IOC Report
XSLHv0kxy7.exe

loading gif

Files

File Path
Type
Category
Malicious
XSLHv0kxy7.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XSLHv0kxy7.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\P00LCUE.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BLACKSUPER X.exe_175f8be7b2927dcfe564353a4b63bca3ee77699a_64f3a80a_ae410ffc-cda7-44d4-9675-dd62bff63721\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5045.tmp.dmp
Mini DuMP crash report, 16 streams, Sun Nov 17 18:22:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER520B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER523B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators, with escape sequences
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XSLHv0kxy7.exe
"C:\Users\user\Desktop\XSLHv0kxy7.exe"
malicious
C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe
"C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe"
malicious
C:\Users\user\AppData\Local\Temp\P00LCUE.exe
"C:\Users\user\AppData\Local\Temp\P00LCUE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c cls
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c cls
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7576 -s 1684

URLs

Name
IP
Malicious
185.84.161.66
malicious
https://keyauth.win/api/1.2/k
unknown
http://upx.sf.net
unknown
https://keyauth.win/api/1.2/y
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://keyauth.win/api/1.2/
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKSUPER X_RASMANCS
FileDirectory
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
ProgramId
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
FileId
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
LowerCaseLongPath
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
LongPathHash
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
Name
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
OriginalFileName
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
Publisher
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
Version
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
BinFileVersion
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
BinaryType
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
ProductName
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
ProductVersion
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
LinkDate
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
BinProductVersion
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
AppxPackageFullName
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
AppxPackageRelativeId
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
Size
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
Language
\REGISTRY\A\{0c7aafdd-d88c-5ed4-f432-2f3a1cf7b63d}\Root\InventoryApplicationFile\blacksuper x.exe|a7baec89c5678154
Usn
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
952000
unkown
page readonly
malicious
2F71000
trusted library allocation
page read and write
malicious
2C11000
trusted library allocation
page read and write
malicious
7FFD9B746000
trusted library allocation
page execute and read and write
BA6D0FF000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
7FF620371000
unkown
page execute read
7FFD9B67D000
trusted library allocation
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
BA6CEFF000
stack
page read and write
1B3EC000
stack
page read and write
203BAA80000
trusted library allocation
page read and write
EAD000
heap
page read and write
2A5F000
stack
page read and write
1BB0B000
heap
page read and write
BA6CFFE000
stack
page read and write
11E2000
heap
page read and write
2CD2000
trusted library allocation
page read and write
203B9034000
heap
page read and write
7FFD9B6BC000
trusted library allocation
page execute and read and write
950000
unkown
page readonly
203BAA80000
trusted library allocation
page read and write
203BA9B0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
11A0000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B663000
trusted library allocation
page execute and read and write
1093000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
9F0000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FF62037C000
unkown
page write copy
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
E3B000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
10C0000
heap
page read and write
203B90E0000
heap
page read and write
7FFD9B6CC000
trusted library allocation
page execute and read and write
203BC3A3000
heap
page read and write
BA6CDFE000
stack
page read and write
1010000
heap
page read and write
DFA000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9B0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
1C0EE000
stack
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
C10000
unkown
page readonly
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203B9010000
heap
page read and write
203BA9B0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
1BB04000
heap
page read and write
12F78000
trusted library allocation
page read and write
950000
unkown
page readonly
203BAA80000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
12C11000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FF620370000
unkown
page readonly
1165000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
1BAB1000
heap
page read and write
12F71000
trusted library allocation
page read and write
203BA9B0000
trusted library allocation
page read and write
7FFD9B690000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
7FFD9B756000
trusted library allocation
page execute and read and write
203BAA80000
trusted library allocation
page read and write
DF0000
heap
page read and write
203BAA70000
heap
page read and write
DFD000
heap
page read and write
2CB2000
trusted library allocation
page read and write
1B92E000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
BA6CCFC000
stack
page read and write
1B5DB000
stack
page read and write
203BAA80000
trusted library allocation
page read and write
1540000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
1B6A0000
heap
page execute and read and write
203B9013000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
1BB00000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
1BEEE000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
11B5000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203B8FE9000
heap
page read and write
1210000
heap
page read and write
E10000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
7FFD9B674000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
E04000
heap
page read and write
1BAC8000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
11CC000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
DF2000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203B901B000
heap
page read and write
203B9014000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
11AC000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
2CB6000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BC3A0000
heap
page read and write
1BF0F000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
BA6D2FE000
stack
page read and write
1B9AE000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
1C1ED000
stack
page read and write
203BAA80000
trusted library allocation
page read and write
7FFD9B664000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
1190000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
DDC000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
2C0F000
stack
page read and write
7FF62037D000
unkown
page readonly
203BC7F0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203B8FEC000
heap
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
1B8AE000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
7FFD9B710000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
1110000
heap
page read and write
203B9033000
heap
page read and write
12F73000
trusted library allocation
page read and write
11CA000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
7FF620371000
unkown
page execute read
203BAA80000
trusted library allocation
page read and write
203B9017000
heap
page read and write
11D4000
heap
page read and write
11B0000
heap
page read and write
1080000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203B9013000
heap
page read and write
1C00B000
stack
page read and write
1B7F0000
heap
page read and write
964000
unkown
page readonly
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
12C18000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
1110000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA40000
heap
page read and write
203BC2D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B672000
trusted library allocation
page read and write
1B910000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
ECB000
heap
page read and write
7FFD9B69D000
trusted library allocation
page execute and read and write
1B922000
heap
page read and write
E0D000
heap
page read and write
7FFD9B673000
trusted library allocation
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
ED0000
heap
page read and write
7FFD9B720000
trusted library allocation
page execute and read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA990000
heap
page read and write
1BC0E000
stack
page read and write
DD0000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA20000
trusted library allocation
page read and write
1160000
heap
page read and write
C10000
unkown
page readonly
203BAA80000
trusted library allocation
page read and write
10F0000
heap
page read and write
1BFEE000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
2B00000
heap
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
DA4000
stack
page read and write
203BAA80000
trusted library allocation
page read and write
11A6000
heap
page read and write
149E000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B812000
trusted library allocation
page read and write
C66000
unkown
page readonly
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9B0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
DD6000
heap
page read and write
C12000
unkown
page readonly
203BAA80000
trusted library allocation
page read and write
1BB14000
heap
page read and write
FEF000
stack
page read and write
E8C000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
2DEE000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
7FFD9B674000
trusted library allocation
page read and write
203BA9F0000
trusted library allocation
page read and write
203BA9C0000
trusted library allocation
page read and write
139F000
stack
page read and write
203BAA80000
trusted library allocation
page read and write
1216000
heap
page read and write
7FF47E830000
trusted library allocation
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203B9037000
heap
page read and write
2CAF000
trusted library allocation
page read and write
1BCAE000
stack
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
1BB1C000
heap
page read and write
203B91C0000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
E90000
heap
page read and write
1BAAB000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B68D000
trusted library allocation
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
7FF620378000
unkown
page readonly
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203B900A000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B683000
trusted library allocation
page read and write
203BAA7B000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
203B8FE0000
heap
page read and write
1B900000
heap
page execute and read and write
203B9018000
heap
page read and write
7FF62037C000
unkown
page read and write
E12000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
203B901F000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
2E00000
heap
page read and write
7FFD9B68D000
trusted library allocation
page execute and read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
10C5000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
7FFD9B670000
trusted library allocation
page read and write
1BB0D000
stack
page read and write
1170000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
2F60000
heap
page execute and read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
1B19D000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203B8FF6000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
203B9013000
heap
page read and write
203BAAA0000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
1BE0E000
stack
page read and write
203BA9D0000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
EAA000
heap
page read and write
10D0000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
1C10E000
stack
page read and write
1BD0F000
stack
page read and write
7FF62037D000
unkown
page readonly
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
7FFD9B730000
trusted library allocation
page execute and read and write
7FF620378000
unkown
page readonly
203BA9D0000
trusted library allocation
page read and write
126E000
heap
page read and write
BA6D1FF000
stack
page read and write
7FF620370000
unkown
page readonly
7FFD9B71C000
trusted library allocation
page execute and read and write
203BAA80000
trusted library allocation
page read and write
203BA9D0000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
1545000
heap
page read and write
203BA9D0000
trusted library allocation
page read and write
1B7AF000
stack
page read and write
FF0000
heap
page read and write
11E4000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
CF1000
stack
page read and write
7FFD9B69B000
trusted library allocation
page execute and read and write
203BAA80000
trusted library allocation
page read and write
203B900A000
heap
page read and write
203BAA75000
heap
page read and write
203BAA80000
trusted library allocation
page read and write
203BAA80000
trusted library allocation
page read and write
There are 396 hidden memdumps, click here to show them.