write
19AE7B20000
heap
page read and write
1F933E43000
heap
page read and write
2664D28A000
heap
page read and write
1DB0C8E3000
heap
page read and write
98C71FE000
stack
page read and write
1C52C32D000
heap
page read and write
1F095BE8000
heap
page read and write
98DD89000
stack
page read and write
1C52C347000
heap
page read and write
19AE77E1000
heap
page read and write
1F093E6F000
heap
page read and write
1F095D5F000
heap
page read and write
1DB0C8E3000
heap
page read and write
1BDC1E08000
heap
page read and write
260D1197000
heap
page read and write
1F093E9E000
heap
page read and write
1F095BE8000
heap
page read and write
2664D262000
heap
page read and write
1F095D53000
heap
page read and write
1C52C38B000
heap
page read and write
98E5FE000
stack
page read and write
1C52C3AC000
heap
page read and write
1F093E6F000
heap
page read and write
1C52C365000
heap
page read and write
1DB0C8EA000
heap
page read and write
1F093E6F000
heap
page read and write
1F093E6A000
heap
page read and write
28A6C1AD000
heap
page read and write
19AE77E2000
heap
page read and write
416AAFE000
stack
page read and write
1F093E5F000
heap
page read and write
2892DDBC000
heap
page read and write
1F095DA7000
heap
page read and write
2664D269000
heap
page read and write
A6D5FFF000
stack
page read and write
1FA72480000
heap
page read and write
1F095D74000
heap
page read and write
1BDC1E13000
heap
page read and write
1C6C0F58000
heap
page read and write
19AE7842000
heap
page read and write
1F093E6A000
heap
page read and write
1F095D68000
heap
page read and write
2664D279000
heap
page read and write
1FA72466000
heap
page read and write
1F095B53000
heap
page read and write
1C6C0FBE000
heap
page read and write
1F093E6A000
heap
page read and write
1FA724A5000
heap
page read and write
6FD000
stack
page read and write
B6D05FD000
stack
page read and write
2892DCE5000
heap
page read and write
B3BB4FE000
stack
page read and write
1F095D74000
heap
page read and write
1F095D78000
heap
page read and write
1F095D96000
heap
page read and write
1F095D82000
heap
page read and write
2664D27A000
heap
page read and write
1F095D74000
heap
page read and write
1C52C34A000
heap
page read and write
2664D2B0000
heap
page read and write
1F093DF2000
heap
page read and write
1FA724A3000
heap
page read and write
2664D270000
heap
page read and write
1F933E2E000
heap
page read and write
28BF000
stack
page read and write
2892DD78000
heap
page read and write
1DB0C89A000
heap
page read and write
2892DDBA000
heap
page read and write
1F095DA7000
heap
page read and write
1F095DA9000
heap
page read and write
1F095D74000
heap
page read and write
1F093E4A000
heap
page read and write
2892DD9B000
heap
page read and write
2892DDDE000
heap
page read and write
1F095DA7000
heap
page read and write
1BDC1E39000
heap
page read and write
260D116F000
heap
page read and write
1F095DA7000
heap
page read and write
1F093DF3000
heap
page read and write
2892DD92000
heap
page read and write
260D115D000
heap
page read and write
1C6C0F8C000
heap
page read and write
1C52C380000
heap
page read and write
1F095D93000
heap
page read and write
1F093E0E000
heap
page read and write
2664D2AA000
heap
page read and write
1F095D5F000
heap
page read and write
B6D00FE000
stack
page read and write
1F093E6A000
heap
page read and write
BF744F9000
stack
page read and write
2892DDE2000
heap
page read and write
1F095D82000
heap
page read and write
19AE77FF000
heap
page read and write
1C52C368000
heap
page read and write
1C6C0F60000
heap
page read and write
1F093DF3000
heap
page read and write
1F257FE000
stack
page read and write
1F095D58000
heap
page read and write
28FE000
stack
page read and write
1F933DB0000
heap
page read and write
1DB0C87C000
heap
page read and write
1FA7249E000
heap
page read and write
1F095DA7000
heap
page read and write
1F093E9C000
heap
page read and write
1FA72440000
heap
page read and write
1F095D93000
heap
page read and write
1C52C385000
heap
page read and write
1F095D57000
heap
page read and write
1C6C0FC2000
heap
page read and write
1F095D7C000
heap
page read and write
1F095D7F000
heap
page read and write
1BDC1E33000
heap
page read and write
416A5FE000
stack
page read and write
1F095D63000
heap
page read and write
662D3FE000
stack
page read and write
2664D242000
heap
page read and write
1F093E75000
heap
page read and write
2664D27E000
heap
page read and write
2A9E4FC000
stack
page read and write
1F093E9E000
heap
page read and write
1F933D70000
heap
page read and write
1F095D93000
heap
page read and write
1DB0C865000
heap
page read and write
1F095D82000
heap
page read and write
1F095D94000
heap
page read and write
1F095D60000
heap
page read and write
19AE7817000
heap
page read and write
1F095D74000
heap
page read and write
1F095DA7000
heap
page read and write
260D1182000
heap
page read and write
1F095D50000
heap
page read and write
1F093E5B000
heap
page read and write
1F095D5C000
heap
page read and write
1F093E6A000
heap
page read and write
19AE7847000
heap
page read and write
1F095B4D000
heap
page read and write
1F095D93000
heap
page read and write
2892DDDA000
heap
page read and write
76A000
heap
page read and write
1F095D74000
heap
page read and write
1F095D58000
heap
page read and write
1F095BA4000
heap
page read and write
1F095B99000
heap
page read and write
416A9FF000
stack
page read and write
1C6C0F75000
heap
page read and write
98C70FF000
stack
page read and write
1F093E54000
heap
page read and write
1F933E7F000
heap
page read and write
1F095BEC000
heap
page read and write
1F095BEC000
heap
page read and write
2892DDD8000
heap
page read and write
1F095D74000
heap
page read and write
1C6C0F85000
heap
page read and write
1F095D50000
heap
page read and write
19AE7806000
heap
page read and write
1C6C0F69000
heap
page read and write
1F093E9D000
heap
page read and write
1F095D74000
heap
page read and write
7A5000
heap
page read and write
33504FD000
stack
page read and write
1F095BD1000
heap
page read and write
19AE7813000
heap
page read and write
19AE76A0000
heap
page read and write
1F093E4A000
heap
page read and write
1F095B34000
heap
page read and write
262B000
stack
page read and write
1F095BEC000
heap
page read and write
2664D275000
heap
page read and write
662CB59000
stack
page read and write
1F095D74000
heap
page read and write
1F095BEC000
heap
page read and write
1FA724A7000
heap
page read and write
416A7FE000
stack
page read and write
1F093E54000
heap
page read and write
1C52C385000
heap
page read and write
1F251FE000
stack
page read and write
28A6BFF0000
heap
page read and write
1FA72441000
heap
page read and write
1F095D57000
heap
page read and write
1C6C0EF0000
heap
page read and write
1F093E6A000
heap
page read and write
260D1164000
heap
page read and write
1FA72468000
heap
page read and write
1F093E5B000
heap
page read and write
1F095D74000
heap
page read and write
260D11E2000
heap
page read and write
98C6EFE000
stack
page read and write
416A8FF000
stack
page read and write
2892DC90000
heap
page read and write
1F095DA7000
heap
page read and write
1F093E9D000
heap
page read and write
28A6C0B6000
heap
page read and write
1F095D74000
heap
page read and write
1BDC1E00000
heap
page read and write
1F093E9D000
heap
page read and write
1DB0C8E3000
heap
page read and write
1F095D63000
heap
page read and write
1F095D57000
heap
page read and write
1F093E5F000
heap
page read and write
1F095DAB000
heap
page read and write
19AE7777000
heap
page read and write
1F093E06000
heap
page read and write
1F933E36000
heap
page read and write
1F095D74000
heap
page read and write
2664D299000
heap
page read and write
8AE000
stack
page read and write
1F095D74000
heap
page read and write
2892DCE0000
heap
page read and write
1F095D57000
heap
page read and write
260D11E2000
heap
page read and write
1DB0C89A000
heap
page read and write
1F095D82000
heap
page read and write
19AE77DF000
heap
page read and write
2A9E4ED000
stack
page read and write
1F095D74000
heap
page read and write
1F933E80000
heap
page read and write
2892DD2D000
heap
page read and write
1F933E66000
heap
page read and write
1C52C31C000
heap
page read and write
1F095DA7000
heap
page read and write
98E8FF000
stack
page read and write
1F095B45000
heap
page read and write
1F095BE8000
heap
page read and write
1F093E5C000
heap
page read and write
1BDC1E13000
heap
page read and write
1BDC1E17000
heap
page read and write
BF749FF000
stack
page read and write
28A6C035000
heap
page read and write
19AE76D0000
heap
page read and write
33503FF000
stack
page read and write
1FA72310000
heap
page read and write
1F095B77000
heap
page read and write
1F095D8D000
heap
page read and write
BF745FE000
stack
page read and write
1F093E9D000
heap
page read and write
1F093DF3000
heap
page read and write
1F095D5F000
heap
page read and write
1F095DAB000
heap
page read and write
1C52C361000
heap
page read and write
1F095B74000
heap
page read and write
1F093DF4000
heap
page read and write
1DB0C8A4000
heap
page read and write
1FA7248E000
heap
page read and write
1C52C35F000
heap
page read and write
662D4FE000
stack
page read and write
260D11C1000
heap
page read and write
2664D2A3000
heap
page read and write
1F093E6F000
heap
page read and write
1F095D93000
heap
page read and write
33500FE000
stack
page read and write
1F095D5C000
heap
page read and write
1BDC1E36000
heap
page read and write
1DB0C8E5000
heap
page read and write
1FA724C8000
heap
page read and write
19AE7830000
heap
page read and write
1F095D66000
heap
page read and write
1F095D57000
heap
page read and write
1F093E6A000
heap
page read and write
28A6C0DE000
heap
page read and write
1F095D74000
heap
page read and write
1BDC1E5C000
heap
page read and write
1F093DF2000
heap
page read and write
260D1080000
heap
page read and write
1C6C0F99000
heap
page read and write
1F095B64000
heap
page read and write
1F095D5F000
heap
page read and write
1F093E4A000
heap
page read and write
98C6CFE000
stack
page read and write
1F095D5C000
heap
page read and write
1F093E0E000
heap
page read and write
3EC000
stack
page read and write
1F095D78000
heap
page read and write
1C6C0F1B000
heap
page read and write
1C6C0FA3000
heap
page read and write
1F933E2E000
heap
page read and write
1F095D7A000
heap
page read and write
1FA725B0000
heap
page read and write
1F933E3D000
heap
page read and write
1F093E75000
heap
page read and write
1F095BCE000
heap
page read and write
1F095D5F000
heap
page read and write
B6D03FE000
stack
page read and write
1F933E73000
heap
page read and write
1F095D57000
heap
page read and write
98C74FE000
stack
page read and write
2664D2A2000
heap
page read and write
1FA72450000
heap
page read and write
BF74BFE000
stack
page read and write
1F095BE8000
heap
page read and write
1F095D5C000
heap
page read and write
1F095D96000
heap
page read and write
1F093E6F000
heap
page read and write
A6D5AFE000
stack
page read and write
1F093E6A000
heap
page read and write
1C52C39A000
heap
page read and write
1F093E0E000
heap
page read and write
1F095BA1000
heap
page read and write
1F093E5F000
heap
page read and write
2664D272000
heap
page read and write
1F095D5C000
heap
page read and write
1FA7247C000
heap
page read and write
2A9E0FE000
stack
page read and write
1C6C0F60000
heap
page read and write
19AE7B25000
heap
page read and write
260D1060000
heap
page read and write
1F095D82000
heap
page read and write
1F095D5C000
heap
page read and write
260D117B000
heap
page read and write
60433FE000
stack
page read and write
1F095D57000
heap
page read and write
1F095D58000
heap
page read and write
19AE77DE000
heap
page read and write
1DB0C89C000
heap
page read and write
2664D2A7000
heap
page read and write
19AE77F8000
heap
page read and write
1DB0C90B000
heap
page read and write
1F095D57000
heap
page read and write
28A6DF12000
heap
page read and write
28A6C030000
heap
page read and write
19AE77E7000
heap
page read and write
1F093E5B000
heap
page read and write
1F093E75000
heap
page read and write
1F093E73000
heap
page read and write
1F095BCE000
heap
page read and write
1F093DF2000
heap
page read and write
1F095D60000
heap
page read and write
1F093E9E000
heap
page read and write
1F093E5B000
heap
page read and write
260D11A0000
heap
page read and write
1F095D63000
heap
page read and write
1BDC1E06000
heap
page read and write
260D11D0000
heap
page read and write
1F252FF000
stack
page read and write
1F095D58000
heap
page read and write
1BDC1E11000
heap
page read and write
1F095D93000
heap
page read and write
BF748FE000
stack
page read and write
1F095D74000
heap
page read and write
1DB0C863000
heap
page read and write
19AE7847000
heap
page read and write
1F934005000
heap
page read and write
1F095BA4000
heap
page read and write
1F933E48000
heap
page read and write
1F093E74000
heap
page read and write
1F093E73000
heap
page read and write
1F095D5F000
heap
page read and write
1F093E6F000
heap
page read and write
1C52C323000
heap
page read and write
1F095BCE000
heap
page read and write
1BDC1E13000
heap
page read and write
260D13E5000
heap
page read and write
2A9E5ED000
stack
page read and write
1F095D74000
heap
page read and write
1F095D74000
heap
page read and write
60436FF000
stack
page read and write
1DB0C8DD000
heap
page read and write
1C52C31D000
heap
page read and write
98E1FE000
stack
page read and write
60431FE000
stack
page read and write
1C6C10E5000
heap
page read and write
B6CFEFD000
stack
page read and write
1F095DAB000
heap
page read and write
1C52C345000
heap
page read and write
1F095D74000
heap
page read and write
1FA724C8000
heap
page read and write
1F095B78000
heap
page read and write
98E6FE000
stack
page read and write
1F095B5C000
heap
page read and write
1C6C0F19000
heap
page read and write
1DB0C8CA000
heap
page read and write
1FA724A2000
heap
page read and write
1F095D57000
heap
page read and write
1FA72492000
heap
page read and write
1F095D41000
heap
page read and write
1BDC1E1E000
heap
page read and write
1F093E54000
heap
page read and write
19AE76B0000
heap
page read and write
33505FE000
stack
page read and write
19AE7842000
heap
page read and write
1F093E75000
heap
page read and write
2CAE000
stack
page read and write
1F095D78000
heap
page read and write
1C52C3AC000
heap
page read and write
2664D28A000
heap
page read and write
1F095D64000
heap
page read and write
1F095DA7000
heap
page read and write
1F093E5F000
heap
page read and write
1F095D5C000
heap
page read and write
19AE780B000
heap
page read and write
19AE77F5000
heap
page read and write
1F095B99000
heap
page read and write
2892DDC2000
heap
page read and write
1F095BCE000
heap
page read and write
1F093E5F000
heap
page read and write
1DB0C810000
heap
page read and write
1F095B80000
heap
page read and write
19AE7770000
heap
page read and write
2A9DAFE000
stack
page read and write
1F095DA7000
heap
page read and write
1C6C0F4C000
heap
page read and write
28A6C1AB000
heap
page read and write
1F095D4A000
heap
page read and write
1F095D5C000
heap
page read and write
1F095D6A000
heap
page read and write
1BDC1E1B000
heap
page read and write
1C6C0F6A000
heap
page read and write
1F093E6A000
heap
page read and write
1F093E54000
heap
page read and write
1F093E5C000
heap
page read and write
1F095D74000
heap
page read and write
1C52C352000
heap
page read and write
1F095B75000
heap
page read and write
1C6C0F14000
heap
page read and write
1F095BB9000
heap
page read and write
1BDC1E09000
heap
page read and write
19AE780C000
heap
page read and write
267E000
stack
page read and write
1F095AFE000
heap
page read and write
1DB0C8DA000
heap
page read and write
1C52C378000
heap
page read and write
1F093E5B000
heap
page read and write
1C6C0E70000
heap
page read and write
28A6C164000
heap
page read and write
1F095D7E000
heap
page read and write
1F095DA7000
heap
page read and write
1F095D4A000
heap
page read and write
1F095D93000
heap
page read and write
2664D26A000
heap
page read and write
BF74AFE000
stack
page read and write
1F095AF0000
heap
page read and write
1F095D82000
heap
page read and write
1C52C352000
heap
page read and write
2892DD88000
heap
page read and write
1F093E6F000
heap
page read and write
1FA72462000
heap
page read and write
1F095D57000
heap
page read and write
8C0000
heap
page read and write
2892DDBF000
heap
page read and write
1F095D58000
heap
page read and write
1F095D96000
heap
page read and write
1F095BAE000
heap
page read and write
1F095BE8000
heap
page read and write
1C52C333000
heap
page read and write
2664D286000
heap
page read and write
1C6C0F7C000
heap
page read and write
1F933E30000
heap
page read and write
BF74CFD000
stack
page read and write
1DB0C8B7000
heap
page read and write
1F095DA7000
heap
page read and write
1F095D7A000
heap
page read and write
1F093E08000
heap
page read and write
1F095D63000
heap
page read and write
1F095BE8000
heap
page read and write
1F095D94000
heap
page read and write
1F095DAB000
heap
page read and write
A6D58F9000
stack
page read and write
2664D25A000
heap
page read and write
1F093E6F000
heap
page read and write
19AE7813000
heap
page read and write
1FA7244F000
heap
page read and write
1F095BEC000
heap
page read and write
1BDC1E5B000
heap
page read and write
1F095BD0000
heap
page read and write
2892DDB2000
heap
page read and write
2892DDDE000
heap
page read and write
1F095D4E000
heap
page read and write
1BDC1E31000
heap
page read and write
860000
heap
page read and write
1DB0C8BC000
heap
page read and write
BF74DFE000
stack
page read and write
1F933E6C000
heap
page read and write
1F093E54000
heap
page read and write
1F095D57000
heap
page read and write
1F095D74000
heap
page read and write
1F095D5C000
heap
page read and write
1F095D57000
heap
page read and write
60432FE000
stack
page read and write
1F093E6F000
heap
page read and write
1BDC1E61000
heap
page read and write
1BDC2090000
heap
page read and write
1DB0C6F0000
heap
page read and write
1DB0C8A4000
heap
page read and write
A6D60FD000
stack
page read and write
1FA7246F000
heap
page read and write
1F933E1A000
heap
page read and write
1BDC1E84000
heap
page read and write
1BDC1D90000
heap
page read and write
1DB0C89A000
heap
page read and write
1F095DAB000
heap
page read and write
2A9E2FE000
stack
page read and write
1F933E80000
heap
page read and write
1F095D93000
heap
page read and write
1F095BA0000
heap
page read and write
1F933E38000
heap
page read and write
1F093E4A000
heap
page read and write
2664D291000
heap
page read and write
260D118F000
heap
page read and write
1F095DAF000
heap
page read and write
2892DD92000
heap
page read and write
19AE77F5000
heap
page read and write
1BDC1D98000
heap
page read and write
1F095B85000
heap
page read and write
1F095D74000
heap
page read and write
1F095D62000
heap
page read and write
1F095B78000
heap
page read and write
1C52C323000
heap
page read and write
1F095B32000
heap
page read and write
1BDC1E5D000
heap
page read and write
260D1127000
heap
page read and write
1DB0C8D8000
heap
page read and write
1F254FE000
stack
page read and write
2892DD98000
heap
page read and write
1F095D74000
heap
page read and write
260D1172000
heap
page read and write
1F095D57000
heap
page read and write
1F093E5B000
heap
page read and write
98C6FFF000
stack
page read and write
2664D2BA000
heap
page read and write
1F095D5C000
heap
page read and write
C1D000
stack
page read and write
1F095DA7000
heap
page read and write
2892DDD0000
heap
page read and write
416ADFE000
stack
page read and write
1F095D7A000
heap
page read and write
2A6B000
stack
page read and write
1BDC1E29000
heap
page read and write
1F095D57000
heap
page read and write
1F093E6F000
heap
page read and write
1F093E6A000
heap
page read and write
1F093E6F000
heap
page read and write
1F093DF3000
heap
page read and write
1C52C377000
heap
page read and write
2892DD82000
heap
page read and write
1F095BEC000
heap
page read and write
1F093E6A000
heap
page read and write
1F095D97000
heap
page read and write
1F095DA7000
heap
page read and write
33501FE000
stack
page read and write
1C6C0FBB000
heap
page read and write
1F093E9D000
heap
page read and write
1FA7243F000
heap
page read and write
2A9DDFC000
stack
page read and write
1F095DA7000
heap
page read and write
1C52C650000
heap
page read and write
2A9E5FD000
stack
page read and write
1DB0C8B4000
heap
page read and write
1F095D8F000
heap
page read and write
1BDC1DBB000
heap
page read and write
1F093E73000
heap
page read and write
1C52C336000
heap
page read and write
2664D1A0000
heap
page read and write
1F095D5C000
heap
page read and write
1F095D4A000
heap
page read and write
1C6C0EF8000
heap
page read and write
1F933E37000
heap
page read and write
A6D59FE000
stack
page read and write
1F095D93000
heap
page read and write
260D1189000
heap
page read and write
1F095D74000
heap
page read and write
260D119C000
heap
page read and write
1F095D7A000
heap
page read and write
260D11E2000
heap
page read and write
260D0F80000
heap
page read and write
1F093E56000
heap
page read and write
1F095D97000
heap
page read and write
1F933E71000
heap
page read and write
662D0FE000
stack
page read and write
1F093E0E000
heap
page read and write
2664D1F0000
heap
page read and write
19AE77FD000
heap
page read and write
1F095D74000
heap
page read and write
260D117A000
heap
page read and write
1DB0C890000
heap
page read and write
1DB0CA15000
heap
page read and write
1F933E83000
heap
page read and write
28A6C040000
heap
page read and write
1F095DAB000
heap
page read and write
2664D2B5000
heap
page read and write
B6D02FE000
stack
page read and write
1F095D74000
heap
page read and write
B3BB7FE000
stack
page read and write
1C52C37E000
heap
page read and write
1F095D63000
heap
page read and write
1C6C0D70000
heap
page read and write
1F093E5B000
heap
page read and write
1F093E5B000
heap
page read and write
1F095BE8000
heap
page read and write
1C6C0F73000
heap
page read and write
1F095D74000
heap
page read and write
1C52C34E000
heap
page read and write
1C6C0FBE000
heap
page read and write
1F093E54000
heap
page read and write
1C6C0F8B000
heap
page read and write
1F095D4A000
heap
page read and write
1F095D5C000
heap
page read and write
1F095BCE000
heap
page read and write
1F093E47000
heap
page read and write
1F093E0D000
heap
page read and write
1F933DC7000
heap
page read and write
1F095B78000
heap
page read and write
1F933E3E000
heap
page read and write
1F095D5C000
heap
page read and write
1F093E71000
heap
page read and write
1F095D4A000
heap
page read and write
1F093E54000
heap
page read and write
1F093D20000
heap
page read and write
1DB0C8BC000
heap
page read and write
2892DDE6000
heap
page read and write
1F093E9D000
heap
page read and write
1F093DF2000
heap
page read and write
28A6DF16000
heap
page read and write
1F095DA7000
heap
page read and write
1F095B84000
heap
page read and write
1DB0C891000
heap
page read and write
1F093E0E000
heap
page read and write
19AE9570000
heap
page read and write
1F095B70000
heap
page read and write
1F095D97000
heap
page read and write
1BDC1E26000
heap
page read and write
1F093DA0000
heap
page read and write
662D5FD000
stack
page read and write
1FA7244A000
heap
page read and write
1F095D63000
heap
page read and write
1F095D58000
heap
page read and write
1F093E6F000
heap
page read and write
19AE77FD000
heap
page read and write
1F095D74000
heap
page read and write
19AE781C000
heap
page read and write
1F095BB9000
heap
page read and write
2510000
heap
page read and write
662CFFE000
stack
page read and write
1C52C381000
heap
page read and write
1F095D5C000
heap
page read and write
260D13E0000
heap
page read and write
1F095D57000
heap
page read and write
1F095B16000
heap
page read and write
B3BB8FA000
stack
page read and write
19AE783F000
heap
page read and write
1C52C377000
heap
page read and write
2A9E3FE000
stack
page read and write
1F256FD000
stack
page read and write
1C52C330000
heap
page read and write
1F093E9E000
heap
page read and write
1C52C302000
heap
page read and write
1F095D5C000
heap
page read and write
1F093E75000
heap
page read and write
1F095B2B000
heap
page read and write
1FA724B6000
heap
page read and write
1F095D31000
heap
page read and write
19AE77F2000
heap
page read and write
19AE77F3000
heap
page read and write
1F095D9A000
heap
page read and write
334FEFE000
stack
page read and write
98E3FF000
stack
page read and write
1F093E9E000
heap
page read and write
1DB0C8A7000
heap
page read and write
1F095D85000
heap
page read and write
2664D299000
heap
page read and write
1F095D74000
heap
page read and write
1F095BE8000
heap
page read and write
1F093E6A000
heap
page read and write
1F933E51000
heap
page read and write
2664D2A2000
heap
page read and write
1F095DA8000
heap
page read and write
1F095D57000
heap
page read and write
1F095D58000
heap
page read and write
260D1187000
heap
page read and write
1F933E49000
heap
page read and write
1F095D5C000
heap
page read and write
260D11AA000
heap
page read and write
1F933E5D000
heap
page read and write
1F095B74000
heap
page read and write
B3BBBFD000
stack
page read and write
B6CFFFE000
stack
page read and write
1F095D5C000
heap
page read and write
1C52C322000
heap
page read and write
1F095D54000
heap
page read and write
1F093E6F000
heap
page read and write
1FA7246D000
heap
page read and write
1FA72480000
heap
page read and write
1FA724A2000
heap
page read and write
1F095D83000
heap
page read and write
1F095B5C000
heap
page read and write
1C52C260000
heap
page read and write
19AE77DB000
heap
page read and write
1F095D50000
heap
page read and write
1F095D74000
heap
page read and write
1F093E5F000
heap
page read and write
1F093E75000
heap
page read and write
1F934000000
heap
page read and write
1FA72230000
heap
page read and write
1F933E45000
heap
page read and write
1F093E9D000
heap
page read and write
1F093E54000
heap
page read and write
1F095D4E000
heap
page read and write
1F093E5B000
heap
page read and write
1F095DA7000
heap
page read and write
2664D271000
heap
page read and write
2664D25E000
heap
page read and write
1F095D74000
heap
page read and write
1DB0C8C5000
heap
page read and write
1DB0C8E8000
heap
page read and write
1F095D4E000
heap
page read and write
1F095D57000
heap
page read and write
1F093E6F000
heap
page read and write
1F933E37000
heap
page read and write
1DB0C8B4000
heap
page read and write
416A6FE000
stack
page read and write
1F095BE8000
heap
page read and write
260D1158000
heap
page read and write
1F095D57000
heap
page read and write
416ACFD000
stack
page read and write
2664D293000
heap
page read and write
1F095D7F000
heap
page read and write
B6D04FE000
stack
page read and write
1F095D94000
heap
page read and write
1F095D93000
heap
page read and write
1F093E6A000
heap
page read and write
1F095D74000
heap
page read and write
1F095D58000
heap
page read and write
1F095D93000
heap
page read and write
260D115B000
heap
page read and write
2664D274000
heap
page read and write
1F093E0D000
heap
page read and write
1F095D74000
heap
page read and write
2892DD9C000
heap
page read and write
1F095D74000
heap
page read and write
98C69F9000
stack
page read and write
1F093DF3000
heap
page read and write
1F095D74000
heap
page read and write
1F095B6F000
heap
page read and write
1F095DA7000
heap
page read and write
1F095D58000
heap
page read and write
1F933E22000
heap
page read and write
1F093E6A000
heap
page read and write
19AE77E1000
heap
page read and write
2664D274000
heap
page read and write
760000
heap
page read and write
2664D2B6000
heap
page read and write
1F095DA7000
heap
page read and write
1C6C0F69000
heap
page read and write
2A9DBFE000
stack
page read and write
1F093F50000
unkown
page read and write
1F095DA7000
heap
page read and write
2664D264000
heap
page read and write
1BDC1E3F000
heap
page read and write
1F095D57000
heap
page read and write
1F095D5C000
heap
page read and write
1F095D74000
heap
page read and write
2664F080000
heap
page read and write
1FA72432000
heap
page read and write
1F095BCE000
heap
page read and write
1FA7245C000
heap
page read and write
1F933DB8000
heap
page read and write
D1E000
stack
page read and write
1F24FFD000
stack
page read and write
A6D5DFE000
stack
page read and write
1DB0C890000
heap
page read and write
1F095D60000
heap
page read and write
B3BB9FF000
stack
page read and write
1FA7244C000
heap
page read and write
1F933E6F000
heap
page read and write
1C6C0F67000
heap
page read and write
1F095D74000
heap
page read and write
1F093E0E000
heap
page read and write
1F095D60000
heap
page read and write
260D115D000
heap
page read and write
1F095DA7000
heap
page read and write
1F095D53000
heap
page read and write
2664D245000
heap
page read and write
2664D295000
heap
page read and write
1F093E9D000
heap
page read and write
1F095D57000
heap
page read and write
19AE77C1000
heap
page read and write
1F095BEC000
heap
page read and write
2A9D8FE000
stack
page read and write
1F095B52000
heap
page read and write
1F093E9D000
heap
page read and write
1F095BA4000
heap
page read and write
1F093E0E000
heap
page read and write
1DB0C7D0000
heap
page read and write
2892DD10000
heap
page read and write
1F933E2D000
heap
page read and write
1F095D93000
heap
page read and write
1C52C280000
heap
page read and write
1F093E56000
heap
page read and write
1F095BCE000
heap
page read and write
1F095D50000
heap
page read and write
A6D61FE000
stack
page read and write
750000
heap
page read and write
1F095BCE000
heap
page read and write
1F095D74000
heap
page read and write
260D11A4000
heap
page read and write
1DB0C8E5000
heap
page read and write
1C52C338000
heap
page read and write
1F093E6F000
heap
page read and write
1F093E6F000
heap
page read and write
1C6C0FA9000
heap
page read and write
1FA72478000
heap
page read and write
1F093E54000
heap
page read and write
1F095DA7000
heap
page read and write
1F095DA7000
heap
page read and write
1F093E74000
heap
page read and write
1F095DAB000
heap
page read and write
28A6C193000
heap
page read and write
2664D2B2000
heap
page read and write
1F093E6A000
heap
page read and write
1BDC1E43000
heap
page read and write
1F095D5C000
heap
page read and write
1DB0C8BE000
heap
page read and write
1F095D82000
heap
page read and write
1DB0CA10000
heap
page read and write
1C52C385000
heap
page read and write
1F093E54000
heap
page read and write
1F093E6A000
heap
page read and write
1F095D74000
heap
page read and write
1DB0C888000
heap
page read and write
1F095D79000
heap
page read and write
2A9CF4C000
stack
page read and write
1F093E5B000
heap
page read and write
19AE7809000
heap
page read and write
1F095DA7000
heap
page read and write
1FA72485000
heap
page read and write
2664D263000
heap
page read and write
1F095DAB000
heap
page read and write
1F093E54000
heap
page read and write
1F093DA8000
heap
page read and write
19AE77E9000
heap
page read and write
2664D26E000
heap
page read and write
1C52C317000
heap
page read and write
1F095D5C000
heap
page read and write
1DB0C87A000
heap
page read and write
33502FE000
stack
page read and write
1F933E73000
heap
page read and write
260D11B9000
heap
page read and write
2A9E1FE000
stack
page read and write
2664D28E000
heap
page read and write
60430FE000
stack
page read and write
1C52C315000
heap
page read and write
1F095D58000
heap
page read and write
1F095D50000
heap
page read and write
1DB0C87E000
heap
page read and write
B6CFB39000
stack
page read and write
1F935C20000
heap
page read and write
1F095D4A000
heap
page read and write
2892DDE2000
heap
page read and write
19AE77E0000
heap
page read and write
1F095D7F000
heap
page read and write
1F095D58000
heap
page read and write
260D1179000
heap
page read and write
1F093DF2000
heap
page read and write
1F933E59000
heap
page read and write
1F095D5C000
heap
page read and write
1F095D58000
heap
page read and write
1C52C250000
heap
page read and write
2664D29D000
heap
page read and write
1F095BDF000
heap
page read and write
1F095D80000
heap
page read and write
1F095D74000
heap
page read and write
1F095DA7000
heap
page read and write
24FC000
stack
page read and write
1F095DA7000
heap
page read and write
1F093E5F000
heap
page read and write
1F095D69000
heap
page read and write
BF746FE000
stack
page read and write
2664D263000
heap
page read and write
1FA72448000
heap
page read and write
1BDC1E1D000
heap
page read and write
1FA72485000
heap
page read and write
2664D3F0000
heap
page read and write
19AE77EA000
heap
page read and write
1C6C0F5F000
heap
page read and write
1F095BE8000
heap
page read and write
2892DD89000
heap
page read and write
1F093E56000
heap
page read and write
260D1163000
heap
page read and write
1DB0C895000
heap
page read and write
260D1179000
heap
page read and write
19AE77E9000
heap
page read and write
260D1184000
heap
page read and write
1F095D74000
heap
page read and write
1FA72450000
heap
page read and write
2892DDD6000
heap
page read and write
1F255FE000
stack
page read and write
1F095DA7000
heap
page read and write
1F095BB9000
heap
page read and write
2892DD93000
heap
page read and write
260D1152000
heap
page read and write
1DB0C880000
heap
page read and write
260D1156000
heap
page read and write
B6D01FE000
stack
page read and write
1C6C0F71000
heap
page read and write
1F093E75000
heap
page read and write
2664D1F8000
heap
page read and write
1F095B52000
heap
page read and write
1C6C0F7C000
heap
page read and write
1F093E74000
heap
page read and write
1F095B35000
heap
page read and write
334FFFE000
stack
page read and write
1F095DA7000
heap
page read and write
98C73FD000
stack
page read and write
1DB0C8E8000
heap
page read and write
260D116C000
heap
page read and write
1BDC1E45000
heap
page read and write
1C6C0F73000
heap
page read and write
1F095D58000
heap
page read and write
28A6C0B0000
heap
page read and write
19AE7828000
heap
page read and write
1F933E31000
heap
page read and write
1DB0C90B000
heap
page read and write
260D1175000
heap
page read and write
1F093E45000
heap
page read and write
2664D26A000
heap
page read and write
19AE7811000
heap
page read and write
1F095BCE000
heap
page read and write
1DB0C7F0000
heap
page read and write
1F095BE8000
heap
page read and write
1F095D58000
heap
page read and write
1F095D82000
heap
page read and write
1C6C0F5C000
heap
page read and write
1F095B6F000
heap
page read and write
19AE7819000
heap
page read and write
2A9DEFE000
stack
page read and write
1F095DAB000
heap
page read and write
1F093E6F000
heap
page read and write
260D116C000
heap
page read and write
2892DD17000
heap
page read and write
1F093DF2000
heap
page read and write
1F095D57000
heap
page read and write
1BDC2095000
heap
page read and write
260D1170000
heap
page read and write
1FA724C8000
heap
page read and write
1F093E5B000
heap
page read and write
1F095B78000
heap
page read and write
1F933E2B000
heap
page read and write
2892DDDE000
heap
page read and write
2A9D9FD000
stack
page read and write
260D116E000
heap
page read and write
2664D27F000
heap
page read and write
260D1187000
heap
page read and write
28A6C000000
heap
page read and write
1F095D74000
heap
page read and write
1F093E9D000
heap
page read and write
662D1FE000
stack
page read and write
1F093E54000
heap
page read and write
1F095BEC000
heap
page read and write
A6D5EFE000
stack
page read and write
1F093E54000
heap
page read and write
98C72FE000
stack
page read and write
1F095D50000
heap
page read and write
1C52C2B0000
heap
page read and write
2892DDA7000
heap
page read and write
1F093E73000
heap
page read and write
2A9D7FE000
stack
page read and write
1F095DAB000
heap
page read and write
1FA723D0000
heap
page read and write
1F095BAB000
heap
page read and write
1F933E50000
heap
page read and write
1BDC1DF7000
heap
page read and write
1F933E1E000
heap
page read and write
1F093E73000
heap
page read and write
1F095D82000
heap
page read and write
6042B79000
stack
page read and write
2520000
heap
page read and write
1F093E9D000
heap
page read and write
1F093E75000
heap
page read and write
1F095D94000
heap
page read and write
1F095D58000
heap
page read and write
1F095BEC000
heap
page read and write
260D11C0000
heap
page read and write
1F095D58000
heap
page read and write
1C6C0E50000
heap
page read and write
1F093E56000
heap
page read and write
1F095D53000
heap
page read and write
60435FD000
stack
page read and write
2A9DCFF000
stack
page read and write
28A6C0BC000
heap
page read and write
1F093E5B000
heap
page read and write
1F933E62000
heap
page read and write
277F000
stack
page read and write
2892DD86000
heap
page read and write
2664D26E000
heap
page read and write
1F095D7A000
heap
page read and write
1BDC1F60000
heap
page read and write
2892DDD0000
heap
page read and write
1F095DAB000
heap
page read and write
1C52C389000
heap
page read and write
1F933E81000
heap
page read and write
1F095BE8000
heap
page read and write
1F095DA7000
heap
page read and write
2664D3F5000
heap
page read and write
1F093E75000
heap
page read and write
1C52C37E000
heap
page read and write
416ABFF000
stack
page read and write
2892DDA3000
heap
page read and write
1F095B4E000
heap
page read and write
BDE000
stack
page read and write
2A9E7FE000
stack
page read and write
1F093E0E000
heap
page read and write
1DB0C885000
heap
page read and write
1DB0C88A000
heap
page read and write
1C6C0F80000
heap
page read and write
1F095DA7000
heap
page read and write
1DB0C8DA000
heap
page read and write
1F093E5B000
heap
page read and write
1F095D60000
heap
page read and write
1F095D5C000
heap
page read and write
1F093E9E000
heap
page read and write
1C52C336000
heap
page read and write
1F24EF9000
stack
page read and write
1F250FE000
stack
page read and write
1F093E54000
heap
page read and write
1F095B75000
heap
page read and write
1FA72437000
heap
page read and write
1F095D98000
heap
page read and write
1F093E5F000
heap
page read and write
1FA7247F000
heap
page read and write
1BDC1E18000
heap
page read and write
1F093E0D000
heap
page read and write
1F095DA7000
heap
page read and write
260D10F0000
heap
page read and write
1F093E6A000
heap
page read and write
BF747FE000
stack
page read and write
1F095D5F000
heap
page read and write
1F095D60000
heap
page read and write
1FA72440000
heap
page read and write
2892DD3B000
heap
page read and write
334FDFE000
stack
page read and write
19AE77FE000
heap
page read and write
19AE7805000
heap
page read and write
1F095BCE000
heap
page read and write
2892DDAE000
heap
page read and write
1F095D4E000
heap
page read and write
2664D286000
heap
page read and write
1C6C10E0000
heap
page read and write
662CEFE000
stack
page read and write
1FA7246F000
heap
page read and write
19AE7811000
heap
page read and write
1C6C0F6B000
heap
page read and write
1F095D5C000
heap
page read and write
1F093DF2000
heap
page read and write
B3BB6FE000
stack
page read and write
1F095D93000
heap
page read and write
1F095D68000
heap
page read and write
19AE7824000
heap
page read and write
1F933C70000
heap
page read and write
1DB0C877000
heap
page read and write
1F095BBA000
heap
page read and write
1F093E6A000
heap
page read and write
1F933D50000
heap
page read and write
2892DDD0000
heap
page read and write
1F095D5F000
heap
page read and write
1F095BB9000
heap
page read and write
B3BAD99000
stack
page read and write
1F095B51000
heap
page read and write
19AE7845000
heap
page read and write
1F095B1C000
heap
page read and write
2664D28C000
heap
page read and write
416A4F9000
stack
page read and write
260D115E000
heap
page read and write
1BDC1DFD000
heap
page read and write
1F095D5C000
heap
page read and write
1F093E56000
heap
page read and write
1C6C0F97000
heap
page read and write
28A6C10B000
heap
page read and write
1F093E0E000
heap
page read and write
28A6C11D000
heap
page read and write
1F093E5C000
heap
page read and write
2A9DFFF000
stack
page read and write
A6D5BFE000
stack
page read and write
1F095D5F000
heap
page read and write
1F095D6A000
heap
page read and write
1BDC1E0A000
heap
page read and write
76E000
heap
page read and write
1F095D74000
heap
page read and write
1F095D74000
heap
page read and write
1F095D57000
heap
page read and write
1F095D58000
heap
page read and write
1C6C0FA7000
heap
page read and write
1F095D58000
heap
page read and write
27BE000
stack
page read and write
1F095B74000
heap
page read and write
1F093DF3000
heap
page read and write
A9E000
stack
page read and write
1F095DB2000
heap
page read and write
1F095DAB000
heap
page read and write
1F095B75000
heap
page read and write
1F095BE8000
heap
page read and write
260D1159000
heap
page read and write
1F095D50000
heap
page read and write
1F093E0D000
heap
page read and write
1F095D4A000
heap
page read and write
1F095DA7000
heap
page read and write
1BDC1E01000
heap
page read and write
60434FE000
stack
page read and write
1DB0C8A5000
heap
page read and write
1DB0C8B0000
heap
page read and write
1F095B80000
heap
page read and write
1F093D40000
heap
page read and write
1F095DA7000
heap
page read and write
1F095D50000
heap
page read and write
1F095AF5000
heap
page read and write
1F094000000
heap
page read and write
1F095D5F000
heap
page read and write
1F093E9E000
heap
page read and write
1F933E4E000
heap
page read and write
1F095D4A000
heap
page read and write
1F095D58000
heap
page read and write
1F095B59000
heap
page read and write
1F095D4A000
heap
page read and write
2892DD1C000
heap
page read and write
There are 1340 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://app.cfe.mx/Aplicaciones/CCFE/Actualizate/actualizate.aspx?Qr=QRMNS
https://app.cfe.mx/Aplicaciones/CCFE/Actualizate/actualizate.aspx?Qr=QRMNS
https://app.cfe.mx/Aplicaciones/Otros/Buscador/
https://td.doubleclick.net/td/ga/rul?tid=G-HHX5QY23J4&gacid=1781228907.1713546348&gtm=45je44h0v888298854za200&dma=0&gcd=13l3l3l3l1&npa=0&pscdl=noapi&aip=1&fledge=1&z=1375083632
about:blank
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lecr_gZAAAAAGOim0B7pXfRwwcNSkd7OnRMhmn8&co=aHR0cHM6Ly9hcHAuY2ZlLm14OjQ0Mw..&hl=en&v=rz4DvU-cY2JYCwHSTck0_qm-&size=normal&cb=tf8f0dhm8oce
https://www.google.com/recaptcha/api2/bframe?hl=en&v=rz4DvU-cY2JYCwHSTck0_qm-&k=6Lecr_gZAAAAAGOim0B7pXfRwwcNSkd7OnRMhmn8