Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
XSLHv0kxy7.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XSLHv0kxy7.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\P00LCUE.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BLACKSUPER X.exe_175f8be7b2927dcfe564353a4b63bca3ee77699a_64f3a80a_ae410ffc-cda7-44d4-9675-dd62bff63721\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5045.tmp.dmp
|
Mini DuMP crash report, 16 streams, Sun Nov 17 18:22:13 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER520B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER523B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators, with escape sequences
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\XSLHv0kxy7.exe
|
"C:\Users\user\Desktop\XSLHv0kxy7.exe"
|
||
C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe
|
"C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe"
|
||
C:\Users\user\AppData\Local\Temp\P00LCUE.exe
|
"C:\Users\user\AppData\Local\Temp\P00LCUE.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7576 -s 1684
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
185.84.161.66
|
|||
https://keyauth.win/api/1.2/k
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://keyauth.win/api/1.2/y
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://keyauth.win/api/1.2/
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
ProgramId
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
FileId
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
LongPathHash
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
Name
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
OriginalFileName
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
Publisher
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
Version
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
BinFileVersion
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
BinaryType
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
ProductName
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
ProductVersion
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
LinkDate
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
BinProductVersion
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
AppxPackageFullName
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
Size
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
Language
|
||
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
|
Usn
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
952000
|
unkown
|
page readonly
|
||
2F71000
|
trusted library allocation
|
page read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
7FFD9B746000
|
trusted library allocation
|
page execute and read and write
|
||
BA6D0FF000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FF620371000
|
unkown
|
page execute read
|
||
7FFD9B67D000
|
trusted library allocation
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
BA6CEFF000
|
stack
|
page read and write
|
||
1B3EC000
|
stack
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
EAD000
|
heap
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
1BB0B000
|
heap
|
page read and write
|
||
BA6CFFE000
|
stack
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
2CD2000
|
trusted library allocation
|
page read and write
|
||
203B9034000
|
heap
|
page read and write
|
||
7FFD9B6BC000
|
trusted library allocation
|
page execute and read and write
|
||
950000
|
unkown
|
page readonly
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9B0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B663000
|
trusted library allocation
|
page execute and read and write
|
||
1093000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FF62037C000
|
unkown
|
page write copy
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
203B90E0000
|
heap
|
page read and write
|
||
7FFD9B6CC000
|
trusted library allocation
|
page execute and read and write
|
||
203BC3A3000
|
heap
|
page read and write
|
||
BA6CDFE000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9B0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1C0EE000
|
stack
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203B9010000
|
heap
|
page read and write
|
||
203BA9B0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1BB04000
|
heap
|
page read and write
|
||
12F78000
|
trusted library allocation
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
12C11000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FF620370000
|
unkown
|
page readonly
|
||
1165000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1BAB1000
|
heap
|
page read and write
|
||
12F71000
|
trusted library allocation
|
page read and write
|
||
203BA9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
2CC8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B756000
|
trusted library allocation
|
page execute and read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
203BAA70000
|
heap
|
page read and write
|
||
DFD000
|
heap
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
1B92E000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
BA6CCFC000
|
stack
|
page read and write
|
||
1B5DB000
|
stack
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1B6A0000
|
heap
|
page execute and read and write
|
||
203B9013000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1BB00000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1BEEE000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B8FE9000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B674000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1BAC8000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
11CC000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203B901B000
|
heap
|
page read and write
|
||
203B9014000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
11AC000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
2CB6000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BC3A0000
|
heap
|
page read and write
|
||
1BF0F000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
BA6D2FE000
|
stack
|
page read and write
|
||
1B9AE000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1C1ED000
|
stack
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B664000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
7FF62037D000
|
unkown
|
page readonly
|
||
203BC7F0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B8FEC000
|
heap
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
1B8AE000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
203B9033000
|
heap
|
page read and write
|
||
12F73000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FF620371000
|
unkown
|
page execute read
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B9017000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B9013000
|
heap
|
page read and write
|
||
1C00B000
|
stack
|
page read and write
|
||
1B7F0000
|
heap
|
page read and write
|
||
964000
|
unkown
|
page readonly
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
12C18000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA40000
|
heap
|
page read and write
|
||
203BC2D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B672000
|
trusted library allocation
|
page read and write
|
||
1B910000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
ECB000
|
heap
|
page read and write
|
||
7FFD9B69D000
|
trusted library allocation
|
page execute and read and write
|
||
1B922000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
7FFD9B673000
|
trusted library allocation
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page execute and read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA990000
|
heap
|
page read and write
|
||
1BC0E000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA20000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
1BFEE000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
heap
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
stack
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B812000
|
trusted library allocation
|
page read and write
|
||
C66000
|
unkown
|
page readonly
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9B0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
C12000
|
unkown
|
page readonly
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1BB14000
|
heap
|
page read and write
|
||
FEF000
|
stack
|
page read and write
|
||
E8C000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B674000
|
trusted library allocation
|
page read and write
|
||
203BA9F0000
|
trusted library allocation
|
page read and write
|
||
203BA9C0000
|
trusted library allocation
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
7FF47E830000
|
trusted library allocation
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B9037000
|
heap
|
page read and write
|
||
2CAF000
|
trusted library allocation
|
page read and write
|
||
1BCAE000
|
stack
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1BB1C000
|
heap
|
page read and write
|
||
203B91C0000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B67D000
|
trusted library allocation
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
1BAAB000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B68D000
|
trusted library allocation
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FF620378000
|
unkown
|
page readonly
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
2C38000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203B900A000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
2CAC000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B683000
|
trusted library allocation
|
page read and write
|
||
203BAA7B000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B8FE0000
|
heap
|
page read and write
|
||
1B900000
|
heap
|
page execute and read and write
|
||
203B9018000
|
heap
|
page read and write
|
||
7FF62037C000
|
unkown
|
page read and write
|
||
E12000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B901F000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
7FFD9B68D000
|
trusted library allocation
|
page execute and read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
10C5000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
1BB0D000
|
stack
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page execute and read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1B19D000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203B8FF6000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B9013000
|
heap
|
page read and write
|
||
203BAAA0000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1BE0E000
|
stack
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
EAA000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1C10E000
|
stack
|
page read and write
|
||
1BD0F000
|
stack
|
page read and write
|
||
7FF62037D000
|
unkown
|
page readonly
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B730000
|
trusted library allocation
|
page execute and read and write
|
||
7FF620378000
|
unkown
|
page readonly
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
126E000
|
heap
|
page read and write
|
||
BA6D1FF000
|
stack
|
page read and write
|
||
7FF620370000
|
unkown
|
page readonly
|
||
7FFD9B71C000
|
trusted library allocation
|
page execute and read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
203BA9D0000
|
trusted library allocation
|
page read and write
|
||
1B7AF000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
7FFD9B69B000
|
trusted library allocation
|
page execute and read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203B900A000
|
heap
|
page read and write
|
||
203BAA75000
|
heap
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
||
203BAA80000
|
trusted library allocation
|
page read and write
|
There are 396 hidden memdumps, click here to show them.