Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
37429345.pdf
|
PDF document, version 1.7, 1 pages
|
initial sample
|
||
C:\Users\user\Downloads\1473272810.dps_tax_gov_ua_17622653645.rar (copy)
|
RAR archive data, v5
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\7949dccb-9dc0-46ce-9bb1-e825e679125d.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241028172903Z-177.bmp
|
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 4, database pages 14, cookie 0x5, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8,
version-valid-for 25
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI5204e.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A91evobgb_1s86il7_4cg.tmp
|
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A9buap5j_1s86il6_4cg.tmp
|
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-28 13-29-01-083.log
|
ASCII text, with very long lines (393)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
|
ASCII text, with very long lines (393), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\39dbc172-6f7f-4600-8ca8-eb3a615310f7.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\62dcb786-9139-46bd-b3fa-82167a809293.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\7b925a26-1345-4880-a1c3-353745c6461e.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\a64e1611-8618-4dd2-af8a-b4a9872ac960.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unarchiver.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wu5ba1gq.lwu\dps_tax_gov_ua_0739220983\??????????? ????? ?????????? ?????????? ??????.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobSettings
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\DF22CF8B8C3B46C10D3D5C407561EABEB57F8181.crl
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 16:29:26 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 16:29:26 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 16:29:26 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 16:29:26 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 16:29:26 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\Downloads\1473272810.dps_tax_gov_ua_17622653645.rar.crdownload
|
RAR archive data, v5
|
dropped
|
||
C:\Users\user\Downloads\d9c1edb4-b1c2-47d1-bddb-032ba20a935b.tmp
|
RAR archive data, v5
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1211409625\LICENSE
|
ASCII text
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1211409625\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1211409625\manifest.fingerprint
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1211409625\manifest.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1211409625\sets.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1236057237\Filtering Rules
|
data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1236057237\LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1236057237\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1236057237\manifest.fingerprint
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1236057237\manifest.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1314818920\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1314818920\cr_en-us_500000_index.bin
|
data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1314818920\manifest.fingerprint
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1314818920\manifest.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1677436516\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1677436516\manifest.fingerprint
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1677436516\manifest.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_1677436516\optimization-hints.pb
|
data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_521230152\Google.Widevine.CDM.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_521230152\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_521230152\manifest.fingerprint
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7568_521230152\manifest.json
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 221
|
RAR archive data, v5
|
downloaded
|
There are 58 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "https://qaz.is/load/fK7NR3/668d3238-49f0-4207-9478-4e8005840fbb"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1896,i,12452905871821157740,5775890423641875054,262144
/prefetch:8
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\37429345.pdf"
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0"
--lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2044
--field-trial-handle=1612,i,2609987279070104200,10577324592718449673,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker
/prefetch:8
|
||
C:\Windows\SysWOW64\unarchiver.exe
|
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\1473272810.dps_tax_gov_ua_17622653645.rar"
|
||
C:\Windows\SysWOW64\7za.exe
|
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\wu5ba1gq.lwu" "C:\Users\user\Downloads\1473272810.dps_tax_gov_ua_17622653645.rar"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://wieistmeineip.de
|
unknown
|
||
https://mercadoshops.com.co
|
unknown
|
||
https://gliadomain.com
|
unknown
|
||
https://poalim.xyz
|
unknown
|
||
https://mercadolivre.com
|
unknown
|
||
https://reshim.org
|
unknown
|
||
https://nourishingpursuits.com
|
unknown
|
||
https://medonet.pl
|
unknown
|
||
https://unotv.com
|
unknown
|
||
https://mercadoshops.com.br
|
unknown
|
||
https://joyreactor.cc
|
unknown
|
||
https://zdrowietvn.pl
|
unknown
|
||
https://johndeere.com
|
unknown
|
||
https://songstats.com
|
unknown
|
||
https://baomoi.com
|
unknown
|
||
https://supereva.it
|
unknown
|
||
https://elfinancierocr.com
|
unknown
|
||
https://bolasport.com
|
unknown
|
||
https://rws1nvtvt.com
|
unknown
|
||
https://desimartini.com
|
unknown
|
||
https://hearty.app
|
unknown
|
||
https://hearty.gift
|
unknown
|
||
https://mercadoshops.com
|
unknown
|
||
https://heartymail.com
|
unknown
|
||
https://nlc.hu
|
unknown
|
||
https://p106.net
|
unknown
|
||
https://radio2.be
|
unknown
|
||
https://finn.no
|
unknown
|
||
https://hc1.com
|
unknown
|
||
https://kompas.tv
|
unknown
|
||
https://mystudentdashboard.com
|
unknown
|
||
https://songshare.com
|
unknown
|
||
https://smaker.pl
|
unknown
|
||
https://mercadopago.com.mx
|
unknown
|
||
https://p24.hu
|
unknown
|
||
https://talkdeskqaid.com
|
unknown
|
||
https://24.hu
|
unknown
|
||
https://mercadopago.com.pe
|
unknown
|
||
https://cardsayings.net
|
unknown
|
||
https://text.com
|
unknown
|
||
https://mightytext.net
|
unknown
|
||
https://pudelek.pl
|
unknown
|
||
https://hazipatika.com
|
unknown
|
||
https://joyreactor.com
|
unknown
|
||
https://cookreactor.com
|
unknown
|
||
https://wildixin.com
|
unknown
|
||
https://eworkbookcloud.com
|
unknown
|
||
https://cognitiveai.ru
|
unknown
|
||
https://nacion.com
|
unknown
|
||
https://chennien.com
|
unknown
|
||
https://drimer.travel
|
unknown
|
||
https://deccoria.pl
|
unknown
|
||
https://mercadopago.cl
|
unknown
|
||
https://talkdeskstgid.com
|
unknown
|
||
https://naukri.com
|
unknown
|
||
https://interia.pl
|
unknown
|
||
https://bonvivir.com
|
unknown
|
||
https://carcostadvisor.be
|
unknown
|
||
https://salemovetravel.com
|
unknown
|
||
https://sapo.io
|
unknown
|
||
https://wpext.pl
|
unknown
|
||
https://welt.de
|
unknown
|
||
https://poalim.site
|
unknown
|
||
https://drimer.io
|
unknown
|
||
https://infoedgeindia.com
|
unknown
|
||
https://blackrockadvisorelite.it
|
unknown
|
||
https://cognitive-ai.ru
|
unknown
|
||
https://cafemedia.com
|
unknown
|
||
https://graziadaily.co.uk
|
unknown
|
||
https://thirdspace.org.au
|
unknown
|
||
https://mercadoshops.com.ar
|
unknown
|
||
https://smpn106jkt.sch.id
|
unknown
|
||
https://elpais.uy
|
unknown
|
||
https://landyrev.com
|
unknown
|
||
https://the42.ie
|
unknown
|
||
https://commentcamarche.com
|
unknown
|
||
https://tucarro.com.ve
|
unknown
|
||
https://rws3nvtvt.com
|
unknown
|
||
https://eleconomista.net
|
unknown
|
||
https://helpdesk.com
|
unknown
|
||
https://mercadolivre.com.br
|
unknown
|
||
https://clmbtech.com
|
unknown
|
||
https://standardsandpraiserepurpose.com
|
unknown
|
||
https://07c225f3.online
|
unknown
|
||
https://salemovefinancial.com
|
unknown
|
||
https://mercadopago.com.br
|
unknown
|
||
https://qaz.is/load/fK7NR3/668d3238-49f0-4207-9478-4e8005840fbb)
|
unknown
|
||
https://commentcamarche.net
|
unknown
|
||
https://etfacademy.it
|
unknown
|
||
https://mighty-app.appspot.com
|
unknown
|
||
https://hj.rs
|
unknown
|
||
https://hearty.me
|
unknown
|
||
https://mercadolibre.com.gt
|
unknown
|
||
https://timesinternet.in
|
unknown
|
||
https://indiatodayne.in
|
unknown
|
||
https://idbs-staging.com
|
unknown
|
||
https://blackrock.com
|
unknown
|
||
https://idbs-eworkbook.com
|
unknown
|
||
https://motherandbaby.com
|
unknown
|
||
https://mercadolibre.co.cr
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
1.1.1.1
|
unknown
|
Australia
|
||
142.250.185.100
|
unknown
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
||
80.87.203.251
|
unknown
|
Russian Federation
|
||
239.255.255.250
|
unknown
|
Reserved
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sAssetId
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
bisSharedFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
bisSharedFile
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
100A000
|
trusted library allocation
|
page execute and read and write
|
||
24D5000
|
heap
|
page read and write
|
||
2FA6000
|
trusted library allocation
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
1017000
|
trusted library allocation
|
page execute and read and write
|
||
3CD000
|
stack
|
page read and write
|
||
ECC000
|
trusted library allocation
|
page execute and read and write
|
||
8AF000
|
stack
|
page read and write
|
||
ECA000
|
trusted library allocation
|
page execute and read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
10CE000
|
heap
|
page read and write
|
||
2FAB000
|
trusted library allocation
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
EBA000
|
trusted library allocation
|
page execute and read and write
|
||
526D000
|
stack
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
2F95000
|
trusted library allocation
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
3F41000
|
trusted library allocation
|
page read and write
|
||
12BF000
|
stack
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1002000
|
trusted library allocation
|
page execute and read and write
|
||
2F41000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
2FB9000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
10FD000
|
heap
|
page read and write
|
||
2CC000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
EC2000
|
trusted library allocation
|
page execute and read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
7F6C0000
|
trusted library allocation
|
page execute and read and write
|
||
1400000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
2F8A000
|
trusted library allocation
|
page read and write
|
||
780000
|
trusted library allocation
|
page read and write
|
||
54EF000
|
stack
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
EB2000
|
trusted library allocation
|
page execute and read and write
|
||
10CB000
|
heap
|
page read and write
|
||
CF9000
|
stack
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
97C000
|
stack
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
101B000
|
trusted library allocation
|
page execute and read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
2FC4000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
53AD000
|
stack
|
page read and write
|
||
1410000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
heap
|
page execute and read and write
|
||
2300000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
2FA3000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
trusted library allocation
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
There are 72 hidden memdumps, click here to show them.