Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://cosergei-esenin.comsergei-esenin.comty/public/assets/
|
unknown
|
||
https://sergei-esenin.com/
|
unknown
|
||
https://sergei-esenin.com:443/apiK
|
unknown
|
||
https://sergei-esenin.com:443/apih
|
unknown
|
||
studennotediw.store
|
|||
https://sergei-esenin.com/za%
|
unknown
|
||
https://sergei-esenin.com/BK
|
unknown
|
||
dissapoiznw.store
|
|||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
https://sergei-esenin.com/apieP
|
unknown
|
||
https://steamcommunity.com:443/profiles/76561199724331900
|
unknown
|
||
eaglepawnoy.store
|
|||
https://sergei-esenin.com:443/api
|
unknown
|
||
https://sergei-esenin.com/k
|
unknown
|
||
https://sergei-esenin.com:443/api6
|
unknown
|
||
https://sergei-esenin.com/apiwz
|
unknown
|
||
https://sergei-esenin.com:443/api4p.default-release/key4.dbPK
|
unknown
|
||
bathdoomgaz.store
|
|||
https://sergei-esenin.com/apiHv$
|
unknown
|
||
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://player.vimeo.com
|
unknown
|
||
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C0e3d185a3e106e7
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://community.steamstatic.com/public/javascript/promo/stickers.js?v=W8NP8aTVqtms&l=english
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
|
unknown
|
||
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
|
unknown
|
||
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://steam.tv/
|
unknown
|
||
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
https://licendfilteo.site:443/api
|
unknown
|
||
https://steamcommunity.com/p
|
unknown
|
||
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
|
unknown
|
||
https://community.steamstatic.com/public/css/skin_1/profilev2.css?v=t9xiI4DlPpEB&l=english
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://community.steamstatic.com/public/javascript/applications/community/main.js?v=4XouecKy8sZy&am
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://clearancek.site/api
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://sketchfab.com
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://steamcommunity.com/U
|
unknown
|
||
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
|
unknown
|
||
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
|
unknown
|
||
https://store.steampowered.com/;
|
unknown
|
||
https://community.steamstatic.com/public/css/promo/summer2017/stickers.css?v=P8gOPraCSjV6&l=engl
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900&
|
unknown
|
||
https://community.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://recaptcha.net/recaptcha/;
|
unknown
|
||
https://community.steamstatic.com/public/javascript/applications/community/manifest.js?v=r7a4-LYcQOj
|
unknown
|
||
https://dissapoiznw.store:443/api
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://medal.tv
|
unknown
|
||
https://broadcast.st.dl.eccdnx.com
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
|
unknown
|
||
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
|
unknown
|
||
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a61
|
unknown
|
||
https://community.steamstatic.com/
|
unknown
|
||
https://community.steamstatic.com/public/css/applications/community/main.css?v=DVae4t4RZiHA&l=en
|
unknown
|
||
https://clearancek.site:443/api
|
unknown
|
||
https://steamcommunity.com/workshop/
|
unknown
|
||
https://login.steampowered.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
sergei-esenin.com
|
104.21.53.8
|
||
eaglepawnoy.store
|
unknown
|
||
bathdoomgaz.store
|
unknown
|
||
spirittunek.store
|
unknown
|
||
licendfilteo.site
|
unknown
|
||
studennotediw.store
|
unknown
|
||
mobbipenju.store
|
unknown
|
||
clearancek.site
|
unknown
|
||
dissapoiznw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.53.8
|
sergei-esenin.com
|
United States
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4D1000
|
unkown
|
page execute and read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
5C07000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
5C12000
|
trusted library allocation
|
page read and write
|
||
6A9000
|
unkown
|
page execute and read and write
|
||
414E000
|
stack
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
12FD000
|
heap
|
page read and write
|
||
525F000
|
stack
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
7F3000
|
unkown
|
page execute and write copy
|
||
5ED2000
|
trusted library allocation
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
770000
|
unkown
|
page execute and read and write
|
||
12EA000
|
heap
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
154F000
|
stack
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
742000
|
unkown
|
page execute and read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
1281000
|
heap
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
731000
|
unkown
|
page execute and read and write
|
||
12F9000
|
heap
|
page read and write
|
||
73E000
|
unkown
|
page execute and write copy
|
||
4C91000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
5CF7000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
128B000
|
heap
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
736000
|
unkown
|
page execute and read and write
|
||
7CC000
|
unkown
|
page execute and write copy
|
||
732000
|
unkown
|
page execute and write copy
|
||
3D8E000
|
stack
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
2FBC000
|
stack
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
128B000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BD4000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
78F000
|
unkown
|
page execute and write copy
|
||
12EB000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
792000
|
unkown
|
page execute and read and write
|
||
5BCF000
|
stack
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
5A2F000
|
stack
|
page read and write
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
unkown
|
page execute and write copy
|
||
510D000
|
stack
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
766000
|
unkown
|
page execute and write copy
|
||
120A000
|
heap
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
5CEA000
|
trusted library allocation
|
page read and write
|
||
7CA000
|
unkown
|
page execute and write copy
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5EF1000
|
trusted library allocation
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
5F09000
|
trusted library allocation
|
page read and write
|
||
12EB000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
7A3000
|
unkown
|
page execute and write copy
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
5ED8000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
12FD000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5CDB000
|
trusted library allocation
|
page read and write
|
||
5BD5000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
561F000
|
stack
|
page read and write
|
||
530000
|
unkown
|
page execute and write copy
|
||
5CEA000
|
trusted library allocation
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
6DB000
|
unkown
|
page execute and read and write
|
||
52E9000
|
trusted library allocation
|
page read and write
|
||
5BD8000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
4D1000
|
unkown
|
page execute and write copy
|
||
320F000
|
stack
|
page read and write
|
||
5C32000
|
trusted library allocation
|
page read and write
|
||
12FB000
|
heap
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
7F2000
|
unkown
|
page execute and read and write
|
||
5CDD000
|
trusted library allocation
|
page read and write
|
||
515C000
|
stack
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
12FA000
|
heap
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
12EB000
|
heap
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
5C28000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
74E000
|
unkown
|
page execute and write copy
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
5CF9000
|
trusted library allocation
|
page read and write
|
||
5770000
|
remote allocation
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
6AC000
|
unkown
|
page execute and write copy
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
118A000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
63D0000
|
trusted library allocation
|
page read and write
|
||
702000
|
unkown
|
page execute and write copy
|
||
5C35000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
7DC000
|
unkown
|
page execute and write copy
|
||
12ED000
|
heap
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
68EF000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
703000
|
unkown
|
page execute and read and write
|
||
7DB000
|
unkown
|
page execute and read and write
|
||
12EC000
|
heap
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
55AC000
|
trusted library allocation
|
page read and write
|
||
759000
|
unkown
|
page execute and write copy
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
58CD000
|
stack
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
747000
|
unkown
|
page execute and read and write
|
||
12EC000
|
heap
|
page read and write
|
||
2FCD000
|
heap
|
page read and write
|
||
5C14000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
4C91000
|
heap
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
5770000
|
remote allocation
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
12FD000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
768000
|
unkown
|
page execute and read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
5CDF000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
7A4000
|
unkown
|
page execute and read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
72E000
|
unkown
|
page execute and write copy
|
||
1200000
|
heap
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
75E000
|
unkown
|
page execute and read and write
|
||
5770000
|
remote allocation
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
6D8000
|
unkown
|
page execute and write copy
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
5BE3000
|
trusted library allocation
|
page read and write
|
||
128B000
|
heap
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
5CFA000
|
trusted library allocation
|
page read and write
|
||
70B000
|
unkown
|
page execute and write copy
|
||
4C91000
|
heap
|
page read and write
|
||
74F000
|
unkown
|
page execute and read and write
|
||
438F000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page execute and read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5FB1000
|
trusted library allocation
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
769000
|
unkown
|
page execute and write copy
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
heap
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
575F000
|
stack
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
6D1000
|
unkown
|
page execute and write copy
|
||
1271000
|
heap
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
5C26000
|
trusted library allocation
|
page read and write
|
||
1283000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
53C000
|
unkown
|
page execute and write copy
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
5C14000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
743000
|
unkown
|
page execute and write copy
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
5C14000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
6D1000
|
unkown
|
page execute and read and write
|
||
360E000
|
stack
|
page read and write
|
||
6C6000
|
unkown
|
page execute and read and write
|
||
12F7000
|
heap
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5BD4000
|
trusted library allocation
|
page read and write
|
||
108B000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
12DF000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
12EB000
|
heap
|
page read and write
|
||
7F2000
|
unkown
|
page execute and write copy
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
1283000
|
heap
|
page read and write
|
||
715000
|
unkown
|
page execute and read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
5C24000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
128B000
|
heap
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
unkown
|
page execute and write copy
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
unkown
|
page execute and read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
7DB000
|
unkown
|
page execute and write copy
|
There are 529 hidden memdumps, click here to show them.