Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
osGcfBvGVu.pdf
|
PDF document, version 1.7, 1 pages
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0ace9ee3d914a5c0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d449e58cb15daaf1_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index~RF52ad0a.TMP (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF5230f4.TMP (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-230105074603Z-204.bmp
|
PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3024000, file counter 16, database pages 15, cookie 0x5, schema 4,
UTF-8, version-valid-for 16
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache.bin
|
data
|
dropped
|
There are 41 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\osGcfBvGVu.pdf
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://traffmen.ru/wb?keyword=eicar%20pdf%20test%20file
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB
--service-sandbox-type=none --mojo-platform-channel-handle=1852 --field-trial-handle=1784,i,17276974344343449179,18398132625013484821,131072
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://static.s123-cdn-static.com/uploads/4489441/normal_5fc8b59e7613e.pdf)
|
unknown
|
||
https://zawasofolebu.weebly.com/uploads/1/3/4/9/134902788/6a0ec8.pdf)
|
unknown
|
||
https://xuzufudoroxibu.weebly.com/uploads/1/3/4/7/134755415/fewonuviwinulewipa.pdf)
|
unknown
|
||
https://voxonevixes.weebly.com/uploads/1/3/4/3/134383310/3212069.pdf)
|
unknown
|
||
https://denasigetul.weebly.com/uploads/1/3/4/3/134332190/3aadf349f71.pdf)
|
unknown
|
||
https://traffmen.ru/wb?keyword=eicar%20pdf%20test%20file
|
104.21.19.149
|
||
https://jatorogerujew.weebly.com/uploads/1/3/2/7/132710569/5650151.pdf)
|
unknown
|
||
https://static1.squarespace.com/static/5fc2d06c1452f90b7ff1a516/t/5fc81fa34b97230d050097b8/160695082
|
unknown
|
||
https://static1.squarespace.com/static/5fc59785d49dd12447543100/t/5fc892132dd5737571b7b636/160698011
|
unknown
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
142.251.209.13
|
||
https://static.s123-cdn-static.com/uploads/4451565/normal_5fc4be3b76a1c.pdf)
|
unknown
|
||
https://vesumuzuvof.weebly.com/uploads/1/3/4/6/134685641/gewof.pdf)
|
unknown
|
||
https://cdn-cms.f-static.net/uploads/4498392/normal_5faf04625de48.pdf)
|
unknown
|
||
https://traffmen.ru/wb?keyword=eicar%20pdf%20test%20file
|
|||
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
142.250.184.78
|
||
https://cdn-cms.f-static.net/uploads/4381737/normal_5f9c867fda2cc.pdf)
|
unknown
|
||
https://traffmen.ru/favicon.ico
|
104.21.19.149
|
||
https://cdn-cms.f-static.net/uploads/4376874/normal_5fa0c5cb1b909.pdf)
|
unknown
|
||
https://a.nel.cloudflare.com/report/v3?s=gMx5mUmwuq9TlZ9qKTp9%2F2xmk7yZ0efWtwpnhfwBZoaG8au4PoBBTHLZ%2FcCZtNwexk2p%2FndcEsHZuVXcqa45OLsm%2BSaJvf4C3J0D%2FZtJclcfBsADf5ZEGlU9o6IrXA%3D%3D
|
35.190.80.1
|
||
https://traffmen.ru/wb?keyword=eicar%20pdf%20test%20file)
|
unknown
|
||
https://static.s123-cdn-static.com/uploads/4479223/normal_5fc8ecf96736d.pdf)
|
unknown
|
||
https://a.nel.cloudflare.com/report/v3?s=sOH7aKZQs7HUmJ%2B%2BIpDazDd8U6kSBoRWr90OOINUwzQ6PDO6tOTlpT7hsiU%2F%2Flm7Mmoc82w9xaFVb7ORgr2CRA3wz2daEIcWiZsz1tp8VaBD76du9kWQg%2FV6l5uNug%3D%3D
|
35.190.80.1
|
||
https://cdn-cms.f-static.net/uploads/4365599/normal_5f9abc7d2f1a4.pdf)
|
unknown
|
||
https://daviwoza.weebly.com/uploads/1/3/4/6/134670821/rudaruzarafaw-nobokujiduv-nalegeji-regoresusa.
|
unknown
|
There are 14 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
a.nel.cloudflare.com
|
35.190.80.1
|
||
accounts.google.com
|
142.251.209.13
|
||
traffmen.ru
|
172.67.186.133
|
||
www.google.com
|
142.250.184.36
|
||
clients.l.google.com
|
142.250.184.78
|
||
clients2.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.19.149
|
unknown
|
United States
|
||
142.250.184.78
|
clients.l.google.com
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
142.251.209.13
|
accounts.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.184.36
|
www.google.com
|
United States
|
||
35.190.80.1
|
a.nel.cloudflare.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
dr
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blocklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_USERSS-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry
|
TraceTimeLast
|
There are 54 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D7A8AFD000
|
stack
|
page read and write
|
||
1FD111D0000
|
trusted library section
|
page readonly
|
||
194FA402000
|
heap
|
page read and write
|
||
19256700000
|
heap
|
page read and write
|
||
21AD9E48000
|
heap
|
page read and write
|
||
100847A000
|
stack
|
page read and write
|
||
4A9017F000
|
stack
|
page read and write
|
||
1FD15620000
|
trusted library allocation
|
page read and write
|
||
1FD1582E000
|
heap
|
page read and write
|
||
25B7CE45000
|
heap
|
page read and write
|
||
1FD15A21000
|
trusted library allocation
|
page read and write
|
||
1FD15630000
|
trusted library allocation
|
page read and write
|
||
4A8F5EB000
|
stack
|
page read and write
|
||
5C51C7B000
|
stack
|
page read and write
|
||
140587B000
|
stack
|
page read and write
|
||
4A9057C000
|
stack
|
page read and write
|
||
1FD10072000
|
heap
|
page read and write
|
||
1DBF4A00000
|
trusted library allocation
|
page read and write
|
||
194FA45B000
|
heap
|
page read and write
|
||
D7A8DFC000
|
stack
|
page read and write
|
||
1FD02600000
|
heap
|
page read and write
|
||
194FA370000
|
trusted library allocation
|
page read and write
|
||
2C5A5102000
|
heap
|
page read and write
|
||
90A767C000
|
stack
|
page read and write
|
||
1FD10B18000
|
heap
|
page read and write
|
||
26B26702000
|
heap
|
page read and write
|
||
25B7CE4F000
|
heap
|
page read and write
|
||
1FD11593000
|
trusted library allocation
|
page read and write
|
||
1FD02560000
|
trusted library allocation
|
page read and write
|
||
F33F0FF000
|
stack
|
page read and write
|
||
21AD9D50000
|
trusted library allocation
|
page read and write
|
||
25B7CE66000
|
heap
|
page read and write
|
||
1FD15780000
|
trusted library allocation
|
page read and write
|
||
194FA400000
|
heap
|
page read and write
|
||
1FD15822000
|
heap
|
page read and write
|
||
1FD03023000
|
heap
|
page read and write
|
||
1FD15AA0000
|
remote allocation
|
page read and write
|
||
1FD023E0000
|
heap
|
page read and write
|
||
21AD9E40000
|
heap
|
page read and write
|
||
2C5A504C000
|
heap
|
page read and write
|
||
1FD02E02000
|
heap
|
page read and write
|
||
1FD11590000
|
trusted library allocation
|
page read and write
|
||
25B7D602000
|
trusted library allocation
|
page read and write
|
||
25B7CE7B000
|
heap
|
page read and write
|
||
194FA472000
|
heap
|
page read and write
|
||
1FD03002000
|
heap
|
page read and write
|
||
25B7CE32000
|
heap
|
page read and write
|
||
90A7BFF000
|
stack
|
page read and write
|
||
2C5A502A000
|
heap
|
page read and write
|
||
1FD15800000
|
heap
|
page read and write
|
||
1FD15812000
|
heap
|
page read and write
|
||
25B7CE59000
|
heap
|
page read and write
|
||
19256430000
|
heap
|
page read and write
|
||
1FD1584D000
|
heap
|
page read and write
|
||
194FA46A000
|
heap
|
page read and write
|
||
28EB26BA000
|
heap
|
page read and write
|
||
90A77FB000
|
stack
|
page read and write
|
||
28EB26B8000
|
heap
|
page read and write
|
||
21AD9F13000
|
heap
|
page read and write
|
||
25B7CE7E000
|
heap
|
page read and write
|
||
194FA340000
|
heap
|
page read and write
|
||
2C5A4F30000
|
heap
|
page read and write
|
||
1FD02F6D000
|
heap
|
page read and write
|
||
1405A7E000
|
stack
|
page read and write
|
||
1FD15817000
|
heap
|
page read and write
|
||
9C126FD000
|
stack
|
page read and write
|
||
26B26540000
|
remote allocation
|
page read and write
|
||
4A900FF000
|
stack
|
page read and write
|
||
1FD1587E000
|
heap
|
page read and write
|
||
1FD0FFA0000
|
heap
|
page read and write
|
||
1FD15A50000
|
trusted library allocation
|
page read and write
|
||
1FD15751000
|
trusted library allocation
|
page read and write
|
||
2C5A5002000
|
heap
|
page read and write
|
||
1FD02F02000
|
heap
|
page read and write
|
||
1FD155B0000
|
trusted library allocation
|
page read and write
|
||
90A74FF000
|
stack
|
page read and write
|
||
1FD02F43000
|
heap
|
page read and write
|
||
26B26613000
|
heap
|
page read and write
|
||
25B7CE42000
|
heap
|
page read and write
|
||
4C7A8B000
|
stack
|
page read and write
|
||
4A8F9F7000
|
stack
|
page read and write
|
||
1FD10013000
|
heap
|
page read and write
|
||
25B7D5A0000
|
trusted library allocation
|
page read and write
|
||
21ADB802000
|
trusted library allocation
|
page read and write
|
||
4C80FF000
|
stack
|
page read and write
|
||
1DBF47A0000
|
trusted library allocation
|
page read and write
|
||
26B26629000
|
heap
|
page read and write
|
||
2C5A503B000
|
heap
|
page read and write
|
||
1FD02540000
|
trusted library allocation
|
page read and write
|
||
25B7CE13000
|
heap
|
page read and write
|
||
21AD9E6F000
|
heap
|
page read and write
|
||
2C5A502F000
|
heap
|
page read and write
|
||
2C5A4F80000
|
heap
|
page read and write
|
||
1FD03030000
|
heap
|
page read and write
|
||
F33EFFF000
|
stack
|
page read and write
|
||
1FD15AA0000
|
remote allocation
|
page read and write
|
||
21AD9D70000
|
trusted library allocation
|
page read and write
|
||
1FD03000000
|
heap
|
page read and write
|
||
4A8F8FE000
|
stack
|
page read and write
|
||
26B26410000
|
heap
|
page read and write
|
||
9C125FE000
|
stack
|
page read and write
|
||
1FD115A0000
|
trusted library allocation
|
page read and write
|
||
19256656000
|
heap
|
page read and write
|
||
25B7CE7C000
|
heap
|
page read and write
|
||
1FD15A60000
|
trusted library allocation
|
page read and write
|
||
1FD0278E000
|
heap
|
page read and write
|
||
21AD9DE0000
|
remote allocation
|
page read and write
|
||
1FD15C10000
|
trusted library allocation
|
page read and write
|
||
4A9007E000
|
stack
|
page read and write
|
||
4A8FA7E000
|
stack
|
page read and write
|
||
1FD10A00000
|
heap
|
page read and write
|
||
90A7AFC000
|
stack
|
page read and write
|
||
90A6F6B000
|
stack
|
page read and write
|
||
21AD9C50000
|
heap
|
page read and write
|
||
1FD11571000
|
trusted library allocation
|
page read and write
|
||
1FD111E0000
|
trusted library section
|
page readonly
|
||
25B7CE43000
|
heap
|
page read and write
|
||
1DBF3D75000
|
heap
|
page read and write
|
||
1FD10C81000
|
trusted library allocation
|
page read and write
|
||
1FD02692000
|
heap
|
page read and write
|
||
21AD9BF0000
|
heap
|
page read and write
|
||
25B7CE31000
|
heap
|
page read and write
|
||
1FD10B59000
|
heap
|
page read and write
|
||
194FA467000
|
heap
|
page read and write
|
||
19256713000
|
heap
|
page read and write
|
||
1FD11200000
|
trusted library section
|
page readonly
|
||
4A8FC7E000
|
stack
|
page read and write
|
||
25B7CE64000
|
heap
|
page read and write
|
||
19256663000
|
heap
|
page read and write
|
||
26B263A0000
|
heap
|
page read and write
|
||
194FA475000
|
heap
|
page read and write
|
||
194FA440000
|
heap
|
page read and write
|
||
25B7CE58000
|
heap
|
page read and write
|
||
1FD02658000
|
heap
|
page read and write
|
||
21AD9E58000
|
heap
|
page read and write
|
||
1FD02664000
|
heap
|
page read and write
|
||
D7A89FF000
|
stack
|
page read and write
|
||
9C120FF000
|
stack
|
page read and write
|
||
26B2665C000
|
heap
|
page read and write
|
||
1DBF3A90000
|
heap
|
page read and write
|
||
1FD15BB0000
|
trusted library allocation
|
page read and write
|
||
21AD9E62000
|
heap
|
page read and write
|
||
28EB2490000
|
heap
|
page read and write
|
||
1FD15AB0000
|
trusted library allocation
|
page read and write
|
||
4A8FB7A000
|
stack
|
page read and write
|
||
28EB2600000
|
heap
|
page read and write
|
||
D7A867C000
|
stack
|
page read and write
|
||
2C5A4FB0000
|
trusted library allocation
|
page read and write
|
||
1FD10056000
|
heap
|
page read and write
|
||
1DBF3AB0000
|
heap
|
page read and write
|
||
21ADB7A0000
|
trusted library allocation
|
page read and write
|
||
81EC07E000
|
stack
|
page read and write
|
||
19256702000
|
heap
|
page read and write
|
||
25B7CD00000
|
heap
|
page read and write
|
||
100857F000
|
stack
|
page read and write
|
||
25B7CE5A000
|
heap
|
page read and write
|
||
81EBF7E000
|
stack
|
page read and write
|
||
1FD15A0E000
|
trusted library allocation
|
page read and write
|
||
21AD9E48000
|
heap
|
page read and write
|
||
1FD15894000
|
heap
|
page read and write
|
||
21AD9DE0000
|
remote allocation
|
page read and write
|
||
26B26540000
|
remote allocation
|
page read and write
|
||
1FD02F00000
|
heap
|
page read and write
|
||
1FD10A02000
|
heap
|
page read and write
|
||
1FD02686000
|
heap
|
page read and write
|
||
26B26602000
|
heap
|
page read and write
|
||
28EB2E02000
|
heap
|
page read and write
|
||
1FD02440000
|
heap
|
page read and write
|
||
1FD02FB0000
|
heap
|
page read and write
|
||
5C5237E000
|
stack
|
page read and write
|
||
1FD03027000
|
heap
|
page read and write
|
||
1FD15A24000
|
trusted library allocation
|
page read and write
|
||
1405B7A000
|
stack
|
page read and write
|
||
9C1237E000
|
stack
|
page read and write
|
||
1FD02653000
|
heap
|
page read and write
|
||
81EBABB000
|
stack
|
page read and write
|
||
25B7CCA0000
|
heap
|
page read and write
|
||
194FA413000
|
heap
|
page read and write
|
||
10082FB000
|
stack
|
page read and write
|
||
25B7CE5B000
|
heap
|
page read and write
|
||
5C5267E000
|
stack
|
page read and write
|
||
19256668000
|
heap
|
page read and write
|
||
2C5A5013000
|
heap
|
page read and write
|
||
1DBF3AD0000
|
heap
|
page read and write
|
||
21AD9F00000
|
heap
|
page read and write
|
||
21AD9E58000
|
heap
|
page read and write
|
||
1FD15865000
|
heap
|
page read and write
|
||
1DBF4A60000
|
trusted library allocation
|
page read and write
|
||
25B7CE69000
|
heap
|
page read and write
|
||
28EB2613000
|
heap
|
page read and write
|
||
19256625000
|
heap
|
page read and write
|
||
25B7CE3B000
|
heap
|
page read and write
|
||
26B263B0000
|
heap
|
page read and write
|
||
1DBF3D70000
|
heap
|
page read and write
|
||
2C5A5054000
|
heap
|
page read and write
|
||
D7A8BFC000
|
stack
|
page read and write
|
||
5C5277E000
|
stack
|
page read and write
|
||
1FD15A10000
|
trusted library allocation
|
page read and write
|
||
1FD02FC7000
|
heap
|
page read and write
|
||
1FD15840000
|
heap
|
page read and write
|
||
9C1207C000
|
stack
|
page read and write
|
||
90A737C000
|
stack
|
page read and write
|
||
1FD1007B000
|
heap
|
page read and write
|
||
1FD10113000
|
heap
|
page read and write
|
||
1FD02613000
|
heap
|
page read and write
|
||
28EB26C7000
|
heap
|
page read and write
|
||
25B7CE76000
|
heap
|
page read and write
|
||
1FD0FFD0000
|
trusted library allocation
|
page read and write
|
||
1FD1008B000
|
heap
|
page read and write
|
||
5C51F7F000
|
stack
|
page read and write
|
||
21AD9E02000
|
heap
|
page read and write
|
||
26B26540000
|
remote allocation
|
page read and write
|
||
25B7CE6B000
|
heap
|
page read and write
|
||
1FD023D0000
|
heap
|
page read and write
|
||
10080FA000
|
stack
|
page read and write
|
||
1925663C000
|
heap
|
page read and write
|
||
28EB24F0000
|
heap
|
page read and write
|
||
1FD15881000
|
heap
|
page read and write
|
||
25B7CE48000
|
heap
|
page read and write
|
||
90A79FE000
|
stack
|
page read and write
|
||
1FD1587B000
|
heap
|
page read and write
|
||
2C5A5045000
|
heap
|
page read and write
|
||
25B7CE68000
|
heap
|
page read and write
|
||
1FD10077000
|
heap
|
page read and write
|
||
1FD10B18000
|
heap
|
page read and write
|
||
21AD9BE0000
|
heap
|
page read and write
|
||
1FD10B00000
|
heap
|
page read and write
|
||
1FD10B02000
|
heap
|
page read and write
|
||
194FA502000
|
heap
|
page read and write
|
||
1FD027E5000
|
heap
|
page read and write
|
||
26B26600000
|
heap
|
page read and write
|
||
1FD15A08000
|
trusted library allocation
|
page read and write
|
||
1FD02F54000
|
heap
|
page read and write
|
||
1FD155A0000
|
trusted library allocation
|
page read and write
|
||
1007CAB000
|
stack
|
page read and write
|
||
1DBF49E0000
|
trusted library allocation
|
page read and write
|
||
194FA2D0000
|
heap
|
page read and write
|
||
1FD02713000
|
heap
|
page read and write
|
||
D7A87FF000
|
stack
|
page read and write
|
||
21AD9E00000
|
heap
|
page read and write
|
||
1008379000
|
stack
|
page read and write
|
||
1FD15863000
|
heap
|
page read and write
|
||
26B2663D000
|
heap
|
page read and write
|
||
1DBF3D79000
|
heap
|
page read and write
|
||
26B26626000
|
heap
|
page read and write
|
||
1DBF49F0000
|
heap
|
page readonly
|
||
10081FE000
|
stack
|
page read and write
|
||
1FD0268D000
|
heap
|
page read and write
|
||
1FD02691000
|
heap
|
page read and write
|
||
21AD9F18000
|
heap
|
page read and write
|
||
28EB2670000
|
heap
|
page read and write
|
||
1FD15A00000
|
trusted library allocation
|
page read and write
|
||
26B26510000
|
trusted library allocation
|
page read and write
|
||
14059F9000
|
stack
|
page read and write
|
||
1FD15BA0000
|
trusted library allocation
|
page read and write
|
||
1FD15750000
|
trusted library allocation
|
page read and write
|
||
10087FF000
|
stack
|
page read and write
|
||
4A9027F000
|
stack
|
page read and write
|
||
1FD10B18000
|
heap
|
page read and write
|
||
1FD1575A000
|
trusted library allocation
|
page read and write
|
||
1FD15770000
|
trusted library allocation
|
page read and write
|
||
25B7CE5E000
|
heap
|
page read and write
|
||
9C122FC000
|
stack
|
page read and write
|
||
1DBF4790000
|
trusted library allocation
|
page read and write
|
||
9C1257D000
|
stack
|
page read and write
|
||
1FD02F90000
|
heap
|
page read and write
|
||
1FD155E0000
|
trusted library allocation
|
page read and write
|
||
2C5A5A02000
|
trusted library allocation
|
page read and write
|
||
1FD0FF30000
|
heap
|
page read and write
|
||
19256E02000
|
trusted library allocation
|
page read and write
|
||
1405AFE000
|
stack
|
page read and write
|
||
1FD0266E000
|
heap
|
page read and write
|
||
4C82FE000
|
stack
|
page read and write
|
||
81EBBBE000
|
stack
|
page read and write
|
||
1FD10B59000
|
heap
|
page read and write
|
||
81EC17F000
|
stack
|
page read and write
|
||
25B7CF02000
|
heap
|
page read and write
|
||
1FD02643000
|
heap
|
page read and write
|
||
28EB263E000
|
heap
|
page read and write
|
||
1FD1588E000
|
heap
|
page read and write
|
||
19256440000
|
heap
|
page read and write
|
||
1FD15885000
|
heap
|
page read and write
|
||
1FD10B59000
|
heap
|
page read and write
|
||
21AD9E57000
|
heap
|
page read and write
|
||
1DBF4720000
|
trusted library allocation
|
page read and write
|
||
25B7CE85000
|
heap
|
page read and write
|
||
81EBB3E000
|
stack
|
page read and write
|
||
28EB2480000
|
heap
|
page read and write
|
||
1FD02FBC000
|
heap
|
page read and write
|
||
19256613000
|
heap
|
page read and write
|
||
1FD0268A000
|
heap
|
page read and write
|
||
1FD0FFE0000
|
trusted library section
|
page read and write
|
||
1FD100BC000
|
heap
|
page read and write
|
||
1FD10A15000
|
heap
|
page read and write
|
||
1FD0263D000
|
heap
|
page read and write
|
||
1FD1003F000
|
heap
|
page read and write
|
||
26B26654000
|
heap
|
page read and write
|
||
19256679000
|
heap
|
page read and write
|
||
194FA454000
|
heap
|
page read and write
|
||
1FD15AA0000
|
remote allocation
|
page read and write
|
||
4A8FD7F000
|
stack
|
page read and write
|
||
1FD15770000
|
trusted library allocation
|
page read and write
|
||
1DBF4A10000
|
trusted library allocation
|
page read and write
|
||
25B7CE6C000
|
heap
|
page read and write
|
||
21AD9DE0000
|
remote allocation
|
page read and write
|
||
1FD100A0000
|
heap
|
page read and write
|
||
5C5227D000
|
stack
|
page read and write
|
||
1FD111F0000
|
trusted library section
|
page readonly
|
||
1FD10094000
|
heap
|
page read and write
|
||
25B7CE61000
|
heap
|
page read and write
|
||
25B7CE2A000
|
heap
|
page read and write
|
||
1FD10B18000
|
heap
|
page read and write
|
||
1FD02F22000
|
heap
|
page read and write
|
||
28EB2702000
|
heap
|
page read and write
|
||
28EB2F00000
|
heap
|
page read and write
|
||
1FD10102000
|
heap
|
page read and write
|
||
1DBF3B16000
|
heap
|
page read and write
|
||
1FD15A70000
|
trusted library allocation
|
page read and write
|
||
F33EDFE000
|
stack
|
page read and write
|
||
21AD9F02000
|
heap
|
page read and write
|
||
1DBF3B1E000
|
heap
|
page read and write
|
||
4C7FFB000
|
stack
|
page read and write
|
||
25B7CE41000
|
heap
|
page read and write
|
||
90A75FF000
|
stack
|
page read and write
|
||
25B7CE6E000
|
heap
|
page read and write
|
||
1FD15A90000
|
trusted library allocation
|
page read and write
|
||
1FD15780000
|
trusted library allocation
|
page read and write
|
||
25B7CE3E000
|
heap
|
page read and write
|
||
28EB26C9000
|
heap
|
page read and write
|
||
25B7CE62000
|
heap
|
page read and write
|
||
1FD15740000
|
trusted library allocation
|
page read and write
|
||
1DBF3B1E000
|
heap
|
page read and write
|
||
4A8FFFE000
|
stack
|
page read and write
|
||
1DBF4730000
|
trusted library allocation
|
page read and write
|
||
28EB26E1000
|
heap
|
page read and write
|
||
4A8F87E000
|
stack
|
page read and write
|
||
4A9047A000
|
stack
|
page read and write
|
||
F33E9DB000
|
stack
|
page read and write
|
||
1DBF3D80000
|
trusted library allocation
|
page read and write
|
||
19256600000
|
heap
|
page read and write
|
||
2C5A4F20000
|
heap
|
page read and write
|
||
28EB2F14000
|
heap
|
page read and write
|
||
25B7CE75000
|
heap
|
page read and write
|
||
194FA513000
|
heap
|
page read and write
|
||
1FD10C00000
|
trusted library allocation
|
page read and write
|
||
25B7CE2E000
|
heap
|
page read and write
|
||
1FD03013000
|
heap
|
page read and write
|
||
25B7CE26000
|
heap
|
page read and write
|
||
21AD9E2A000
|
heap
|
page read and write
|
||
25B7CE46000
|
heap
|
page read and write
|
||
1FD10000000
|
heap
|
page read and write
|
||
21AD9E47000
|
heap
|
page read and write
|
||
25B7CE63000
|
heap
|
page read and write
|
||
1FD0FF40000
|
heap
|
page read and write
|
||
1FD15A80000
|
trusted library allocation
|
page read and write
|
||
1FD15A27000
|
trusted library allocation
|
page read and write
|
||
1FD02629000
|
heap
|
page read and write
|
||
1FD0262F000
|
heap
|
page read and write
|
||
1FD027B9000
|
heap
|
page read and write
|
||
1FD155C0000
|
trusted library allocation
|
page read and write
|
||
90A777C000
|
stack
|
page read and write
|
||
90A78FF000
|
stack
|
page read and write
|
||
1FD10029000
|
heap
|
page read and write
|
||
194FA429000
|
heap
|
page read and write
|
||
1DBF3950000
|
heap
|
page read and write
|
||
1FD100FE000
|
heap
|
page read and write
|
||
28EB25F0000
|
trusted library allocation
|
page read and write
|
||
25B7CE5D000
|
heap
|
page read and write
|
||
D7A88FF000
|
stack
|
page read and write
|
||
2C5A5000000
|
heap
|
page read and write
|
||
194FA43D000
|
heap
|
page read and write
|
||
4A902FF000
|
stack
|
page read and write
|
||
192565A0000
|
trusted library allocation
|
page read and write
|
||
194FAE02000
|
trusted library allocation
|
page read and write
|
||
28EB2687000
|
heap
|
page read and write
|
||
25B7CE32000
|
heap
|
page read and write
|
||
28EB2713000
|
heap
|
page read and write
|
||
1FD10B13000
|
heap
|
page read and write
|
||
19256628000
|
heap
|
page read and write
|
||
25B7CC90000
|
heap
|
page read and write
|
||
4A9037F000
|
stack
|
page read and write
|
||
F33EEF9000
|
stack
|
page read and write
|
||
1FD10B59000
|
heap
|
page read and write
|
||
D7A847B000
|
stack
|
page read and write
|
||
1FD02F22000
|
heap
|
page read and write
|
||
100867E000
|
stack
|
page read and write
|
||
25B7CE5F000
|
heap
|
page read and write
|
||
1FD15740000
|
trusted library allocation
|
page read and write
|
||
25B7CE3C000
|
heap
|
page read and write
|
||
1FD10F00000
|
trusted library allocation
|
page read and write
|
||
28EB2629000
|
heap
|
page read and write
|
||
21AD9DA0000
|
trusted library allocation
|
page read and write
|
||
1FD15C10000
|
trusted library allocation
|
page read and write
|
||
4C81FB000
|
stack
|
page read and write
|
||
25B7CE78000
|
heap
|
page read and write
|
||
194FA2E0000
|
heap
|
page read and write
|
||
25B7CE30000
|
heap
|
page read and write
|
||
1DBF3960000
|
trusted library allocation
|
page read and write
|
||
21AD9E13000
|
heap
|
page read and write
|
||
25B7CE47000
|
heap
|
page read and write
|
||
2C5A503E000
|
heap
|
page read and write
|
||
5C51E7A000
|
stack
|
page read and write
|
||
4A8FF7B000
|
stack
|
page read and write
|
||
81EC27E000
|
stack
|
page read and write
|
||
1FD1008F000
|
heap
|
page read and write
|
||
192564A0000
|
heap
|
page read and write
|
||
25B7CE00000
|
heap
|
page read and write
|
||
1FD11210000
|
trusted library section
|
page readonly
|
||
21AD9E89000
|
heap
|
page read and write
|
||
25B7CE65000
|
heap
|
page read and write
|
||
5C5247E000
|
stack
|
page read and write
|
||
10086FF000
|
stack
|
page read and write
|
||
26B26E02000
|
trusted library allocation
|
page read and write
|
||
1FD11220000
|
trusted library section
|
page readonly
|
||
1FD15757000
|
trusted library allocation
|
page read and write
|
||
1FD15755000
|
trusted library allocation
|
page read and write
|
||
5C5207C000
|
stack
|
page read and write
|
||
1FD15784000
|
trusted library allocation
|
page read and write
|
||
1FD15C10000
|
trusted library allocation
|
page read and write
|
||
1FD0266B000
|
heap
|
page read and write
|
||
5C5257F000
|
stack
|
page read and write
|
||
1FD15750000
|
trusted library allocation
|
page read and write
|
||
4A8FE7A000
|
stack
|
page read and write
|
||
19256602000
|
heap
|
page read and write
|
||
1FD110F0000
|
trusted library allocation
|
page read and write
|
||
21AD9E3E000
|
heap
|
page read and write
|
||
1DBF3B1E000
|
heap
|
page read and write
|
There are 417 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://traffmen.ru/wb?keyword=eicar%20pdf%20test%20file
|