IOC Report
FFL 01 EXP 09-01-23.pdf

loading gif

Files

File Path
Type
Category
Malicious
FFL 01 EXP 09-01-23.pdf
PDF document, version 1.6
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\39c14c1f4b086971_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6267ed4d4a13f54b_0
data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-220420233817Z-213.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3024000
modified
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.6460
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst (copy)
PostScript document text
dropped
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\FFL 01 EXP 09-01-23.pdf
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer /prefetch:1 "C:\Users\user\Desktop\FFL 01 EXP 09-01-23.pdf
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1692,15095255467343264,15953424090873945641,131072 --disable-features=VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAACAAwABAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=7054524493282448139 --mojo-platform-channel-handle=1704 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1692,15095255467343264,15953424090873945641,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=3437087714133067519 --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3437087714133067519 --renderer-client-id=2 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:1
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1692,15095255467343264,15953424090873945641,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=3988524340413199970 --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3988524340413199970 --renderer-client-id=4 --mojo-platform-channel-handle=1820 --allow-no-sandbox-job /prefetch:1
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1692,15095255467343264,15953424090873945641,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=10726486129092804403 --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=10726486129092804403 --renderer-client-id=5 --mojo-platform-channel-handle=1968 --allow-no-sandbox-job /prefetch:1
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1692,15095255467343264,15953424090873945641,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=4353246954609320378 --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4353246954609320378 --renderer-client-id=6 --mojo-platform-channel-handle=1964 --allow-no-sandbox-job /prefetch:1

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0
tfilename
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0
iTabCount
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent
iWinCount
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
aDefaultRHPViewModeL
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
bExpandRHPInViewer
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
bLastExitNormal
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement
bNormalExit
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
uLastAppLaunchTimeStamp
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
iNumReaderLaunches
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C92AE28000
heap
page read and write
17B5E77000
stack
page read and write
A2E1BFF000
stack
page read and write
1F8BA530000
trusted library allocation
page read and write
630EB3E000
stack
page read and write
1F8B5759000
heap
page read and write
25565FC0000
heap
page read and write
14D64170000
heap
page read and write
10151FF000
stack
page read and write
25E35460000
heap
page read and write
1C92AD60000
heap
page read and write
19FB6B65000
heap
page read and write
17B5C7B000
stack
page read and write
6B3FD7B000
stack
page read and write
14D6426F000
heap
page read and write
290C0A60000
trusted library allocation
page read and write
1E6BDE6A000
heap
page read and write
1014BFF000
stack
page read and write
1F8B4E59000
heap
page read and write
14D64274000
heap
page read and write
1C92AE40000
heap
page read and write
1F8B6260000
trusted library allocation
page read and write
14D64278000
heap
page read and write
1F8BA615000
heap
page read and write
290C0400000
heap
page read and write
1F8BA702000
heap
page read and write
A2E1CFE000
stack
page read and write
14D6427C000
heap
page read and write
35F257C000
stack
page read and write
35F2B7D000
stack
page read and write
1F8B4E8E000
heap
page read and write
24288FE000
unkown
page read and write
1F8B5615000
heap
page read and write
630F07E000
stack
page read and write
1E6BE700000
heap
page read and write
14D6427A000
heap
page read and write
14D6427D000
heap
page read and write
AB6A7FF000
stack
page read and write
1E6BE739000
heap
page read and write
290C0431000
heap
page read and write
1F8BA63E000
heap
page read and write
1F8B4D10000
heap
page read and write
1EAE07E000
stack
page read and write
1C77825B000
heap
page read and write
1014AFF000
stack
page read and write
35F29FC000
stack
page read and write
101467F000
stack
page read and write
A2E187E000
stack
page read and write
1F8BA410000
trusted library allocation
page read and write
1014D7E000
stack
page read and write
25E35590000
remote allocation
page read and write
17B617F000
stack
page read and write
1F8BA3EE000
trusted library allocation
page read and write
25E353F0000
heap
page read and write
1C92AE00000
heap
page read and write
1F8BA6B9000
heap
page read and write
19FB6909000
heap
page read and write
1C778229000
heap
page read and write
35F277F000
stack
page read and write
E7F987D000
stack
page read and write
1C77826C000
heap
page read and write
1C77824F000
heap
page read and write
25E35613000
heap
page read and write
1C92ADF0000
trusted library allocation
page read and write
35F28FC000
stack
page read and write
1F8B4E92000
heap
page read and write
1F8B5EF0000
trusted library section
page readonly
1C7781E0000
heap
page read and write
14D64313000
heap
page read and write
14D6426E000
heap
page read and write
1F8BA706000
heap
page read and write
290C0C02000
trusted library allocation
page read and write
1F8B55B1000
trusted library allocation
page read and write
1C92ADC0000
heap
page read and write
25565F60000
heap
page read and write
14D64277000
heap
page read and write
1C778233000
heap
page read and write
1F8B5ED0000
trusted library section
page readonly
16144A29000
heap
page read and write
19FB6F00000
unkown
page readonly
290C0437000
heap
page read and write
1E6BDE27000
heap
page read and write
35F2E7E000
stack
page read and write
1F8B5981000
trusted library allocation
page read and write
AB6AFFF000
stack
page read and write
AB6ABFE000
stack
page read and write
1F8BA520000
trusted library allocation
page read and write
1F8B5713000
heap
page read and write
E7F967E000
stack
page read and write
1C92AF02000
heap
page read and write
630EF7E000
stack
page read and write
1EADD4B000
stack
page read and write
1C77826A000
heap
page read and write
1C92AE13000
heap
page read and write
16145202000
trusted library allocation
page read and write
E7F917C000
stack
page read and write
1C77827C000
heap
page read and write
1F8B4E78000
heap
page read and write
1F8BA620000
heap
page read and write
101457A000
stack
page read and write
1C77825D000
heap
page read and write
16144B02000
heap
page read and write
1F8B4EFC000
heap
page read and write
1F8B4E29000
heap
page read and write
1E6BE712000
heap
page read and write
25E35640000
heap
page read and write
1E6BDE62000
heap
page read and write
1F8BA700000
heap
page read and write
1C92AF00000
heap
page read and write
1F8B4E7A000
heap
page read and write
19FB6900000
heap
page read and write
1F8B4E57000
heap
page read and write
1F8BA4B0000
trusted library allocation
page read and write
1F8B4DC0000
trusted library section
page read and write
1F8BA70C000
heap
page read and write
14D64292000
heap
page read and write
1EAE1FF000
stack
page read and write
1F8B4EAD000
heap
page read and write
19FB6B70000
unkown
page readonly
1C778265000
heap
page read and write
1F8B55D3000
trusted library allocation
page read and write
25566002000
heap
page read and write
35F2D7C000
stack
page read and write
1C778260000
heap
page read and write
1014DFE000
stack
page read and write
17B5F7D000
stack
page read and write
16144890000
heap
page read and write
25E35629000
heap
page read and write
1C778246000
heap
page read and write
1F8B4F25000
heap
page read and write
290C02A0000
heap
page read and write
25E35E02000
trusted library allocation
page read and write
1F8BA3E0000
trusted library allocation
page read and write
1F8BA400000
trusted library allocation
page read and write
1F8BA64B000
heap
page read and write
16144A13000
heap
page read and write
AB6A9FF000
stack
page read and write
16144A8F000
heap
page read and write
1F8BA3E0000
trusted library allocation
page read and write
630EBBE000
stack
page read and write
1F8B4F13000
heap
page read and write
1E6BDE60000
heap
page read and write
1014CFD000
stack
page read and write
290C043E000
heap
page read and write
E7F99FD000
stack
page read and write
1C77823E000
heap
page read and write
1C778940000
trusted library allocation
page read and write
1EAE3F7000
stack
page read and write
14D64308000
heap
page read and write
1C778302000
heap
page read and write
1EADDCE000
stack
page read and write
1C778180000
heap
page read and write
290C0502000
heap
page read and write
1C778263000
heap
page read and write
35F2A7B000
stack
page read and write
1E6BDD30000
heap
page read and write
1C778213000
heap
page read and write
25566113000
heap
page read and write
25566802000
trusted library allocation
page read and write
1F8BA657000
heap
page read and write
1F8B4E00000
heap
page read and write
1EAE17C000
stack
page read and write
14D64271000
heap
page read and write
E7F95FD000
stack
page read and write
A2E19FF000
stack
page read and write
101487C000
stack
page read and write
25E35400000
heap
page read and write
1E6BDE89000
heap
page read and write
290C0413000
heap
page read and write
25E3565E000
heap
page read and write
1F8BA6FD000
heap
page read and write
AB6ADFF000
stack
page read and write
1F8BA6EC000
heap
page read and write
161449F0000
trusted library allocation
page read and write
1C92B602000
trusted library allocation
page read and write
1C92AE79000
heap
page read and write
1C92AF13000
heap
page read and write
1F8B5702000
heap
page read and write
1F8B5DE0000
trusted library allocation
page read and write
1F8BA6E7000
heap
page read and write
16144A00000
heap
page read and write
25565F50000
heap
page read and write
AB6AAFD000
stack
page read and write
101497B000
stack
page read and write
1C778170000
heap
page read and write
A2E154B000
stack
page read and write
1F8BA424000
trusted library allocation
page read and write
17B5A7B000
stack
page read and write
25566000000
heap
page read and write
17B5B7F000
stack
page read and write
1F8BA401000
trusted library allocation
page read and write
290C0446000
heap
page read and write
14D64254000
heap
page read and write
A2E1AFE000
stack
page read and write
17B5D7A000
stack
page read and write
E7F98FE000
stack
page read and write
161448F0000
heap
page read and write
1F8B5718000
heap
page read and write
14D6428A000
heap
page read and write
1E6BDD90000
heap
page read and write
1F8B55E0000
trusted library allocation
page read and write
25566102000
heap
page read and write
1C77827F000
heap
page read and write
1F8B5600000
heap
page read and write
1EAE4FE000
stack
page read and write
290C042F000
heap
page read and write
14D64110000
heap
page read and write
1F8B5718000
heap
page read and write
1C778A02000
trusted library allocation
page read and write
1F8BA540000
remote allocation
page read and write
35F287E000
stack
page read and write
1E6BDD20000
heap
page read and write
AB6A1DB000
stack
page read and write
1F8B4E40000
heap
page read and write
14D6426D000
heap
page read and write
290C0300000
heap
page read and write
1E6BDE00000
heap
page read and write
1F8BA420000
trusted library allocation
page read and write
1F8B5759000
heap
page read and write
14D64213000
heap
page read and write
290C02B0000
heap
page read and write
6B3FE7B000
stack
page read and write
1C778259000
heap
page read and write
1F8B5EC0000
trusted library section
page readonly
1F8BA4F0000
trusted library allocation
page read and write
14D64229000
heap
page read and write
1C778262000
heap
page read and write
630EABB000
stack
page read and write
242867E000
unkown
page read and write
1F8B4E8C000
heap
page read and write
35F2C7F000
stack
page read and write
25565FF0000
trusted library allocation
page read and write
14D64A02000
trusted library allocation
page read and write
1F8BA540000
trusted library allocation
page read and write
1F8B4D80000
heap
page read and write
1EAE2FA000
stack
page read and write
19FB68D0000
unkown
page read and write
1C778200000
heap
page read and write
1F8B4E13000
heap
page read and write
1E6BDEBB000
heap
page read and write
14D6428A000
heap
page read and write
16144A8B000
heap
page read and write
1F8BA62E000
heap
page read and write
25566078000
heap
page read and write
1F8B4E9E000
heap
page read and write
1F8BA664000
heap
page read and write
14D64302000
heap
page read and write
1F8BA3E8000
trusted library allocation
page read and write
1C77823C000
heap
page read and write
14D64100000
heap
page read and write
14D64276000
heap
page read and write
1E6BDE44000
heap
page read and write
101477F000
stack
page read and write
1F8B55D0000
trusted library allocation
page read and write
16144880000
heap
page read and write
1014477000
stack
page read and write
19FB68B0000
unkown
page read and write
1F8B4D20000
heap
page read and write
2556606E000
heap
page read and write
1E6BDF02000
heap
page read and write
1E6BE602000
heap
page read and write
1F8BA410000
trusted library allocation
page read and write
1F8BA6B5000
heap
page read and write
1F8BA540000
remote allocation
page read and write
19FB6B60000
heap
page read and write
1E6BDECC000
heap
page read and write
1F8BA2D0000
trusted library allocation
page read and write
19FB6910000
heap
page read and write
1F8BA6F6000
heap
page read and write
1C778243000
heap
page read and write
1C77827B000
heap
page read and write
1F8BA600000
heap
page read and write
1F8BA500000
trusted library allocation
page read and write
16144A3C000
heap
page read and write
1C92AD50000
heap
page read and write
16144A71000
heap
page read and write
1F8BA6A2000
heap
page read and write
14D641A0000
trusted library allocation
page read and write
1E6BDDC0000
trusted library allocation
page read and write
1C92AE02000
heap
page read and write
16144A87000
heap
page read and write
6B3FF7B000
stack
page read and write
25E35560000
trusted library allocation
page read and write
14D64202000
heap
page read and write
2556605C000
heap
page read and write
AB6A5FA000
stack
page read and write
1C778235000
heap
page read and write
17B5AFE000
stack
page read and write
1C778258000
heap
page read and write
1F8BA510000
trusted library allocation
page read and write
1F8B4DB0000
trusted library allocation
page read and write
E7F9AFD000
stack
page read and write
14D64270000
heap
page read and write
14D64273000
heap
page read and write
35F216B000
stack
page read and write
25E35590000
remote allocation
page read and write
25E35600000
heap
page read and write
AB6AEFF000
stack
page read and write
25566063000
heap
page read and write
1C778248000
heap
page read and write
6B3FA7C000
stack
page read and write
1F8BA2C0000
trusted library allocation
page read and write
1F8B4E70000
heap
page read and write
1F8B4F02000
heap
page read and write
1E6BDEC9000
heap
page read and write
1014FFA000
stack
page read and write
14D64265000
heap
page read and write
1F8B55F0000
trusted library allocation
page read and write
1F8BA68B000
heap
page read and write
1014EFA000
stack
page read and write
1F8B5700000
heap
page read and write
1F8BA404000
trusted library allocation
page read and write
1E6BDF13000
heap
page read and write
1F8B4E75000
heap
page read and write
14D6423C000
heap
page read and write
1F8B5F00000
trusted library section
page readonly
E7F9B7F000
stack
page read and write
1EAE5FF000
stack
page read and write
E7F977E000
stack
page read and write
630F27E000
stack
page read and write
25E35590000
remote allocation
page read and write
AB6ACFF000
stack
page read and write
25566013000
heap
page read and write
AB6A6FD000
stack
page read and write
19FB6840000
heap
page read and write
630F17E000
stack
page read and write
14D64200000
heap
page read and write
1E6BDEE1000
heap
page read and write
AB6A8FF000
stack
page read and write
1F8B5EE0000
trusted library section
page readonly
1C778241000
heap
page read and write
1F8BA540000
remote allocation
page read and write
1C92AE57000
heap
page read and write
1C778278000
heap
page read and write
17B607E000
stack
page read and write
1014A7F000
stack
page read and write
1F8B5F10000
trusted library section
page readonly
14D64300000
heap
page read and write
290C0402000
heap
page read and write
6B4007E000
stack
page read and write
1C778225000
heap
page read and write
290C0429000
heap
page read and write
1C77826E000
heap
page read and write
25E35702000
heap
page read and write
16144B13000
heap
page read and write
1C778285000
heap
page read and write
1F8BA709000
heap
page read and write
101427B000
stack
page read and write
242877C000
unkown
page read and write
24287FE000
unkown
page read and write
1C778267000
heap
page read and write
24283FA000
stack
page read and write
25566029000
heap
page read and write
24286FE000
unkown
page read and write
1E6BDE13000
heap
page read and write
A2E15CF000
stack
page read and write
25E35602000
heap
page read and write
1C778247000
heap
page read and write
1F8B5602000
heap
page read and write
242887F000
unkown
page read and write
10149FE000
stack
page read and write
2556603D000
heap
page read and write
There are 352 hidden memdumps, click here to show them.