Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Cancellation_418406_Dec23.pdf
|
PDF document, version 1.3, 1 pages
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0ace9ee3d914a5c0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\39c14c1f4b086971_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6267ed4d4a13f54b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d449e58cb15daaf1_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index~RF4cd3b9.TMP (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF4c4c2a.TMP (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-230105170223Z-212.bmp
|
PC bitmap, Windows 3.x format, 164 x -115 x 32, cbSize 75494, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3024000, file counter 12, database pages 15, cookie 0x5, schema 4,
UTF-8, version-valid-for 12
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.2008
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unarchiver.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Downloads\Cancellation_367461_Dec23.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\Cancellation_367461_Dec23.zip.crdownload
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\f1db83af-6dc2-44be-ad08-ad1b8f6a393d.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
There are 48 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\Cancellation_418406_Dec23.pdf
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://agapeministriesinternational.church/blog/Cancellation_367461_Dec23.zip
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1948 --field-trial-handle=1812,i,544507481073856773,15156316211615148029,131072
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
|
||
C:\Windows\SysWOW64\unarchiver.exe
|
C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Cancellation_367461_Dec23.zip
|
||
C:\Windows\SysWOW64\7za.exe
|
C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fgt4alc0.uhe" "C:\Users\user\Downloads\Cancellation_367461_Dec23.zip
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://agapeministriesinternational.church/blog/Cancellation_367461_Dec23.zip
|
50.62.149.105
|
||
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
142.250.184.78
|
||
http://agapeministriesinternational.church/blog/Cancellation_367461_Dec23.zip)
|
unknown
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
142.251.209.13
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
agapeministriesinternational.church
|
50.62.149.105
|
||
accounts.google.com
|
142.251.209.13
|
||
www.google.com
|
142.250.184.36
|
||
clients.l.google.com
|
142.250.184.78
|
||
clients2.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
50.62.149.105
|
agapeministriesinternational.church
|
United States
|
||
142.250.184.78
|
clients.l.google.com
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
142.251.209.13
|
accounts.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.184.36
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\SysWOW64\unarchiver.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\SysWOW64\unarchiver.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
dr
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blocklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_USERSS-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry
|
TraceTimeLast
|
There are 55 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2026DBF3000
|
trusted library allocation
|
page read and write
|
||
7D6000
|
stack
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
2624C202000
|
heap
|
page read and write
|
||
18E92900000
|
trusted library allocation
|
page read and write
|
||
E18593B000
|
stack
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
24916502000
|
heap
|
page read and write
|
||
1CCA3FC0000
|
trusted library allocation
|
page read and write
|
||
2026E200000
|
trusted library allocation
|
page read and write
|
||
68EC9EC000
|
stack
|
page read and write
|
||
8F1D7FE000
|
stack
|
page read and write
|
||
56E437A000
|
stack
|
page read and write
|
||
20272A81000
|
trusted library allocation
|
page read and write
|
||
220A14B0000
|
heap
|
page read and write
|
||
67C000
|
stack
|
page read and write
|
||
4F6A000
|
stack
|
page read and write
|
||
1CCA4113000
|
heap
|
page read and write
|
||
56E3F8F000
|
stack
|
page read and write
|
||
2624B829000
|
heap
|
page read and write
|
||
2CAA000
|
trusted library allocation
|
page read and write
|
||
2CD8000
|
trusted library allocation
|
page read and write
|
||
2624B890000
|
heap
|
page read and write
|
||
F2A000
|
trusted library allocation
|
page execute and read and write
|
||
56E43FF000
|
stack
|
page read and write
|
||
BDE5EFF000
|
stack
|
page read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
2026D66A000
|
heap
|
page read and write
|
||
4B57A7E000
|
stack
|
page read and write
|
||
18E926A0000
|
heap
|
page read and write
|
||
8F1D4FB000
|
stack
|
page read and write
|
||
18E92827000
|
heap
|
page read and write
|
||
20272AA0000
|
trusted library allocation
|
page read and write
|
||
23312864000
|
heap
|
page read and write
|
||
251945F0000
|
trusted library allocation
|
page read and write
|
||
220A1674000
|
heap
|
page read and write
|
||
CF3F5FF000
|
stack
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
18E9280D000
|
heap
|
page read and write
|
||
220A1644000
|
heap
|
page read and write
|
||
2624B5F0000
|
heap
|
page read and write
|
||
23312866000
|
heap
|
page read and write
|
||
2624C102000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
CF3FA7E000
|
stack
|
page read and write
|
||
8F1D6FF000
|
stack
|
page read and write
|
||
220A1633000
|
heap
|
page read and write
|
||
20272BC0000
|
remote allocation
|
page read and write
|
||
FE9A47B000
|
stack
|
page read and write
|
||
18E92804000
|
heap
|
page read and write
|
||
2026D702000
|
heap
|
page read and write
|
||
220A1647000
|
heap
|
page read and write
|
||
FE9A87F000
|
stack
|
page read and write
|
||
220A1657000
|
heap
|
page read and write
|
||
28147E40000
|
heap
|
page read and write
|
||
20272B80000
|
trusted library allocation
|
page read and write
|
||
220A1E02000
|
trusted library allocation
|
page read and write
|
||
1CCA402A000
|
heap
|
page read and write
|
||
D73E9FF000
|
stack
|
page read and write
|
||
2624B98E000
|
heap
|
page read and write
|
||
2624B813000
|
heap
|
page read and write
|
||
25194600000
|
heap
|
page read and write
|
||
20272C66000
|
heap
|
page read and write
|
||
2026E440000
|
trusted library allocation
|
page read and write
|
||
CF3EEFE000
|
stack
|
page read and write
|
||
220A167E000
|
heap
|
page read and write
|
||
2631E802000
|
trusted library allocation
|
page read and write
|
||
1CCA4061000
|
heap
|
page read and write
|
||
2624B851000
|
heap
|
page read and write
|
||
7F310000
|
trusted library allocation
|
page execute and read and write
|
||
CF3FC7C000
|
stack
|
page read and write
|
||
2CD2000
|
trusted library allocation
|
page read and write
|
||
D73EAFA000
|
stack
|
page read and write
|
||
F290EFE000
|
stack
|
page read and write
|
||
2026D5D0000
|
trusted library allocation
|
page read and write
|
||
F2909BB000
|
stack
|
page read and write
|
||
CF3F67F000
|
stack
|
page read and write
|
||
2624B855000
|
heap
|
page read and write
|
||
2631E040000
|
heap
|
page read and write
|
||
2026D3A0000
|
heap
|
page read and write
|
||
2CEB000
|
trusted library allocation
|
page read and write
|
||
56E42F9000
|
stack
|
page read and write
|
||
20272A68000
|
trusted library allocation
|
page read and write
|
||
1CCA4102000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page execute and read and write
|
||
7DA000
|
stack
|
page read and write
|
||
18E929C0000
|
heap
|
page readonly
|
||
2D22000
|
trusted library allocation
|
page read and write
|
||
2631DF60000
|
heap
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
251943C0000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
23312620000
|
heap
|
page read and write
|
||
25194C02000
|
trusted library allocation
|
page read and write
|
||
2519463D000
|
heap
|
page read and write
|
||
2D03000
|
trusted library allocation
|
page read and write
|
||
220A1642000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
2631DFF0000
|
trusted library allocation
|
page read and write
|
||
CF3F87F000
|
stack
|
page read and write
|
||
25194BB0000
|
remote allocation
|
page read and write
|
||
2624C154000
|
heap
|
page read and write
|
||
CF3F9FE000
|
stack
|
page read and write
|
||
28147E00000
|
heap
|
page read and write
|
||
F57000
|
trusted library allocation
|
page execute and read and write
|
||
2CCA000
|
trusted library allocation
|
page read and write
|
||
3C91000
|
trusted library allocation
|
page read and write
|
||
18E92A20000
|
trusted library allocation
|
page read and write
|
||
2624C1BD000
|
heap
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
1CCA5A70000
|
trusted library allocation
|
page read and write
|
||
28147E02000
|
heap
|
page read and write
|
||
2624B893000
|
heap
|
page read and write
|
||
68ED27D000
|
stack
|
page read and write
|
||
2026D692000
|
heap
|
page read and write
|
||
2D1A000
|
trusted library allocation
|
page read and write
|
||
20272B90000
|
trusted library allocation
|
page read and write
|
||
18E9280D000
|
heap
|
page read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
2026D390000
|
heap
|
page read and write
|
||
24916425000
|
heap
|
page read and write
|
||
20272BB0000
|
trusted library allocation
|
page read and write
|
||
2026D600000
|
heap
|
page read and write
|
||
1CCA4057000
|
heap
|
page read and write
|
||
25194602000
|
heap
|
page read and write
|
||
24916446000
|
heap
|
page read and write
|
||
56E427F000
|
stack
|
page read and write
|
||
F2C000
|
trusted library allocation
|
page execute and read and write
|
||
20272A80000
|
trusted library allocation
|
page read and write
|
||
BDE5FFF000
|
stack
|
page read and write
|
||
24916390000
|
heap
|
page read and write
|
||
F42000
|
trusted library allocation
|
page execute and read and write
|
||
220A1659000
|
heap
|
page read and write
|
||
2624B84E000
|
heap
|
page read and write
|
||
E185E7E000
|
stack
|
page read and write
|
||
18E92970000
|
trusted library allocation
|
page read and write
|
||
20272ED0000
|
trusted library allocation
|
page read and write
|
||
2026D629000
|
heap
|
page read and write
|
||
20272C2F000
|
heap
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
23313132000
|
heap
|
page read and write
|
||
E1861FF000
|
stack
|
page read and write
|
||
2026D700000
|
heap
|
page read and write
|
||
2026E570000
|
trusted library section
|
page readonly
|
||
18E93530000
|
trusted library allocation
|
page read and write
|
||
20272A84000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
2624B843000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
2026D713000
|
heap
|
page read and write
|
||
CF3F77F000
|
stack
|
page read and write
|
||
1CCA3ED0000
|
heap
|
page read and write
|
||
20272940000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
remote allocation
|
page read and write
|
||
CF3F17A000
|
stack
|
page read and write
|
||
220A1613000
|
heap
|
page read and write
|
||
220A1663000
|
heap
|
page read and write
|
||
28148602000
|
trusted library allocation
|
page read and write
|
||
220A1679000
|
heap
|
page read and write
|
||
1CCA4040000
|
heap
|
page read and write
|
||
2631E029000
|
heap
|
page read and write
|
||
24916340000
|
heap
|
page read and write
|
||
2026DC15000
|
heap
|
page read and write
|
||
CF3EBDC000
|
stack
|
page read and write
|
||
FE9A67E000
|
stack
|
page read and write
|
||
2624B869000
|
heap
|
page read and write
|
||
220A167A000
|
heap
|
page read and write
|
||
20272C7D000
|
heap
|
page read and write
|
||
23312680000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page execute and read and write
|
||
18E93300000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
2631E013000
|
heap
|
page read and write
|
||
25194629000
|
heap
|
page read and write
|
||
1CCA4013000
|
heap
|
page read and write
|
||
1CCA407B000
|
heap
|
page read and write
|
||
2624C002000
|
heap
|
page read and write
|
||
23312780000
|
trusted library allocation
|
page read and write
|
||
1CCA4000000
|
heap
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
2026DD18000
|
heap
|
page read and write
|
||
220A1673000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
E185FF9000
|
stack
|
page read and write
|
||
2026DBF0000
|
trusted library allocation
|
page read and write
|
||
20272B30000
|
trusted library allocation
|
page read and write
|
||
2026E8C0000
|
trusted library allocation
|
page read and write
|
||
20272C84000
|
heap
|
page read and write
|
||
220A1660000
|
heap
|
page read and write
|
||
2CE6000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
trusted library allocation
|
page execute and read and write
|
||
8F1D5FB000
|
stack
|
page read and write
|
||
23313100000
|
heap
|
page read and write
|
||
2CC8000
|
trusted library allocation
|
page read and write
|
||
25194613000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
4B576FE000
|
stack
|
page read and write
|
||
1CCA4002000
|
heap
|
page read and write
|
||
2026E520000
|
trusted library section
|
page readonly
|
||
2631E069000
|
heap
|
page read and write
|
||
20272A6E000
|
trusted library allocation
|
page read and write
|
||
220A166C000
|
heap
|
page read and write
|
||
2CA2000
|
trusted library allocation
|
page read and write
|
||
2631E05B000
|
heap
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
1CCA4046000
|
heap
|
page read and write
|
||
2026DD13000
|
heap
|
page read and write
|
||
1CCA4047000
|
heap
|
page read and write
|
||
68ED47F000
|
stack
|
page read and write
|
||
2026DBD1000
|
trusted library allocation
|
page read and write
|
||
D73E5FB000
|
stack
|
page read and write
|
||
20272C00000
|
heap
|
page read and write
|
||
220A1640000
|
heap
|
page read and write
|
||
23312913000
|
heap
|
page read and write
|
||
28147D70000
|
heap
|
page read and write
|
||
2026E560000
|
trusted library section
|
page readonly
|
||
20272A87000
|
trusted library allocation
|
page read and write
|
||
2624B864000
|
heap
|
page read and write
|
||
2491644D000
|
heap
|
page read and write
|
||
2631E000000
|
heap
|
page read and write
|
||
220A1672000
|
heap
|
page read and write
|
||
2624C1C7000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
220A165C000
|
heap
|
page read and write
|
||
BDE5DFF000
|
stack
|
page read and write
|
||
220A1683000
|
heap
|
page read and write
|
||
202728C0000
|
trusted library allocation
|
page read and write
|
||
1CCA5AF0000
|
remote allocation
|
page read and write
|
||
20272C52000
|
heap
|
page read and write
|
||
6DC000
|
stack
|
page read and write
|
||
D73EDFE000
|
stack
|
page read and write
|
||
CF3F8FE000
|
stack
|
page read and write
|
||
CF3F47A000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2026D690000
|
heap
|
page read and write
|
||
28147D10000
|
heap
|
page read and write
|
||
18E92560000
|
heap
|
page read and write
|
||
220A164E000
|
heap
|
page read and write
|
||
24916402000
|
heap
|
page read and write
|
||
2624B866000
|
heap
|
page read and write
|
||
24916400000
|
heap
|
page read and write
|
||
1CCA3EE0000
|
heap
|
page read and write
|
||
20272BC0000
|
remote allocation
|
page read and write
|
||
4B57B7F000
|
stack
|
page read and write
|
||
220A1677000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
FE9A17F000
|
stack
|
page read and write
|
||
2624B83C000
|
heap
|
page read and write
|
||
18E927C0000
|
heap
|
page read and write
|
||
20272BB0000
|
trusted library allocation
|
page read and write
|
||
D09000
|
heap
|
page read and write
|
||
1CCA4088000
|
heap
|
page read and write
|
||
20272A90000
|
trusted library allocation
|
page read and write
|
||
E1863FA000
|
stack
|
page read and write
|
||
1CCA5AF0000
|
remote allocation
|
page read and write
|
||
2624C1D2000
|
heap
|
page read and write
|
||
4B5787E000
|
stack
|
page read and write
|
||
BDE57FD000
|
stack
|
page read and write
|
||
CF3EFF7000
|
stack
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
F22000
|
trusted library allocation
|
page execute and read and write
|
||
2624C143000
|
heap
|
page read and write
|
||
1CCA3F90000
|
trusted library allocation
|
page read and write
|
||
2631E002000
|
heap
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
2026D6A4000
|
heap
|
page read and write
|
||
18E929D0000
|
trusted library allocation
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
CF3FB7C000
|
stack
|
page read and write
|
||
25194420000
|
heap
|
page read and write
|
||
2624C1CF000
|
heap
|
page read and write
|
||
2631DF50000
|
heap
|
page read and write
|
||
220A1450000
|
heap
|
page read and write
|
||
1CCA3F70000
|
trusted library allocation
|
page read and write
|
||
2331283D000
|
heap
|
page read and write
|
||
FE99FFC000
|
stack
|
page read and write
|
||
2D1F000
|
trusted library allocation
|
page read and write
|
||
220A1675000
|
heap
|
page read and write
|
||
220A1661000
|
heap
|
page read and write
|
||
F290FFE000
|
stack
|
page read and write
|
||
F290E7E000
|
stack
|
page read and write
|
||
2624B85D000
|
heap
|
page read and write
|
||
2026DC02000
|
heap
|
page read and write
|
||
68ED57C000
|
stack
|
page read and write
|
||
23312813000
|
heap
|
page read and write
|
||
18E92A19000
|
heap
|
page read and write
|
||
220A167B000
|
heap
|
page read and write
|
||
220A163D000
|
heap
|
page read and write
|
||
18E92910000
|
trusted library allocation
|
page read and write
|
||
1CCA411C000
|
heap
|
page read and write
|
||
2631E102000
|
heap
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
BDE5CFF000
|
stack
|
page read and write
|
||
4E6D000
|
stack
|
page read and write
|
||
2026DD59000
|
heap
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
220A1641000
|
heap
|
page read and write
|
||
2D17000
|
trusted library allocation
|
page read and write
|
||
2624C122000
|
heap
|
page read and write
|
||
2624C213000
|
heap
|
page read and write
|
||
CF3EE7E000
|
stack
|
page read and write
|
||
2491642F000
|
heap
|
page read and write
|
||
18E9280C000
|
heap
|
page read and write
|
||
233128BA000
|
heap
|
page read and write
|
||
2D25000
|
trusted library allocation
|
page read and write
|
||
23313002000
|
heap
|
page read and write
|
||
BDE56FB000
|
stack
|
page read and write
|
||
CF3F57B000
|
stack
|
page read and write
|
||
BDE52DB000
|
stack
|
page read and write
|
||
28147E57000
|
heap
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
8F1CFAB000
|
stack
|
page read and write
|
||
23312887000
|
heap
|
page read and write
|
||
20272C90000
|
heap
|
page read and write
|
||
18E927D0000
|
heap
|
page read and write
|
||
BDE5AFD000
|
stack
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
233128C2000
|
heap
|
page read and write
|
||
1CCA4057000
|
heap
|
page read and write
|
||
CF3F6FE000
|
stack
|
page read and write
|
||
F4A000
|
trusted library allocation
|
page execute and read and write
|
||
1CCA4069000
|
heap
|
page read and write
|
||
20272A90000
|
trusted library allocation
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
2519465C000
|
heap
|
page read and write
|
||
2026D68E000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
2631E075000
|
heap
|
page read and write
|
||
2624C122000
|
heap
|
page read and write
|
||
2624B600000
|
heap
|
page read and write
|
||
2026DC00000
|
heap
|
page read and write
|
||
18E929B0000
|
trusted library allocation
|
page read and write
|
||
FE99BEB000
|
stack
|
page read and write
|
||
23312610000
|
heap
|
page read and write
|
||
2026DD00000
|
heap
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
2491643C000
|
heap
|
page read and write
|
||
24916443000
|
heap
|
page read and write
|
||
20272C8C000
|
heap
|
page read and write
|
||
2624B760000
|
trusted library allocation
|
page read and write
|
||
20272C22000
|
heap
|
page read and write
|
||
220A1632000
|
heap
|
page read and write
|
||
2026DD59000
|
heap
|
page read and write
|
||
4B5767E000
|
stack
|
page read and write
|
||
24916413000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
24916330000
|
heap
|
page read and write
|
||
2624C230000
|
heap
|
page read and write
|
||
2026D697000
|
heap
|
page read and write
|
||
1CCA407E000
|
heap
|
page read and write
|
||
2631E113000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
FE9A2FC000
|
stack
|
page read and write
|
||
2026D725000
|
heap
|
page read and write
|
||
220A1702000
|
heap
|
page read and write
|
||
2331286C000
|
heap
|
page read and write
|
||
2624B780000
|
trusted library allocation
|
page read and write
|
||
25194702000
|
heap
|
page read and write
|
||
220A1645000
|
heap
|
page read and write
|
||
2CE9000
|
trusted library allocation
|
page read and write
|
||
2026E540000
|
trusted library section
|
page readonly
|
||
18E9280D000
|
heap
|
page read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
F2910FD000
|
stack
|
page read and write
|
||
220A163B000
|
heap
|
page read and write
|
||
220A15B0000
|
trusted library allocation
|
page read and write
|
||
220A1440000
|
heap
|
page read and write
|
||
220A1665000
|
heap
|
page read and write
|
||
220A1662000
|
heap
|
page read and write
|
||
FE9A77D000
|
stack
|
page read and write
|
||
18E927C8000
|
heap
|
page read and write
|
||
7A0000
|
remote allocation
|
page read and write
|
||
1CCA4056000
|
heap
|
page read and write
|
||
2624B9B9000
|
heap
|
page read and write
|
||
68ED07E000
|
stack
|
page read and write
|
||
24916452000
|
heap
|
page read and write
|
||
2026DF01000
|
trusted library allocation
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
CF3F37E000
|
stack
|
page read and write
|
||
2624C190000
|
heap
|
page read and write
|
||
2D14000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
2026D400000
|
heap
|
page read and write
|
||
1CCA4100000
|
heap
|
page read and write
|
||
2026D613000
|
heap
|
page read and write
|
||
2D06000
|
trusted library allocation
|
page read and write
|
||
23312902000
|
heap
|
page read and write
|
||
20272A60000
|
trusted library allocation
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
28147E13000
|
heap
|
page read and write
|
||
25194BB0000
|
remote allocation
|
page read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
220A1646000
|
heap
|
page read and write
|
||
28147F02000
|
heap
|
page read and write
|
||
20272C17000
|
heap
|
page read and write
|
||
28147E64000
|
heap
|
page read and write
|
||
FE9A57D000
|
stack
|
page read and write
|
||
F29117E000
|
stack
|
page read and write
|
||
2624B843000
|
heap
|
page read and write
|
||
1CCA4118000
|
heap
|
page read and write
|
||
28147E79000
|
heap
|
page read and write
|
||
CF3F27B000
|
stack
|
page read and write
|
||
20272BC0000
|
remote allocation
|
page read and write
|
||
251943B0000
|
heap
|
page read and write
|
||
BDE5BFE000
|
stack
|
page read and write
|
||
68ECF7F000
|
stack
|
page read and write
|
||
FE9A27E000
|
stack
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
2CE3000
|
trusted library allocation
|
page read and write
|
||
28147E68000
|
heap
|
page read and write
|
||
2026DD18000
|
heap
|
page read and write
|
||
249163C0000
|
trusted library allocation
|
page read and write
|
||
20272C45000
|
heap
|
page read and write
|
||
FE9A3FE000
|
stack
|
page read and write
|
||
20272A60000
|
trusted library allocation
|
page read and write
|
||
20272950000
|
trusted library allocation
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
E185CFF000
|
stack
|
page read and write
|
||
E18647F000
|
stack
|
page read and write
|
||
2026E530000
|
trusted library section
|
page readonly
|
||
18E926C0000
|
heap
|
page read and write
|
||
24916C02000
|
trusted library allocation
|
page read and write
|
||
23312829000
|
heap
|
page read and write
|
||
220A1629000
|
heap
|
page read and write
|
||
68ED37C000
|
stack
|
page read and write
|
||
2624B9E5000
|
heap
|
page read and write
|
||
220A1664000
|
heap
|
page read and write
|
||
2624C1B1000
|
heap
|
page read and write
|
||
2026D641000
|
heap
|
page read and write
|
||
2631DFC0000
|
heap
|
page read and write
|
||
28147DA0000
|
trusted library allocation
|
page read and write
|
||
1CCA5AF0000
|
remote allocation
|
page read and write
|
||
220A165F000
|
heap
|
page read and write
|
||
F02000
|
trusted library allocation
|
page execute and read and write
|
||
1CCA4047000
|
heap
|
page read and write
|
||
20272B70000
|
trusted library allocation
|
page read and write
|
||
E1862FF000
|
stack
|
page read and write
|
||
2026D67C000
|
heap
|
page read and write
|
||
20272A65000
|
trusted library allocation
|
page read and write
|
||
E185F7B000
|
stack
|
page read and write
|
||
18E92570000
|
trusted library allocation
|
page read and write
|
||
2624C100000
|
heap
|
page read and write
|
||
2624B88A000
|
heap
|
page read and write
|
||
4B573FB000
|
stack
|
page read and write
|
||
2624C16F000
|
heap
|
page read and write
|
||
E1860FA000
|
stack
|
page read and write
|
||
2624C200000
|
heap
|
page read and write
|
||
2026D5E0000
|
trusted library section
|
page read and write
|
||
220A165A000
|
heap
|
page read and write
|
||
28147F00000
|
heap
|
page read and write
|
||
20272A61000
|
trusted library allocation
|
page read and write
|
||
23312800000
|
heap
|
page read and write
|
||
2026D673000
|
heap
|
page read and write
|
||
2026D6A2000
|
heap
|
page read and write
|
||
2D11000
|
trusted library allocation
|
page read and write
|
||
220A1600000
|
heap
|
page read and write
|
||
F5B000
|
trusted library allocation
|
page execute and read and write
|
||
2026DD02000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
28147E28000
|
heap
|
page read and write
|
||
18E92804000
|
heap
|
page read and write
|
||
28147D00000
|
heap
|
page read and write
|
||
F29127D000
|
stack
|
page read and write
|
||
56E3F0B000
|
stack
|
page read and write
|
||
220A1658000
|
heap
|
page read and write
|
||
2026D678000
|
heap
|
page read and write
|
||
4B5797E000
|
stack
|
page read and write
|
||
2624B660000
|
heap
|
page read and write
|
||
2624C223000
|
heap
|
page read and write
|
||
28147F13000
|
heap
|
page read and write
|
||
2624C227000
|
heap
|
page read and write
|
||
68ED17F000
|
stack
|
page read and write
|
||
202728D0000
|
trusted library allocation
|
page read and write
|
||
1CCA405C000
|
heap
|
page read and write
|
||
2CF7000
|
trusted library allocation
|
page read and write
|
||
1CCA5C02000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
24916429000
|
heap
|
page read and write
|
||
2624B913000
|
heap
|
page read and write
|
||
18E929E0000
|
trusted library allocation
|
page read and write
|
||
2624B858000
|
heap
|
page read and write
|
||
220A1668000
|
heap
|
page read and write
|
||
20272AA4000
|
trusted library allocation
|
page read and write
|
||
18E92A15000
|
heap
|
page read and write
|
||
D73EBFA000
|
stack
|
page read and write
|
||
233128CB000
|
heap
|
page read and write
|
||
4F6C000
|
stack
|
page read and write
|
||
25194BB0000
|
remote allocation
|
page read and write
|
||
56E4479000
|
stack
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
18E92A10000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
F290C7D000
|
stack
|
page read and write
|
||
1CCA3F40000
|
heap
|
page read and write
|
||
7A0000
|
remote allocation
|
page read and write
|
||
20272BA0000
|
trusted library allocation
|
page read and write
|
||
BDE58FE000
|
stack
|
page read and write
|
||
2631E077000
|
heap
|
page read and write
|
||
20272BC0000
|
trusted library allocation
|
page read and write
|
||
CF3F07E000
|
stack
|
page read and write
|
||
20272C11000
|
heap
|
page read and write
|
||
2624B800000
|
heap
|
page read and write
|
||
25194624000
|
heap
|
page read and write
|
||
2026E550000
|
trusted library section
|
page readonly
|
There are 497 hidden memdumps, click here to show them.