IOC Report
CA14522283_5480736289593760083_label.pdf

loading gif

Files

File Path
Type
Category
Malicious
CA14522283_5480736289593760083_label.pdf
PDF document, version 1.4
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-220528041510Z-237.bmp
PC bitmap, Windows 3.x format, 107 x -152 x 32
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3024000
modified
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.6460
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst (copy)
PostScript document text
dropped
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\CA14522283_5480736289593760083_label.pdf
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer /prefetch:1 "C:\Users\user\Desktop\CA14522283_5480736289593760083_label.pdf
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1700,2511582042625791843,3130822291093567199,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=9883313947327340566 --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9883313947327340566 --renderer-client-id=2 --mojo-platform-channel-handle=1712 --allow-no-sandbox-job /prefetch:1
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1700,2511582042625791843,3130822291093567199,131072 --disable-features=VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAACAAwABAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=1896595982516621214 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1700,2511582042625791843,3130822291093567199,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=11556664242557579988 --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=11556664242557579988 --renderer-client-id=4 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:1
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1700,2511582042625791843,3130822291093567199,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=6513707815498450385 --lang=en-US --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6513707815498450385 --renderer-client-id=5 --mojo-platform-channel-handle=2092 --allow-no-sandbox-job /prefetch:1

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0
tfilename
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0
iTabCount
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent
iWinCount
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
aDefaultRHPViewModeL
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
bExpandRHPInViewer
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
bLastExitNormal
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement
bNormalExit
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
uLastAppLaunchTimeStamp
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
iNumReaderLaunches
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
283D3DD0000
trusted library allocation
page read and write
158FB5A4000
heap
page read and write
158FACAB000
heap
page read and write
283CFB00000
trusted library allocation
page read and write
2771B455000
heap
page read and write
1B89E671000
heap
page read and write
2508745F000
heap
page read and write
158FB581000
heap
page read and write
2771B429000
heap
page read and write
158FB512000
heap
page read and write
283CE89D000
heap
page read and write
158FB57A000
heap
page read and write
158FB593000
heap
page read and write
210E0053000
heap
page read and write
158FACC4000
heap
page read and write
1A3B70E9000
heap
page read and write
283D3B00000
trusted library allocation
page read and write
696D6FE000
stack
page read and write
38C11FE000
stack
page read and write
C16FBFE000
stack
page read and write
BA5B07C000
stack
page read and write
210E0049000
heap
page read and write
158FABF0000
remote allocation
page read and write
1B89E713000
heap
page read and write
283CE902000
heap
page read and write
25087483000
heap
page read and write
158FB5A9000
heap
page read and write
25087479000
heap
page read and write
696D7FF000
stack
page read and write
BD291F7000
stack
page read and write
BA5A777000
stack
page read and write
158FB581000
heap
page read and write
1A3B70E8000
heap
page read and write
1B89EE02000
trusted library allocation
page read and write
158FB588000
heap
page read and write
20292D3A000
heap
page read and write
2771B432000
heap
page read and write
BD3C0CB000
stack
page read and write
1A3B70AD000
heap
page read and write
283CE813000
heap
page read and write
283D3B10000
trusted library allocation
page read and write
158FACFA000
heap
page read and write
283D3E75000
heap
page read and write
E360B7E000
stack
page read and write
BD3C7FF000
stack
page read and write
BA5AB79000
stack
page read and write
210E0113000
heap
page read and write
158FB586000
heap
page read and write
210E0054000
heap
page read and write
2771B441000
heap
page read and write
237F222A000
heap
page read and write
212DA313000
heap
page read and write
158FB402000
heap
page read and write
158FB5A9000
heap
page read and write
BA5ACFF000
stack
page read and write
2771B44D000
heap
page read and write
2771BC02000
trusted library allocation
page read and write
FF4ADBE000
stack
page read and write
158FB578000
heap
page read and write
696DBFE000
stack
page read and write
158FB57C000
heap
page read and write
283D3CC1000
trusted library allocation
page read and write
158FACEF000
heap
page read and write
158FB5CC000
heap
page read and write
F293F7C000
stack
page read and write
1A3B70E8000
heap
page read and write
283CF740000
trusted library section
page readonly
1A3B7290000
heap
page read and write
210E005A000
heap
page read and write
27230B70000
heap
page read and write
158FAC00000
heap
page read and write
1A3B70AB000
heap
page read and write
1A3B70D0000
heap
page read and write
283CE8FB000
heap
page read and write
2771B478000
heap
page read and write
283CE858000
heap
page read and write
237F2302000
heap
page read and write
FF4B2FE000
stack
page read and write
27231402000
trusted library allocation
page read and write
2771B45A000
heap
page read and write
2771B459000
heap
page read and write
212DA275000
heap
page read and write
BD28BBE000
stack
page read and write
210E0059000
heap
page read and write
158FB59F000
heap
page read and write
27230C6C000
heap
page read and write
283CEF18000
heap
page read and write
696D07C000
stack
page read and write
237F2960000
remote allocation
page read and write
158FBA03000
heap
page read and write
283D3E3B000
heap
page read and write
283CE85A000
heap
page read and write
27230C7A000
heap
page read and write
158FB581000
heap
page read and write
283D3F03000
heap
page read and write
283CF650000
trusted library allocation
page read and write
1A3B70B1000
heap
page read and write
210E0052000
heap
page read and write
158FB586000
heap
page read and write
27230C76000
heap
page read and write
210DFE20000
heap
page read and write
158FB58C000
heap
page read and write
283D4000000
remote allocation
page read and write
2771B460000
heap
page read and write
158FAC26000
heap
page read and write
158FAC70000
heap
page read and write
E3612FE000
stack
page read and write
2771B47C000
heap
page read and write
F29397F000
stack
page read and write
BA5AC7B000
stack
page read and write
283D3CAE000
trusted library allocation
page read and write
283D3CC4000
trusted library allocation
page read and write
2029243E000
heap
page read and write
283D3B90000
trusted library allocation
page read and write
C16F87B000
stack
page read and write
212DA252000
heap
page read and write
2771B446000
heap
page read and write
838B0FE000
stack
page read and write
283CE88B000
heap
page read and write
283D3E48000
heap
page read and write
158FB5B0000
heap
page read and write
27230B00000
heap
page read and write
158FB598000
heap
page read and write
1B89EC80000
trusted library allocation
page read and write
BA5B27E000
stack
page read and write
1A3B70D0000
heap
page read and write
158FAB80000
trusted library allocation
page read and write
158FB5B8000
heap
page read and write
696D27B000
stack
page read and write
212DA229000
heap
page read and write
158FB581000
heap
page read and write
283D3CC0000
trusted library allocation
page read and write
158FB58B000
heap
page read and write
158FAAE0000
heap
page read and write
2771B442000
heap
page read and write
E360FFB000
stack
page read and write
2771B43B000
heap
page read and write
2771B461000
heap
page read and write
158FAC13000
heap
page read and write
283CE5E0000
heap
page read and write
38C127F000
stack
page read and write
696D3FF000
stack
page read and write
838A6FB000
stack
page read and write
210E003C000
heap
page read and write
283CE891000
heap
page read and write
283CE874000
heap
page read and write
158FB560000
heap
page read and write
25087330000
heap
page read and write
2771B45F000
heap
page read and write
283CEE02000
heap
page read and write
158FACB1000
heap
page read and write
202924B9000
heap
page read and write
1A3B70E8000
heap
page read and write
212DA308000
heap
page read and write
25087360000
trusted library allocation
page read and write
2508745C000
heap
page read and write
237F2213000
heap
page read and write
283D3F00000
heap
page read and write
318137B000
stack
page read and write
212DAA02000
trusted library allocation
page read and write
BD292FF000
stack
page read and write
25087500000
heap
page read and write
210E0024000
heap
page read and write
283D3E6C000
heap
page read and write
838AE7F000
stack
page read and write
212DA26E000
heap
page read and write
1A3B72B0000
heap
page read and write
283D3E1E000
heap
page read and write
BD3C6FB000
stack
page read and write
E3610F7000
stack
page read and write
212DA040000
heap
page read and write
E360AFB000
stack
page read and write
158FACE4000
heap
page read and write
158FAB50000
heap
page read and write
210E008E000
heap
page read and write
237F2240000
heap
page read and write
210DFE80000
heap
page read and write
283CE879000
heap
page read and write
2771B46C000
heap
page read and write
283D3E00000
trusted library allocation
page read and write
1B89E65B000
heap
page read and write
BA5A97A000
stack
page read and write
212DA030000
heap
page read and write
250872D0000
heap
page read and write
25087502000
heap
page read and write
212DA25A000
heap
page read and write
212DA26E000
heap
page read and write
283CE83E000
heap
page read and write
158FB574000
heap
page read and write
210E006F000
heap
page read and write
210E0013000
heap
page read and write
283CEF00000
heap
page read and write
158FB5A4000
heap
page read and write
2771B457000
heap
page read and write
158FB57C000
heap
page read and write
210E004B000
heap
page read and write
FF4B3FE000
stack
page read and write
2771B456000
heap
page read and write
2771B250000
heap
page read and write
838AB7F000
stack
page read and write
838ADFD000
stack
page read and write
158FB57A000
heap
page read and write
1A3B70D5000
heap
page read and write
283CE8AA000
heap
page read and write
1B89E4B0000
heap
page read and write
C16FDFE000
stack
page read and write
1A3B70C2000
heap
page read and write
283D3B80000
trusted library allocation
page read and write
25087429000
heap
page read and write
202923C0000
trusted library allocation
page read and write
3181CFE000
unkown
page read and write
1B89E4C0000
heap
page read and write
1A3B7030000
heap
page read and write
20292260000
heap
page read and write
BA5ADFE000
stack
page read and write
C16FCF7000
stack
page read and write
27230BA0000
trusted library allocation
page read and write
158FAD02000
heap
page read and write
1B89E666000
heap
page read and write
1B89E600000
heap
page read and write
696D8FE000
stack
page read and write
158FB519000
heap
page read and write
158FB586000
heap
page read and write
237F2A02000
trusted library allocation
page read and write
158FB586000
heap
page read and write
3181879000
stack
page read and write
FF4B07E000
stack
page read and write
F2933DB000
stack
page read and write
283CE877000
heap
page read and write
F2937FC000
stack
page read and write
283CEDB0000
trusted library section
page read and write
283CE800000
heap
page read and write
283CEF13000
heap
page read and write
210E0108000
heap
page read and write
283D4000000
remote allocation
page read and write
283CF780000
trusted library section
page readonly
210E0050000
heap
page read and write
2771B46E000
heap
page read and write
3181A7E000
stack
page read and write
283CF770000
trusted library section
page readonly
210DFF80000
trusted library allocation
page read and write
158FAC80000
heap
page read and write
237F2960000
remote allocation
page read and write
237F2170000
heap
page read and write
2771B46A000
heap
page read and write
250872C0000
heap
page read and write
20292513000
heap
page read and write
158FAC29000
heap
page read and write
158FB576000
heap
page read and write
283CE86F000
heap
page read and write
318167E000
stack
page read and write
283D3D70000
trusted library allocation
page read and write
27230C13000
heap
page read and write
212DA200000
heap
page read and write
2771B47B000
heap
page read and write
283D3CD0000
trusted library allocation
page read and write
20292C02000
heap
page read and write
2771B426000
heap
page read and write
1B89E702000
heap
page read and write
1A3B70D4000
heap
page read and write
BD293FC000
stack
page read and write
696DAFE000
stack
page read and write
F29407E000
stack
page read and write
2771B1F0000
heap
page read and write
210E0000000
heap
page read and write
BA5A87D000
stack
page read and write
212DA28F000
heap
page read and write
237F2930000
trusted library allocation
page read and write
1B89E677000
heap
page read and write
283D3DF0000
trusted library allocation
page read and write
20292502000
heap
page read and write
27230D13000
heap
page read and write
212DA213000
heap
page read and write
BA5AE7F000
stack
page read and write
212DA23C000
heap
page read and write
283D3F02000
heap
page read and write
1A3B72B5000
heap
page read and write
283D3EFC000
heap
page read and write
158FB582000
heap
page read and write
1A3B70C5000
heap
page read and write
158FB5A2000
heap
page read and write
2771B45C000
heap
page read and write
210DFE10000
heap
page read and write
38C12FC000
stack
page read and write
210E004D000
heap
page read and write
283D3CA8000
trusted library allocation
page read and write
C16FEFD000
stack
page read and write
237F2236000
heap
page read and write
158FAC86000
heap
page read and write
202924CA000
heap
page read and write
2029246D000
heap
page read and write
25087C02000
trusted library allocation
page read and write
BD290FB000
stack
page read and write
20292488000
heap
page read and write
158FBA02000
heap
page read and write
1A3B70E1000
heap
page read and write
696D5FE000
stack
page read and write
F293BFD000
stack
page read and write
27230C28000
heap
page read and write
283D3CE4000
trusted library allocation
page read and write
1B89E629000
heap
page read and write
283D3EAB000
heap
page read and write
212DA1A0000
trusted library allocation
page read and write
1B89E613000
heap
page read and write
BD28B3B000
stack
page read and write
E360BFF000
stack
page read and write
2771B350000
trusted library allocation
page read and write
158FB596000
heap
page read and write
20292413000
heap
page read and write
BA5AD7E000
stack
page read and write
158FABF0000
remote allocation
page read and write
158FB500000
heap
page read and write
283D3E00000
heap
page read and write
27230C3C000
heap
page read and write
158FB57D000
heap
page read and write
20292250000
heap
page read and write
158FB59A000
heap
page read and write
283CFAF3000
trusted library allocation
page read and write
F293C7B000
stack
page read and write
838AF7D000
stack
page read and write
BA5AEFE000
stack
page read and write
283D4000000
remote allocation
page read and write
38C0D9A000
stack
page read and write
27230B10000
heap
page read and write
158FB514000
heap
page read and write
2771B502000
heap
page read and write
283D3DB0000
trusted library allocation
page read and write
BA5A34C000
stack
page read and write
2771B440000
heap
page read and write
158FAAF0000
heap
page read and write
237F2960000
remote allocation
page read and write
1A3B70B6000
heap
page read and write
210E0100000
heap
page read and write
158FBA02000
heap
page read and write
283CEF02000
heap
page read and write
1A3B70D0000
heap
page read and write
212DA25F000
heap
page read and write
BD3C5FB000
stack
page read and write
283CEDA0000
trusted library allocation
page read and write
2771B1E0000
heap
page read and write
696D9FF000
stack
page read and write
2771B467000
heap
page read and write
283CF760000
trusted library section
page readonly
BD3C8FE000
stack
page read and write
1A3B70B6000
heap
page read and write
838ABFE000
stack
page read and write
BD28E7E000
stack
page read and write
158FB581000
heap
page read and write
2771B462000
heap
page read and write
283D3DE0000
trusted library allocation
page read and write
283D3E54000
heap
page read and write
F293A7E000
stack
page read and write
FF4B4FF000
stack
page read and write
283CFAF0000
trusted library allocation
page read and write
237F21D0000
heap
page read and write
BD28FFE000
stack
page read and write
1B89E641000
heap
page read and write
25087464000
heap
page read and write
20292400000
heap
page read and write
158FACB5000
heap
page read and write
1B89E520000
heap
page read and write
158FB57A000
heap
page read and write
237F2200000
heap
page read and write
283D3EEF000
heap
page read and write
158FB575000
heap
page read and write
283CE640000
heap
page read and write
283D3DC0000
trusted library allocation
page read and write
158FBA00000
heap
page read and write
210E0088000
heap
page read and write
25087513000
heap
page read and write
210E0102000
heap
page read and write
237F2160000
heap
page read and write
25087400000
heap
page read and write
BA5AF7F000
stack
page read and write
283CF730000
trusted library section
page readonly
2771B458000
heap
page read and write
1A3B70A0000
heap
page read and write
158FAD13000
heap
page read and write
25087508000
heap
page read and write
283CEF18000
heap
page read and write
FF4B1FE000
stack
page read and write
1A3B70EB000
heap
page read and write
696D4FD000
stack
page read and write
158FB5D2000
heap
page read and write
283D3CA0000
trusted library allocation
page read and write
25087459000
heap
page read and write
283CEE15000
heap
page read and write
210E004C000
heap
page read and write
20292D13000
heap
page read and write
1A3B70E8000
heap
page read and write
158FBA02000
heap
page read and write
E360EFB000
stack
page read and write
158FB597000
heap
page read and write
38C107E000
stack
page read and write
283D3E2C000
heap
page read and write
283CFAD1000
trusted library allocation
page read and write
212DA281000
heap
page read and write
283D3CD0000
trusted library allocation
page read and write
1A3B70C6000
heap
page read and write
210E004F000
heap
page read and write
283D3E60000
heap
page read and write
158FB57D000
heap
page read and write
158FB587000
heap
page read and write
237F2202000
heap
page read and write
158FB599000
heap
page read and write
283CE829000
heap
page read and write
212DA0A0000
heap
page read and write
283CEE00000
heap
page read and write
210E007D000
heap
page read and write
283CEF59000
heap
page read and write
3181C77000
stack
page read and write
1A3B7270000
heap
page read and write
212DA302000
heap
page read and write
2771B400000
heap
page read and write
25087451000
heap
page read and write
212DA264000
heap
page read and write
158FAC3C000
heap
page read and write
2771B47F000
heap
page read and write
F293E7E000
stack
page read and write
158FB58E000
heap
page read and write
27230D00000
heap
page read and write
C16F8FE000
stack
page read and write
158FB5C4000
heap
page read and write
237F2259000
heap
page read and write
25087413000
heap
page read and write
283CF750000
trusted library section
page readonly
F293D7E000
stack
page read and write
FF4AD3B000
stack
page read and write
158FBA02000
heap
page read and write
158FABF0000
remote allocation
page read and write
2508743C000
heap
page read and write
2771B43D000
heap
page read and write
20292D00000
heap
page read and write
202924C8000
heap
page read and write
BD294FE000
stack
page read and write
158FACD7000
heap
page read and write
27230C55000
heap
page read and write
202922C0000
heap
page read and write
283CE88D000
heap
page read and write
158FB592000
heap
page read and write
210E002D000
heap
page read and write
838B07D000
stack
page read and write
158FB5D2000
heap
page read and write
31813FE000
stack
page read and write
2771B485000
heap
page read and write
158FBA20000
heap
page read and write
158FB570000
heap
page read and write
212DA300000
heap
page read and write
E3611FF000
stack
page read and write
158FB570000
heap
page read and write
210E0802000
trusted library allocation
page read and write
3181977000
stack
page read and write
283D3CE0000
trusted library allocation
page read and write
158FBA02000
heap
page read and write
2771B413000
heap
page read and write
158FB5BA000
heap
page read and write
283D3CA0000
trusted library allocation
page read and write
158FACD4000
heap
page read and write
C16F97D000
stack
page read and write
158FB585000
heap
page read and write
38C1178000
stack
page read and write
158FACC8000
heap
page read and write
1B89E602000
heap
page read and write
27230C02000
heap
page read and write
283CE5D0000
heap
page read and write
158FB584000
heap
page read and write
283D3E1A000
heap
page read and write
158FB576000
heap
page read and write
318177C000
stack
page read and write
F293AFC000
stack
page read and write
210E0056000
heap
page read and write
27230D02000
heap
page read and write
210E004A000
heap
page read and write
1A3B70E8000
heap
page read and write
838ACFE000
stack
page read and write
3181B7A000
stack
page read and write
283CEF59000
heap
page read and write
BA5AA7E000
stack
page read and write
1A3B70C4000
heap
page read and write
283D3EF4000
heap
page read and write
1B89E689000
heap
page read and write
158FB584000
heap
page read and write
283CE913000
heap
page read and write
38C10FE000
stack
page read and write
158FB598000
heap
page read and write
283D3EFA000
heap
page read and write
20292429000
heap
page read and write
27230C00000
heap
page read and write
158FB584000
heap
page read and write
158FB593000
heap
page read and write
27230C81000
heap
page read and write
212DA25D000
heap
page read and write
1A3B70E0000
heap
page read and write
158FB54F000
heap
page read and write
158FB5C4000
heap
page read and write
C16FB7B000
stack
page read and write
There are 486 hidden memdumps, click here to show them.