

#ADOBE FLASH PLAYER 10.1 R52 FREE#
Name RT_ICON RVA 0x487158 Size 0x8a8 Type dBase IV DBT of block length 1024, next free block index 40, next free block 0, next used block 0 Language EnglishĭBase IV DBT of block length 1024, next free block index 40, next free block 0, next used block 0 Name RT_ICON RVA 0x4862b0 Size 0xea8 Type data Language English Name RT_ICON RVA 0x486188 Size 0x128 Type GLS_BINARY_LSB_FIRST Language English Name RT_ICON RVA 0x485ea0 Size 0x2e8 Type dBase IV DBT of block length 512, next free block index 40, next free block 4102606028, next used block 1078215748 Language EnglishĭBase IV DBT of block length 512, next free block index 40, next free block 4102606028, next used block 1078215748 Name RT_ICON RVA 0x485838 Size 0圆68 Type data Language English Name RT_CURSOR RVA 0x485704 Size 0x134 Type data Language English Name RT_CURSOR RVA 0x485650 Size 0xb4 Type data Language English Name RT_CURSOR RVA 0x48551c Size 0x134 Type data Language English Name RT_CURSOR RVA 0x485468 Size 0xb4 Type data Language English Name RT_CURSOR RVA 0x485334 Size 0x134 Type data Language English
#ADOBE FLASH PLAYER 10.1 R52 DRIVER#
Opens the Kernel Security Device Driver (KsecDD) of Windows Pattern match: " Pattern match: " Pattern match: "" Reads information about supported languages "kamimachi.exe" wrote bytes "d83adf74" to virtual address "0x74E001FC" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "b436df74" to virtual address "0x74E0025C" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "b4360200" to virtual address "0x74DF4EA4" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "a0116673" to virtual address "0x751EE324" (part of module "WININET.DLL") "kamimachi.exe" wrote bytes "b436df74" to virtual address "0x74E00278" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "d83adf74" to virtual address "0x74E00258" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "b4360200" to virtual address "0x74DF4D68" (part of module "SSPICLI.DLL")

"kamimachi.exe" wrote bytes "d83adf74" to virtual address "0x74E00274" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "b810156673ffe0" to virtual address "0x74DF36B4" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "d83a0200" to virtual address "0x74DF4D78" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "d83a0200" to virtual address "0x74DF4E38" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "b890126673ffe0" to virtual address "0x74DF3AD8" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "b436df74" to virtual address "0x74E001E4" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "b436df74" to virtual address "0x74E00200" (part of module "SSPICLI.DLL") "kamimachi.exe" wrote bytes "d83adf74" to virtual address "0x74E001E0" (part of module "SSPICLI.DLL") Installs hooks/patches the running process
