Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
CA14522283_5480736289593760083_label.pdf
|
PDF document, version 1.4
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-220528041510Z-237.bmp
|
PC bitmap, Windows 3.x format, 107 x -152 x 32
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3024000
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.6460
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst (copy)
|
PostScript document text
|
dropped
|
There are 38 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\CA14522283_5480736289593760083_label.pdf
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer /prefetch:1 "C:\Users\user\Desktop\CA14522283_5480736289593760083_label.pdf
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat
Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1700,2511582042625791843,3130822291093567199,131072
--disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=9883313947327340566 --lang=en-US --disable-pack-loading
--log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035
Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9883313947327340566
--renderer-client-id=2 --mojo-platform-channel-handle=1712 --allow-no-sandbox-job /prefetch:1
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1700,2511582042625791843,3130822291093567199,131072
--disable-features=VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log"
--log-severity=disable --product-version="ReaderServices/19.12.20035 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAACAAwABAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA
--use-gl=swiftshader-webgl --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=1896595982516621214
--mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat
Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1700,2511582042625791843,3130822291093567199,131072
--disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=11556664242557579988 --lang=en-US --disable-pack-loading
--log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035
Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=11556664242557579988
--renderer-client-id=4 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:1
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files (x86)\Adobe\Acrobat
Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1700,2511582042625791843,3130822291093567199,131072
--disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=6513707815498450385 --lang=en-US --disable-pack-loading
--log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.12.20035
Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6513707815498450385
--renderer-client-id=5 --mojo-platform-channel-handle=2092 --allow-no-sandbox-job /prefetch:1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0\cPathInfo
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0\cTab0
|
tfilename
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent\cWin0
|
iTabCount
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement\cWindowsCurrent
|
iWinCount
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
|
aDefaultRHPViewModeL
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
|
bExpandRHPInViewer
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
|
bLastExitNormal
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SessionManagement
|
bNormalExit
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
|
uLastAppLaunchTimeStamp
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
|
iNumReaderLaunches
|
There are 17 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
283D3DD0000
|
trusted library allocation
|
page read and write
|
||
158FB5A4000
|
heap
|
page read and write
|
||
158FACAB000
|
heap
|
page read and write
|
||
283CFB00000
|
trusted library allocation
|
page read and write
|
||
2771B455000
|
heap
|
page read and write
|
||
1B89E671000
|
heap
|
page read and write
|
||
2508745F000
|
heap
|
page read and write
|
||
158FB581000
|
heap
|
page read and write
|
||
2771B429000
|
heap
|
page read and write
|
||
158FB512000
|
heap
|
page read and write
|
||
283CE89D000
|
heap
|
page read and write
|
||
158FB57A000
|
heap
|
page read and write
|
||
158FB593000
|
heap
|
page read and write
|
||
210E0053000
|
heap
|
page read and write
|
||
158FACC4000
|
heap
|
page read and write
|
||
1A3B70E9000
|
heap
|
page read and write
|
||
283D3B00000
|
trusted library allocation
|
page read and write
|
||
696D6FE000
|
stack
|
page read and write
|
||
38C11FE000
|
stack
|
page read and write
|
||
C16FBFE000
|
stack
|
page read and write
|
||
BA5B07C000
|
stack
|
page read and write
|
||
210E0049000
|
heap
|
page read and write
|
||
158FABF0000
|
remote allocation
|
page read and write
|
||
1B89E713000
|
heap
|
page read and write
|
||
283CE902000
|
heap
|
page read and write
|
||
25087483000
|
heap
|
page read and write
|
||
158FB5A9000
|
heap
|
page read and write
|
||
25087479000
|
heap
|
page read and write
|
||
696D7FF000
|
stack
|
page read and write
|
||
BD291F7000
|
stack
|
page read and write
|
||
BA5A777000
|
stack
|
page read and write
|
||
158FB581000
|
heap
|
page read and write
|
||
1A3B70E8000
|
heap
|
page read and write
|
||
1B89EE02000
|
trusted library allocation
|
page read and write
|
||
158FB588000
|
heap
|
page read and write
|
||
20292D3A000
|
heap
|
page read and write
|
||
2771B432000
|
heap
|
page read and write
|
||
BD3C0CB000
|
stack
|
page read and write
|
||
1A3B70AD000
|
heap
|
page read and write
|
||
283CE813000
|
heap
|
page read and write
|
||
283D3B10000
|
trusted library allocation
|
page read and write
|
||
158FACFA000
|
heap
|
page read and write
|
||
283D3E75000
|
heap
|
page read and write
|
||
E360B7E000
|
stack
|
page read and write
|
||
BD3C7FF000
|
stack
|
page read and write
|
||
BA5AB79000
|
stack
|
page read and write
|
||
210E0113000
|
heap
|
page read and write
|
||
158FB586000
|
heap
|
page read and write
|
||
210E0054000
|
heap
|
page read and write
|
||
2771B441000
|
heap
|
page read and write
|
||
237F222A000
|
heap
|
page read and write
|
||
212DA313000
|
heap
|
page read and write
|
||
158FB402000
|
heap
|
page read and write
|
||
158FB5A9000
|
heap
|
page read and write
|
||
BA5ACFF000
|
stack
|
page read and write
|
||
2771B44D000
|
heap
|
page read and write
|
||
2771BC02000
|
trusted library allocation
|
page read and write
|
||
FF4ADBE000
|
stack
|
page read and write
|
||
158FB578000
|
heap
|
page read and write
|
||
696DBFE000
|
stack
|
page read and write
|
||
158FB57C000
|
heap
|
page read and write
|
||
283D3CC1000
|
trusted library allocation
|
page read and write
|
||
158FACEF000
|
heap
|
page read and write
|
||
158FB5CC000
|
heap
|
page read and write
|
||
F293F7C000
|
stack
|
page read and write
|
||
1A3B70E8000
|
heap
|
page read and write
|
||
283CF740000
|
trusted library section
|
page readonly
|
||
1A3B7290000
|
heap
|
page read and write
|
||
210E005A000
|
heap
|
page read and write
|
||
27230B70000
|
heap
|
page read and write
|
||
158FAC00000
|
heap
|
page read and write
|
||
1A3B70AB000
|
heap
|
page read and write
|
||
1A3B70D0000
|
heap
|
page read and write
|
||
283CE8FB000
|
heap
|
page read and write
|
||
2771B478000
|
heap
|
page read and write
|
||
283CE858000
|
heap
|
page read and write
|
||
237F2302000
|
heap
|
page read and write
|
||
FF4B2FE000
|
stack
|
page read and write
|
||
27231402000
|
trusted library allocation
|
page read and write
|
||
2771B45A000
|
heap
|
page read and write
|
||
2771B459000
|
heap
|
page read and write
|
||
212DA275000
|
heap
|
page read and write
|
||
BD28BBE000
|
stack
|
page read and write
|
||
210E0059000
|
heap
|
page read and write
|
||
158FB59F000
|
heap
|
page read and write
|
||
27230C6C000
|
heap
|
page read and write
|
||
283CEF18000
|
heap
|
page read and write
|
||
696D07C000
|
stack
|
page read and write
|
||
237F2960000
|
remote allocation
|
page read and write
|
||
158FBA03000
|
heap
|
page read and write
|
||
283D3E3B000
|
heap
|
page read and write
|
||
283CE85A000
|
heap
|
page read and write
|
||
27230C7A000
|
heap
|
page read and write
|
||
158FB581000
|
heap
|
page read and write
|
||
283D3F03000
|
heap
|
page read and write
|
||
283CF650000
|
trusted library allocation
|
page read and write
|
||
1A3B70B1000
|
heap
|
page read and write
|
||
210E0052000
|
heap
|
page read and write
|
||
158FB586000
|
heap
|
page read and write
|
||
27230C76000
|
heap
|
page read and write
|
||
210DFE20000
|
heap
|
page read and write
|
||
158FB58C000
|
heap
|
page read and write
|
||
283D4000000
|
remote allocation
|
page read and write
|
||
2771B460000
|
heap
|
page read and write
|
||
158FAC26000
|
heap
|
page read and write
|
||
158FAC70000
|
heap
|
page read and write
|
||
E3612FE000
|
stack
|
page read and write
|
||
2771B47C000
|
heap
|
page read and write
|
||
F29397F000
|
stack
|
page read and write
|
||
BA5AC7B000
|
stack
|
page read and write
|
||
283D3CAE000
|
trusted library allocation
|
page read and write
|
||
283D3CC4000
|
trusted library allocation
|
page read and write
|
||
2029243E000
|
heap
|
page read and write
|
||
283D3B90000
|
trusted library allocation
|
page read and write
|
||
C16F87B000
|
stack
|
page read and write
|
||
212DA252000
|
heap
|
page read and write
|
||
2771B446000
|
heap
|
page read and write
|
||
838B0FE000
|
stack
|
page read and write
|
||
283CE88B000
|
heap
|
page read and write
|
||
283D3E48000
|
heap
|
page read and write
|
||
158FB5B0000
|
heap
|
page read and write
|
||
27230B00000
|
heap
|
page read and write
|
||
158FB598000
|
heap
|
page read and write
|
||
1B89EC80000
|
trusted library allocation
|
page read and write
|
||
BA5B27E000
|
stack
|
page read and write
|
||
1A3B70D0000
|
heap
|
page read and write
|
||
158FAB80000
|
trusted library allocation
|
page read and write
|
||
158FB5B8000
|
heap
|
page read and write
|
||
696D27B000
|
stack
|
page read and write
|
||
212DA229000
|
heap
|
page read and write
|
||
158FB581000
|
heap
|
page read and write
|
||
283D3CC0000
|
trusted library allocation
|
page read and write
|
||
158FB58B000
|
heap
|
page read and write
|
||
158FAAE0000
|
heap
|
page read and write
|
||
2771B442000
|
heap
|
page read and write
|
||
E360FFB000
|
stack
|
page read and write
|
||
2771B43B000
|
heap
|
page read and write
|
||
2771B461000
|
heap
|
page read and write
|
||
158FAC13000
|
heap
|
page read and write
|
||
283CE5E0000
|
heap
|
page read and write
|
||
38C127F000
|
stack
|
page read and write
|
||
696D3FF000
|
stack
|
page read and write
|
||
838A6FB000
|
stack
|
page read and write
|
||
210E003C000
|
heap
|
page read and write
|
||
283CE891000
|
heap
|
page read and write
|
||
283CE874000
|
heap
|
page read and write
|
||
158FB560000
|
heap
|
page read and write
|
||
25087330000
|
heap
|
page read and write
|
||
2771B45F000
|
heap
|
page read and write
|
||
283CEE02000
|
heap
|
page read and write
|
||
158FACB1000
|
heap
|
page read and write
|
||
202924B9000
|
heap
|
page read and write
|
||
1A3B70E8000
|
heap
|
page read and write
|
||
212DA308000
|
heap
|
page read and write
|
||
25087360000
|
trusted library allocation
|
page read and write
|
||
2508745C000
|
heap
|
page read and write
|
||
237F2213000
|
heap
|
page read and write
|
||
283D3F00000
|
heap
|
page read and write
|
||
318137B000
|
stack
|
page read and write
|
||
212DAA02000
|
trusted library allocation
|
page read and write
|
||
BD292FF000
|
stack
|
page read and write
|
||
25087500000
|
heap
|
page read and write
|
||
210E0024000
|
heap
|
page read and write
|
||
283D3E6C000
|
heap
|
page read and write
|
||
838AE7F000
|
stack
|
page read and write
|
||
212DA26E000
|
heap
|
page read and write
|
||
1A3B72B0000
|
heap
|
page read and write
|
||
283D3E1E000
|
heap
|
page read and write
|
||
BD3C6FB000
|
stack
|
page read and write
|
||
E3610F7000
|
stack
|
page read and write
|
||
212DA040000
|
heap
|
page read and write
|
||
E360AFB000
|
stack
|
page read and write
|
||
158FACE4000
|
heap
|
page read and write
|
||
158FAB50000
|
heap
|
page read and write
|
||
210E008E000
|
heap
|
page read and write
|
||
237F2240000
|
heap
|
page read and write
|
||
210DFE80000
|
heap
|
page read and write
|
||
283CE879000
|
heap
|
page read and write
|
||
2771B46C000
|
heap
|
page read and write
|
||
283D3E00000
|
trusted library allocation
|
page read and write
|
||
1B89E65B000
|
heap
|
page read and write
|
||
BA5A97A000
|
stack
|
page read and write
|
||
212DA030000
|
heap
|
page read and write
|
||
250872D0000
|
heap
|
page read and write
|
||
25087502000
|
heap
|
page read and write
|
||
212DA25A000
|
heap
|
page read and write
|
||
212DA26E000
|
heap
|
page read and write
|
||
283CE83E000
|
heap
|
page read and write
|
||
158FB574000
|
heap
|
page read and write
|
||
210E006F000
|
heap
|
page read and write
|
||
210E0013000
|
heap
|
page read and write
|
||
283CEF00000
|
heap
|
page read and write
|
||
158FB5A4000
|
heap
|
page read and write
|
||
2771B457000
|
heap
|
page read and write
|
||
158FB57C000
|
heap
|
page read and write
|
||
210E004B000
|
heap
|
page read and write
|
||
FF4B3FE000
|
stack
|
page read and write
|
||
2771B456000
|
heap
|
page read and write
|
||
2771B250000
|
heap
|
page read and write
|
||
838AB7F000
|
stack
|
page read and write
|
||
838ADFD000
|
stack
|
page read and write
|
||
158FB57A000
|
heap
|
page read and write
|
||
1A3B70D5000
|
heap
|
page read and write
|
||
283CE8AA000
|
heap
|
page read and write
|
||
1B89E4B0000
|
heap
|
page read and write
|
||
C16FDFE000
|
stack
|
page read and write
|
||
1A3B70C2000
|
heap
|
page read and write
|
||
283D3B80000
|
trusted library allocation
|
page read and write
|
||
25087429000
|
heap
|
page read and write
|
||
202923C0000
|
trusted library allocation
|
page read and write
|
||
3181CFE000
|
unkown
|
page read and write
|
||
1B89E4C0000
|
heap
|
page read and write
|
||
1A3B7030000
|
heap
|
page read and write
|
||
20292260000
|
heap
|
page read and write
|
||
BA5ADFE000
|
stack
|
page read and write
|
||
C16FCF7000
|
stack
|
page read and write
|
||
27230BA0000
|
trusted library allocation
|
page read and write
|
||
158FAD02000
|
heap
|
page read and write
|
||
1B89E666000
|
heap
|
page read and write
|
||
1B89E600000
|
heap
|
page read and write
|
||
696D8FE000
|
stack
|
page read and write
|
||
158FB519000
|
heap
|
page read and write
|
||
158FB586000
|
heap
|
page read and write
|
||
237F2A02000
|
trusted library allocation
|
page read and write
|
||
158FB586000
|
heap
|
page read and write
|
||
3181879000
|
stack
|
page read and write
|
||
FF4B07E000
|
stack
|
page read and write
|
||
F2933DB000
|
stack
|
page read and write
|
||
283CE877000
|
heap
|
page read and write
|
||
F2937FC000
|
stack
|
page read and write
|
||
283CEDB0000
|
trusted library section
|
page read and write
|
||
283CE800000
|
heap
|
page read and write
|
||
283CEF13000
|
heap
|
page read and write
|
||
210E0108000
|
heap
|
page read and write
|
||
283D4000000
|
remote allocation
|
page read and write
|
||
283CF780000
|
trusted library section
|
page readonly
|
||
210E0050000
|
heap
|
page read and write
|
||
2771B46E000
|
heap
|
page read and write
|
||
3181A7E000
|
stack
|
page read and write
|
||
283CF770000
|
trusted library section
|
page readonly
|
||
210DFF80000
|
trusted library allocation
|
page read and write
|
||
158FAC80000
|
heap
|
page read and write
|
||
237F2960000
|
remote allocation
|
page read and write
|
||
237F2170000
|
heap
|
page read and write
|
||
2771B46A000
|
heap
|
page read and write
|
||
250872C0000
|
heap
|
page read and write
|
||
20292513000
|
heap
|
page read and write
|
||
158FAC29000
|
heap
|
page read and write
|
||
158FB576000
|
heap
|
page read and write
|
||
283CE86F000
|
heap
|
page read and write
|
||
318167E000
|
stack
|
page read and write
|
||
283D3D70000
|
trusted library allocation
|
page read and write
|
||
27230C13000
|
heap
|
page read and write
|
||
212DA200000
|
heap
|
page read and write
|
||
2771B47B000
|
heap
|
page read and write
|
||
283D3CD0000
|
trusted library allocation
|
page read and write
|
||
20292C02000
|
heap
|
page read and write
|
||
2771B426000
|
heap
|
page read and write
|
||
1B89E702000
|
heap
|
page read and write
|
||
1A3B70D4000
|
heap
|
page read and write
|
||
BD293FC000
|
stack
|
page read and write
|
||
696DAFE000
|
stack
|
page read and write
|
||
F29407E000
|
stack
|
page read and write
|
||
2771B1F0000
|
heap
|
page read and write
|
||
210E0000000
|
heap
|
page read and write
|
||
BA5A87D000
|
stack
|
page read and write
|
||
212DA28F000
|
heap
|
page read and write
|
||
237F2930000
|
trusted library allocation
|
page read and write
|
||
1B89E677000
|
heap
|
page read and write
|
||
283D3DF0000
|
trusted library allocation
|
page read and write
|
||
20292502000
|
heap
|
page read and write
|
||
27230D13000
|
heap
|
page read and write
|
||
212DA213000
|
heap
|
page read and write
|
||
BA5AE7F000
|
stack
|
page read and write
|
||
212DA23C000
|
heap
|
page read and write
|
||
283D3F02000
|
heap
|
page read and write
|
||
1A3B72B5000
|
heap
|
page read and write
|
||
283D3EFC000
|
heap
|
page read and write
|
||
158FB582000
|
heap
|
page read and write
|
||
1A3B70C5000
|
heap
|
page read and write
|
||
158FB5A2000
|
heap
|
page read and write
|
||
2771B45C000
|
heap
|
page read and write
|
||
210DFE10000
|
heap
|
page read and write
|
||
38C12FC000
|
stack
|
page read and write
|
||
210E004D000
|
heap
|
page read and write
|
||
283D3CA8000
|
trusted library allocation
|
page read and write
|
||
C16FEFD000
|
stack
|
page read and write
|
||
237F2236000
|
heap
|
page read and write
|
||
158FAC86000
|
heap
|
page read and write
|
||
202924CA000
|
heap
|
page read and write
|
||
2029246D000
|
heap
|
page read and write
|
||
25087C02000
|
trusted library allocation
|
page read and write
|
||
BD290FB000
|
stack
|
page read and write
|
||
20292488000
|
heap
|
page read and write
|
||
158FBA02000
|
heap
|
page read and write
|
||
1A3B70E1000
|
heap
|
page read and write
|
||
696D5FE000
|
stack
|
page read and write
|
||
F293BFD000
|
stack
|
page read and write
|
||
27230C28000
|
heap
|
page read and write
|
||
283D3CE4000
|
trusted library allocation
|
page read and write
|
||
1B89E629000
|
heap
|
page read and write
|
||
283D3EAB000
|
heap
|
page read and write
|
||
212DA1A0000
|
trusted library allocation
|
page read and write
|
||
1B89E613000
|
heap
|
page read and write
|
||
BD28B3B000
|
stack
|
page read and write
|
||
E360BFF000
|
stack
|
page read and write
|
||
2771B350000
|
trusted library allocation
|
page read and write
|
||
158FB596000
|
heap
|
page read and write
|
||
20292413000
|
heap
|
page read and write
|
||
BA5AD7E000
|
stack
|
page read and write
|
||
158FABF0000
|
remote allocation
|
page read and write
|
||
158FB500000
|
heap
|
page read and write
|
||
283D3E00000
|
heap
|
page read and write
|
||
27230C3C000
|
heap
|
page read and write
|
||
158FB57D000
|
heap
|
page read and write
|
||
20292250000
|
heap
|
page read and write
|
||
158FB59A000
|
heap
|
page read and write
|
||
283CFAF3000
|
trusted library allocation
|
page read and write
|
||
F293C7B000
|
stack
|
page read and write
|
||
838AF7D000
|
stack
|
page read and write
|
||
BA5AEFE000
|
stack
|
page read and write
|
||
283D4000000
|
remote allocation
|
page read and write
|
||
38C0D9A000
|
stack
|
page read and write
|
||
27230B10000
|
heap
|
page read and write
|
||
158FB514000
|
heap
|
page read and write
|
||
2771B502000
|
heap
|
page read and write
|
||
283D3DB0000
|
trusted library allocation
|
page read and write
|
||
BA5A34C000
|
stack
|
page read and write
|
||
2771B440000
|
heap
|
page read and write
|
||
158FAAF0000
|
heap
|
page read and write
|
||
237F2960000
|
remote allocation
|
page read and write
|
||
1A3B70B6000
|
heap
|
page read and write
|
||
210E0100000
|
heap
|
page read and write
|
||
158FBA02000
|
heap
|
page read and write
|
||
283CEF02000
|
heap
|
page read and write
|
||
1A3B70D0000
|
heap
|
page read and write
|
||
212DA25F000
|
heap
|
page read and write
|
||
BD3C5FB000
|
stack
|
page read and write
|
||
283CEDA0000
|
trusted library allocation
|
page read and write
|
||
2771B1E0000
|
heap
|
page read and write
|
||
696D9FF000
|
stack
|
page read and write
|
||
2771B467000
|
heap
|
page read and write
|
||
283CF760000
|
trusted library section
|
page readonly
|
||
BD3C8FE000
|
stack
|
page read and write
|
||
1A3B70B6000
|
heap
|
page read and write
|
||
838ABFE000
|
stack
|
page read and write
|
||
BD28E7E000
|
stack
|
page read and write
|
||
158FB581000
|
heap
|
page read and write
|
||
2771B462000
|
heap
|
page read and write
|
||
283D3DE0000
|
trusted library allocation
|
page read and write
|
||
283D3E54000
|
heap
|
page read and write
|
||
F293A7E000
|
stack
|
page read and write
|
||
FF4B4FF000
|
stack
|
page read and write
|
||
283CFAF0000
|
trusted library allocation
|
page read and write
|
||
237F21D0000
|
heap
|
page read and write
|
||
BD28FFE000
|
stack
|
page read and write
|
||
1B89E641000
|
heap
|
page read and write
|
||
25087464000
|
heap
|
page read and write
|
||
20292400000
|
heap
|
page read and write
|
||
158FACB5000
|
heap
|
page read and write
|
||
1B89E520000
|
heap
|
page read and write
|
||
158FB57A000
|
heap
|
page read and write
|
||
237F2200000
|
heap
|
page read and write
|
||
283D3EEF000
|
heap
|
page read and write
|
||
158FB575000
|
heap
|
page read and write
|
||
283CE640000
|
heap
|
page read and write
|
||
283D3DC0000
|
trusted library allocation
|
page read and write
|
||
158FBA00000
|
heap
|
page read and write
|
||
210E0088000
|
heap
|
page read and write
|
||
25087513000
|
heap
|
page read and write
|
||
210E0102000
|
heap
|
page read and write
|
||
237F2160000
|
heap
|
page read and write
|
||
25087400000
|
heap
|
page read and write
|
||
BA5AF7F000
|
stack
|
page read and write
|
||
283CF730000
|
trusted library section
|
page readonly
|
||
2771B458000
|
heap
|
page read and write
|
||
1A3B70A0000
|
heap
|
page read and write
|
||
158FAD13000
|
heap
|
page read and write
|
||
25087508000
|
heap
|
page read and write
|
||
283CEF18000
|
heap
|
page read and write
|
||
FF4B1FE000
|
stack
|
page read and write
|
||
1A3B70EB000
|
heap
|
page read and write
|
||
696D4FD000
|
stack
|
page read and write
|
||
158FB5D2000
|
heap
|
page read and write
|
||
283D3CA0000
|
trusted library allocation
|
page read and write
|
||
25087459000
|
heap
|
page read and write
|
||
283CEE15000
|
heap
|
page read and write
|
||
210E004C000
|
heap
|
page read and write
|
||
20292D13000
|
heap
|
page read and write
|
||
1A3B70E8000
|
heap
|
page read and write
|
||
158FBA02000
|
heap
|
page read and write
|
||
E360EFB000
|
stack
|
page read and write
|
||
158FB597000
|
heap
|
page read and write
|
||
38C107E000
|
stack
|
page read and write
|
||
283D3E2C000
|
heap
|
page read and write
|
||
283CFAD1000
|
trusted library allocation
|
page read and write
|
||
212DA281000
|
heap
|
page read and write
|
||
283D3CD0000
|
trusted library allocation
|
page read and write
|
||
1A3B70C6000
|
heap
|
page read and write
|
||
210E004F000
|
heap
|
page read and write
|
||
283D3E60000
|
heap
|
page read and write
|
||
158FB57D000
|
heap
|
page read and write
|
||
158FB587000
|
heap
|
page read and write
|
||
237F2202000
|
heap
|
page read and write
|
||
158FB599000
|
heap
|
page read and write
|
||
283CE829000
|
heap
|
page read and write
|
||
212DA0A0000
|
heap
|
page read and write
|
||
283CEE00000
|
heap
|
page read and write
|
||
210E007D000
|
heap
|
page read and write
|
||
283CEF59000
|
heap
|
page read and write
|
||
3181C77000
|
stack
|
page read and write
|
||
1A3B7270000
|
heap
|
page read and write
|
||
212DA302000
|
heap
|
page read and write
|
||
2771B400000
|
heap
|
page read and write
|
||
25087451000
|
heap
|
page read and write
|
||
212DA264000
|
heap
|
page read and write
|
||
158FAC3C000
|
heap
|
page read and write
|
||
2771B47F000
|
heap
|
page read and write
|
||
F293E7E000
|
stack
|
page read and write
|
||
158FB58E000
|
heap
|
page read and write
|
||
27230D00000
|
heap
|
page read and write
|
||
C16F8FE000
|
stack
|
page read and write
|
||
158FB5C4000
|
heap
|
page read and write
|
||
237F2259000
|
heap
|
page read and write
|
||
25087413000
|
heap
|
page read and write
|
||
283CF750000
|
trusted library section
|
page readonly
|
||
F293D7E000
|
stack
|
page read and write
|
||
FF4AD3B000
|
stack
|
page read and write
|
||
158FBA02000
|
heap
|
page read and write
|
||
158FABF0000
|
remote allocation
|
page read and write
|
||
2508743C000
|
heap
|
page read and write
|
||
2771B43D000
|
heap
|
page read and write
|
||
20292D00000
|
heap
|
page read and write
|
||
202924C8000
|
heap
|
page read and write
|
||
BD294FE000
|
stack
|
page read and write
|
||
158FACD7000
|
heap
|
page read and write
|
||
27230C55000
|
heap
|
page read and write
|
||
202922C0000
|
heap
|
page read and write
|
||
283CE88D000
|
heap
|
page read and write
|
||
158FB592000
|
heap
|
page read and write
|
||
210E002D000
|
heap
|
page read and write
|
||
838B07D000
|
stack
|
page read and write
|
||
158FB5D2000
|
heap
|
page read and write
|
||
31813FE000
|
stack
|
page read and write
|
||
2771B485000
|
heap
|
page read and write
|
||
158FBA20000
|
heap
|
page read and write
|
||
158FB570000
|
heap
|
page read and write
|
||
212DA300000
|
heap
|
page read and write
|
||
E3611FF000
|
stack
|
page read and write
|
||
158FB570000
|
heap
|
page read and write
|
||
210E0802000
|
trusted library allocation
|
page read and write
|
||
3181977000
|
stack
|
page read and write
|
||
283D3CE0000
|
trusted library allocation
|
page read and write
|
||
158FBA02000
|
heap
|
page read and write
|
||
2771B413000
|
heap
|
page read and write
|
||
158FB5BA000
|
heap
|
page read and write
|
||
283D3CA0000
|
trusted library allocation
|
page read and write
|
||
158FACD4000
|
heap
|
page read and write
|
||
C16F97D000
|
stack
|
page read and write
|
||
158FB585000
|
heap
|
page read and write
|
||
38C1178000
|
stack
|
page read and write
|
||
158FACC8000
|
heap
|
page read and write
|
||
1B89E602000
|
heap
|
page read and write
|
||
27230C02000
|
heap
|
page read and write
|
||
283CE5D0000
|
heap
|
page read and write
|
||
158FB584000
|
heap
|
page read and write
|
||
283D3E1A000
|
heap
|
page read and write
|
||
158FB576000
|
heap
|
page read and write
|
||
318177C000
|
stack
|
page read and write
|
||
F293AFC000
|
stack
|
page read and write
|
||
210E0056000
|
heap
|
page read and write
|
||
27230D02000
|
heap
|
page read and write
|
||
210E004A000
|
heap
|
page read and write
|
||
1A3B70E8000
|
heap
|
page read and write
|
||
838ACFE000
|
stack
|
page read and write
|
||
3181B7A000
|
stack
|
page read and write
|
||
283CEF59000
|
heap
|
page read and write
|
||
BA5AA7E000
|
stack
|
page read and write
|
||
1A3B70C4000
|
heap
|
page read and write
|
||
283D3EF4000
|
heap
|
page read and write
|
||
1B89E689000
|
heap
|
page read and write
|
||
158FB584000
|
heap
|
page read and write
|
||
283CE913000
|
heap
|
page read and write
|
||
38C10FE000
|
stack
|
page read and write
|
||
158FB598000
|
heap
|
page read and write
|
||
283D3EFA000
|
heap
|
page read and write
|
||
20292429000
|
heap
|
page read and write
|
||
27230C00000
|
heap
|
page read and write
|
||
158FB584000
|
heap
|
page read and write
|
||
158FB593000
|
heap
|
page read and write
|
||
27230C81000
|
heap
|
page read and write
|
||
212DA25D000
|
heap
|
page read and write
|
||
1A3B70E0000
|
heap
|
page read and write
|
||
158FB54F000
|
heap
|
page read and write
|
||
158FB5C4000
|
heap
|
page read and write
|
||
C16FB7B000
|
stack
|
page read and write
|
There are 486 hidden memdumps, click here to show them.