IOC Report
SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsc77A8.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Pinball\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nslCE96.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nslCE97.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nslCE97.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsy8A1.tmp
data
dropped
C:\Users\user\AppData\Roaming\Pinball\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Pinball\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Pinball\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\Pinball\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Pinball\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\Pinball\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Pinball\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\Pinball\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\Pinball\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\Pinball\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Pinball\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\Pinball\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\Pinball\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\Pinball\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 90 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exe"
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
malicious
There are 26 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
http://spanchtoc.bond/22_2/huge.dat
unknown
https://chrome.google.com/webstore?hl=hiCtrl$1
unknown
https://chrome.google.com/webstore?hl=de&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://support.google.com/chrome/answer/6098869?hl=es
unknown
http://www.apache.org/licenses/LICEN
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://www.google.com/chrome/privacy/eula_text.html
unknown
https://www.google.com/chrome/privacy/eula_text.htmlAy&udaGestionado
unknown
https://www.google.com/chrome/privacy/eula_text.htmlP&al
unknown
https://chrome.google.com/webstore?hl=plCtrl$1
unknown
https://passwords.google.comcuenta
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
https://chrome.google.com/webstore?hl=es&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
https://chrome.google.com/webstore?hl=ja&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=te&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://chrome.google.com/webstore?hl=pl&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://chrome.google.com/webstore?hl=elCtrl$1
unknown
https://passwords.google.com
unknown
http://www.iana.org/assignments/multicast-addresses
unknown
https://github.com/JamesNK/Newtonsoft.Json/issues/652
unknown
https://chrome.google.com/webstore?hl=sk&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
https://chrome.google.com/webstore?hl=bnCtrl$1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://bageyou.xyz
unknown
http://logging.apache.org/log4ne
unknown
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://www.google.com/chrome/privacy/eula_text.htmlPomo&cZarz
unknown
https://chrome.google.com/webstore?hl=jaCtrl$1
unknown
https://passwords.google.comCuenta
unknown
http://www.connectionstrings.com/
unknown
https://support.google.com/chromebook?p=app_intent
unknown
https://www.beispiel.de
unknown
https://chrome.google.com/webstore?hl=huCtrl$1
unknown
https://chrome.google.com/webstore?hl=lv&category=theme81https://myactivity.google.com/myactivity/?u
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
http://logging.apache.org/log4j
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://chrome.google.com/webstore?hl=hi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=el&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
https://chrome.google.com/webstore?hl=lvCtrl$1
unknown
http://api.install-stat.debug.world/clients/installs
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://www.google.com/chrome/privacy/eula_text.htmlP&omocn
unknown
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
unknown
https://chrome.google.com/webstore?hl=deStrg$1
unknown
https://chrome.google.com/webstore?hl=teCtrl$1
unknown
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
unknown
https://chrome.google.com/webstore?hl=es-419Ctrl$1
unknown
http://spanchtoc.bond/22_2/huge.dat9
unknown
https://www.newtonsoft.com/json
unknown
https://www.google.com/chrome/privacy/eula_text.html&HilfeVon
unknown
http://bageyou.xyz/c/g
unknown
http://api.install-stat.debug.world/clients/activity
unknown
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
unknown
http://spanchtoc.bond/22_2/huge.dat-
unknown
http://www.apache.org/).
unknown
http://spanchtoc.bond/22_2/huge.dati
unknown
https://myactivity.google.com/
unknown
https://www.google.com/chrome/privacy/eula_text.html&S
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://policies.google.com/
unknown
https://chrome.google.com/webstore?hl=esCtrl$1
unknown
https://ejemplo.com.Se
unknown
http://logging.apache.org/log4net/schemas/log4net-events-1.2>
unknown
http://spanchtoc.bond/22_2/huge.dat/SILENTgetOK
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherEnabled
unknown
https://chrome.google.com/webstore/category/extensions
unknown
https://chrome.google.com/webstore?hl=hu&category=theme81https://myactivity.google.com/myactivity/?u
unknown
http://bageyou.xyz/c/g4
unknown
http://www.apache.org/licenses/
unknown
https://chrome.google.com/webstore?hl=es-419&category=theme81https://myactivity.google.com/myactivit
unknown
https://passwords.google.comT
unknown
https://passwords.google.comGoogle
unknown
http://james.newtonking.com/projects/json
unknown
https://passwords.google.comKonta
unknown
https://chrome.google.com/webstore?hl=skCtrl$1
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
unknown
https://passwords.google.comGoogle-KontoF
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://chrome.google.com/webstore?hl=bn&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://www.google.com/chrome/privacy/eula_text.htmlYar&d
unknown
https://chrome.google.com/webstore?hl=viCtrl$1
unknown
http://www.faqs.org/rfcs/rfc3164.html.
unknown
http://ejemplo.com
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlGreylist
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.45.251
unknown
United States
104.21.75.251
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Pinball
Sid
HKEY_CURRENT_USER\SOFTWARE\Pinball
Pid
HKEY_CURRENT_USER\SOFTWARE\Pinball
Version
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Pinball
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\Pinball
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\Pinball
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Pinball
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
BF0000
heap
page read and write
718000
heap
page read and write
30C0000
trusted library allocation
page read and write
4E7000
heap
page read and write
2E8E000
stack
page read and write
93F000
heap
page read and write
B49000
heap
page read and write
A60000
heap
page read and write
EA0000
heap
page read and write
422000
unkown
page read and write
B25000
heap
page read and write
2DAE000
stack
page read and write
4EE000
heap
page read and write
1185000
heap
page read and write
1270000
heap
page read and write
8F6000
stack
page read and write
4EE000
heap
page read and write
5704000
trusted library allocation
page read and write
14D0000
trusted library allocation
page execute and read and write
6780000
trusted library allocation
page read and write
2700000
trusted library allocation
page execute and read and write
3247000
trusted library allocation
page read and write
5A94000
trusted library allocation
page read and write
56F4000
trusted library allocation
page read and write
C03000
heap
page read and write
4EE000
heap
page read and write
AAE000
stack
page read and write
1698000
heap
page read and write
990000
heap
page read and write
144D000
trusted library allocation
page execute and read and write
3145000
trusted library allocation
page read and write
4D56000
trusted library allocation
page read and write
1533000
trusted library allocation
page execute and read and write
41AC000
trusted library allocation
page read and write
1359000
heap
page read and write
1607000
trusted library allocation
page execute and read and write
4EE000
heap
page read and write
805000
heap
page read and write
4E13000
trusted library allocation
page read and write
1457000
heap
page read and write
56FE000
trusted library allocation
page read and write
AA3000
trusted library allocation
page execute and read and write
590000
heap
page read and write
15A3000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
282F000
stack
page read and write
30D4000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
23F0000
heap
page execute and read and write
4CCF000
stack
page read and write
A0E000
stack
page read and write
49E1000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
440000
unkown
page readonly
7C5000
heap
page read and write
A90000
trusted library allocation
page read and write
14E6000
trusted library allocation
page execute and read and write
52C1000
trusted library allocation
page read and write
8A4000
trusted library allocation
page read and write
EA2000
trusted library allocation
page read and write
40A000
unkown
page write copy
AF0000
trusted library allocation
page read and write
6F6000
stack
page read and write
4D80000
trusted library allocation
page read and write
55E000
stack
page read and write
4E7000
heap
page read and write
920000
heap
page read and write
AB0000
heap
page read and write
BEE000
stack
page read and write
684000
heap
page read and write
1137000
heap
page read and write
E76000
trusted library allocation
page execute and read and write
4EE000
heap
page read and write
1668000
heap
page read and write
30C5000
trusted library allocation
page read and write
2820000
heap
page read and write
4E7000
heap
page read and write
DFB000
stack
page read and write
34AA000
trusted library allocation
page read and write
70E000
stack
page read and write
14CE000
stack
page read and write
4E15000
trusted library allocation
page read and write
151B000
heap
page read and write
4E7000
heap
page read and write
4EE000
heap
page read and write
4E7000
heap
page read and write
14D9000
heap
page read and write
30B5000
trusted library allocation
page read and write
4EE000
heap
page read and write
B39000
heap
page read and write
7E5000
heap
page read and write
A18000
heap
page read and write
4E7000
heap
page read and write
53AE000
stack
page read and write
655C000
stack
page read and write
4EE000
heap
page read and write
1160000
trusted library allocation
page read and write
215E000
stack
page read and write
39B000
stack
page read and write
4E7000
heap
page read and write
4E7000
heap
page read and write
2160000
trusted library allocation
page read and write
4E7000
heap
page read and write
560000
heap
page read and write
93B000
stack
page read and write
5A6C000
trusted library allocation
page read and write
4E7000
heap
page read and write
1085000
heap
page read and write
BB0000
trusted library allocation
page read and write
5781000
trusted library allocation
page read and write
1577000
trusted library allocation
page execute and read and write
4E7000
heap
page read and write
D12000
unkown
page readonly
3477000
trusted library allocation
page read and write
614000
heap
page read and write
4D69000
trusted library allocation
page read and write
4EE000
heap
page read and write
4E00000
trusted library allocation
page read and write
99E000
stack
page read and write
4141000
trusted library allocation
page read and write
B1F000
stack
page read and write
3200000
heap
page read and write
52AF000
stack
page read and write
F92000
heap
page read and write
2176000
trusted library allocation
page execute and read and write
2A10000
heap
page execute and read and write
4D84000
trusted library allocation
page read and write
431000
unkown
page readonly
4E7000
heap
page read and write
435000
unkown
page read and write
5840000
heap
page read and write
3F0000
heap
page read and write
EAB000
trusted library allocation
page execute and read and write
900000
trusted library allocation
page execute and read and write
4E7000
heap
page read and write
1657000
trusted library allocation
page read and write
94C000
heap
page read and write
2821000
heap
page read and write
1365000
heap
page read and write
1050000
heap
page read and write
4EE000
heap
page read and write
266E000
stack
page read and write
10BE000
stack
page read and write
49B0000
trusted library allocation
page read and write
96E000
stack
page read and write
4E7000
heap
page read and write
144D000
trusted library allocation
page execute and read and write
4E7000
heap
page read and write
4EE000
heap
page read and write
8F0000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
1196000
trusted library allocation
page execute and read and write
998000
heap
page read and write
9B0000
heap
page read and write
4E7000
heap
page read and write
E8E000
stack
page read and write
14CB000
heap
page read and write
A5A000
heap
page read and write
110B000
heap
page read and write
453000
unkown
page readonly
4F12000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page execute and read and write
40A000
unkown
page write copy
87E000
stack
page read and write
4EE000
heap
page read and write
1450000
heap
page read and write
8A0000
heap
page read and write
2EE7000
trusted library allocation
page read and write
49C4000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
185F000
stack
page read and write
4E7000
heap
page read and write
52BC000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
2475000
trusted library allocation
page read and write
408000
unkown
page readonly
14D7000
heap
page read and write
31F0000
trusted library allocation
page read and write
4E7000
heap
page read and write
2650000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
4E7000
heap
page read and write
740000
heap
page read and write
10CF000
stack
page read and write
4E7000
heap
page read and write
2100000
heap
page read and write
4E7000
heap
page read and write
1488000
heap
page read and write
D10000
unkown
page readonly
21A0000
trusted library allocation
page read and write
985000
heap
page read and write
1540000
trusted library allocation
page read and write
14E1000
trusted library allocation
page read and write
1300000
heap
page read and write
21F0000
trusted library allocation
page execute and read and write
760000
heap
page read and write
11A0000
trusted library allocation
page read and write
691000
heap
page read and write
D1D000
trusted library allocation
page execute and read and write
1545000
heap
page read and write
1520000
trusted library allocation
page read and write
BB4000
trusted library allocation
page read and write
8D7000
trusted library allocation
page execute and read and write
14D0000
trusted library allocation
page read and write
10F6000
stack
page read and write
F78000
heap
page read and write
100E000
stack
page read and write
73B000
heap
page read and write
349E000
trusted library allocation
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
E30000
trusted library allocation
page read and write
4E7000
heap
page read and write
431000
unkown
page readonly
D00000
trusted library allocation
page read and write
23DD000
stack
page read and write
850000
heap
page read and write
AB0000
trusted library allocation
page read and write
4EE000
heap
page read and write
924000
trusted library allocation
page read and write
4EE000
heap
page read and write
585E000
stack
page read and write
4A20000
trusted library allocation
page read and write
6DD000
trusted library allocation
page execute and read and write
4D94000
trusted library allocation
page read and write
598000
heap
page read and write
310E000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
4EE000
heap
page read and write
2154000
trusted library allocation
page read and write
4EE000
heap
page read and write
1630000
trusted library allocation
page execute and read and write
38E5000
trusted library allocation
page read and write
1596000
heap
page read and write
408000
unkown
page readonly
C65000
heap
page read and write
980000
trusted library allocation
page execute and read and write
9B0000
heap
page read and write
1410000
heap
page read and write
4E7000
heap
page read and write
BBD000
trusted library allocation
page execute and read and write
5F2000
heap
page read and write
6770000
trusted library allocation
page read and write
4B65000
trusted library allocation
page read and write
1602000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
1015000
heap
page read and write
B48000
heap
page read and write
BBC000
heap
page read and write
1190000
trusted library allocation
page read and write
BE2000
trusted library allocation
page read and write
22EE000
stack
page read and write
34A1000
trusted library allocation
page read and write
4E7000
heap
page read and write
1556000
trusted library allocation
page execute and read and write
2C0F000
stack
page read and write
11D0000
heap
page read and write
1150000
heap
page read and write
4E7000
heap
page read and write
BD0000
trusted library allocation
page read and write
1020000
heap
page read and write
453000
unkown
page readonly
5A85000
trusted library allocation
page read and write
FF0000
heap
page read and write
1590000
heap
page read and write
4E7000
heap
page read and write
910000
heap
page read and write
3F0000
heap
page read and write
D8D000
stack
page read and write
11F0000
heap
page read and write
4B5E000
stack
page read and write
147A000
heap
page read and write
86E000
stack
page read and write
42E000
unkown
page readonly
147B000
trusted library allocation
page execute and read and write
150E000
stack
page read and write
311D000
trusted library allocation
page read and write
8CA000
trusted library allocation
page execute and read and write
94A000
heap
page read and write
470000
heap
page read and write
5B3C000
stack
page read and write
4D90000
trusted library allocation
page read and write
2EF0000
heap
page execute and read and write
69D4000
heap
page read and write
14E7000
trusted library allocation
page read and write
A68000
heap
page read and write
ADB000
trusted library allocation
page execute and read and write
24A7000
trusted library allocation
page read and write
E40000
heap
page read and write
C00000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
45A000
unkown
page readonly
6BE000
stack
page read and write
12FF000
stack
page read and write
4EE000
heap
page read and write
10D0000
heap
page read and write
12C5000
heap
page read and write
9EE000
stack
page read and write
EA7000
trusted library allocation
page execute and read and write
269E000
stack
page read and write
150E000
heap
page read and write
9A0000
heap
page read and write
1550000
heap
page read and write
9F6000
heap
page read and write
E82000
trusted library allocation
page read and write
4EE000
heap
page read and write
1010000
heap
page read and write
2E40000
trusted library allocation
page read and write
67F2000
unkown
page readonly
BA1000
heap
page read and write
4EE000
heap
page read and write
5850000
unkown
page readonly
7BE000
heap
page read and write
707000
trusted library allocation
page execute and read and write
2837000
heap
page read and write
4C0000
heap
page read and write
ACA000
trusted library allocation
page execute and read and write
FCC000
heap
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
49D0000
trusted library allocation
page read and write
1472000
trusted library allocation
page read and write
23E1000
trusted library allocation
page read and write
5E0000
heap
page read and write
15C6000
trusted library allocation
page execute and read and write
4EE000
heap
page read and write
2FA1000
trusted library allocation
page read and write
970000
heap
page read and write
5DE000
heap
page read and write
58D0000
heap
page execute and read and write
710000
heap
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
119A000
trusted library allocation
page execute and read and write
12ED000
heap
page read and write
12F6000
stack
page read and write
4E7000
heap
page read and write
1280000
heap
page read and write
4EE000
heap
page read and write
5C5E000
stack
page read and write
4EE000
heap
page read and write
930000
trusted library allocation
page read and write
1260000
heap
page read and write
4EE000
heap
page read and write
2187000
trusted library allocation
page execute and read and write
146A000
trusted library allocation
page execute and read and write
121E000
stack
page read and write
946000
trusted library allocation
page execute and read and write
5F2000
heap
page read and write
11A7000
trusted library allocation
page execute and read and write
4EE000
heap
page read and write
679000
heap
page read and write
C10000
trusted library allocation
page execute and read and write
134E000
stack
page read and write
401000
unkown
page execute read
4A19000
trusted library allocation
page read and write
1350000
heap
page read and write
3141000
trusted library allocation
page read and write
C30000
heap
page read and write
4E7000
heap
page read and write
1298000
heap
page read and write
C2A000
heap
page read and write
168F000
stack
page read and write
980000
heap
page read and write
523E000
stack
page read and write
3267000
trusted library allocation
page read and write
40A000
unkown
page read and write
4E7000
heap
page read and write
4D45000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
51AE000
stack
page read and write
50AF000
stack
page read and write
3130000
heap
page execute and read and write
4A06000
trusted library allocation
page read and write
DCE000
stack
page read and write
126E000
stack
page read and write
304E000
stack
page read and write
5711000
trusted library allocation
page read and write
38E1000
trusted library allocation
page read and write
10001000
unkown
page execute read
910000
trusted library allocation
page read and write
4EE000
heap
page read and write
408000
unkown
page readonly
29EE000
stack
page read and write
4E7000
heap
page read and write
30D0000
trusted library allocation
page read and write
24A1000
trusted library allocation
page read and write
5CA000
heap
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
153D000
trusted library allocation
page execute and read and write
31D0000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
4E7000
heap
page read and write
8F6000
stack
page read and write
5A97000
trusted library allocation
page read and write
44C000
unkown
page readonly
4EE000
heap
page read and write
8CA000
heap
page read and write
1444000
trusted library allocation
page read and write
454E000
stack
page read and write
23E7000
trusted library allocation
page read and write
5A5000
heap
page read and write
9EA000
heap
page read and write
6FA000
trusted library allocation
page execute and read and write
9BA000
heap
page read and write
6C0000
trusted library allocation
page read and write
3108000
trusted library allocation
page read and write
9C5000
heap
page read and write
3211000
trusted library allocation
page read and write
E5F000
stack
page read and write
155A000
trusted library allocation
page execute and read and write
4215000
trusted library allocation
page read and write
49DE000
trusted library allocation
page read and write
63A0000
trusted library allocation
page execute and read and write
2EAF000
stack
page read and write
4E7000
heap
page read and write
4D0000
heap
page read and write
49CB000
trusted library allocation
page read and write
3488000
trusted library allocation
page read and write
1640000
heap
page read and write
140E000
stack
page read and write
4E7000
heap
page read and write
606000
heap
page read and write
4E7000
heap
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
10000000
unkown
page readonly
21E0000
heap
page read and write
4EE000
heap
page read and write
6BBE000
stack
page read and write
AE0000
heap
page read and write
3104000
trusted library allocation
page read and write
1476000
trusted library allocation
page execute and read and write
4E7000
heap
page read and write
408000
unkown
page readonly
BF0000
heap
page read and write
4D9E000
trusted library allocation
page read and write
4EE000
heap
page read and write
401000
unkown
page execute read
440000
unkown
page readonly
215D000
trusted library allocation
page execute and read and write
3180000
heap
page read and write
14A0000
heap
page read and write
5725000
trusted library allocation
page read and write
4EE000
heap
page read and write
12F9000
heap
page read and write
5B5E000
stack
page read and write
7F9000
heap
page read and write
5772000
trusted library allocation
page read and write
4E7000
heap
page read and write
4E7000
heap
page read and write
4EE000
heap
page read and write
595E000
stack
page read and write
1600000
trusted library allocation
page read and write
1070000
heap
page read and write
43E000
unkown
page readonly
560000
heap
page read and write
4E7000
heap
page read and write
AAD000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
940000
trusted library allocation
page read and write
4D8B000
trusted library allocation
page read and write
4E7000
heap
page read and write
70B000
trusted library allocation
page execute and read and write
B52000
heap
page read and write
5896000
unkown
page readonly
4E7000
heap
page read and write
12C0000
heap
page read and write
1524000
heap
page read and write
154B000
heap
page read and write
510000
heap
page read and write
4E7000
heap
page read and write
6D0000
trusted library allocation
page read and write
4F4E000
stack
page read and write
92D000
trusted library allocation
page execute and read and write
4EE000
heap
page read and write
1170000
trusted library allocation
page read and write
98E000
stack
page read and write
22FE000
stack
page read and write
14F0000
heap
page read and write
990000
heap
page read and write
4E7000
heap
page read and write
2331000
trusted library allocation
page read and write
D14000
trusted library allocation
page read and write
1580000
heap
page read and write
1050000
heap
page read and write
5A6E000
trusted library allocation
page read and write
697E000
stack
page read and write
38E7000
trusted library allocation
page read and write
CF6000
stack
page read and write
430000
unkown
page read and write
4EE000
heap
page read and write
4E7000
heap
page read and write
3475000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
4EE000
heap
page read and write
5700000
trusted library allocation
page read and write
1534000
trusted library allocation
page read and write
980000
heap
page read and write
A16000
heap
page read and write
5A1E000
stack
page read and write
2170000
trusted library allocation
page read and write
940000
heap
page read and write
30C0000
heap
page execute and read and write
936000
stack
page read and write
4E7000
heap
page read and write
44C000
unkown
page readonly
AA4000
trusted library allocation
page read and write
4EE000
heap
page read and write
970000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
12A0000
heap
page read and write
E96000
trusted library allocation
page execute and read and write
FC7000
heap
page read and write
4DA1000
trusted library allocation
page read and write
BF8000
heap
page read and write
4E7000
heap
page read and write
4EE000
heap
page read and write
D51000
unkown
page readonly
1460000
trusted library allocation
page read and write
4EE000
heap
page read and write
4D50000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
2201000
trusted library allocation
page read and write
2153000
trusted library allocation
page execute and read and write
5830000
trusted library allocation
page read and write
4EE000
heap
page read and write
168A000
heap
page read and write
4FA0000
heap
page execute and read and write
4EE000
heap
page read and write
4E7000
heap
page read and write
895000
heap
page read and write
A77000
heap
page read and write
4E7000
heap
page read and write
218B000
trusted library allocation
page execute and read and write
BD6000
trusted library allocation
page execute and read and write
95A000
heap
page read and write
59DE000
stack
page read and write
4E7000
heap
page read and write
1290000
heap
page read and write
6760000
heap
page read and write
8C0000
trusted library allocation
page read and write
5B0000
heap
page read and write
4E7000
heap
page read and write
1444000
trusted library allocation
page read and write
2E8E000
stack
page read and write
4EE000
heap
page read and write
12DC000
heap
page read and write
1706000
heap
page read and write
6F6000
trusted library allocation
page execute and read and write
5C50000
trusted library allocation
page read and write
14C3000
trusted library allocation
page execute and read and write
1450000
heap
page read and write
5833000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
4E7000
heap
page read and write
5CB000
stack
page read and write
4D5000
heap
page read and write
4DCE000
stack
page read and write
5F0000
heap
page read and write
4EE000
heap
page read and write
232E000
stack
page read and write
42B000
unkown
page read and write
14C4000
trusted library allocation
page read and write
E87000
trusted library allocation
page execute and read and write
4E7000
heap
page read and write
2471000
trusted library allocation
page read and write
920000
heap
page read and write
14B0000
trusted library allocation
page read and write
ABA000
heap
page read and write
4EE000
heap
page read and write
2D5F000
stack
page read and write
4EE000
heap
page read and write
2FB0000
heap
page read and write
6F7E000
stack
page read and write
7E0000
heap
page read and write
42A000
unkown
page read and write
169F000
stack
page read and write
4EE000
heap
page read and write
464D000
stack
page read and write
840000
heap
page read and write
BEB000
trusted library allocation
page execute and read and write
246E000
stack
page read and write
63B2000
unkown
page readonly
5A80000
trusted library allocation
page read and write
55D0000
heap
page execute and read and write
FAB000
stack
page read and write
EF6000
stack
page read and write
ED8000
heap
page read and write
347D000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
4E7000
heap
page read and write
736000
stack
page read and write
1552000
trusted library allocation
page read and write
EFA000
heap
page read and write
4990000
trusted library allocation
page read and write
145E000
stack
page read and write
67E0000
trusted library allocation
page execute and read and write
1458000
heap
page read and write
923000
trusted library allocation
page execute and read and write
30F4000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
63B0000
unkown
page readonly
396000
stack
page read and write
56FE000
stack
page read and write
2717000
trusted library allocation
page read and write
4F6000
stack
page read and write
9A000
stack
page read and write
1482000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
7E9000
heap
page read and write
4EE000
heap
page read and write
4DB5000
trusted library allocation
page read and write
E23000
trusted library allocation
page execute and read and write
30E0000
heap
page read and write
160B000
trusted library allocation
page execute and read and write
B9B000
stack
page read and write
1160000
heap
page read and write
1575000
heap
page read and write
5580000
trusted library allocation
page read and write
5B5000
heap
page read and write
401000
unkown
page execute read
BE3000
heap
page read and write
8A8000
heap
page read and write
249F000
trusted library allocation
page read and write
470000
heap
page read and write
6D4000
trusted library allocation
page read and write
4E7000
heap
page read and write
F36000
stack
page read and write
702000
trusted library allocation
page read and write
141F000
stack
page read and write
920000
trusted library allocation
page read and write
900000
heap
page read and write
F9A000
heap
page read and write
2C5E000
stack
page read and write
14F7000
heap
page read and write
262F000
stack
page read and write
B7B000
heap
page read and write
83B000
stack
page read and write
1173000
trusted library allocation
page execute and read and write
129E000
heap
page read and write
14F5000
heap
page read and write
765000
heap
page read and write
4F21000
trusted library allocation
page read and write
4EE000
heap
page read and write
920000
trusted library allocation
page read and write
15AD000
trusted library allocation
page execute and read and write
FA7000
heap
page read and write
A40000
heap
page read and write
401000
unkown
page execute read
8C0000
heap
page read and write
90F000
stack
page read and write
1477000
trusted library allocation
page execute and read and write
A65000
heap
page read and write
63B000
stack
page read and write
4E7000
heap
page read and write
4E7000
heap
page read and write
4EE000
heap
page read and write
6A6000
heap
page read and write
4F1C000
trusted library allocation
page read and write
26DD000
stack
page read and write
4DFE000
stack
page read and write
30A0000
trusted library allocation
page read and write
E2D000
trusted library allocation
page execute and read and write
1257000
heap
page read and write
11C0000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page execute and read and write
4B63000
trusted library allocation
page read and write
29F0000
heap
page read and write
ABF000
stack
page read and write
4217000
trusted library allocation
page read and write
9B3000
heap
page read and write
610000
heap
page read and write
4EE000
heap
page read and write
4171000
trusted library allocation
page read and write
D5E000
stack
page read and write
14F0000
heap
page read and write
4D20000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
154D000
trusted library allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
4E7000
heap
page read and write
1556000
heap
page read and write
BA0000
trusted library allocation
page read and write
148B000
trusted library allocation
page execute and read and write
1430000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
4EE000
heap
page read and write
6220000
heap
page read and write
480000
heap
page read and write
49D4000
trusted library allocation
page read and write
917000
heap
page read and write
4EE000
heap
page read and write
400000
unkown
page readonly
4E7000
heap
page read and write
82E000
stack
page read and write
4E7000
heap
page read and write
3000000
heap
page read and write
D10000
trusted library allocation
page read and write
710000
heap
page read and write
95B000
trusted library allocation
page execute and read and write
6D3E000
stack
page read and write
4AD0000
heap
page read and write
E8B000
trusted library allocation
page execute and read and write
4D60000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
13CD000
stack
page read and write
10004000
unkown
page readonly
D0F000
stack
page read and write
5F8000
heap
page read and write
E90000
trusted library allocation
page read and write
1149000
heap
page read and write
1460000
trusted library allocation
page read and write
147A000
trusted library allocation
page execute and read and write
4211000
trusted library allocation
page read and write
11AB000
trusted library allocation
page execute and read and write
31E0000
trusted library allocation
page read and write
4EE000
heap
page read and write
2A20000
trusted library allocation
page execute and read and write
D13000
trusted library allocation
page execute and read and write
14A8000
heap
page read and write
4EE000
heap
page read and write
3215000
trusted library allocation
page read and write
870000
heap
page read and write
49F5000
trusted library allocation
page read and write
4E7000
heap
page read and write
12F6000
stack
page read and write
5DC000
heap
page read and write
4E7000
heap
page read and write
890000
heap
page read and write
570E000
trusted library allocation
page read and write
1174000
trusted library allocation
page read and write
8A3000
trusted library allocation
page execute and read and write
69A6000
heap
page read and write
66D000
heap
page read and write
15FF000
stack
page read and write
D30000
unkown
page readonly
281B000
stack
page read and write
1BB000
stack
page read and write
5A62000
trusted library allocation
page read and write
4EE000
heap
page read and write
276F000
stack
page read and write
1660000
heap
page read and write
61A000
heap
page read and write
3485000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
4EE000
heap
page read and write
131D000
heap
page read and write
14C0000
trusted library allocation
page read and write
1566000
heap
page read and write
930000
trusted library allocation
page execute and read and write
4D70000
heap
page read and write
49CE000
trusted library allocation
page read and write
887000
heap
page read and write
D53000
unkown
page readonly
4EE000
heap
page read and write
4B70000
heap
page execute and read and write
14EA000
trusted library allocation
page execute and read and write
1443000
trusted library allocation
page execute and read and write
4DA7000
trusted library allocation
page read and write
1860000
heap
page read and write
4EE000
heap
page read and write
6980000
heap
page read and write
4EE000
heap
page read and write
665C000
stack
page read and write
4D86000
trusted library allocation
page read and write
4E7000
heap
page read and write
1227000
heap
page read and write
2180000
trusted library allocation
page read and write
957000
trusted library allocation
page execute and read and write
21EE000
stack
page read and write
E60000
trusted library allocation
page read and write
28D0000
heap
page execute and read and write
9C8000
heap
page read and write
4EE000
heap
page read and write
6E3E000
stack
page read and write
4F0E000
stack
page read and write
4A04000
trusted library allocation
page read and write
24C7000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
15A4000
trusted library allocation
page read and write
C21000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
8AD000
trusted library allocation
page execute and read and write
6ABE000
stack
page read and write
10002000
unkown
page readonly
4E7000
heap
page read and write
2770000
heap
page read and write
4EE000
heap
page read and write
69CF000
heap
page read and write
4EE000
heap
page read and write
316F000
trusted library allocation
page read and write
747000
heap
page read and write
2207000
trusted library allocation
page read and write
157B000
trusted library allocation
page execute and read and write
1360000
heap
page read and write
1466000
trusted library allocation
page execute and read and write
BB3000
trusted library allocation
page execute and read and write
4EE000
heap
page read and write
576E000
stack
page read and write
11DF000
stack
page read and write
E0E000
stack
page read and write
5F7000
heap
page read and write
2E40000
trusted library allocation
page read and write
928000
heap
page read and write
5CA000
heap
page read and write
4E7000
heap
page read and write
4E7000
heap
page read and write
E9A000
trusted library allocation
page execute and read and write
1430000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
29B000
stack
page read and write
1720000
heap
page read and write
A88000
heap
page read and write
F70000
heap
page read and write
890000
heap
page read and write
4A10000
trusted library allocation
page read and write
ED0000
heap
page read and write
4E7000
heap
page read and write
2220000
heap
page read and write
5A90000
trusted library allocation
page read and write
4E7000
heap
page read and write
49DE000
stack
page read and write
5835000
trusted library allocation
page read and write
4EE000
heap
page read and write
2720000
heap
page read and write
760000
heap
page read and write
A60000
heap
page read and write
1131000
heap
page read and write
42E000
unkown
page readonly
45A000
unkown
page readonly
6D3000
trusted library allocation
page execute and read and write
10ED000
heap
page read and write
4EE000
heap
page read and write
309E000
stack
page read and write
4E7000
heap
page read and write
29AE000
stack
page read and write
4E7000
heap
page read and write
5A83000
trusted library allocation
page read and write
5CE000
heap
page read and write
323F000
trusted library allocation
page read and write
749000
heap
page read and write
94A000
trusted library allocation
page execute and read and write
4EE000
heap
page read and write
4B1E000
stack
page read and write
4E7000
heap
page read and write
23D0000
heap
page read and write
107A000
heap
page read and write
13CF000
stack
page read and write
AD7000
trusted library allocation
page execute and read and write
217A000
trusted library allocation
page execute and read and write
5AB0000
trusted library allocation
page read and write
E47000
heap
page read and write
4EE000
heap
page read and write
117D000
trusted library allocation
page execute and read and write
C27000
trusted library allocation
page read and write
8D9000
heap
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
1058000
heap
page read and write
1572000
trusted library allocation
page read and write
606000
heap
page read and write
5CE000
heap
page read and write
C40000
heap
page read and write
F08000
heap
page read and write
4EE000
heap
page read and write
8A0000
heap
page read and write
400000
unkown
page readonly
E3B000
stack
page read and write
2711000
trusted library allocation
page read and write
5C1000
heap
page read and write
1075000
heap
page read and write
890000
trusted library allocation
page read and write
4147000
trusted library allocation
page read and write
4EE000
heap
page read and write
1180000
heap
page read and write
4E7000
heap
page read and write
9B000
stack
page read and write
4E7000
heap
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
6F0000
trusted library allocation
page read and write
4EE000
heap
page read and write
B00000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page execute and read and write
2FFF000
stack
page read and write
4D8E000
trusted library allocation
page read and write
679000
heap
page read and write
B8F000
stack
page read and write
BC0000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
19A000
stack
page read and write
308E000
stack
page read and write
9B5000
heap
page read and write
6E7D000
stack
page read and write
BDA000
trusted library allocation
page execute and read and write
A5E000
stack
page read and write
1560000
heap
page read and write
14CD000
trusted library allocation
page execute and read and write
AC6000
trusted library allocation
page execute and read and write
2150000
trusted library allocation
page read and write
11CF000
stack
page read and write
14E0000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
11A2000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
2182000
trusted library allocation
page read and write
B10000
heap
page read and write
4EE000
heap
page read and write
4E7000
heap
page read and write
4EE000
heap
page read and write
31CF000
stack
page read and write
4EE000
heap
page read and write
1575000
trusted library allocation
page execute and read and write
49C6000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
4E7000
heap
page read and write
D4F000
stack
page read and write
4EE000
heap
page read and write
15C0000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
AC1000
trusted library allocation
page read and write
30FB000
trusted library allocation
page read and write
4E7000
heap
page read and write
52B2000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
4D54000
trusted library allocation
page read and write
10F6000
stack
page read and write
4E7000
heap
page read and write
34BC000
trusted library allocation
page read and write
6230000
heap
page read and write
1470000
heap
page read and write
4EE000
heap
page read and write
EC0000
trusted library allocation
page read and write
5852000
unkown
page readonly
5A71000
trusted library allocation
page read and write
7D0000
heap
page read and write
12D4000
heap
page read and write
4E7000
heap
page read and write
4E0000
heap
page read and write
9B0000
heap
page read and write
57B000
stack
page read and write
2210000
heap
page execute and read and write
5A0000
heap
page read and write
26E0000
heap
page read and write
5B1E000
stack
page read and write
30F6000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
E24000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
277B000
heap
page read and write
4E7000
heap
page read and write
236E000
stack
page read and write
23AE000
stack
page read and write
4E6000
heap
page read and write
67F0000
unkown
page readonly
DFB000
stack
page read and write
1470000
trusted library allocation
page read and write
606000
heap
page read and write
4F8E000
stack
page read and write
43E000
unkown
page readonly
400000
unkown
page readonly
3471000
trusted library allocation
page read and write
49B5000
trusted library allocation
page read and write
8D2000
trusted library allocation
page read and write
D44000
unkown
page readonly
1088000
heap
page read and write
4E7000
heap
page read and write
140E000
stack
page read and write
67CE000
stack
page read and write
1450000
trusted library allocation
page read and write
12CD000
heap
page read and write
B18000
heap
page read and write
B3A000
heap
page read and write
4EE000
heap
page read and write
AD2000
trusted library allocation
page read and write
E7A000
trusted library allocation
page execute and read and write
1180000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
855000
heap
page read and write
1590000
trusted library allocation
page read and write
A80000
heap
page read and write
958000
heap
page read and write
BE7000
trusted library allocation
page execute and read and write
F9B000
stack
page read and write
2337000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
4E7000
heap
page read and write
56FB000
trusted library allocation
page read and write
4EE000
heap
page read and write
2877000
heap
page read and write
8DB000
trusted library allocation
page execute and read and write
1249000
heap
page read and write
1487000
trusted library allocation
page execute and read and write
880000
heap
page read and write
4E7000
heap
page read and write
3090000
trusted library allocation
page read and write
4EE000
heap
page read and write
4E7000
heap
page read and write
B30000
heap
page read and write
56F0000
trusted library allocation
page read and write
5A5E000
stack
page read and write
2ECC000
stack
page read and write
D4E000
stack
page read and write
2781000
heap
page read and write
4EE000
heap
page read and write
4E7000
heap
page read and write
3177000
trusted library allocation
page read and write
4E7000
heap
page read and write
2821000
heap
page read and write
2F8E000
stack
page read and write
561E000
stack
page read and write
606000
heap
page read and write
4EE000
heap
page read and write
5F2000
heap
page read and write
55CE000
stack
page read and write
4E7000
heap
page read and write
2F90000
trusted library allocation
page execute and read and write
14CE000
stack
page read and write
4E0E000
stack
page read and write
19A000
stack
page read and write
4E7000
heap
page read and write
40A000
unkown
page read and write
952000
trusted library allocation
page read and write
635E000
stack
page read and write
1443000
trusted library allocation
page execute and read and write
1651000
trusted library allocation
page read and write
1220000
heap
page read and write
4EE000
heap
page read and write
4EE000
heap
page read and write
400000
unkown
page readonly
1150000
heap
page read and write
4E7000
heap
page read and write
8B0000
trusted library allocation
page read and write
8C6000
trusted library allocation
page execute and read and write
3171000
trusted library allocation
page read and write
4EE000
heap
page read and write
There are 1034 hidden memdumps, click here to show them.