IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://cosergei-esenin.comsergei-esenin.comty/public/assets/
unknown
malicious
https://sergei-esenin.com/
unknown
malicious
https://sergei-esenin.com:443/apiK
unknown
malicious
https://sergei-esenin.com:443/apih
unknown
malicious
studennotediw.store
malicious
https://sergei-esenin.com/za%
unknown
malicious
https://sergei-esenin.com/BK
unknown
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://sergei-esenin.com/apieP
unknown
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://sergei-esenin.com:443/api
unknown
malicious
https://sergei-esenin.com/k
unknown
malicious
https://sergei-esenin.com:443/api6
unknown
malicious
https://sergei-esenin.com/apiwz
unknown
malicious
https://sergei-esenin.com:443/api4p.default-release/key4.dbPK
unknown
malicious
bathdoomgaz.store
malicious
https://sergei-esenin.com/apiHv$
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C0e3d185a3e106e7
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.steamstatic.com/public/javascript/promo/stickers.js?v=W8NP8aTVqtms&l=english
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://licendfilteo.site:443/api
unknown
https://steamcommunity.com/p
unknown
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.steamstatic.com/public/css/skin_1/profilev2.css?v=t9xiI4DlPpEB&l=english
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://community.steamstatic.com/public/javascript/applications/community/main.js?v=4XouecKy8sZy&am
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://clearancek.site/api
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://steamcommunity.com/U
unknown
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://support.microsof
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://store.steampowered.com/;
unknown
https://community.steamstatic.com/public/css/promo/summer2017/stickers.css?v=P8gOPraCSjV6&l=engl
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
https://steamcommunity.com/profiles/76561199724331900&
unknown
https://community.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.steamstatic.com/public/javascript/applications/community/manifest.js?v=r7a4-LYcQOj
unknown
https://dissapoiznw.store:443/api
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a61
unknown
https://community.steamstatic.com/
unknown
https://community.steamstatic.com/public/css/applications/community/main.css?v=DVae4t4RZiHA&l=en
unknown
https://clearancek.site:443/api
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4D1000
unkown
page execute and read and write
malicious
4C80000
direct allocation
page read and write
5CD1000
trusted library allocation
page read and write
5C07000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
12E5000
heap
page read and write
5BEE000
trusted library allocation
page read and write
5C12000
trusted library allocation
page read and write
6A9000
unkown
page execute and read and write
414E000
stack
page read and write
5CD1000
trusted library allocation
page read and write
1248000
heap
page read and write
5C27000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
4C91000
heap
page read and write
310E000
stack
page read and write
5C17000
trusted library allocation
page read and write
34CE000
stack
page read and write
5BE7000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
12DC000
heap
page read and write
5BDA000
trusted library allocation
page read and write
5FA1000
trusted library allocation
page read and write
12FD000
heap
page read and write
525F000
stack
page read and write
5CFB000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
35CF000
stack
page read and write
124F000
heap
page read and write
4C91000
heap
page read and write
52A0000
direct allocation
page execute and read and write
5BF8000
trusted library allocation
page read and write
1263000
heap
page read and write
324E000
stack
page read and write
5C18000
trusted library allocation
page read and write
7F3000
unkown
page execute and write copy
5ED2000
trusted library allocation
page read and write
5BFF000
trusted library allocation
page read and write
5BF7000
trusted library allocation
page read and write
12F0000
heap
page read and write
5BEC000
trusted library allocation
page read and write
12D5000
heap
page read and write
770000
unkown
page execute and read and write
12EA000
heap
page read and write
5C1A000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
154F000
stack
page read and write
124F000
heap
page read and write
742000
unkown
page execute and read and write
4C91000
heap
page read and write
5CEB000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
5CFB000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
12DB000
heap
page read and write
12F8000
heap
page read and write
5BEE000
trusted library allocation
page read and write
1281000
heap
page read and write
5BFF000
trusted library allocation
page read and write
1263000
heap
page read and write
5BD9000
trusted library allocation
page read and write
731000
unkown
page execute and read and write
12F9000
heap
page read and write
73E000
unkown
page execute and write copy
4C91000
heap
page read and write
4C91000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
129E000
heap
page read and write
5C47000
trusted library allocation
page read and write
5CF7000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
12EE000
heap
page read and write
128B000
heap
page read and write
5BE7000
trusted library allocation
page read and write
124F000
heap
page read and write
12F9000
heap
page read and write
5280000
direct allocation
page execute and read and write
5CFB000
trusted library allocation
page read and write
5CD8000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5C17000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
736000
unkown
page execute and read and write
7CC000
unkown
page execute and write copy
732000
unkown
page execute and write copy
3D8E000
stack
page read and write
5BFC000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
4C5F000
stack
page read and write
12F0000
heap
page read and write
5BDA000
trusted library allocation
page read and write
12E9000
heap
page read and write
12DF000
heap
page read and write
5BE0000
trusted library allocation
page read and write
2FBC000
stack
page read and write
5C00000
trusted library allocation
page read and write
5C17000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
1271000
heap
page read and write
460F000
stack
page read and write
128B000
heap
page read and write
5CFB000
trusted library allocation
page read and write
3FCF000
stack
page read and write
5C3E000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
4C91000
heap
page read and write
5BD4000
trusted library allocation
page read and write
4CA0000
heap
page read and write
4C80000
direct allocation
page read and write
5CEB000
trusted library allocation
page read and write
4C91000
heap
page read and write
5CFB000
trusted library allocation
page read and write
12D8000
heap
page read and write
428E000
stack
page read and write
5CFB000
trusted library allocation
page read and write
1263000
heap
page read and write
5CEB000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
12F9000
heap
page read and write
5CEB000
trusted library allocation
page read and write
1295000
heap
page read and write
5CEB000
trusted library allocation
page read and write
5BE7000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
78F000
unkown
page execute and write copy
12EB000
heap
page read and write
5CEB000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
1271000
heap
page read and write
792000
unkown
page execute and read and write
5BCF000
stack
page read and write
5BFC000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
450E000
stack
page read and write
12F6000
heap
page read and write
2F7F000
stack
page read and write
5A2F000
stack
page read and write
5C28000
trusted library allocation
page read and write
7E4000
unkown
page execute and write copy
510D000
stack
page read and write
488F000
stack
page read and write
5CFB000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
5BE7000
trusted library allocation
page read and write
766000
unkown
page execute and write copy
120A000
heap
page read and write
12DB000
heap
page read and write
5CEA000
trusted library allocation
page read and write
7CA000
unkown
page execute and write copy
5C18000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
168E000
stack
page read and write
5CFB000
trusted library allocation
page read and write
12D1000
heap
page read and write
5CD1000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
12E5000
heap
page read and write
53DE000
stack
page read and write
478E000
stack
page read and write
5C45000
trusted library allocation
page read and write
4B5E000
stack
page read and write
5C4D000
trusted library allocation
page read and write
12FA000
heap
page read and write
4C60000
heap
page read and write
5CEB000
trusted library allocation
page read and write
5EF1000
trusted library allocation
page read and write
400E000
stack
page read and write
5BE0000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
4C91000
heap
page read and write
12E5000
heap
page read and write
5BF9000
trusted library allocation
page read and write
5CD8000
trusted library allocation
page read and write
5F09000
trusted library allocation
page read and write
12EB000
heap
page read and write
4C80000
direct allocation
page read and write
39CE000
stack
page read and write
5BF8000
trusted library allocation
page read and write
1239000
heap
page read and write
129E000
heap
page read and write
3E8F000
stack
page read and write
5CFF000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
12D4000
heap
page read and write
4C80000
direct allocation
page read and write
7A3000
unkown
page execute and write copy
5CFB000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
5ED8000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
12FD000
heap
page read and write
5CEB000
trusted library allocation
page read and write
5CDB000
trusted library allocation
page read and write
5BD5000
trusted library allocation
page read and write
30CF000
stack
page read and write
561F000
stack
page read and write
530000
unkown
page execute and write copy
5CEA000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
12D5000
heap
page read and write
5BE0000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
2FC7000
heap
page read and write
5C47000
trusted library allocation
page read and write
6DB000
unkown
page execute and read and write
52E9000
trusted library allocation
page read and write
5BD8000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
410F000
stack
page read and write
135E000
stack
page read and write
5CFB000
trusted library allocation
page read and write
1265000
heap
page read and write
5C17000
trusted library allocation
page read and write
370F000
stack
page read and write
1284000
heap
page read and write
4D1000
unkown
page execute and write copy
320F000
stack
page read and write
5C32000
trusted library allocation
page read and write
12FB000
heap
page read and write
12EA000
heap
page read and write
4C80000
direct allocation
page read and write
7F2000
unkown
page execute and read and write
5CDD000
trusted library allocation
page read and write
515C000
stack
page read and write
52A0000
direct allocation
page execute and read and write
12FA000
heap
page read and write
44CF000
stack
page read and write
5C17000
trusted library allocation
page read and write
12EB000
heap
page read and write
5BF8000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
5CEB000
trusted library allocation
page read and write
1271000
heap
page read and write
1239000
heap
page read and write
5C28000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
12EE000
heap
page read and write
5CD8000
trusted library allocation
page read and write
4C91000
heap
page read and write
5CEB000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C17000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
4A1E000
stack
page read and write
5BE8000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
5CFB000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
4C91000
heap
page read and write
5BE0000
trusted library allocation
page read and write
74E000
unkown
page execute and write copy
5CFB000
trusted library allocation
page read and write
4B1F000
stack
page read and write
12E9000
heap
page read and write
3ECE000
stack
page read and write
129E000
heap
page read and write
5CF9000
trusted library allocation
page read and write
5770000
remote allocation
page read and write
5270000
direct allocation
page execute and read and write
5CFB000
trusted library allocation
page read and write
6AC000
unkown
page execute and write copy
5CFB000
trusted library allocation
page read and write
607D000
trusted library allocation
page read and write
118A000
stack
page read and write
4C80000
direct allocation
page read and write
5D01000
trusted library allocation
page read and write
338E000
stack
page read and write
5F68000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
702000
unkown
page execute and write copy
5C35000
trusted library allocation
page read and write
4C91000
heap
page read and write
5BE5000
trusted library allocation
page read and write
7DC000
unkown
page execute and write copy
12ED000
heap
page read and write
5C45000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
1248000
heap
page read and write
5BFF000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
5CFB000
trusted library allocation
page read and write
68EF000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
124F000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
54DD000
stack
page read and write
5BE7000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
703000
unkown
page execute and read and write
7DB000
unkown
page execute and read and write
12EC000
heap
page read and write
5BF2000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
348F000
stack
page read and write
1271000
heap
page read and write
5C17000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
4C91000
heap
page read and write
5BF1000
trusted library allocation
page read and write
12F6000
heap
page read and write
5ED0000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
12F9000
heap
page read and write
55AC000
trusted library allocation
page read and write
759000
unkown
page execute and write copy
5BEB000
trusted library allocation
page read and write
551E000
stack
page read and write
12F9000
heap
page read and write
58CD000
stack
page read and write
12F6000
heap
page read and write
4C90000
heap
page read and write
5C4D000
trusted library allocation
page read and write
4C91000
heap
page read and write
5BFC000
trusted library allocation
page read and write
747000
unkown
page execute and read and write
12EC000
heap
page read and write
2FCD000
heap
page read and write
5C14000
trusted library allocation
page read and write
12F0000
heap
page read and write
5BF9000
trusted library allocation
page read and write
5CFF000
trusted library allocation
page read and write
4D0000
unkown
page readonly
4C91000
heap
page read and write
592E000
stack
page read and write
4C91000
heap
page read and write
11F0000
heap
page read and write
5D09000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
5770000
remote allocation
page read and write
5BFD000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
12FD000
heap
page read and write
5CFB000
trusted library allocation
page read and write
12DB000
heap
page read and write
1299000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
4D0000
unkown
page read and write
5CFB000
trusted library allocation
page read and write
3C4E000
stack
page read and write
5BF8000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
384F000
stack
page read and write
128A000
heap
page read and write
2E7E000
stack
page read and write
4C80000
direct allocation
page read and write
5CEB000
trusted library allocation
page read and write
768000
unkown
page execute and read and write
5CD7000
trusted library allocation
page read and write
1265000
heap
page read and write
5CDF000
trusted library allocation
page read and write
1370000
heap
page read and write
7A4000
unkown
page execute and read and write
5C4B000
trusted library allocation
page read and write
12D4000
heap
page read and write
72E000
unkown
page execute and write copy
1200000
heap
page read and write
5CD1000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5FA9000
trusted library allocation
page read and write
75E000
unkown
page execute and read and write
5770000
remote allocation
page read and write
5F79000
trusted library allocation
page read and write
4C91000
heap
page read and write
4890000
heap
page read and write
565E000
stack
page read and write
128A000
heap
page read and write
5CEB000
trusted library allocation
page read and write
374E000
stack
page read and write
6D8000
unkown
page execute and write copy
5BF1000
trusted library allocation
page read and write
1299000
heap
page read and write
52D0000
direct allocation
page execute and read and write
5BE3000
trusted library allocation
page read and write
128B000
heap
page read and write
5BF9000
trusted library allocation
page read and write
5120000
direct allocation
page read and write
6041000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
70B000
unkown
page execute and write copy
4C91000
heap
page read and write
74F000
unkown
page execute and read and write
438F000
stack
page read and write
4C80000
direct allocation
page read and write
5BF9000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
5D01000
trusted library allocation
page read and write
12EE000
heap
page read and write
5C0F000
trusted library allocation
page read and write
1263000
heap
page read and write
3ACF000
stack
page read and write
5D09000
trusted library allocation
page read and write
530000
unkown
page execute and read and write
5CEB000
trusted library allocation
page read and write
12FA000
heap
page read and write
5C2B000
trusted library allocation
page read and write
5FB1000
trusted library allocation
page read and write
5C17000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
5AC0000
heap
page read and write
5CFB000
trusted library allocation
page read and write
424F000
stack
page read and write
5CE9000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
388E000
stack
page read and write
769000
unkown
page execute and write copy
5BF0000
trusted library allocation
page read and write
12FE000
heap
page read and write
398F000
stack
page read and write
5C37000
trusted library allocation
page read and write
5120000
direct allocation
page read and write
1375000
heap
page read and write
575F000
stack
page read and write
3B0E000
stack
page read and write
5BF2000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
6D1000
unkown
page execute and write copy
1271000
heap
page read and write
5CE9000
trusted library allocation
page read and write
1234000
heap
page read and write
5C26000
trusted library allocation
page read and write
1283000
heap
page read and write
4C91000
heap
page read and write
5BE5000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
5CFB000
trusted library allocation
page read and write
5CD8000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
4C80000
direct allocation
page read and write
5CFB000
trusted library allocation
page read and write
1271000
heap
page read and write
5CEB000
trusted library allocation
page read and write
464E000
stack
page read and write
53C000
unkown
page execute and write copy
5C18000
trusted library allocation
page read and write
49DF000
stack
page read and write
5C27000
trusted library allocation
page read and write
3D4F000
stack
page read and write
5A8E000
stack
page read and write
5C14000
trusted library allocation
page read and write
12DF000
heap
page read and write
334F000
stack
page read and write
48DE000
stack
page read and write
120E000
heap
page read and write
743000
unkown
page execute and write copy
5BE5000
trusted library allocation
page read and write
158E000
stack
page read and write
5C14000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
2FC0000
heap
page read and write
5C17000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
12E9000
heap
page read and write
5C13000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
6D1000
unkown
page execute and read and write
360E000
stack
page read and write
6C6000
unkown
page execute and read and write
12F7000
heap
page read and write
5C0F000
trusted library allocation
page read and write
5BE7000
trusted library allocation
page read and write
5BD4000
trusted library allocation
page read and write
108B000
stack
page read and write
55C4000
trusted library allocation
page read and write
12E9000
heap
page read and write
52A0000
direct allocation
page execute and read and write
12DF000
heap
page read and write
5120000
direct allocation
page read and write
57CE000
stack
page read and write
12F5000
heap
page read and write
5BE0000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
1299000
heap
page read and write
3C0F000
stack
page read and write
11E0000
heap
page read and write
5CEB000
trusted library allocation
page read and write
12EB000
heap
page read and write
7F2000
unkown
page execute and write copy
5BE0000
trusted library allocation
page read and write
1283000
heap
page read and write
715000
unkown
page execute and read and write
5BF3000
trusted library allocation
page read and write
52AD000
stack
page read and write
5C03000
trusted library allocation
page read and write
5BFE000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
43CE000
stack
page read and write
5CEB000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
1284000
heap
page read and write
474F000
stack
page read and write
5BFF000
trusted library allocation
page read and write
128B000
heap
page read and write
5BFF000
trusted library allocation
page read and write
7E4000
unkown
page execute and write copy
5CD8000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
12F9000
heap
page read and write
5C45000
trusted library allocation
page read and write
7B0000
unkown
page execute and read and write
5BE7000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
12DF000
heap
page read and write
5BE5000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
1295000
heap
page read and write
7DB000
unkown
page execute and write copy
There are 529 hidden memdumps, click here to show them.