Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Tom Kean 126480286683.pdf
|
PDF document, version 1.7
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0ace9ee3d914a5c0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d449e58cb15daaf1_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
|
Maple help database
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
|
Maple help database
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-220623161933Z-209.bmp
|
PC bitmap, Windows 3.x format, 117 x -152 x 32
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3024000
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt19.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.1340
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt19.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt16.lst.1340
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
|
data
|
dropped
|
There are 45 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\Tom Kean 126480286683.pdf
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A0BCA3A000
|
heap
|
page read and write
|
||
207FDC3A000
|
heap
|
page read and write
|
||
1A0B7291000
|
heap
|
page read and write
|
||
1B88AA80000
|
trusted library allocation
|
page read and write
|
||
1A7C7802000
|
heap
|
page read and write
|
||
24B2D840000
|
heap
|
page read and write
|
||
207FDC7A000
|
heap
|
page read and write
|
||
84C3B7A000
|
stack
|
page read and write
|
||
207FDA60000
|
heap
|
page read and write
|
||
207FDC5E000
|
heap
|
page read and write
|
||
1D0637B7000
|
heap
|
page read and write
|
||
1D0637AA000
|
heap
|
page read and write
|
||
1A0BCB02000
|
heap
|
page read and write
|
||
207FDC6B000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
207FDC44000
|
heap
|
page read and write
|
||
218D1780000
|
heap
|
page read and write
|
||
1FA4D84B000
|
heap
|
page read and write
|
||
984F16F000
|
stack
|
page read and write
|
||
1A7C7385000
|
heap
|
page read and write
|
||
1A7C7393000
|
heap
|
page read and write
|
||
1A7C7386000
|
heap
|
page read and write
|
||
1A7C781A000
|
heap
|
page read and write
|
||
1A7C7385000
|
heap
|
page read and write
|
||
1A7C68C8000
|
heap
|
page read and write
|
||
E6647E000
|
stack
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1AC0EB70000
|
heap
|
page read and write
|
||
6FEDEFF000
|
stack
|
page read and write
|
||
1A7C683C000
|
heap
|
page read and write
|
||
E65F7F000
|
stack
|
page read and write
|
||
1A7C73B5000
|
heap
|
page read and write
|
||
2145A113000
|
heap
|
page read and write
|
||
1FA4D790000
|
heap
|
page read and write
|
||
1D0637B5000
|
heap
|
page read and write
|
||
1A0B7302000
|
heap
|
page read and write
|
||
1A0BC940000
|
trusted library allocation
|
page read and write
|
||
84C367A000
|
stack
|
page read and write
|
||
1A0B7BD1000
|
trusted library allocation
|
page read and write
|
||
1AC0F602000
|
trusted library allocation
|
page read and write
|
||
1A0B7BF3000
|
trusted library allocation
|
page read and write
|
||
1A0BCC20000
|
trusted library allocation
|
page read and write
|
||
1A7C6913000
|
heap
|
page read and write
|
||
1A0B8440000
|
trusted library section
|
page readonly
|
||
1AC0EC13000
|
heap
|
page read and write
|
||
B1622FF000
|
stack
|
page read and write
|
||
1E300CC0000
|
heap
|
page read and write
|
||
1A7C7821000
|
heap
|
page read and write
|
||
24B2D813000
|
heap
|
page read and write
|
||
1A0BC921000
|
trusted library allocation
|
page read and write
|
||
21459E10000
|
heap
|
page read and write
|
||
6FEDC7C000
|
stack
|
page read and write
|
||
1A7C7375000
|
heap
|
page read and write
|
||
1D06379F000
|
heap
|
page read and write
|
||
2145A05B000
|
heap
|
page read and write
|
||
1D06379F000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
970F2FD000
|
stack
|
page read and write
|
||
2145A000000
|
heap
|
page read and write
|
||
1AC0EC57000
|
heap
|
page read and write
|
||
207FDC13000
|
heap
|
page read and write
|
||
41E17E000
|
stack
|
page read and write
|
||
1D063797000
|
heap
|
page read and write
|
||
1A0BC920000
|
trusted library allocation
|
page read and write
|
||
1D063700000
|
heap
|
page read and write
|
||
576297F000
|
stack
|
page read and write
|
||
B161B5C000
|
stack
|
page read and write
|
||
1A7C7384000
|
heap
|
page read and write
|
||
207FDC66000
|
heap
|
page read and write
|
||
1A7C7366000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1AC0EB10000
|
heap
|
page read and write
|
||
24B2D800000
|
heap
|
page read and write
|
||
1D063781000
|
heap
|
page read and write
|
||
1FA4D913000
|
heap
|
page read and write
|
||
1A7C7371000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
2145A064000
|
heap
|
page read and write
|
||
1B88A302000
|
heap
|
page read and write
|
||
1FA4D84B000
|
heap
|
page read and write
|
||
1A7C7802000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
84C397E000
|
stack
|
page read and write
|
||
1A7C739C000
|
heap
|
page read and write
|
||
1A7C7385000
|
heap
|
page read and write
|
||
24B2D7E0000
|
trusted library allocation
|
page read and write
|
||
1AC0ED08000
|
heap
|
page read and write
|
||
1E300E2C000
|
heap
|
page read and write
|
||
207FDA70000
|
heap
|
page read and write
|
||
24B2DFB0000
|
remote allocation
|
page read and write
|
||
1B88A24B000
|
heap
|
page read and write
|
||
41DD7E000
|
stack
|
page read and write
|
||
1B88A213000
|
heap
|
page read and write
|
||
1A7C7380000
|
heap
|
page read and write
|
||
1A7C6908000
|
heap
|
page read and write
|
||
1A7C7384000
|
heap
|
page read and write
|
||
207FDC42000
|
heap
|
page read and write
|
||
1AC0EC5E000
|
heap
|
page read and write
|
||
1A0BCA11000
|
heap
|
page read and write
|
||
1A0B71A0000
|
trusted library section
|
page read and write
|
||
1A7C7821000
|
heap
|
page read and write
|
||
1A7C7389000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
5BB5E7E000
|
stack
|
page read and write
|
||
984F5FC000
|
stack
|
page read and write
|
||
1A7C66E0000
|
heap
|
page read and write
|
||
1E300E50000
|
heap
|
page read and write
|
||
1A7C7800000
|
heap
|
page read and write
|
||
2145A102000
|
heap
|
page read and write
|
||
84C38FE000
|
stack
|
page read and write
|
||
1FA4F2C0000
|
trusted library allocation
|
page read and write
|
||
5CFDD77000
|
stack
|
page read and write
|
||
84C357B000
|
stack
|
page read and write
|
||
6FEDFFE000
|
stack
|
page read and write
|
||
2145A013000
|
heap
|
page read and write
|
||
1A0B7D00000
|
heap
|
page read and write
|
||
41DF7B000
|
stack
|
page read and write
|
||
1A0B72A4000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
984F4F9000
|
stack
|
page read and write
|
||
218D1837000
|
heap
|
page read and write
|
||
1A0BCC10000
|
trusted library allocation
|
page read and write
|
||
1E300E00000
|
heap
|
page read and write
|
||
1A0B7D13000
|
heap
|
page read and write
|
||
1A7C6916000
|
heap
|
page read and write
|
||
970F17E000
|
stack
|
page read and write
|
||
1A7C6868000
|
heap
|
page read and write
|
||
207FDAD0000
|
heap
|
page read and write
|
||
1A0BCC40000
|
trusted library allocation
|
page read and write
|
||
20CB7302000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1E300CB0000
|
heap
|
page read and write
|
||
207FE402000
|
trusted library allocation
|
page read and write
|
||
24B2E002000
|
trusted library allocation
|
page read and write
|
||
1AC0EC88000
|
heap
|
page read and write
|
||
1A0BD000000
|
heap
|
page read and write
|
||
1D063770000
|
heap
|
page read and write
|
||
207FDC69000
|
heap
|
page read and write
|
||
1A0B8320000
|
trusted library allocation
|
page read and write
|
||
1A7C7371000
|
heap
|
page read and write
|
||
207FDC4E000
|
heap
|
page read and write
|
||
970F67D000
|
stack
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A7C781A000
|
heap
|
page read and write
|
||
970F37B000
|
stack
|
page read and write
|
||
21459E80000
|
heap
|
page read and write
|
||
218D1800000
|
heap
|
page read and write
|
||
1A0BCAE0000
|
heap
|
page read and write
|
||
1D063A20000
|
heap
|
page read and write
|
||
1FA4F402000
|
trusted library allocation
|
page read and write
|
||
1B88AC02000
|
trusted library allocation
|
page read and write
|
||
4717B7F000
|
stack
|
page read and write
|
||
1AC0EBA0000
|
trusted library allocation
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A7C68AB000
|
heap
|
page read and write
|
||
1FA4D730000
|
heap
|
page read and write
|
||
5BB6277000
|
stack
|
page read and write
|
||
5CFDEFA000
|
stack
|
page read and write
|
||
2145A070000
|
heap
|
page read and write
|
||
1A7C738A000
|
heap
|
page read and write
|
||
5BB5FFB000
|
stack
|
page read and write
|
||
1A7C67F0000
|
remote allocation
|
page read and write
|
||
1FA4D802000
|
heap
|
page read and write
|
||
1A7C7398000
|
heap
|
page read and write
|
||
1A0BCAF7000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A0BCAF5000
|
heap
|
page read and write
|
||
20CB70D0000
|
heap
|
page read and write
|
||
1D063786000
|
heap
|
page read and write
|
||
970F47C000
|
stack
|
page read and write
|
||
B161EFE000
|
stack
|
page read and write
|
||
1A0BCA1D000
|
heap
|
page read and write
|
||
B1623FD000
|
stack
|
page read and write
|
||
77AF27E000
|
stack
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1B88A271000
|
heap
|
page read and write
|
||
1A0B8210000
|
trusted library allocation
|
page read and write
|
||
1E300E4D000
|
heap
|
page read and write
|
||
B16217E000
|
stack
|
page read and write
|
||
218D1828000
|
heap
|
page read and write
|
||
218D1802000
|
heap
|
page read and write
|
||
77AF6FE000
|
stack
|
page read and write
|
||
1AC0ED13000
|
heap
|
page read and write
|
||
576287D000
|
stack
|
page read and write
|
||
24B2D670000
|
heap
|
page read and write
|
||
207FDC5F000
|
heap
|
page read and write
|
||
207FDC5B000
|
heap
|
page read and write
|
||
6FEDD7E000
|
stack
|
page read and write
|
||
1B88A313000
|
heap
|
page read and write
|
||
1A0BC7F0000
|
trusted library allocation
|
page read and write
|
||
970F57F000
|
stack
|
page read and write
|
||
1E301602000
|
trusted library allocation
|
page read and write
|
||
1A7C7385000
|
heap
|
page read and write
|
||
5CFDB77000
|
stack
|
page read and write
|
||
207FDC3E000
|
heap
|
page read and write
|
||
1A7C7387000
|
heap
|
page read and write
|
||
1A0B8400000
|
trusted library section
|
page readonly
|
||
1FA4D85B000
|
heap
|
page read and write
|
||
1A0B7325000
|
heap
|
page read and write
|
||
20CB7A02000
|
heap
|
page read and write
|
||
1D063795000
|
heap
|
page read and write
|
||
1AC0EC02000
|
heap
|
page read and write
|
||
1B88A23C000
|
heap
|
page read and write
|
||
5CFD56E000
|
stack
|
page read and write
|
||
1D0637B1000
|
heap
|
page read and write
|
||
84C3A7F000
|
stack
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A7C7353000
|
heap
|
page read and write
|
||
84C387B000
|
stack
|
page read and write
|
||
20CB7287000
|
heap
|
page read and write
|
||
1B88A300000
|
heap
|
page read and write
|
||
1A7C7386000
|
heap
|
page read and write
|
||
207FDC77000
|
heap
|
page read and write
|
||
1A7C73A9000
|
heap
|
page read and write
|
||
1A0B7273000
|
heap
|
page read and write
|
||
5CFDFFC000
|
stack
|
page read and write
|
||
1A7C7320000
|
heap
|
page read and write
|
||
1E300D20000
|
heap
|
page read and write
|
||
1A7C737D000
|
heap
|
page read and write
|
||
E65DFC000
|
stack
|
page read and write
|
||
1A7C737B000
|
heap
|
page read and write
|
||
1E300F02000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1FA4D868000
|
heap
|
page read and write
|
||
84C3CFE000
|
stack
|
page read and write
|
||
24B2DFB0000
|
remote allocation
|
page read and write
|
||
1E300E81000
|
heap
|
page read and write
|
||
1A7C7802000
|
heap
|
page read and write
|
||
84C377E000
|
stack
|
page read and write
|
||
1A7C73B6000
|
heap
|
page read and write
|
||
1B88A308000
|
heap
|
page read and write
|
||
1A0BC7E0000
|
trusted library allocation
|
page read and write
|
||
1A7C7802000
|
heap
|
page read and write
|
||
207FDC7E000
|
heap
|
page read and write
|
||
1B88A1E0000
|
heap
|
page read and write
|
||
984F1EF000
|
stack
|
page read and write
|
||
1E300E53000
|
heap
|
page read and write
|
||
24B2DFB0000
|
remote allocation
|
page read and write
|
||
1A0BCA00000
|
heap
|
page read and write
|
||
1A0B7213000
|
heap
|
page read and write
|
||
1A7C7379000
|
heap
|
page read and write
|
||
84C407E000
|
stack
|
page read and write
|
||
5BB5EFE000
|
stack
|
page read and write
|
||
5762B7F000
|
stack
|
page read and write
|
||
1AC0ED02000
|
heap
|
page read and write
|
||
218D1864000
|
heap
|
page read and write
|
||
218D1900000
|
heap
|
page read and write
|
||
207FDC00000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
2145A079000
|
heap
|
page read and write
|
||
1FA4D859000
|
heap
|
page read and write
|
||
1A7C73A7000
|
heap
|
page read and write
|
||
1FA4D900000
|
heap
|
page read and write
|
||
24B2D902000
|
heap
|
page read and write
|
||
1A7C68EB000
|
heap
|
page read and write
|
||
1A7C68E1000
|
heap
|
page read and write
|
||
B1624FD000
|
stack
|
page read and write
|
||
1A0B8430000
|
trusted library section
|
page readonly
|
||
1A7C73A0000
|
heap
|
page read and write
|
||
E6657C000
|
stack
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1FA4F340000
|
remote allocation
|
page read and write
|
||
1FA4F340000
|
remote allocation
|
page read and write
|
||
24B2D829000
|
heap
|
page read and write
|
||
E6637C000
|
stack
|
page read and write
|
||
218D2202000
|
trusted library allocation
|
page read and write
|
||
1A7C7802000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1B88A24F000
|
heap
|
page read and write
|
||
5762A7F000
|
stack
|
page read and write
|
||
77AF4FB000
|
stack
|
page read and write
|
||
1A7C6855000
|
heap
|
page read and write
|
||
1AC0EC24000
|
heap
|
page read and write
|
||
1A7C6863000
|
heap
|
page read and write
|
||
1AC0EC3C000
|
heap
|
page read and write
|
||
1FA4D800000
|
heap
|
page read and write
|
||
207FDC61000
|
heap
|
page read and write
|
||
1B88A27B000
|
heap
|
page read and write
|
||
970F77E000
|
stack
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
207FDC60000
|
heap
|
page read and write
|
||
6FEE1FE000
|
stack
|
page read and write
|
||
1A0BCAA0000
|
heap
|
page read and write
|
||
1AC0EB00000
|
heap
|
page read and write
|
||
B16207E000
|
stack
|
page read and write
|
||
970F1FC000
|
stack
|
page read and write
|
||
1FA4F280000
|
trusted library allocation
|
page read and write
|
||
1A7C68EB000
|
heap
|
page read and write
|
||
207FDC41000
|
heap
|
page read and write
|
||
E6599B000
|
stack
|
page read and write
|
||
1E300E48000
|
heap
|
page read and write
|
||
21459E20000
|
heap
|
page read and write
|
||
5BB647D000
|
stack
|
page read and write
|
||
1A0BC908000
|
trusted library allocation
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
970F07F000
|
stack
|
page read and write
|
||
1A0BC900000
|
trusted library allocation
|
page read and write
|
||
1A7C739C000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A0B7C15000
|
heap
|
page read and write
|
||
1E300E8B000
|
heap
|
page read and write
|
||
1A7C6882000
|
heap
|
page read and write
|
||
20CB7313000
|
heap
|
page read and write
|
||
1FA4D85B000
|
heap
|
page read and write
|
||
576277E000
|
stack
|
page read and write
|
||
1E300F08000
|
heap
|
page read and write
|
||
4717D7F000
|
stack
|
page read and write
|
||
218D17F0000
|
heap
|
page read and write
|
||
1A0BC90E000
|
trusted library allocation
|
page read and write
|
||
5762D7F000
|
stack
|
page read and write
|
||
207FDC5A000
|
heap
|
page read and write
|
||
1D063792000
|
heap
|
page read and write
|
||
41DCFE000
|
stack
|
page read and write
|
||
1A0BCA2B000
|
heap
|
page read and write
|
||
1A7C688B000
|
heap
|
page read and write
|
||
5CFD5EE000
|
stack
|
page read and write
|
||
20CB726D000
|
heap
|
page read and write
|
||
1D0637AA000
|
heap
|
page read and write
|
||
2145A002000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1B88A26B000
|
heap
|
page read and write
|
||
5CFD4EB000
|
stack
|
page read and write
|
||
1A0B7D02000
|
heap
|
page read and write
|
||
1B88A202000
|
heap
|
page read and write
|
||
1A7C685B000
|
heap
|
page read and write
|
||
1A7C7316000
|
heap
|
page read and write
|
||
207FDC47000
|
heap
|
page read and write
|
||
1A7C7387000
|
heap
|
page read and write
|
||
1A7C7202000
|
heap
|
page read and write
|
||
20CB7200000
|
heap
|
page read and write
|
||
1A0B7200000
|
heap
|
page read and write
|
||
24B2D680000
|
heap
|
page read and write
|
||
41E37F000
|
stack
|
page read and write
|
||
77AF2FE000
|
stack
|
page read and write
|
||
1A7C685F000
|
heap
|
page read and write
|
||
218D1879000
|
heap
|
page read and write
|
||
77AF7FE000
|
stack
|
page read and write
|
||
5BB617B000
|
stack
|
page read and write
|
||
1FA4D875000
|
heap
|
page read and write
|
||
218D1877000
|
heap
|
page read and write
|
||
1A7C6813000
|
heap
|
page read and write
|
||
6FEDCFE000
|
stack
|
page read and write
|
||
1A7C739A000
|
heap
|
page read and write
|
||
1A0BCAED000
|
heap
|
page read and write
|
||
1A7C7370000
|
heap
|
page read and write
|
||
1A7C737D000
|
heap
|
page read and write
|
||
2145A041000
|
heap
|
page read and write
|
||
1A7C7386000
|
heap
|
page read and write
|
||
1A7C739C000
|
heap
|
page read and write
|
||
21459F80000
|
trusted library allocation
|
page read and write
|
||
5CFDDFF000
|
unkown
|
page read and write
|
||
1A7C738E000
|
heap
|
page read and write
|
||
1A0BC930000
|
trusted library allocation
|
page read and write
|
||
1D0636E0000
|
heap
|
page read and write
|
||
1A7C737E000
|
heap
|
page read and write
|
||
1A0BC944000
|
trusted library allocation
|
page read and write
|
||
1A7C73B3000
|
heap
|
page read and write
|
||
1B88A200000
|
heap
|
page read and write
|
||
1A7C7386000
|
heap
|
page read and write
|
||
1A0B724E000
|
heap
|
page read and write
|
||
1A0BCA53000
|
heap
|
page read and write
|
||
5CFDA7B000
|
stack
|
page read and write
|
||
2145A02A000
|
heap
|
page read and write
|
||
1A0BCA50000
|
trusted library allocation
|
page read and write
|
||
1A0B72AC000
|
heap
|
page read and write
|
||
1A7C7318000
|
heap
|
page read and write
|
||
207FDC57000
|
heap
|
page read and write
|
||
1A0B725F000
|
heap
|
page read and write
|
||
1FA4D902000
|
heap
|
page read and write
|
||
20CB723E000
|
heap
|
page read and write
|
||
207FDC5C000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A0BC9D0000
|
trusted library allocation
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
24B2D6E0000
|
heap
|
page read and write
|
||
1AC0EC00000
|
heap
|
page read and write
|
||
1A0B7D18000
|
heap
|
page read and write
|
||
1A7C6829000
|
heap
|
page read and write
|
||
1A7C66F0000
|
heap
|
page read and write
|
||
576257D000
|
stack
|
page read and write
|
||
1A0B7D18000
|
heap
|
page read and write
|
||
1B88A170000
|
heap
|
page read and write
|
||
1A7C68E8000
|
heap
|
page read and write
|
||
1A7C6750000
|
heap
|
page read and write
|
||
1A7C737B000
|
heap
|
page read and write
|
||
207FDBD0000
|
trusted library allocation
|
page read and write
|
||
1A7C73CB000
|
heap
|
page read and write
|
||
1A7C7396000
|
heap
|
page read and write
|
||
1D063786000
|
heap
|
page read and write
|
||
2145A802000
|
trusted library allocation
|
page read and write
|
||
1FA4F340000
|
remote allocation
|
page read and write
|
||
1A0BCAFC000
|
heap
|
page read and write
|
||
1B88A281000
|
heap
|
page read and write
|
||
1AC0EC85000
|
heap
|
page read and write
|
||
1B88A28C000
|
heap
|
page read and write
|
||
1A7C73A8000
|
heap
|
page read and write
|
||
1AC0EC5A000
|
heap
|
page read and write
|
||
20CB72CB000
|
heap
|
page read and write
|
||
1A7C7384000
|
heap
|
page read and write
|
||
77AEF8C000
|
stack
|
page read and write
|
||
20CB7224000
|
heap
|
page read and write
|
||
1A0BCAF9000
|
heap
|
page read and write
|
||
1E300E29000
|
heap
|
page read and write
|
||
1A7C7382000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A7C68D4000
|
heap
|
page read and write
|
||
207FDC58000
|
heap
|
page read and write
|
||
B16227D000
|
stack
|
page read and write
|
||
1D0637AA000
|
heap
|
page read and write
|
||
1FA4D860000
|
heap
|
page read and write
|
||
1A0BCC30000
|
trusted library allocation
|
page read and write
|
||
1D063794000
|
heap
|
page read and write
|
||
20CB72C4000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A0B8450000
|
trusted library section
|
page readonly
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1FA4D918000
|
heap
|
page read and write
|
||
1A7C68FA000
|
heap
|
page read and write
|
||
1E300F13000
|
heap
|
page read and write
|
||
1A0B7100000
|
heap
|
page read and write
|
||
1A7C737D000
|
heap
|
page read and write
|
||
1A7C6780000
|
trusted library allocation
|
page read and write
|
||
207FDC7B000
|
heap
|
page read and write
|
||
1A0B7275000
|
heap
|
page read and write
|
||
20CB71D0000
|
trusted library allocation
|
page read and write
|
||
1A0B7C00000
|
heap
|
page read and write
|
||
5762C7F000
|
stack
|
page read and write
|
||
1FA4D83D000
|
heap
|
page read and write
|
||
1A0B7313000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
84C3D7F000
|
stack
|
page read and write
|
||
1A7C67F0000
|
remote allocation
|
page read and write
|
||
5CFD8FB000
|
stack
|
page read and write
|
||
1A0B7190000
|
trusted library allocation
|
page read and write
|
||
1A7C739A000
|
heap
|
page read and write
|
||
1E300F00000
|
heap
|
page read and write
|
||
84C3BFF000
|
stack
|
page read and write
|
||
B161FFE000
|
stack
|
page read and write
|
||
970EA8B000
|
stack
|
page read and write
|
||
1A0BC900000
|
trusted library allocation
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1FA4D813000
|
heap
|
page read and write
|
||
20CB7213000
|
heap
|
page read and write
|
||
1A7C7397000
|
heap
|
page read and write
|
||
1A0BCA60000
|
trusted library allocation
|
page read and write
|
||
84C327B000
|
stack
|
page read and write
|
||
41E077000
|
stack
|
page read and write
|
||
E6627D000
|
stack
|
page read and write
|
||
1E300E4B000
|
heap
|
page read and write
|
||
218D1813000
|
heap
|
page read and write
|
||
1A7C737C000
|
heap
|
page read and write
|
||
4717A7B000
|
stack
|
page read and write
|
||
1A0BC930000
|
trusted library allocation
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A0BCAF1000
|
heap
|
page read and write
|
||
6FEE0FE000
|
stack
|
page read and write
|
||
1A0B70F0000
|
heap
|
page read and write
|
||
41DC7B000
|
stack
|
page read and write
|
||
1A0B72FC000
|
heap
|
page read and write
|
||
1A0BC924000
|
trusted library allocation
|
page read and write
|
||
1FA4D7E0000
|
trusted library allocation
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
5CFD97E000
|
stack
|
page read and write
|
||
5BB607E000
|
stack
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A7C7387000
|
heap
|
page read and write
|
||
1A0B726E000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
207FDC46000
|
heap
|
page read and write
|
||
1A0B8200000
|
trusted library allocation
|
page read and write
|
||
84C3477000
|
stack
|
page read and write
|
||
1AC0EC62000
|
heap
|
page read and write
|
||
41DE7B000
|
stack
|
page read and write
|
||
1A7C68C1000
|
heap
|
page read and write
|
||
1A7C73B5000
|
heap
|
page read and write
|
||
218D1913000
|
heap
|
page read and write
|
||
E6617F000
|
stack
|
page read and write
|
||
1A0BCA47000
|
heap
|
page read and write
|
||
1FA4D82A000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
84C39FF000
|
stack
|
page read and write
|
||
1D0637AF000
|
heap
|
page read and write
|
||
207FDC45000
|
heap
|
page read and write
|
||
77AF5F7000
|
stack
|
page read and write
|
||
984F479000
|
stack
|
page read and write
|
||
207FDD02000
|
heap
|
page read and write
|
||
1A0BCAA3000
|
heap
|
page read and write
|
||
41E27D000
|
stack
|
page read and write
|
||
1A7C73AB000
|
heap
|
page read and write
|
||
84C3E7C000
|
stack
|
page read and write
|
||
1E300E46000
|
heap
|
page read and write
|
||
1A7C7384000
|
heap
|
page read and write
|
||
5BB5BEC000
|
stack
|
page read and write
|
||
1FA4D849000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A0BCA60000
|
heap
|
page read and write
|
||
1FA4D7C0000
|
trusted library allocation
|
page read and write
|
||
1B88A251000
|
heap
|
page read and write
|
||
207FDC84000
|
heap
|
page read and write
|
||
1A7C6902000
|
heap
|
page read and write
|
||
1AC0EC80000
|
heap
|
page read and write
|
||
5CFDC7F000
|
stack
|
page read and write
|
||
20CB7B00000
|
heap
|
page read and write
|
||
207FDC3D000
|
heap
|
page read and write
|
||
24B2D857000
|
heap
|
page read and write
|
||
1A7C7389000
|
heap
|
page read and write
|
||
E6607F000
|
stack
|
page read and write
|
||
218D1858000
|
heap
|
page read and write
|
||
1B88A180000
|
heap
|
page read and write
|
||
1A0B728C000
|
heap
|
page read and write
|
||
20CB7060000
|
heap
|
page read and write
|
||
1AC0ED00000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A7C67F0000
|
remote allocation
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
207FDC29000
|
heap
|
page read and write
|
||
1B88A22A000
|
heap
|
page read and write
|
||
1A0BCC60000
|
remote allocation
|
page read and write
|
||
20CB7070000
|
heap
|
page read and write
|
||
1A7C68B5000
|
heap
|
page read and write
|
||
207FDC6D000
|
heap
|
page read and write
|
||
1A0BCC60000
|
remote allocation
|
page read and write
|
||
1A0B7160000
|
heap
|
page read and write
|
||
1A7C7386000
|
heap
|
page read and write
|
||
1A7C73A9000
|
heap
|
page read and write
|
||
1A7C6800000
|
heap
|
page read and write
|
||
5761FDB000
|
stack
|
page read and write
|
||
1A0B7278000
|
heap
|
page read and write
|
||
57623FA000
|
stack
|
page read and write
|
||
984F0EA000
|
stack
|
page read and write
|
||
471757C000
|
stack
|
page read and write
|
||
1A7C73CF000
|
heap
|
page read and write
|
||
1A0B8420000
|
trusted library section
|
page readonly
|
||
1A7C739B000
|
heap
|
page read and write
|
||
218D1902000
|
heap
|
page read and write
|
||
1E300E6A000
|
heap
|
page read and write
|
||
1A0BCA89000
|
heap
|
page read and write
|
||
218D1790000
|
heap
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1B88A26B000
|
heap
|
page read and write
|
||
1A0BCAFC000
|
heap
|
page read and write
|
||
1E300E3C000
|
heap
|
page read and write
|
||
1A7C73C0000
|
heap
|
page read and write
|
||
1A0BCC60000
|
remote allocation
|
page read and write
|
||
20CB72BA000
|
heap
|
page read and write
|
||
1A7C7387000
|
heap
|
page read and write
|
||
1A0B7BF0000
|
trusted library allocation
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
1A0B7229000
|
heap
|
page read and write
|
||
1A7C6882000
|
heap
|
page read and write
|
||
4717C7F000
|
stack
|
page read and write
|
||
218D2090000
|
trusted library allocation
|
page read and write
|
||
1A0B8410000
|
trusted library section
|
page readonly
|
||
1A7C7370000
|
heap
|
page read and write
|
||
1A0B7C02000
|
heap
|
page read and write
|
||
1A0B87A0000
|
trusted library allocation
|
page read and write
|
||
984F57E000
|
stack
|
page read and write
|
||
1E3015C0000
|
trusted library allocation
|
page read and write
|
||
1A0B729D000
|
heap
|
page read and write
|
||
1E300E13000
|
heap
|
page read and write
|
||
1D063A25000
|
heap
|
page read and write
|
||
24B2D802000
|
heap
|
page read and write
|
||
1A7C7300000
|
heap
|
page read and write
|
||
1A0BCADB000
|
heap
|
page read and write
|
||
5BB637E000
|
stack
|
page read and write
|
||
1AC0EC66000
|
heap
|
page read and write
|
||
20CB721E000
|
heap
|
page read and write
|
||
207FDC31000
|
heap
|
page read and write
|
||
1A7C68AB000
|
heap
|
page read and write
|
||
1B88A256000
|
heap
|
page read and write
|
||
1D063680000
|
heap
|
page read and write
|
||
1D06379F000
|
heap
|
page read and write
|
||
576267D000
|
stack
|
page read and write
|
||
1A7C739B000
|
heap
|
page read and write
|
||
970EEFC000
|
stack
|
page read and write
|
||
1FA4D720000
|
heap
|
page read and write
|
||
218D1840000
|
heap
|
page read and write
|
There are 568 hidden memdumps, click here to show them.