Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\DiFxAPI.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Forbudenes2.MON
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MEMORABLENESS.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600,
atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Standardiserede7.sma
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\document-open-recent-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5F49.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\portaudio_x64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-release.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://www.vmware.com/0
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
http://www.vmware.com/0/
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
There are 5 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ABSCISSAS\Unpauperised
|
Hjlpeskrmen
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Moringaceous\Forladegevrer193
|
Expand String Value
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Celioncus\POLEYNE
|
Expand String Value
|
||
HKEY_CURRENT_USER\Software\dbenavnet\rehearhearing
|
Duping181
|
||
HKEY_CURRENT_USER\Software\Unvamped92\Universitetsdirektrernes60
|
Idyls
|
||
HKEY_CURRENT_USER\Software\Counterbrace57\monaxon
|
Expand String Value
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Kollapsen117\Margygr
|
dorsicolumn
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
30B0000
|
direct allocation
|
page execute and read and write
|
||
64C73FE000
|
stack
|
page read and write
|
||
1E07E878000
|
heap
|
page read and write
|
||
20C3F613000
|
heap
|
page read and write
|
||
20C44B00000
|
trusted library allocation
|
page read and write
|
||
20C3F691000
|
heap
|
page read and write
|
||
20C44E4B000
|
heap
|
page read and write
|
||
249559B0000
|
remote allocation
|
page read and write
|
||
1E2F3E65000
|
heap
|
page read and write
|
||
20C44BE0000
|
trusted library allocation
|
page read and write
|
||
468A17F000
|
stack
|
page read and write
|
||
24955402000
|
heap
|
page read and write
|
||
1E07E842000
|
heap
|
page read and write
|
||
1E07E87B000
|
heap
|
page read and write
|
||
4278CFF000
|
stack
|
page read and write
|
||
16AA4C13000
|
heap
|
page read and write
|
||
1E07E86C000
|
heap
|
page read and write
|
||
1D265BF0000
|
heap
|
page read and write
|
||
20C44AF1000
|
trusted library allocation
|
page read and write
|
||
468A07D000
|
stack
|
page read and write
|
||
1D265C00000
|
heap
|
page read and write
|
||
24955440000
|
heap
|
page read and write
|
||
1C057C80000
|
heap
|
page read and write
|
||
1D265E26000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
1E2F3E13000
|
heap
|
page read and write
|
||
20BFAC6C000
|
heap
|
page read and write
|
||
1E07E85F000
|
heap
|
page read and write
|
||
1D265F13000
|
heap
|
page read and write
|
||
20BFAC5B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1D266602000
|
trusted library allocation
|
page read and write
|
||
20BFAB70000
|
heap
|
page read and write
|
||
16AA4A60000
|
heap
|
page read and write
|
||
16AA4C49000
|
heap
|
page read and write
|
||
16AA4C77000
|
heap
|
page read and write
|
||
64C6EFE000
|
stack
|
page read and write
|
||
23B4000
|
heap
|
page read and write
|
||
20C44EF5000
|
heap
|
page read and write
|
||
24955400000
|
heap
|
page read and write
|
||
427867C000
|
stack
|
page read and write
|
||
1D265E66000
|
heap
|
page read and write
|
||
1C057E77000
|
heap
|
page read and write
|
||
20C44F02000
|
heap
|
page read and write
|
||
1B086920000
|
heap
|
page read and write
|
||
20C44ADE000
|
trusted library allocation
|
page read and write
|
||
4278BFC000
|
stack
|
page read and write
|
||
20C3FF58000
|
heap
|
page read and write
|
||
1B086A29000
|
heap
|
page read and write
|
||
1C057E8C000
|
heap
|
page read and write
|
||
1E07E832000
|
heap
|
page read and write
|
||
20BFAC64000
|
heap
|
page read and write
|
||
20C449C0000
|
trusted library allocation
|
page read and write
|
||
16AA4C4F000
|
heap
|
page read and write
|
||
64C71FE000
|
stack
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
20C3F63F000
|
heap
|
page read and write
|
||
B5D9B7C000
|
stack
|
page read and write
|
||
B7C0EFE000
|
stack
|
page read and write
|
||
B5DA17E000
|
stack
|
page read and write
|
||
20C44B10000
|
trusted library allocation
|
page read and write
|
||
5FEF35E000
|
stack
|
page read and write
|
||
1C057E76000
|
heap
|
page read and write
|
||
1E2F3D80000
|
heap
|
page read and write
|
||
72E64000
|
unkown
|
page readonly
|
||
D1A8AEB000
|
stack
|
page read and write
|
||
1D265E5A000
|
heap
|
page read and write
|
||
20C40600000
|
trusted library section
|
page readonly
|
||
4278AF7000
|
stack
|
page read and write
|
||
B5DA27E000
|
stack
|
page read and write
|
||
4689D7B000
|
stack
|
page read and write
|
||
16AA4D13000
|
heap
|
page read and write
|
||
20BFAC27000
|
heap
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
1C057E3C000
|
heap
|
page read and write
|
||
1E07E861000
|
heap
|
page read and write
|
||
16AA4C4C000
|
heap
|
page read and write
|
||
1C057E82000
|
heap
|
page read and write
|
||
36EA000
|
stack
|
page read and write
|
||
20C40640000
|
trusted library section
|
page readonly
|
||
20C44AD8000
|
trusted library allocation
|
page read and write
|
||
1E07E829000
|
heap
|
page read and write
|
||
5FEF9FF000
|
stack
|
page read and write
|
||
2401BFE000
|
stack
|
page read and write
|
||
1C057E00000
|
heap
|
page read and write
|
||
D1A8EFF000
|
stack
|
page read and write
|
||
7BC000
|
heap
|
page read and write
|
||
1E07E846000
|
heap
|
page read and write
|
||
468948B000
|
stack
|
page read and write
|
||
1E07E86E000
|
heap
|
page read and write
|
||
2495545C000
|
heap
|
page read and write
|
||
4D55C7B000
|
stack
|
page read and write
|
||
20C44EF1000
|
heap
|
page read and write
|
||
1C057C10000
|
heap
|
page read and write
|
||
1C057E66000
|
heap
|
page read and write
|
||
1E2F3EC9000
|
heap
|
page read and write
|
||
16AA4C00000
|
heap
|
page read and write
|
||
16AA4C29000
|
heap
|
page read and write
|
||
1C057E60000
|
heap
|
page read and write
|
||
20C44AF4000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
1E07E6D0000
|
heap
|
page read and write
|
||
1E07E849000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
24018FF000
|
stack
|
page read and write
|
||
20C3F679000
|
heap
|
page read and write
|
||
1E07E843000
|
heap
|
page read and write
|
||
1B086B13000
|
heap
|
page read and write
|
||
20C3FDD0000
|
trusted library allocation
|
page read and write
|
||
16AA4C82000
|
heap
|
page read and write
|
||
20C44C30000
|
remote allocation
|
page read and write
|
||
20C44E55000
|
heap
|
page read and write
|
||
D1A91FE000
|
stack
|
page read and write
|
||
1E07E83E000
|
heap
|
page read and write
|
||
B7C0BFE000
|
stack
|
page read and write
|
||
24955502000
|
heap
|
page read and write
|
||
16AA4C3C000
|
heap
|
page read and write
|
||
20C44C30000
|
remote allocation
|
page read and write
|
||
5A0000
|
trusted library allocation
|
page read and write
|
||
1D265C60000
|
heap
|
page read and write
|
||
2400E7B000
|
stack
|
page read and write
|
||
4D562FF000
|
stack
|
page read and write
|
||
20C44E1E000
|
heap
|
page read and write
|
||
1C057E5B000
|
heap
|
page read and write
|
||
20C3F570000
|
trusted library allocation
|
page read and write
|
||
20C44E11000
|
heap
|
page read and write
|
||
1B086A60000
|
heap
|
page read and write
|
||
D1A8FFB000
|
stack
|
page read and write
|
||
1E2F3D10000
|
heap
|
page read and write
|
||
1E07E740000
|
heap
|
page read and write
|
||
1D265D60000
|
trusted library allocation
|
page read and write
|
||
427877E000
|
stack
|
page read and write
|
||
20C44BF0000
|
trusted library allocation
|
page read and write
|
||
20C3F68B000
|
heap
|
page read and write
|
||
1D265F02000
|
heap
|
page read and write
|
||
42789FB000
|
stack
|
page read and write
|
||
24955413000
|
heap
|
page read and write
|
||
1B086A76000
|
heap
|
page read and write
|
||
20C3F600000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
1E07E85D000
|
heap
|
page read and write
|
||
1B086A5C000
|
heap
|
page read and write
|
||
1B086A76000
|
heap
|
page read and write
|
||
24013FE000
|
stack
|
page read and write
|
||
1E2F3F13000
|
heap
|
page read and write
|
||
20C3FF00000
|
heap
|
page read and write
|
||
1E2F4602000
|
heap
|
page read and write
|
||
B5D9F7E000
|
stack
|
page read and write
|
||
20C40620000
|
trusted library section
|
page readonly
|
||
20C44AF0000
|
trusted library allocation
|
page read and write
|
||
20C3FF18000
|
heap
|
page read and write
|
||
2401077000
|
stack
|
page read and write
|
||
1E2F3D20000
|
heap
|
page read and write
|
||
1D265E71000
|
heap
|
page read and write
|
||
B5D9A7A000
|
stack
|
page read and write
|
||
B7C0AFE000
|
stack
|
page read and write
|
||
1C057F13000
|
heap
|
page read and write
|
||
4D55CFE000
|
stack
|
page read and write
|
||
1E2F3F02000
|
heap
|
page read and write
|
||
1E07E82F000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
20C3F69C000
|
heap
|
page read and write
|
||
20C44EAB000
|
heap
|
page read and write
|
||
24016FE000
|
stack
|
page read and write
|
||
5FEF7FB000
|
stack
|
page read and write
|
||
B7C10FD000
|
stack
|
page read and write
|
||
20C3F69E000
|
heap
|
page read and write
|
||
20C44E3E000
|
heap
|
page read and write
|
||
1C058602000
|
trusted library allocation
|
page read and write
|
||
20C3F674000
|
heap
|
page read and write
|
||
20BFB330000
|
trusted library allocation
|
page read and write
|
||
1E07E84C000
|
heap
|
page read and write
|
||
20C40610000
|
trusted library section
|
page readonly
|
||
B7C0FFD000
|
stack
|
page read and write
|
||
20BFAB60000
|
heap
|
page read and write
|
||
20C44BA0000
|
trusted library allocation
|
page read and write
|
||
1E07E6E0000
|
heap
|
page read and write
|
||
20C3F713000
|
heap
|
page read and write
|
||
4689B7F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
20C44E62000
|
heap
|
page read and write
|
||
1E2F3ECC000
|
heap
|
page read and write
|
||
5FEFAFF000
|
stack
|
page read and write
|
||
46898FB000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
249559B0000
|
remote allocation
|
page read and write
|
||
16AA4BD0000
|
trusted library allocation
|
page read and write
|
||
1E07E83B000
|
heap
|
page read and write
|
||
4D55D7E000
|
stack
|
page read and write
|
||
20C3F629000
|
heap
|
page read and write
|
||
20C44C20000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
1B0868B0000
|
heap
|
page read and write
|
||
280D000
|
trusted library allocation
|
page read and write
|
||
1C057D80000
|
trusted library allocation
|
page read and write
|
||
24955A02000
|
trusted library allocation
|
page read and write
|
||
20C44E9E000
|
heap
|
page read and write
|
||
20C3F677000
|
heap
|
page read and write
|
||
20C40001000
|
trusted library allocation
|
page read and write
|
||
16AA4C78000
|
heap
|
page read and write
|
||
1C057F02000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
20BFAC72000
|
heap
|
page read and write
|
||
1B086A00000
|
heap
|
page read and write
|
||
20C3FDC0000
|
trusted library allocation
|
page read and write
|
||
20C3F470000
|
heap
|
page read and write
|
||
16AA4A70000
|
heap
|
page read and write
|
||
1E2F3E29000
|
heap
|
page read and write
|
||
B5DA07E000
|
stack
|
page read and write
|
||
1C057F08000
|
heap
|
page read and write
|
||
20C3F580000
|
trusted library section
|
page read and write
|
||
1D265E02000
|
heap
|
page read and write
|
||
1E2F4739000
|
heap
|
page read and write
|
||
20C44F00000
|
heap
|
page read and write
|
||
4689CFE000
|
stack
|
page read and write
|
||
B5DA37E000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
20C44C00000
|
trusted library allocation
|
page read and write
|
||
20C44E2B000
|
heap
|
page read and write
|
||
1E2F4700000
|
heap
|
page read and write
|
||
20C3F400000
|
heap
|
page read and write
|
||
1C057E29000
|
heap
|
page read and write
|
||
1B087202000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
239F000
|
stack
|
page read and write
|
||
B7C077B000
|
stack
|
page read and write
|
||
1E2F3E88000
|
heap
|
page read and write
|
||
1D265E3E000
|
heap
|
page read and write
|
||
5FEF3DE000
|
stack
|
page read and write
|
||
20C44AD0000
|
trusted library allocation
|
page read and write
|
||
1E07E867000
|
heap
|
page read and write
|
||
16AA4C52000
|
heap
|
page read and write
|
||
1E07E800000
|
heap
|
page read and write
|
||
D1A90FF000
|
stack
|
page read and write
|
||
1E07E860000
|
heap
|
page read and write
|
||
20C44EE0000
|
heap
|
page read and write
|
||
4D560F7000
|
stack
|
page read and write
|
||
1B0868C0000
|
heap
|
page read and write
|
||
B5D9E7D000
|
stack
|
page read and write
|
||
4689F7E000
|
stack
|
page read and write
|
||
1E2F3E6E000
|
heap
|
page read and write
|
||
1B086A55000
|
heap
|
page read and write
|
||
20C40630000
|
trusted library section
|
page readonly
|
||
20BFAC87000
|
heap
|
page read and write
|
||
20C44EA0000
|
heap
|
page read and write
|
||
20C405F0000
|
trusted library section
|
page readonly
|
||
20C3FDC3000
|
trusted library allocation
|
page read and write
|
||
20C3FF18000
|
heap
|
page read and write
|
||
1E2F3EBB000
|
heap
|
page read and write
|
||
24012F9000
|
stack
|
page read and write
|
||
B5D9C7E000
|
stack
|
page read and write
|
||
72E60000
|
unkown
|
page readonly
|
||
24955220000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
20BFAC3D000
|
heap
|
page read and write
|
||
20C44E00000
|
heap
|
page read and write
|
||
20BFAD13000
|
heap
|
page read and write
|
||
16AA5402000
|
trusted library allocation
|
page read and write
|
||
1B086A66000
|
heap
|
page read and write
|
||
B7C0D7E000
|
stack
|
page read and write
|
||
20C3FDE0000
|
trusted library allocation
|
page read and write
|
||
4689A7F000
|
stack
|
page read and write
|
||
1C057E13000
|
heap
|
page read and write
|
||
249553F0000
|
trusted library allocation
|
page read and write
|
||
20C3FF02000
|
heap
|
page read and write
|
||
16AA4D00000
|
heap
|
page read and write
|
||
1B086A13000
|
heap
|
page read and write
|
||
20C44C30000
|
trusted library allocation
|
page read and write
|
||
1E07E87C000
|
heap
|
page read and write
|
||
64C70FF000
|
stack
|
page read and write
|
||
16AA4AD0000
|
heap
|
page read and write
|
||
20BFAC00000
|
heap
|
page read and write
|
||
240187F000
|
stack
|
page read and write
|
||
1B086B02000
|
heap
|
page read and write
|
||
20C3FF59000
|
heap
|
page read and write
|
||
4D55EFF000
|
stack
|
page read and write
|
||
1E2F3E67000
|
heap
|
page read and write
|
||
20C3F68D000
|
heap
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
24955429000
|
heap
|
page read and write
|
||
1C057C20000
|
heap
|
page read and write
|
||
20BFB402000
|
trusted library allocation
|
page read and write
|
||
42786FE000
|
stack
|
page read and write
|
||
24017FE000
|
stack
|
page read and write
|
||
1C057E76000
|
heap
|
page read and write
|
||
42788FE000
|
stack
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
20BFABD0000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1E2F3DB0000
|
trusted library allocation
|
page read and write
|
||
1E07F002000
|
trusted library allocation
|
page read and write
|
||
16AA4D02000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
20C3F657000
|
heap
|
page read and write
|
||
20C3FF13000
|
heap
|
page read and write
|
||
4D55FFB000
|
stack
|
page read and write
|
||
1B086A8A000
|
heap
|
page read and write
|
||
20C44EF7000
|
heap
|
page read and write
|
||
1E07E862000
|
heap
|
page read and write
|
||
16AA4C55000
|
heap
|
page read and write
|
||
1E2F3E00000
|
heap
|
page read and write
|
||
20BFAC13000
|
heap
|
page read and write
|
||
24011FB000
|
stack
|
page read and write
|
||
240167F000
|
stack
|
page read and write
|
||
5FEF8F7000
|
stack
|
page read and write
|
||
20C3F702000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
20C44C30000
|
remote allocation
|
page read and write
|
||
72E61000
|
unkown
|
page execute read
|
||
20C3F6FB000
|
heap
|
page read and write
|
||
1B087080000
|
trusted library allocation
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
24015FB000
|
stack
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
20C3F410000
|
heap
|
page read and write
|
||
5FEF2DC000
|
stack
|
page read and write
|
||
20BFAC02000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
20C44E16000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
1B086A8C000
|
heap
|
page read and write
|
||
B5D987C000
|
stack
|
page read and write
|
||
20C44B00000
|
trusted library allocation
|
page read and write
|
||
1E07E82E000
|
heap
|
page read and write
|
||
1E2F3E83000
|
heap
|
page read and write
|
||
1B086A64000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
249559B0000
|
remote allocation
|
page read and write
|
||
20C3F66F000
|
heap
|
page read and write
|
||
1B086A3C000
|
heap
|
page read and write
|
||
7A2000
|
heap
|
page read and write
|
||
1E2F4713000
|
heap
|
page read and write
|
||
1E2F3E42000
|
heap
|
page read and write
|
||
1E07E848000
|
heap
|
page read and write
|
||
1E07E84A000
|
heap
|
page read and write
|
||
4689E7D000
|
stack
|
page read and write
|
||
240177F000
|
stack
|
page read and write
|
||
4D561FE000
|
stack
|
page read and write
|
||
1B086B00000
|
heap
|
page read and write
|
||
1E07E87F000
|
heap
|
page read and write
|
||
1E07E83C000
|
heap
|
page read and write
|
||
27FF000
|
stack
|
page read and write
|
||
1B086B08000
|
heap
|
page read and write
|
||
1D265F00000
|
heap
|
page read and write
|
||
16AA4D08000
|
heap
|
page read and write
|
||
20C3F6AC000
|
heap
|
page read and write
|
||
20C44F05000
|
heap
|
page read and write
|
||
20C40990000
|
trusted library allocation
|
page read and write
|
||
16AA4C71000
|
heap
|
page read and write
|
||
B5D9D7F000
|
stack
|
page read and write
|
||
1C057F00000
|
heap
|
page read and write
|
||
20C40510000
|
trusted library allocation
|
page read and write
|
||
B7C0C7E000
|
stack
|
page read and write
|
||
20C40420000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1B086A90000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
1D265E00000
|
heap
|
page read and write
|
||
72E66000
|
unkown
|
page readonly
|
||
4689BFC000
|
stack
|
page read and write
|
||
1C057E52000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
20C44C10000
|
trusted library allocation
|
page read and write
|
||
1E07E86A000
|
heap
|
page read and write
|
||
1B086A82000
|
heap
|
page read and write
|
||
1E07E813000
|
heap
|
page read and write
|
||
20C3F5E1000
|
trusted library allocation
|
page read and write
|
||
1B086A78000
|
heap
|
page read and write
|
||
20C3FE00000
|
heap
|
page read and write
|
||
1E07E885000
|
heap
|
page read and write
|
||
B7C0E7D000
|
stack
|
page read and write
|
||
64C6E7B000
|
stack
|
page read and write
|
||
1E07E841000
|
heap
|
page read and write
|
||
24019FC000
|
stack
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
35ED000
|
stack
|
page read and write
|
||
20C3FE02000
|
heap
|
page read and write
|
||
20C44B14000
|
trusted library allocation
|
page read and write
|
||
20C3FE15000
|
heap
|
page read and write
|
||
20BFAC65000
|
heap
|
page read and write
|
||
1E07E770000
|
trusted library allocation
|
page read and write
|
||
64C72FE000
|
stack
|
page read and write
|
||
1E07E902000
|
heap
|
page read and write
|
||
249551C0000
|
heap
|
page read and write
|
||
16AA4C48000
|
heap
|
page read and write
|
||
1E07E845000
|
heap
|
page read and write
|
||
64C6F7E000
|
stack
|
page read and write
|
||
20BFAD02000
|
heap
|
page read and write
|
||
1E07E847000
|
heap
|
page read and write
|
||
24014FD000
|
stack
|
page read and write
|
||
1D265E13000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
20C44AD0000
|
trusted library allocation
|
page read and write
|
||
249551B0000
|
heap
|
page read and write
|
There are 385 hidden memdumps, click here to show them.