IOC Report
Launcher.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Launcher.exe
C:\Users\user\Desktop\Launcher.exe
malicious

URLs

Name
IP
Malicious
http://www.impallari.comThis
unknown
http://foo/bar/images/img_downloadwhite.png
unknown
http://foo/Images/img_downloadWhite.png
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage
unknown
https://api.telegram.org/bot
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLMontserratThinMontserratRomanWeightExtraLightLig
unknown
http://foo/bar/fonts/dosis.ttf
unknown
https://universe-city.io/
unknown
http://defaultcontainer/UniverseCity;component/Images/img_downloadWhite.png
unknown
http://defaultcontainer/UniverseCity;component/Fonts/montserrat-variablefont_wght.ttf
unknown
http://foo/bar/fonts/montserrat-variablefont_wght.ttf
unknown
https://twitter.com/UniverseCityP2E
unknown
https://api.telegram.org/bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage?chat_id=-1001
unknown
http://foo/Fonts/dosis.ttf
unknown
http://www.zkysky.com.ar/This
unknown
http://www.zkysky.com.ar/
unknown
http://defaultcontainer/UniverseCity;component/Fonts/dosis.ttf
unknown
https://api.telegram
unknown
https://github.com/JulietaUla/Montserrat)
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLDosisExtraLightWeightLightMediumSemiBoldBoldExtr
unknown
https://discord.com/invite/universecity
unknown
http://foo/Fonts/montserrat-variablefont_wght.ttf
unknown
http://www.impallari.com
unknown
http://scripts.sil.org/OFL
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://discord.com/invite/universecityGhttps://twitter.com/UniverseCityP2E3https://universe-city.io
unknown
https://universe-city.io/download/UniverseCity.zip
unknown
https://api.telegram.org/bot5802716616:AAH_P81FtM2pxxnBzX9bl8iFQfHnI4qwKEs/sendMessage?chat_id=-1001729137879&text=5.0%20NEW%2020.11.2022%0A%E2%9C%85%D0%A3%D1%81%D0%BF%D0%B5%D1%88%D0%BD%D1%8B%D0%B9%20%D0%B7%D0%B0%D0%BF%D1%83%D1%81%D0%BA%20%D0%BB%D0%B0%D1%83%D0%BD%D1%87%D0%B5%D1%80%D0%B0:%20user%0A%D0%A1%D0%B0%D0%B9%D1%82:%20universecity%0A%D0%94%D0%B0%D1%82%D0%B0%2011/24/2022%207:35:59%20PM&parse_mode=Markdown&disable_web_page_preview=True
149.154.167.220
https://github.com/JulietaUla/Montserrat)Montserrat
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Launcher_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A440000
trusted library allocation
page read and write
20253E13000
heap
page read and write
59EF000
trusted library allocation
page read and write
740000
heap
page read and write
4A80000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
5B3B000
trusted library allocation
page read and write
550E000
stack
page read and write
3011EFD000
stack
page read and write
10F0000
trusted library allocation
page execute and read and write
2C10000
trusted library allocation
page read and write
201C6302000
heap
page read and write
1B63666B000
heap
page read and write
E1277C000
stack
page read and write
2CA5CF9000
stack
page read and write
A2A0000
trusted library allocation
page read and write
A5E2000
trusted library allocation
page read and write
A5EB000
trusted library allocation
page read and write
2AC098B9000
heap
page read and write
159FFA50000
heap
page read and write
5BAE000
trusted library allocation
page read and write
1829D030000
trusted library allocation
page read and write
6582000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
5A12000
trusted library allocation
page read and write
2AC09913000
heap
page read and write
58CC000
stack
page read and write
5B55000
trusted library allocation
page read and write
A136000
trusted library allocation
page read and write
1B63665A000
heap
page read and write
2CA5D7E000
stack
page read and write
5B4A000
trusted library allocation
page read and write
A2D0000
trusted library allocation
page read and write
20253E02000
heap
page read and write
A3BC000
trusted library allocation
page read and write
DE7C4FC000
stack
page read and write
144ED013000
heap
page read and write
5AD0000
trusted library allocation
page read and write
20253BC0000
heap
page read and write
5360000
trusted library allocation
page read and write
20253D80000
trusted library allocation
page read and write
1829CD40000
heap
page read and write
201C6A02000
trusted library allocation
page read and write
FCD78FE000
stack
page read and write
1829DCB0000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
5B68000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
DE7C2FD000
stack
page read and write
235BC30D000
heap
page read and write
1000000
trusted library allocation
page read and write
1829D060000
heap
page read and write
235BBC79000
heap
page read and write
A530000
heap
page read and write
A503000
trusted library allocation
page read and write
9CA2000
trusted library allocation
page read and write
144ED750000
remote allocation
page read and write
235BB9E0000
heap
page read and write
655A000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
2C0D000
trusted library allocation
page read and write
5F3C000
stack
page read and write
1829CEF8000
heap
page read and write
235BC630000
heap
page read and write
D9F000
heap
page read and write
1829D020000
trusted library allocation
page read and write
FFCCC000
trusted library allocation
page execute read
109E000
stack
page read and write
650B000
trusted library allocation
page read and write
78AC67F000
stack
page read and write
1018000
trusted library allocation
page read and write
64FA000
trusted library allocation
page read and write
2A00962F000
heap
page read and write
5A3B000
trusted library allocation
page read and write
144ED058000
heap
page read and write
10A0000
heap
page execute and read and write
159FFA40000
heap
page read and write
6549000
trusted library allocation
page read and write
235BBC43000
heap
page read and write
A540000
trusted library allocation
page read and write
235BC202000
heap
page read and write
5B57000
trusted library allocation
page read and write
2A009550000
heap
page read and write
653E000
trusted library allocation
page read and write
A2D0000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
7B9000
stack
page read and write
1030000
trusted library allocation
page read and write
144ED000000
heap
page read and write
5A34000
trusted library allocation
page read and write
A4F6000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
A756000
trusted library allocation
page read and write
1829CF4C000
heap
page read and write
5A21000
trusted library allocation
page read and write
20253E48000
heap
page read and write
4CA290C000
stack
page read and write
5B74000
trusted library allocation
page read and write
5A34000
trusted library allocation
page read and write
A65A000
trusted library allocation
page read and write
159FFA7B000
heap
page read and write
159FF8E0000
heap
page read and write
A710000
trusted library allocation
page read and write
A716000
trusted library allocation
page read and write
1037000
trusted library allocation
page execute and read and write
2A0095B0000
heap
page read and write
5B93000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
1B636613000
heap
page read and write
235BBC8F000
heap
page read and write
64FA000
trusted library allocation
page read and write
A65E000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
1B636602000
heap
page read and write
2AC0A112000
heap
page read and write
144ECF50000
heap
page read and write
6509000
trusted library allocation
page read and write
A4A0000
trusted library allocation
page read and write
1829CD50000
trusted library allocation
page read and write
5B47000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
1B636E02000
trusted library allocation
page read and write
2CA58AB000
stack
page read and write
144ED040000
heap
page read and write
5B7C000
trusted library allocation
page read and write
235BC1C0000
trusted library allocation
page read and write
202557E0000
remote allocation
page read and write
A637000
heap
page read and write
1032000
trusted library allocation
page read and write
1B636675000
heap
page read and write
2C33000
trusted library allocation
page read and write
574E000
stack
page read and write
FFCC7000
trusted library allocation
page readonly
2A81000
trusted library allocation
page read and write
6590000
trusted library allocation
page read and write
2CA5DF9000
stack
page read and write
67C9000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
15A00002000
trusted library allocation
page read and write
A621000
trusted library allocation
page read and write
159FFA13000
heap
page read and write
159FFA7A000
heap
page read and write
A766000
trusted library allocation
page read and write
60BC000
stack
page read and write
1829CF3C000
heap
page read and write
64FE000
trusted library allocation
page read and write
78AC17E000
stack
page read and write
235BBC00000
heap
page read and write
2AF1000
trusted library allocation
page read and write
10ED000
stack
page read and write
FCD70BB000
stack
page read and write
5A21000
trusted library allocation
page read and write
E1237E000
stack
page read and write
A553000
trusted library allocation
page read and write
6785000
trusted library allocation
page read and write
2AC09720000
heap
page read and write
A5E0000
trusted library allocation
page read and write
61BD000
stack
page read and write
6802000
trusted library allocation
page read and write
1829D070000
trusted library allocation
page read and write
6534000
trusted library allocation
page read and write
A706000
trusted library allocation
page read and write
D90000
heap
page read and write
A2E0000
trusted library allocation
page read and write
5244000
heap
page execute and read and write
6514000
trusted library allocation
page read and write
A2A0000
trusted library allocation
page read and write
235BBC77000
heap
page read and write
E1257C000
stack
page read and write
CEF000
heap
page read and write
FFCC4000
trusted library allocation
page execute read
E1217F000
stack
page read and write
6515000
trusted library allocation
page read and write
652F000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
1829D050000
trusted library allocation
page read and write
5A15000
trusted library allocation
page read and write
FFCB4000
trusted library allocation
page readonly
235BC3B0000
heap
page read and write
A5DF000
trusted library allocation
page read and write
CFD000
heap
page read and write
63F1000
trusted library allocation
page read and write
1829CF5A000
heap
page read and write
A6FC000
trusted library allocation
page read and write
1138000
heap
page read and write
201C6229000
heap
page read and write
A740000
trusted library allocation
page read and write
2AC098DF000
heap
page read and write
6529000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
5DFE000
stack
page read and write
6421000
trusted library allocation
page read and write
235BC36D000
heap
page read and write
A57E000
trusted library allocation
page read and write
A43C000
stack
page read and write
FFCCE000
trusted library allocation
page execute read
A2E0000
unkown
page read and write
5AE0000
trusted library allocation
page read and write
607E000
stack
page read and write
159FFA6A000
heap
page read and write
2C45000
trusted library allocation
page read and write
235BBC5A000
heap
page read and write
20253E47000
heap
page read and write
4CA2D7A000
stack
page read and write
5020000
trusted library allocation
page read and write
A3AF000
trusted library allocation
page read and write
1B6365F0000
trusted library allocation
page read and write
6576000
trusted library allocation
page read and write
A4B0000
trusted library allocation
page read and write
29E8000
trusted library allocation
page read and write
235BBC8B000
heap
page read and write
2A009650000
heap
page read and write
6510000
trusted library allocation
page read and write
159FFA00000
heap
page read and write
A581000
trusted library allocation
page read and write
2AC098C3000
heap
page read and write
235BC322000
heap
page read and write
159FFA32000
heap
page read and write
1829CEA0000
heap
page read and write
6579000
trusted library allocation
page read and write
235BBD8E000
heap
page read and write
2AC0986D000
heap
page read and write
A657000
trusted library allocation
page read and write
FFCB1000
trusted library allocation
page execute read
5CFE000
stack
page read and write
201C6213000
heap
page read and write
D478C7B000
stack
page read and write
144ECFF0000
trusted library allocation
page read and write
201C6070000
heap
page read and write
2C20000
trusted library allocation
page read and write
2AC097B0000
trusted library allocation
page read and write
4C1E000
stack
page read and write
235BBC69000
heap
page read and write
FFCC9000
trusted library allocation
page readonly
159FFA63000
heap
page read and write
142EA7E000
stack
page read and write
A4FD000
trusted library allocation
page read and write
6548000
trusted library allocation
page read and write
1829D069000
heap
page read and write
50B0000
heap
page read and write
3011F7F000
stack
page read and write
142EC7E000
stack
page read and write
2A009613000
heap
page read and write
2AEE000
trusted library allocation
page read and write
D94000
heap
page read and write
201C6313000
heap
page read and write
657B000
trusted library allocation
page read and write
2A009560000
heap
page read and write
FFCB3000
trusted library allocation
page execute read
159FFA65000
heap
page read and write
235BC300000
heap
page read and write
5020000
trusted library allocation
page read and write
159FFA4F000
heap
page read and write
142EE7E000
stack
page read and write
5A2F000
trusted library allocation
page read and write
1B636600000
heap
page read and write
4CA31FA000
stack
page read and write
A480000
trusted library allocation
page read and write
2A00963C000
heap
page read and write
2AC09800000
heap
page read and write
2A009600000
heap
page read and write
5B6A000
trusted library allocation
page read and write
235BC354000
heap
page read and write
235BC602000
heap
page read and write
159FF8F0000
heap
page read and write
235BBC90000
heap
page read and write
560E000
stack
page read and write
1829DA76000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
1829CEF0000
heap
page read and write
2AC09780000
heap
page read and write
29E3000
trusted library allocation
page read and write
5A0C000
trusted library allocation
page read and write
4CA2F7C000
stack
page read and write
235BBA40000
heap
page read and write
5A3B000
trusted library allocation
page read and write
1B636713000
heap
page read and write
FFCC3000
trusted library allocation
page readonly
5380000
trusted library allocation
page read and write
159FFA45000
heap
page read and write
A64E000
trusted library allocation
page read and write
5A36000
trusted library allocation
page read and write
D98000
heap
page read and write
A2F0000
trusted library allocation
page read and write
FFCCB000
trusted library allocation
page readonly
5A1A000
trusted library allocation
page read and write
2C06000
trusted library allocation
page read and write
159FFA6B000
heap
page read and write
235BC312000
heap
page read and write
A440000
trusted library allocation
page read and write
202557E0000
remote allocation
page read and write
59FA000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
2AC0A100000
heap
page read and write
D478E7E000
stack
page read and write
5240000
heap
page execute and read and write
A517000
trusted library allocation
page read and write
159FFA29000
heap
page read and write
A511000
trusted library allocation
page read and write
59C8000
stack
page read and write
5A3B000
trusted library allocation
page read and write
654A000
trusted library allocation
page read and write
2B5E000
trusted library allocation
page read and write
159FFA30000
heap
page read and write
5230000
trusted library allocation
page read and write
1B636490000
heap
page read and write
103B000
trusted library allocation
page execute and read and write
A460000
trusted library allocation
page read and write
201C6060000
heap
page read and write
A546000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
652C000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
6586000
trusted library allocation
page read and write
20253F00000
heap
page read and write
A3B9000
trusted library allocation
page read and write
78AC27D000
stack
page read and write
2AC09867000
heap
page read and write
201C60D0000
heap
page read and write
6460000
trusted library allocation
page read and write
1829CF4D000
heap
page read and write
2B44000
trusted library allocation
page read and write
1829DCC0000
trusted library allocation
page read and write
4CA347E000
stack
page read and write
A746000
trusted library allocation
page read and write
FFCC2000
trusted library allocation
page execute read
5A3B000
trusted library allocation
page read and write
612000
unkown
page readonly
30117EB000
stack
page read and write
A703000
trusted library allocation
page read and write
159FFA67000
heap
page read and write
E1267E000
stack
page read and write
657F000
trusted library allocation
page read and write
CC0000
heap
page read and write
78AC37F000
stack
page read and write
6534000
trusted library allocation
page read and write
5A1A000
trusted library allocation
page read and write
20253E00000
heap
page read and write
202557E0000
remote allocation
page read and write
5B81000
trusted library allocation
page read and write
20253F13000
heap
page read and write
1B6364F0000
heap
page read and write
2AC09837000
heap
page read and write
2AC0A13B000
heap
page read and write
20253E62000
heap
page read and write
2A009629000
heap
page read and write
5A3B000
trusted library allocation
page read and write
1829CE80000
heap
page read and write
159FFA60000
heap
page read and write
6320000
trusted library allocation
page read and write
A2B0000
trusted library allocation
page read and write
1829D010000
trusted library allocation
page read and write
A2A8000
trusted library allocation
page read and write
A3E5000
trusted library allocation
page read and write
235BBC3C000
heap
page read and write
E11BAB000
stack
page read and write
5B3E000
trusted library allocation
page read and write
9C84000
trusted library allocation
page read and write
2AC09710000
heap
page read and write
144ED750000
remote allocation
page read and write
61C0000
remote allocation
page read and write
706000
unkown
page readonly
2C24000
trusted library allocation
page read and write
4CA2FF9000
stack
page read and write
2AC09813000
heap
page read and write
D47917E000
stack
page read and write
201C623C000
heap
page read and write
A6F6000
trusted library allocation
page read and write
201C6202000
heap
page read and write
A440000
trusted library allocation
page read and write
30121FD000
stack
page read and write
2AC09902000
heap
page read and write
A3A0000
trusted library allocation
page read and write
78AC07C000
stack
page read and write
61C0000
remote allocation
page read and write
1B636480000
heap
page read and write
1110000
trusted library allocation
page read and write
6572000
trusted library allocation
page read and write
2A009E02000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
201C6300000
heap
page read and write
20253E48000
heap
page read and write
5A21000
trusted library allocation
page read and write
20253E78000
heap
page read and write
2A70000
heap
page read and write
A506000
trusted library allocation
page read and write
61C0000
remote allocation
page read and write
20253E42000
heap
page read and write
A763000
trusted library allocation
page read and write
564E000
stack
page read and write
20253C30000
heap
page read and write
1003000
trusted library allocation
page execute and read and write
63FE000
trusted library allocation
page read and write
DE7C17D000
stack
page read and write
235BC613000
heap
page read and write
4CA30FE000
stack
page read and write
65C2000
trusted library allocation
page read and write
E1247C000
stack
page read and write
144ECF60000
heap
page read and write
102A000
trusted library allocation
page execute and read and write
5230000
unkown
page read and write
652C000
trusted library allocation
page read and write
20253DC0000
trusted library allocation
page read and write
C30000
heap
page read and write
DAB000
heap
page read and write
657B000
trusted library allocation
page read and write
159FFA7E000
heap
page read and write
A2F0000
unkown
page read and write
20253E58000
heap
page read and write
2A009702000
heap
page read and write
5A21000
trusted library allocation
page read and write
20253E89000
heap
page read and write
63F5000
trusted library allocation
page read and write
159FFA49000
heap
page read and write
A2B0000
trusted library allocation
page read and write
DE7B8CB000
stack
page read and write
A470000
trusted library allocation
page read and write
DE7C1FB000
stack
page read and write
50B4000
heap
page read and write
2A009652000
heap
page read and write
2A009602000
heap
page read and write
1829DD10000
trusted library allocation
page read and write
657F000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
D47927F000
stack
page read and write
648B000
trusted library allocation
page read and write
A2A0000
trusted library allocation
page read and write
662E000
stack
page read and write
20253E58000
heap
page read and write
A2B0000
trusted library allocation
page read and write
3011C7E000
stack
page read and write
2A009625000
heap
page read and write
6586000
trusted library allocation
page read and write
3011CFE000
stack
page read and write
6443000
trusted library allocation
page read and write
A3E7000
trusted library allocation
page read and write
159FFA56000
heap
page read and write
235BBC82000
heap
page read and write
FFCB0000
trusted library allocation
page readonly
FFCCA000
trusted library allocation
page execute read
1829DCA0000
heap
page readonly
29DF000
stack
page read and write
235BC627000
heap
page read and write
750000
heap
page read and write
A450000
trusted library allocation
page read and write
4CA337F000
stack
page read and write
A640000
trusted library allocation
page read and write
64C9000
trusted library allocation
page read and write
6576000
trusted library allocation
page read and write
A2D0000
trusted library allocation
page read and write
159FFA39000
heap
page read and write
59E0000
trusted library allocation
page read and write
673E000
trusted library allocation
page read and write
A2E0000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
144ECFC0000
heap
page read and write
FCD75FB000
stack
page read and write
651D000
trusted library allocation
page read and write
78ABC7C000
stack
page read and write
159FFA6D000
heap
page read and write
201C6255000
heap
page read and write
67D1000
trusted library allocation
page read and write
FFCC1000
trusted library allocation
page readonly
640B000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
5BB4000
trusted library allocation
page read and write
1829CF3C000
heap
page read and write
D479079000
stack
page read and write
2B5A000
trusted library allocation
page read and write
5B79000
trusted library allocation
page read and write
4CA2E7F000
stack
page read and write
235BC623000
heap
page read and write
2CA5C79000
stack
page read and write
1020000
trusted library allocation
page read and write
62FE000
stack
page read and write
78ABF7E000
stack
page read and write
DE7C3FE000
stack
page read and write
FFCB5000
trusted library allocation
page execute read
235BC600000
heap
page read and write
A5E7000
trusted library allocation
page read and write
20253E57000
heap
page read and write
A554000
trusted library allocation
page read and write
FFCC5000
trusted library allocation
page readonly
655A000
trusted library allocation
page read and write
A63B000
heap
page read and write
5380000
trusted library allocation
page execute and read and write
5A3B000
trusted library allocation
page read and write
2A009649000
heap
page read and write
5A31000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
3011DFE000
stack
page read and write
A54D000
trusted library allocation
page read and write
6403000
trusted library allocation
page read and write
20253F29000
heap
page read and write
A3E0000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
159FFA47000
heap
page read and write
DE7C5FF000
stack
page read and write
6490000
trusted library allocation
page read and write
2A0095E0000
trusted library allocation
page read and write
FFCCD000
trusted library allocation
page readonly
6589000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
E11FFD000
stack
page read and write
A74D000
trusted library allocation
page read and write
2AC09886000
heap
page read and write
235BC1A0000
trusted library allocation
page read and write
235BBC85000
heap
page read and write
20253D30000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
61FE000
stack
page read and write
159FF980000
trusted library allocation
page read and write
653E000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
1829D065000
heap
page read and write
2AC09848000
heap
page read and write
20255802000
trusted library allocation
page read and write
A633000
heap
page read and write
A4C1000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
4CA32FE000
stack
page read and write
142EF7E000
stack
page read and write
A2E0000
trusted library allocation
page read and write
235BBD13000
heap
page read and write
235BC322000
heap
page read and write
A4F0000
trusted library allocation
page read and write
113E000
heap
page read and write
2C16000
trusted library allocation
page read and write
1004000
trusted library allocation
page read and write
610000
unkown
page readonly
159FFA3D000
heap
page read and write
A585000
trusted library allocation
page read and write
FCD76FE000
stack
page read and write
D68000
heap
page read and write
2AC098E2000
heap
page read and write
20253D50000
trusted library allocation
page read and write
A508000
trusted library allocation
page read and write
A3EA000
trusted library allocation
page read and write
201C6270000
heap
page read and write
6496000
trusted library allocation
page read and write
5A35000
trusted library allocation
page read and write
20253BD0000
heap
page read and write
2C41000
trusted library allocation
page read and write
A566000
trusted library allocation
page read and write
201C61D0000
trusted library allocation
page read and write
D478F7C000
stack
page read and write
A2C0000
trusted library allocation
page read and write
159FFB02000
heap
page read and write
3A91000
trusted library allocation
page read and write
DE7BEFE000
stack
page read and write
FCD77FE000
stack
page read and write
2A009644000
heap
page read and write
235BBC43000
heap
page read and write
100D000
trusted library allocation
page execute and read and write
159FFA62000
heap
page read and write
2A009664000
heap
page read and write
5BC8000
trusted library allocation
page read and write
235BC302000
heap
page read and write
658E000
trusted library allocation
page read and write
672C000
stack
page read and write
5A3B000
trusted library allocation
page read and write
78AC47F000
stack
page read and write
59E5000
trusted library allocation
page read and write
641E000
trusted library allocation
page read and write
2AC09865000
heap
page read and write
235BC38E000
heap
page read and write
142EAFE000
stack
page read and write
5B4A000
trusted library allocation
page read and write
20253E2A000
heap
page read and write
1026000
trusted library allocation
page execute and read and write
A3C8000
trusted library allocation
page read and write
6543000
trusted library allocation
page read and write
142E7AC000
stack
page read and write
1B636629000
heap
page read and write
A0B0000
trusted library allocation
page read and write
78AC57F000
stack
page read and write
64FA000
trusted library allocation
page read and write
144ED102000
heap
page read and write
159FF950000
heap
page read and write
7A70000
trusted library allocation
page read and write
144ED750000
remote allocation
page read and write
1829CF01000
heap
page read and write
5A3B000
trusted library allocation
page read and write
5F7E000
stack
page read and write
E1227E000
stack
page read and write
6424000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
A62B000
trusted library allocation
page read and write
A65C000
trusted library allocation
page read and write
6572000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
235BB9D0000
heap
page read and write
4A88000
trusted library allocation
page read and write
301207D000
stack
page read and write
64C9000
trusted library allocation
page read and write
159FFA77000
heap
page read and write
159FFA42000
heap
page read and write
6582000
trusted library allocation
page read and write
A33E000
stack
page read and write
1130000
heap
page read and write
1035000
trusted library allocation
page execute and read and write
A2D0000
trusted library allocation
page read and write
FFCC8000
trusted library allocation
page execute read
CCA000
heap
page read and write
A664000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
235BBC29000
heap
page read and write
1829DA70000
trusted library allocation
page read and write
1829CF34000
heap
page read and write
159FFA4E000
heap
page read and write
DE7C07C000
stack
page read and write
5B64000
trusted library allocation
page read and write
235BBDE5000
heap
page read and write
A3C1000
trusted library allocation
page read and write
1B636641000
heap
page read and write
1B636702000
heap
page read and write
5E3E000
stack
page read and write
2A009637000
heap
page read and write
652F000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
101D000
trusted library allocation
page execute and read and write
1010000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
3A81000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
201C6200000
heap
page read and write
2AC0A002000
heap
page read and write
78AC77E000
stack
page read and write
2AC098CA000
heap
page read and write
159FFA4B000
heap
page read and write
1829CF3C000
heap
page read and write
144ED002000
heap
page read and write
59EA000
trusted library allocation
page read and write
FFCC6000
trusted library allocation
page execute read
A77E000
trusted library allocation
page read and write
20253F02000
heap
page read and write
2B4D000
trusted library allocation
page read and write
FFCC0000
trusted library allocation
page execute read
6564000
trusted library allocation
page read and write
AF8000
stack
page read and write
159FFA46000
heap
page read and write
6525000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
144ED02A000
heap
page read and write
5370000
unkown
page read and write
DE7BCFC000
stack
page read and write
235BBDB9000
heap
page read and write
142ED7E000
stack
page read and write
A556000
trusted library allocation
page read and write
64C9000
trusted library allocation
page read and write
1022000
trusted library allocation
page read and write
655F000
trusted library allocation
page read and write
30120FF000
stack
page read and write
78ABE7B000
stack
page read and write
A598000
trusted library allocation
page read and write
144ED802000
trusted library allocation
page read and write
5B4B000
trusted library allocation
page read and write
59FF000
trusted library allocation
page read and write
159FFA55000
heap
page read and write
655A000
trusted library allocation
page read and write
A781000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
159FFA84000
heap
page read and write
A630000
heap
page read and write
DE7BFFF000
stack
page read and write
235BBC13000
heap
page read and write
235BC343000
heap
page read and write
There are 660 hidden memdumps, click here to show them.