IOC Report
Launcher.exe

loading gif

Files

File Path
Type
Category
Malicious
Launcher.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Launcher.exe_Mic_f74e1663a5a0b81440bbd1616998843fb822d7d_95756e28_d38ce5c1-f4a1-4545-9092-2c0ff3beb800\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER599.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Dec 22 22:49:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER675.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A4.tmp.xml
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Launcher.exe
"C:\Users\user\Desktop\Launcher.exe"
malicious
C:\Users\user\Desktop\Launcher.exe
"C:\Users\user\Desktop\Launcher.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 600

URLs

Name
IP
Malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
aspecteirs.lat
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://lev-tolstoi.com/urT
unknown
https://community.fastly.steamstatic.com/public/shared/im
unknown
sweepyribs.lat
https://lev-tolstoi.com/S
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
sustainskelet.lat
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://lev-tolstoi.com/piC
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://steamcommunity.com/profiles/76561199724331900
23.55.153.106
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://lev-tolstoi.com/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
energyaffai.lat
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://www.ecosia.org/newtab/
unknown
https://lev-tolstoi.com/apis/d
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://lev-tolstoi.com/api
104.21.66.86
https://lev-tolstoi.com:443/apil
unknown
https://lev-tolstoi.com:443/apii
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://store.steampo
unknown
grannyejh.lat
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
https://lev-tolstoi.com/er
unknown
necklacebudi.lat
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://recaptcha.net/recaptcha/;
unknown
https://lev-tolstoi.com/uo
unknown
https://lev-tolstoi.com/apis
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://medal.tv
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
crosshuaht.lat
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
unknown
https://store.steampowered.com/legal/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
unknown
https://grannyejh.lat:443/api_f
unknown
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
unknown
https://lev-tolstoi.com/api=
unknown
https://lev-tolstoi.com/pS
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://lev-tolstoi.com/5
unknown
https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
unknown
https://lev-tolstoi.com/3
unknown
https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
unknown
https://lev-tolstoi.com/apiC
unknown
https://lev-tolstoi.com/api1
unknown
http://upx.sf.net
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sustainskelet.lat
unknown
malicious
crosshuaht.lat
unknown
malicious
energyaffai.lat
unknown
malicious
necklacebudi.lat
unknown
malicious
steamcommunity.com
23.55.153.106
lev-tolstoi.com
104.21.66.86
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
sweepyribs.lat
unknown
discokeyus.lat
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.66.86
lev-tolstoi.com
United States
23.55.153.106
steamcommunity.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
ProgramId
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
FileId
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
LowerCaseLongPath
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
LongPathHash
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
Name
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
OriginalFileName
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
Publisher
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
Version
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
BinFileVersion
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
BinaryType
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
ProductName
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
ProductVersion
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
LinkDate
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
BinProductVersion
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
AppxPackageFullName
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
AppxPackageRelativeId
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
Size
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
Language
\REGISTRY\A\{8e1bd181-bea2-f0f9-3327-2fff0aa6d0ec}\Root\InventoryApplicationFile\launcher.exe|5df27559031fce4
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2F4D000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3A56000
trusted library allocation
page read and write
1010000
heap
page read and write
FEA000
heap
page read and write
FF9000
heap
page read and write
3A48000
trusted library allocation
page read and write
45E1000
trusted library allocation
page read and write
F6F000
heap
page read and write
F6F000
heap
page read and write
FF3000
heap
page read and write
FFB000
heap
page read and write
F72000
heap
page read and write
A01000
unkown
page readonly
1040000
heap
page read and write
9FC000
unkown
page write copy
3A1F000
trusted library allocation
page read and write
A04000
unkown
page write copy
39D1000
trusted library allocation
page read and write
F5A000
heap
page read and write
3A0C000
trusted library allocation
page read and write
FF3000
heap
page read and write
F72000
heap
page read and write
F6F000
heap
page read and write
101B000
heap
page read and write
39E6000
trusted library allocation
page read and write
3A5F000
trusted library allocation
page read and write
3A11000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
39FA000
trusted library allocation
page read and write
39FA000
trusted library allocation
page read and write
9FC000
unkown
page execute and read and write
39FE000
trusted library allocation
page read and write
2F3E000
stack
page read and write
3A23000
trusted library allocation
page read and write
39FB000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
39F2000
trusted library allocation
page read and write
FC5000
heap
page read and write
3A16000
trusted library allocation
page read and write
F6F000
heap
page read and write
F5A000
heap
page read and write
3A20000
trusted library allocation
page read and write
3420000
remote allocation
page read and write
FF6000
heap
page read and write
39E2000
trusted library allocation
page read and write
32BF000
stack
page read and write
39DF000
trusted library allocation
page read and write
1010000
heap
page read and write
BEB000
stack
page read and write
3A2F000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
39FA000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
A4C000
unkown
page readonly
3AFC000
trusted library allocation
page read and write
1017000
heap
page read and write
F6F000
heap
page read and write
3BBC000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
3AD1000
heap
page read and write
FF0000
heap
page read and write
F72000
heap
page read and write
F90000
heap
page read and write
12E6000
heap
page read and write
39E6000
trusted library allocation
page read and write
FDC000
heap
page read and write
FD5000
heap
page read and write
FF0000
heap
page read and write
3A4E000
trusted library allocation
page read and write
FF0000
heap
page read and write
39E6000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
3ADD000
trusted library allocation
page read and write
3A51000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
F5A000
heap
page read and write
FD4000
heap
page read and write
3A67000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
3A2C000
trusted library allocation
page read and write
13EF000
heap
page read and write
3B84000
trusted library allocation
page read and write
3A4E000
trusted library allocation
page read and write
39E0000
trusted library allocation
page read and write
3420000
remote allocation
page read and write
3A1D000
trusted library allocation
page read and write
3A5C000
trusted library allocation
page read and write
9C0000
unkown
page readonly
9C1000
unkown
page execute read
3A4F000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
FDA000
heap
page read and write
3A1F000
trusted library allocation
page read and write
11A0000
heap
page read and write
FF3000
heap
page read and write
3A1F000
trusted library allocation
page read and write
F54000
heap
page read and write
39FE000
trusted library allocation
page read and write
3AD0000
heap
page read and write
101D000
heap
page read and write
FDC000
heap
page read and write
FF0000
heap
page read and write
3A04000
trusted library allocation
page read and write
3B14000
trusted library allocation
page read and write
31BE000
stack
page read and write
3980000
trusted library allocation
page read and write
101D000
heap
page read and write
39E6000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
F90000
heap
page read and write
39D1000
trusted library allocation
page read and write
1010000
heap
page read and write
9F1000
unkown
page readonly
3A09000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
39FE000
trusted library allocation
page read and write
F90000
heap
page read and write
2E3F000
stack
page read and write
39DA000
trusted library allocation
page read and write
3A14000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
452000
remote allocation
page execute and read and write
3A4E000
trusted library allocation
page read and write
2B8F000
stack
page read and write
FD7000
heap
page read and write
A04000
unkown
page write copy
3B74000
trusted library allocation
page read and write
121E000
stack
page read and write
F90000
heap
page read and write
3A46000
trusted library allocation
page read and write
3A14000
trusted library allocation
page read and write
FF3000
heap
page read and write
3A1A000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
13B2000
heap
page read and write
3A24000
trusted library allocation
page read and write
FEA000
heap
page read and write
3A0F000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
F54000
heap
page read and write
FF3000
heap
page read and write
39EE000
trusted library allocation
page read and write
101A000
heap
page read and write
39FC000
trusted library allocation
page read and write
F5A000
heap
page read and write
3420000
remote allocation
page read and write
3A5C000
trusted library allocation
page read and write
A04000
unkown
page write copy
39ED000
trusted library allocation
page read and write
39D1000
trusted library allocation
page read and write
13F7000
heap
page read and write
39D5000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
3A05000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
FEA000
heap
page read and write
F72000
heap
page read and write
39FE000
trusted library allocation
page read and write
3A4E000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
F6F000
heap
page read and write
3A87000
trusted library allocation
page read and write
39FE000
trusted library allocation
page read and write
3A3E000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
13EF000
heap
page read and write
F90000
heap
page read and write
FF3000
heap
page read and write
13C8000
heap
page read and write
1010000
heap
page read and write
3A87000
trusted library allocation
page read and write
F72000
heap
page read and write
FE2000
heap
page read and write
F90000
heap
page read and write
39DA000
trusted library allocation
page read and write
F53000
heap
page read and write
FF3000
heap
page read and write
39EE000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
3A09000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
FEA000
heap
page read and write
FEA000
heap
page read and write
FF0000
heap
page read and write
39F3000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
FEA000
heap
page read and write
3A1F000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
9C0000
unkown
page readonly
F6F000
heap
page read and write
39F6000
trusted library allocation
page read and write
FF3000
heap
page read and write
2D3F000
stack
page read and write
FF9000
heap
page read and write
3A28000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
FF3000
heap
page read and write
1010000
heap
page read and write
3A0E000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
FF3000
heap
page read and write
3A1F000
trusted library allocation
page read and write
FEA000
heap
page read and write
39DA000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
F5A000
heap
page read and write
13CF000
heap
page read and write
F90000
heap
page read and write
F6F000
heap
page read and write
36BE000
stack
page read and write
F90000
heap
page read and write
3A1A000
trusted library allocation
page read and write
3A14000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
381F000
stack
page read and write
3A20000
trusted library allocation
page read and write
F5A000
heap
page read and write
FEA000
heap
page read and write
9C1000
unkown
page execute read
3A0F000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
9F1000
unkown
page readonly
9FC000
unkown
page write copy
F72000
heap
page read and write
39D5000
trusted library allocation
page read and write
F5A000
heap
page read and write
3A16000
trusted library allocation
page read and write
9C0000
unkown
page readonly
1403000
heap
page read and write
13EF000
heap
page read and write
3A27000
trusted library allocation
page read and write
3A3C000
trusted library allocation
page read and write
39D8000
trusted library allocation
page read and write
F53000
heap
page read and write
FDB000
heap
page read and write
3A1F000
trusted library allocation
page read and write
FF0000
heap
page read and write
F54000
heap
page read and write
FC5000
heap
page read and write
F72000
heap
page read and write
3A05000
trusted library allocation
page read and write
FEA000
heap
page read and write
39E6000
trusted library allocation
page read and write
FF0000
heap
page read and write
1010000
heap
page read and write
F5A000
heap
page read and write
FDA000
heap
page read and write
39ED000
trusted library allocation
page read and write
9C1000
unkown
page execute read
A01000
unkown
page readonly
F2A000
heap
page read and write
F72000
heap
page read and write
3A33000
trusted library allocation
page read and write
3A6F000
trusted library allocation
page read and write
1010000
heap
page read and write
FD4000
heap
page read and write
FF0000
heap
page read and write
1010000
heap
page read and write
39FE000
trusted library allocation
page read and write
F54000
heap
page read and write
3A56000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
3BB4000
trusted library allocation
page read and write
3A05000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
F54000
heap
page read and write
101B000
heap
page read and write
FEA000
heap
page read and write
11D0000
heap
page read and write
1006000
heap
page read and write
F6F000
heap
page read and write
F5A000
heap
page read and write
FF0000
heap
page read and write
39ED000
trusted library allocation
page read and write
F90000
heap
page read and write
39FA000
trusted library allocation
page read and write
39EE000
trusted library allocation
page read and write
39E6000
trusted library allocation
page read and write
FEA000
heap
page read and write
F53000
heap
page read and write
3A20000
trusted library allocation
page read and write
3A3F000
trusted library allocation
page read and write
FF4000
heap
page read and write
FF3000
heap
page read and write
39D5000
trusted library allocation
page read and write
39F5000
trusted library allocation
page read and write
397F000
stack
page read and write
F6F000
heap
page read and write
F90000
heap
page read and write
39D5000
trusted library allocation
page read and write
F53000
heap
page read and write
317D000
stack
page read and write
9F1000
unkown
page readonly
FEA000
heap
page read and write
12E0000
heap
page read and write
FF4000
heap
page read and write
39D2000
trusted library allocation
page read and write
1010000
heap
page read and write
3A27000
trusted library allocation
page read and write
39E6000
trusted library allocation
page read and write
13F0000
heap
page read and write
39FB000
trusted library allocation
page read and write
FF3000
heap
page read and write
13A0000
heap
page read and write
3A38000
trusted library allocation
page read and write
FC7000
heap
page read and write
101D000
heap
page read and write
3A0F000
trusted library allocation
page read and write
F43000
heap
page read and write
FF3000
heap
page read and write
3A1F000
trusted library allocation
page read and write
33FF000
stack
page read and write
FF3000
heap
page read and write
1010000
heap
page read and write
A4C000
unkown
page readonly
3A34000
trusted library allocation
page read and write
FF0000
heap
page read and write
13C7000
heap
page read and write
13F0000
heap
page read and write
3A02000
trusted library allocation
page read and write
142F000
heap
page read and write
F72000
heap
page read and write
3A4E000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
FD1000
heap
page read and write
3A4E000
trusted library allocation
page read and write
3A14000
trusted library allocation
page read and write
3A22000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
F72000
heap
page read and write
F72000
heap
page read and write
39F3000
trusted library allocation
page read and write
10BE000
stack
page read and write
F6F000
heap
page read and write
3C0A000
trusted library allocation
page read and write
3A48000
trusted library allocation
page read and write
3A11000
trusted library allocation
page read and write
F54000
heap
page read and write
3A2E000
trusted library allocation
page read and write
FF0000
heap
page read and write
3A4F000
trusted library allocation
page read and write
A01000
unkown
page readonly
FF0000
heap
page read and write
39FE000
trusted library allocation
page read and write
10C5000
heap
page read and write
1010000
heap
page read and write
F43000
heap
page read and write
FDD000
heap
page read and write
39F6000
trusted library allocation
page read and write
39D9000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
40DA000
trusted library allocation
page read and write
FF3000
heap
page read and write
3A1F000
trusted library allocation
page read and write
371E000
stack
page read and write
FF3000
heap
page read and write
3A36000
trusted library allocation
page read and write
39ED000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
3C65000
trusted library allocation
page read and write
F6F000
heap
page read and write
F90000
heap
page read and write
39E6000
trusted library allocation
page read and write
103C000
stack
page read and write
FEA000
heap
page read and write
A01000
unkown
page readonly
39E6000
trusted library allocation
page read and write
1010000
heap
page read and write
F72000
heap
page read and write
307D000
stack
page read and write
101A000
heap
page read and write
3A37000
trusted library allocation
page read and write
FF0000
heap
page read and write
3A1F000
trusted library allocation
page read and write
1010000
heap
page read and write
3B34000
trusted library allocation
page read and write
129F000
stack
page read and write
39F2000
trusted library allocation
page read and write
3A5C000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
1010000
heap
page read and write
3A1F000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
9C1000
unkown
page execute read
10C7000
heap
page read and write
2A9A000
trusted library allocation
page read and write
113C000
stack
page read and write
F72000
heap
page read and write
3A1F000
trusted library allocation
page read and write
A4C000
unkown
page readonly
39E6000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
FEA000
heap
page read and write
FF0000
heap
page read and write
F54000
heap
page read and write
3A26000
trusted library allocation
page read and write
F6F000
heap
page read and write
9FC000
unkown
page write copy
F90000
heap
page read and write
101B000
heap
page read and write
F72000
heap
page read and write
39FB000
trusted library allocation
page read and write
FEA000
heap
page read and write
39E6000
trusted library allocation
page read and write
F5A000
heap
page read and write
39E1000
trusted library allocation
page read and write
F6F000
heap
page read and write
3A0F000
trusted library allocation
page read and write
2F3D000
stack
page read and write
FD5000
heap
page read and write
3A5F000
trusted library allocation
page read and write
FEA000
heap
page read and write
F5A000
heap
page read and write
FF0000
heap
page read and write
2FE0000
heap
page read and write
1006000
heap
page read and write
FF4000
heap
page read and write
39E0000
trusted library allocation
page read and write
F5A000
heap
page read and write
3A16000
trusted library allocation
page read and write
F6F000
heap
page read and write
39E6000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
39FE000
trusted library allocation
page read and write
3D77000
trusted library allocation
page read and write
F53000
heap
page read and write
3A36000
trusted library allocation
page read and write
3A5F000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
3A4E000
trusted library allocation
page read and write
F72000
heap
page read and write
39E0000
trusted library allocation
page read and write
F54000
heap
page read and write
3A09000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
FE5000
heap
page read and write
9C0000
unkown
page readonly
3A1F000
trusted library allocation
page read and write
35BD000
stack
page read and write
303D000
stack
page read and write
3A18000
trusted library allocation
page read and write
39FE000
trusted library allocation
page read and write
3A09000
trusted library allocation
page read and write
FF4000
heap
page read and write
1010000
heap
page read and write
A04000
unkown
page write copy
3ADA000
trusted library allocation
page read and write
3A38000
trusted library allocation
page read and write
F90000
heap
page read and write
3A1F000
trusted library allocation
page read and write
F5A000
heap
page read and write
39F2000
trusted library allocation
page read and write
39FE000
trusted library allocation
page read and write
F90000
heap
page read and write
13CF000
heap
page read and write
125E000
stack
page read and write
39E6000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
39FD000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
2EE0000
heap
page read and write
F5A000
heap
page read and write
346E000
stack
page read and write
39F5000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
F6F000
heap
page read and write
39FE000
trusted library allocation
page read and write
FF0000
heap
page read and write
FDF000
heap
page read and write
3A8F000
trusted library allocation
page read and write
9FD000
unkown
page read and write
3A1F000
trusted library allocation
page read and write
1010000
heap
page read and write
32FE000
stack
page read and write
39F8000
trusted library allocation
page read and write
39FE000
trusted library allocation
page read and write
39FC000
trusted library allocation
page read and write
F90000
heap
page read and write
FF0000
heap
page read and write
39E2000
trusted library allocation
page read and write
3A2B000
trusted library allocation
page read and write
F3E000
heap
page read and write
F5A000
heap
page read and write
FD0000
heap
page read and write
39E2000
trusted library allocation
page read and write
39EE000
trusted library allocation
page read and write
3A37000
trusted library allocation
page read and write
3A0A000
trusted library allocation
page read and write
12DE000
stack
page read and write
39D5000
trusted library allocation
page read and write
39F7000
trusted library allocation
page read and write
39E6000
trusted library allocation
page read and write
9F1000
unkown
page readonly
3A78000
trusted library allocation
page read and write
39EE000
trusted library allocation
page read and write
F72000
heap
page read and write
3A1C000
trusted library allocation
page read and write
F54000
heap
page read and write
3AE3000
trusted library allocation
page read and write
30E0000
heap
page read and write
2FE1000
heap
page read and write
3A5C000
trusted library allocation
page read and write
F5A000
heap
page read and write
1415000
heap
page read and write
F5A000
heap
page read and write
3A35000
trusted library allocation
page read and write
39F7000
trusted library allocation
page read and write
3A7A000
trusted library allocation
page read and write
FD8000
heap
page read and write
FF3000
heap
page read and write
3A0F000
trusted library allocation
page read and write
FEA000
heap
page read and write
10C0000
heap
page read and write
3A1F000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
F20000
heap
page read and write
3172000
heap
page read and write
3A3E000
trusted library allocation
page read and write
39FB000
trusted library allocation
page read and write
39F6000
trusted library allocation
page read and write
3A0A000
trusted library allocation
page read and write
39E6000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
137D000
stack
page read and write
F72000
heap
page read and write
3A0F000
trusted library allocation
page read and write
FF3000
heap
page read and write
FF0000
heap
page read and write
39C0000
heap
page read and write
3A29000
trusted library allocation
page read and write
F54000
heap
page read and write
3A4E000
trusted library allocation
page read and write
FEA000
heap
page read and write
F90000
heap
page read and write
FF0000
heap
page read and write
3A12000
trusted library allocation
page read and write
3C4C000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
39FF000
trusted library allocation
page read and write
3A22000
trusted library allocation
page read and write
FD8000
heap
page read and write
387E000
stack
page read and write
3A1F000
trusted library allocation
page read and write
39FD000
trusted library allocation
page read and write
F6F000
heap
page read and write
3A14000
trusted library allocation
page read and write
F90000
heap
page read and write
3BDE000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
3A2E000
trusted library allocation
page read and write
1010000
heap
page read and write
39E1000
trusted library allocation
page read and write
39FE000
trusted library allocation
page read and write
39FF000
trusted library allocation
page read and write
F6F000
heap
page read and write
F54000
heap
page read and write
EFB000
stack
page read and write
3BAC000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
3A46000
trusted library allocation
page read and write
FF0000
heap
page read and write
356E000
stack
page read and write
3A1F000
trusted library allocation
page read and write
3A40000
trusted library allocation
page read and write
13AB000
heap
page read and write
F54000
heap
page read and write
3A49000
trusted library allocation
page read and write
FD8000
heap
page read and write
3A28000
trusted library allocation
page read and write
A4C000
unkown
page readonly
1190000
heap
page read and write
3243000
heap
page read and write
F5A000
heap
page read and write
F90000
heap
page read and write
3A1F000
trusted library allocation
page read and write
F72000
heap
page read and write
3A0E000
trusted library allocation
page read and write
3A1D000
trusted library allocation
page read and write
FE6000
heap
page read and write
3A1F000
trusted library allocation
page read and write
FF0000
heap
page read and write
3A16000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
1050000
heap
page read and write
FE6000
heap
page read and write
39FC000
trusted library allocation
page read and write
F54000
heap
page read and write
3A37000
trusted library allocation
page read and write
1260000
heap
page read and write
There are 590 hidden memdumps, click here to show them.