Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsc77A8.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nslCE96.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nslCE97.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nslCE97.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsy8A1.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Pinball\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 90 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exe"
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
||
C:\Users\user\AppData\Roaming\Pinball\Pinball.exe
|
"C:\Users\user\AppData\Roaming\Pinball\Pinball.exe"
|
There are 26 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
http://spanchtoc.bond/22_2/huge.dat
|
unknown
|
||
https://chrome.google.com/webstore?hl=hiCtrl$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=de&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://support.google.com/chrome/answer/6098869?hl=es
|
unknown
|
||
http://www.apache.org/licenses/LICEN
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlAy&udaGestionado
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlP&al
|
unknown
|
||
https://chrome.google.com/webstore?hl=plCtrl$1
|
unknown
|
||
https://passwords.google.comcuenta
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
https://chrome.google.com/webstore?hl=es&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://chrome.google.com/webstore?hl=ja&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=te&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://chrome.google.com/webstore?hl=pl&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://chrome.google.com/webstore?hl=elCtrl$1
|
unknown
|
||
https://passwords.google.com
|
unknown
|
||
http://www.iana.org/assignments/multicast-addresses
|
unknown
|
||
https://github.com/JamesNK/Newtonsoft.Json/issues/652
|
unknown
|
||
https://chrome.google.com/webstore?hl=sk&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
|
unknown
|
||
https://chrome.google.com/webstore?hl=bnCtrl$1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
http://logging.apache.org/log4ne
|
unknown
|
||
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlPomo&cZarz
|
unknown
|
||
https://chrome.google.com/webstore?hl=jaCtrl$1
|
unknown
|
||
https://passwords.google.comCuenta
|
unknown
|
||
http://www.connectionstrings.com/
|
unknown
|
||
https://support.google.com/chromebook?p=app_intent
|
unknown
|
||
https://www.beispiel.de
|
unknown
|
||
https://chrome.google.com/webstore?hl=huCtrl$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=lv&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
http://logging.apache.org/log4j
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://chrome.google.com/webstore?hl=hi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=el&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=lvCtrl$1
|
unknown
|
||
http://api.install-stat.debug.world/clients/installs
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlP&omocn
|
unknown
|
||
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://chrome.google.com/webstore?hl=deStrg$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=teCtrl$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://chrome.google.com/webstore?hl=es-419Ctrl$1
|
unknown
|
||
http://spanchtoc.bond/22_2/huge.dat9
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&HilfeVon
|
unknown
|
||
http://bageyou.xyz/c/g
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
|
unknown
|
||
http://spanchtoc.bond/22_2/huge.dat-
|
unknown
|
||
http://www.apache.org/).
|
unknown
|
||
http://spanchtoc.bond/22_2/huge.dati
|
unknown
|
||
https://myactivity.google.com/
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&S
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://chrome.google.com/webstore?hl=esCtrl$1
|
unknown
|
||
https://ejemplo.com.Se
|
unknown
|
||
http://logging.apache.org/log4net/schemas/log4net-events-1.2>
|
unknown
|
||
http://spanchtoc.bond/22_2/huge.dat/SILENTgetOK
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherEnabled
|
unknown
|
||
https://chrome.google.com/webstore/category/extensions
|
unknown
|
||
https://chrome.google.com/webstore?hl=hu&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
http://bageyou.xyz/c/g4
|
unknown
|
||
http://www.apache.org/licenses/
|
unknown
|
||
https://chrome.google.com/webstore?hl=es-419&category=theme81https://myactivity.google.com/myactivit
|
unknown
|
||
https://passwords.google.comT
|
unknown
|
||
https://passwords.google.comGoogle
|
unknown
|
||
http://james.newtonking.com/projects/json
|
unknown
|
||
https://passwords.google.comKonta
|
unknown
|
||
https://chrome.google.com/webstore?hl=skCtrl$1
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
|
unknown
|
||
https://passwords.google.comGoogle-KontoF
|
unknown
|
||
https://www.nuget.org/packages/Newtonsoft.Json.Bson
|
unknown
|
||
https://chrome.google.com/webstore?hl=bn&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlYar&d
|
unknown
|
||
https://chrome.google.com/webstore?hl=viCtrl$1
|
unknown
|
||
http://www.faqs.org/rfcs/rfc3164.html.
|
unknown
|
||
http://ejemplo.com
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherUrlGreylist
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.45.251
|
unknown
|
United States
|
||
104.21.75.251
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Pinball
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\Pinball
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\Pinball
|
Version
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Pinball
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pinball
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\Pinball
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\Pinball
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Pinball_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Pinball
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
BF0000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page execute and read and write
|
||
6780000
|
trusted library allocation
|
page read and write
|
||
2700000
|
trusted library allocation
|
page execute and read and write
|
||
3247000
|
trusted library allocation
|
page read and write
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
C03000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
1698000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
144D000
|
trusted library allocation
|
page execute and read and write
|
||
3145000
|
trusted library allocation
|
page read and write
|
||
4D56000
|
trusted library allocation
|
page read and write
|
||
1533000
|
trusted library allocation
|
page execute and read and write
|
||
41AC000
|
trusted library allocation
|
page read and write
|
||
1359000
|
heap
|
page read and write
|
||
1607000
|
trusted library allocation
|
page execute and read and write
|
||
4EE000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
4E13000
|
trusted library allocation
|
page read and write
|
||
1457000
|
heap
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
AA3000
|
trusted library allocation
|
page execute and read and write
|
||
590000
|
heap
|
page read and write
|
||
15A3000
|
trusted library allocation
|
page execute and read and write
|
||
9D0000
|
heap
|
page read and write
|
||
282F000
|
stack
|
page read and write
|
||
30D4000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
heap
|
page execute and read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
49E1000
|
trusted library allocation
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
7C5000
|
heap
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
14E6000
|
trusted library allocation
|
page execute and read and write
|
||
52C1000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
trusted library allocation
|
page read and write
|
||
EA2000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1137000
|
heap
|
page read and write
|
||
E76000
|
trusted library allocation
|
page execute and read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1668000
|
heap
|
page read and write
|
||
30C5000
|
trusted library allocation
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
34AA000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
4E15000
|
trusted library allocation
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
655C000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
39B000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2160000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
93B000
|
stack
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
5781000
|
trusted library allocation
|
page read and write
|
||
1577000
|
trusted library allocation
|
page execute and read and write
|
||
4E7000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page readonly
|
||
3477000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
4D69000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
4141000
|
trusted library allocation
|
page read and write
|
||
B1F000
|
stack
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
52AF000
|
stack
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
2176000
|
trusted library allocation
|
page execute and read and write
|
||
2A10000
|
heap
|
page execute and read and write
|
||
4D84000
|
trusted library allocation
|
page read and write
|
||
431000
|
unkown
|
page readonly
|
||
4E7000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
5840000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
EAB000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
trusted library allocation
|
page execute and read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1657000
|
trusted library allocation
|
page read and write
|
||
94C000
|
heap
|
page read and write
|
||
2821000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
144D000
|
trusted library allocation
|
page execute and read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
3197000
|
trusted library allocation
|
page read and write
|
||
1196000
|
trusted library allocation
|
page execute and read and write
|
||
998000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
453000
|
unkown
|
page readonly
|
||
4F12000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page execute and read and write
|
||
40A000
|
unkown
|
page write copy
|
||
87E000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
2EE7000
|
trusted library allocation
|
page read and write
|
||
49C4000
|
trusted library allocation
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
185F000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
52BC000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
2475000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
14D7000
|
heap
|
page read and write
|
||
31F0000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
10CF000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2100000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
21A0000
|
trusted library allocation
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
14E1000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
21F0000
|
trusted library allocation
|
page execute and read and write
|
||
760000
|
heap
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
691000
|
heap
|
page read and write
|
||
D1D000
|
trusted library allocation
|
page execute and read and write
|
||
1545000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
BB4000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
trusted library allocation
|
page execute and read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
F78000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
349E000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page readonly
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
23DD000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
924000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
6DD000
|
trusted library allocation
|
page execute and read and write
|
||
4D94000
|
trusted library allocation
|
page read and write
|
||
598000
|
heap
|
page read and write
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2154000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page execute and read and write
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
1596000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
C65000
|
heap
|
page read and write
|
||
980000
|
trusted library allocation
|
page execute and read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
BBD000
|
trusted library allocation
|
page execute and read and write
|
||
5F2000
|
heap
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
4B65000
|
trusted library allocation
|
page read and write
|
||
1602000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
1015000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
BE2000
|
trusted library allocation
|
page read and write
|
||
22EE000
|
stack
|
page read and write
|
||
34A1000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1556000
|
trusted library allocation
|
page execute and read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
453000
|
unkown
|
page readonly
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
D8D000
|
stack
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
147A000
|
heap
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
147B000
|
trusted library allocation
|
page execute and read and write
|
||
150E000
|
stack
|
page read and write
|
||
311D000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
trusted library allocation
|
page execute and read and write
|
||
94A000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
5B3C000
|
stack
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
heap
|
page execute and read and write
|
||
69D4000
|
heap
|
page read and write
|
||
14E7000
|
trusted library allocation
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
ADB000
|
trusted library allocation
|
page execute and read and write
|
||
24A7000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
45A000
|
unkown
|
page readonly
|
||
6BE000
|
stack
|
page read and write
|
||
12FF000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
EA7000
|
trusted library allocation
|
page execute and read and write
|
||
269E000
|
stack
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
E82000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
67F2000
|
unkown
|
page readonly
|
||
BA1000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
5850000
|
unkown
|
page readonly
|
||
7BE000
|
heap
|
page read and write
|
||
707000
|
trusted library allocation
|
page execute and read and write
|
||
2837000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
ACA000
|
trusted library allocation
|
page execute and read and write
|
||
FCC000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
1472000
|
trusted library allocation
|
page read and write
|
||
23E1000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
15C6000
|
trusted library allocation
|
page execute and read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
58D0000
|
heap
|
page execute and read and write
|
||
710000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
119A000
|
trusted library allocation
|
page execute and read and write
|
||
12ED000
|
heap
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2187000
|
trusted library allocation
|
page execute and read and write
|
||
146A000
|
trusted library allocation
|
page execute and read and write
|
||
121E000
|
stack
|
page read and write
|
||
946000
|
trusted library allocation
|
page execute and read and write
|
||
5F2000
|
heap
|
page read and write
|
||
11A7000
|
trusted library allocation
|
page execute and read and write
|
||
4EE000
|
heap
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page execute and read and write
|
||
134E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4A19000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
3267000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4D45000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
50AF000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page execute and read and write
|
||
4A06000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
910000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
29EE000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
24A1000
|
trusted library allocation
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
153D000
|
trusted library allocation
|
page execute and read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
44C000
|
unkown
|
page readonly
|
||
4EE000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
1444000
|
trusted library allocation
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
23E7000
|
trusted library allocation
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
6FA000
|
trusted library allocation
|
page execute and read and write
|
||
9BA000
|
heap
|
page read and write
|
||
6C0000
|
trusted library allocation
|
page read and write
|
||
3108000
|
trusted library allocation
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
3211000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
155A000
|
trusted library allocation
|
page execute and read and write
|
||
4215000
|
trusted library allocation
|
page read and write
|
||
49DE000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page execute and read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
49CB000
|
trusted library allocation
|
page read and write
|
||
3488000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
21E0000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
3104000
|
trusted library allocation
|
page read and write
|
||
1476000
|
trusted library allocation
|
page execute and read and write
|
||
4E7000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
BF0000
|
heap
|
page read and write
|
||
4D9E000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
440000
|
unkown
|
page readonly
|
||
215D000
|
trusted library allocation
|
page execute and read and write
|
||
3180000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
5725000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
5772000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page readonly
|
||
560000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
AAD000
|
trusted library allocation
|
page execute and read and write
|
||
5F0000
|
heap
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
4D8B000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
70B000
|
trusted library allocation
|
page execute and read and write
|
||
B52000
|
heap
|
page read and write
|
||
5896000
|
unkown
|
page readonly
|
||
4E7000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
1524000
|
heap
|
page read and write
|
||
154B000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
6D0000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
92D000
|
trusted library allocation
|
page execute and read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2331000
|
trusted library allocation
|
page read and write
|
||
D14000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
697E000
|
stack
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
3475000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
1534000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
2170000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page execute and read and write
|
||
936000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
44C000
|
unkown
|
page readonly
|
||
AA4000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
E96000
|
trusted library allocation
|
page execute and read and write
|
||
FC7000
|
heap
|
page read and write
|
||
4DA1000
|
trusted library allocation
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
D51000
|
unkown
|
page readonly
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
2201000
|
trusted library allocation
|
page read and write
|
||
2153000
|
trusted library allocation
|
page execute and read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
168A000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page execute and read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
218B000
|
trusted library allocation
|
page execute and read and write
|
||
BD6000
|
trusted library allocation
|
page execute and read and write
|
||
95A000
|
heap
|
page read and write
|
||
59DE000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
6760000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1444000
|
trusted library allocation
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
6F6000
|
trusted library allocation
|
page execute and read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
14C3000
|
trusted library allocation
|
page execute and read and write
|
||
1450000
|
heap
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
5CB000
|
stack
|
page read and write
|
||
4D5000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
232E000
|
stack
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
14C4000
|
trusted library allocation
|
page read and write
|
||
E87000
|
trusted library allocation
|
page execute and read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2471000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
464D000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
BEB000
|
trusted library allocation
|
page execute and read and write
|
||
246E000
|
stack
|
page read and write
|
||
63B2000
|
unkown
|
page readonly
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
heap
|
page execute and read and write
|
||
FAB000
|
stack
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
347D000
|
trusted library allocation
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
736000
|
stack
|
page read and write
|
||
1552000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
67E0000
|
trusted library allocation
|
page execute and read and write
|
||
1458000
|
heap
|
page read and write
|
||
923000
|
trusted library allocation
|
page execute and read and write
|
||
30F4000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
63B0000
|
unkown
|
page readonly
|
||
396000
|
stack
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
2717000
|
trusted library allocation
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
1482000
|
trusted library allocation
|
page read and write
|
||
577C000
|
trusted library allocation
|
page read and write
|
||
7E9000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
E23000
|
trusted library allocation
|
page execute and read and write
|
||
30E0000
|
heap
|
page read and write
|
||
160B000
|
trusted library allocation
|
page execute and read and write
|
||
B9B000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
BE3000
|
heap
|
page read and write
|
||
8A8000
|
heap
|
page read and write
|
||
249F000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
6D4000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
F36000
|
stack
|
page read and write
|
||
702000
|
trusted library allocation
|
page read and write
|
||
141F000
|
stack
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
14F7000
|
heap
|
page read and write
|
||
262F000
|
stack
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
1173000
|
trusted library allocation
|
page execute and read and write
|
||
129E000
|
heap
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
15AD000
|
trusted library allocation
|
page execute and read and write
|
||
FA7000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8C0000
|
heap
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
1477000
|
trusted library allocation
|
page execute and read and write
|
||
A65000
|
heap
|
page read and write
|
||
63B000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
4F1C000
|
trusted library allocation
|
page read and write
|
||
26DD000
|
stack
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1257000
|
heap
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page execute and read and write
|
||
4B63000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
4217000
|
trusted library allocation
|
page read and write
|
||
9B3000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4171000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
154D000
|
trusted library allocation
|
page execute and read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1556000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
148B000
|
trusted library allocation
|
page execute and read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
3011000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
49D4000
|
trusted library allocation
|
page read and write
|
||
917000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4E7000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
95B000
|
trusted library allocation
|
page execute and read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
E8B000
|
trusted library allocation
|
page execute and read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
13CD000
|
stack
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
D0F000
|
stack
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
147A000
|
trusted library allocation
|
page execute and read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
11AB000
|
trusted library allocation
|
page execute and read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page execute and read and write
|
||
D13000
|
trusted library allocation
|
page execute and read and write
|
||
14A8000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
3215000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
49F5000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
1174000
|
trusted library allocation
|
page read and write
|
||
8A3000
|
trusted library allocation
|
page execute and read and write
|
||
69A6000
|
heap
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
D30000
|
unkown
|
page readonly
|
||
281B000
|
stack
|
page read and write
|
||
1BB000
|
stack
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
3485000
|
trusted library allocation
|
page read and write
|
||
2FA7000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
131D000
|
heap
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
1566000
|
heap
|
page read and write
|
||
930000
|
trusted library allocation
|
page execute and read and write
|
||
4D70000
|
heap
|
page read and write
|
||
49CE000
|
trusted library allocation
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
D53000
|
unkown
|
page readonly
|
||
4EE000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page execute and read and write
|
||
14EA000
|
trusted library allocation
|
page execute and read and write
|
||
1443000
|
trusted library allocation
|
page execute and read and write
|
||
4DA7000
|
trusted library allocation
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
6980000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
665C000
|
stack
|
page read and write
|
||
4D86000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
2180000
|
trusted library allocation
|
page read and write
|
||
957000
|
trusted library allocation
|
page execute and read and write
|
||
21EE000
|
stack
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
heap
|
page execute and read and write
|
||
9C8000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
6E3E000
|
stack
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
4A04000
|
trusted library allocation
|
page read and write
|
||
24C7000
|
trusted library allocation
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
15A4000
|
trusted library allocation
|
page read and write
|
||
C21000
|
trusted library allocation
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
trusted library allocation
|
page execute and read and write
|
||
6ABE000
|
stack
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
4E7000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
69CF000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
316F000
|
trusted library allocation
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
2207000
|
trusted library allocation
|
page read and write
|
||
157B000
|
trusted library allocation
|
page execute and read and write
|
||
1360000
|
heap
|
page read and write
|
||
1466000
|
trusted library allocation
|
page execute and read and write
|
||
BB3000
|
trusted library allocation
|
page execute and read and write
|
||
4EE000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
E9A000
|
trusted library allocation
|
page execute and read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
29B000
|
stack
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
5835000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1131000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
45A000
|
unkown
|
page readonly
|
||
6D3000
|
trusted library allocation
|
page execute and read and write
|
||
10ED000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
5A83000
|
trusted library allocation
|
page read and write
|
||
5CE000
|
heap
|
page read and write
|
||
323F000
|
trusted library allocation
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
94A000
|
trusted library allocation
|
page execute and read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
AD7000
|
trusted library allocation
|
page execute and read and write
|
||
217A000
|
trusted library allocation
|
page execute and read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
117D000
|
trusted library allocation
|
page execute and read and write
|
||
C27000
|
trusted library allocation
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1058000
|
heap
|
page read and write
|
||
1572000
|
trusted library allocation
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
5CE000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
F08000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
E3B000
|
stack
|
page read and write
|
||
2711000
|
trusted library allocation
|
page read and write
|
||
5C1000
|
heap
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
4147000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
6F0000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
B00000
|
trusted library allocation
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page execute and read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
4D8E000
|
trusted library allocation
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
trusted library allocation
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
6E7D000
|
stack
|
page read and write
|
||
BDA000
|
trusted library allocation
|
page execute and read and write
|
||
A5E000
|
stack
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
14CD000
|
trusted library allocation
|
page execute and read and write
|
||
AC6000
|
trusted library allocation
|
page execute and read and write
|
||
2150000
|
trusted library allocation
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
11A2000
|
trusted library allocation
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
2182000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
1575000
|
trusted library allocation
|
page execute and read and write
|
||
49C6000
|
trusted library allocation
|
page read and write
|
||
5717000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
D4F000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
AC1000
|
trusted library allocation
|
page read and write
|
||
30FB000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
52B2000
|
trusted library allocation
|
page read and write
|
||
31D6000
|
trusted library allocation
|
page read and write
|
||
4D54000
|
trusted library allocation
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
34BC000
|
trusted library allocation
|
page read and write
|
||
6230000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
5852000
|
unkown
|
page readonly
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
57B000
|
stack
|
page read and write
|
||
2210000
|
heap
|
page execute and read and write
|
||
5A0000
|
heap
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
30F6000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
E24000
|
trusted library allocation
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
277B000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
4E6000
|
heap
|
page read and write
|
||
67F0000
|
unkown
|
page readonly
|
||
DFB000
|
stack
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
43E000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
49B5000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
trusted library allocation
|
page read and write
|
||
D44000
|
unkown
|
page readonly
|
||
1088000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
B3A000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
AD2000
|
trusted library allocation
|
page read and write
|
||
E7A000
|
trusted library allocation
|
page execute and read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
BE7000
|
trusted library allocation
|
page execute and read and write
|
||
F9B000
|
stack
|
page read and write
|
||
2337000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2877000
|
heap
|
page read and write
|
||
8DB000
|
trusted library allocation
|
page execute and read and write
|
||
1249000
|
heap
|
page read and write
|
||
1487000
|
trusted library allocation
|
page execute and read and write
|
||
880000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
2ECC000
|
stack
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
2781000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
3177000
|
trusted library allocation
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2821000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
5F2000
|
heap
|
page read and write
|
||
55CE000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page execute and read and write
|
||
14CE000
|
stack
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
952000
|
trusted library allocation
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
1443000
|
trusted library allocation
|
page execute and read and write
|
||
1651000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1150000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
8C6000
|
trusted library allocation
|
page execute and read and write
|
||
3171000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
There are 1034 hidden memdumps, click here to show them.